Process security clearances meticulously, strictly adhering to the Protective Security Policy Framework (PSPF) and EY best practices. Leverage electronic case management systems for efficient clearance processing. Offer advice on clearance...
Conduct business analysis to identify and define requirements for technology delivery. Engage in technical design and development activities to support project initiatives. Facilitate business adoption, user training, and change management...
Web, Web services, mobile and thick client penetration testing. Internal/External network penetration testing. Red Team/Purple Team assessments. Social Engineering assessments. Application Security Consulting and Secure Code Review. Cloud security assessments....
Take a leading role in driving the cross-functional implementation of global data risk program initiatives within local teams in the Area, to drive consistency and efficiency in data risk response,...
Process security clearances meticulously, strictly adhering to the Protective Security Policy Framework (PSPF) and EY best practices. Conduct thorough Quality Assurance checks on Personal Security Files (PSFs) ensuring their alignment...
Process security clearances meticulously, strictly adhering to the Protective Security Policy Framework (PSPF) and EY best practices. Leverage electronic case management systems for efficient clearance processing. Offer advice on clearance...