Expoint – all jobs in one place
מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

דרושים United States, Illinois, Information Security Officer ב-United States

ממשו את הפוטנציאל שלכם בתעשיית ההייטק עם אקספוינט! חפשו הזדמנויות עבודה בתור United States, Illinois, Information Security Officer בUnited States והצטרפו לעוד אלפים שכבר מצאו עבודה בחברות המובילות. התחילו את המסע שלכם עוד היום ומצאו את הקריירה האידיאלית עבורכם בתור United States, Illinois, Information Security Officer עם אקספוינט.
חברה
אופי המשרה
קטגוריות תפקיד
שם תפקיד (1)
United States
אזור
עיר
נמצאו 5,023 משרות
Yesterday
EY

EY Chief Information Security Officer CISO - US Government & Pu... United States, Virginia, Arlington

Limitless High-tech career opportunities - Expoint
The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across...
תיאור:

Responsibilities

  • The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across all environments, platforms and applications used or desired for use by GPS. Responsibilities include:
  • Strategy, Governance and Risk Management
  • Development and execution of a multiyear cybersecurity strategy and investment roadmap aligned to business objectives and federal contract requirements.
  • Development, management and maintenance of the GPS IT security risk management policy and/or procedural documentation mapped to NIST SP 800-37 (RMF), NIST SP 80053, NIST SP 800171, NIST SP 800161 (CSCRM), and NIST SP 800218 (SSDF)
  • Ownership of the enterprise risk assessment (ERA), business impact analysis (BIA), and security metrics; present posture and material risk to the COO on a recurring cadence.

Defense Industrial Base Compliance (Classified & Unclassified)

  • Manage GPS compliance with DFARS 252.204-7012, 252.204-7020, and 252.204-7021. This includes:
    • Leading DFARS/CMMC readiness and ongoing compliance.
    • Serving as the Affirming Official (AO) and maintaining an accurate SPRS selfassessment score with defensible Plans of Action and Milestones (POAMs).
    • Achieving and maintaining CMMC certification at level 2.
    • Overseeing management and maintenance of POAMs.
  • Ensure systems operated for the government are designed properly and assessed against the appropriate requirements such as FedRAMP, Cloud Computing Security Requirements Guide, IRS 1075, and MARS-E.
  • Ensure safeguarding and incident reporting obligations for CUI (e.g., DFARS 252.2047012 72hour reporting) are met; coordinate with DC3/DIBNet and affected customers when necessary.
  • Oversee NISPOM compliance for classified systems; partner with FSO to achieve and maintain Authorizations to Operate (ATOs).
  • Ensure proper handling of exportcontrolled data (ITAR/EAR).
  • Prepare for and lead Program through contractually required assessments and customer audits; keep evidence, policies, configurations, and logs auditready.
  • Respond to government inspections or audits in coordination with EY Information Security and Risk Management.

Secure Cloud, Identity & Enterprise Platforms

  • Own security architecture and controls for Azure Government (Azure Gov) and Microsoft 365 GCC High tenants, including Conditional Access, PIM/PAM, encryption, logging/retention, and data governance for CUI.
  • Implement Zero Trust principles across identity, endpoints, networks, and workloads; drive continuous verification and leastprivilege.
  • Deploy and operate EDR/XDR, SIEM/SOAR, DLP, CASB/SSE/SASE, MDM, key management/HSM, and vulnerability/configuration management at scale.
  • Oversee user authorization process and ongoing attestation of user authorization and access.
  • Assist to resolve GPS practitioners’ access or other issues with Enclave environments.
  • Ongoing development, coordination and sustainment of Information Security Continuous Monitoring (ISCM) Program across all applications within the environment.

DevSecOps & Secure SDLC

  • Establish a software security program aligned to NIST SSDF (SP 800218) and EO 14028 expectations; integrate security into SDLC across GitHub and Azure DevOps.
  • Govern AppSec tooling and policy: SAST (e.g., Checkmarx), DAST (e.g., Qualys/AppScan), SCA/OSS (e.g., Mend), IaC/container/K8s scanning, and Wiz/Wiz Code; enforce buildtime gates and remediation SLAs.
  • Require SBOM generation, artifact signing/provenance (e.g., SLSA targets), and secrets management across all repositories and pipelines.

Detection, Response & Resilience

  • Develop, manage and maintain GPS incident response program.
  • Lead SOC and CSIRT functions: 24×7 monitoring, threat intelligence, purple/redteam exercises, and executive tabletop drills.
  • Maintain and test the Incident Response Plan and Cyber Crisis Playbook, including regulatory/customer communications and forensics preservation.

Effective Business Integration

  • Ensure development of fit-for-purpose solutions that support the business activities.
  • Manage integration of Firm applications into the GPS Enclave environment.
  • Understand and facilitate communication of EY’s IT disaster recovery and business continuity plans to GPS clients, potential clients and engagement teams (including engagement team responsibilities).
  • Augment existing Client Security Assurance reviews of data protection requirements contained in RFPs/RFQs to adequately respond, and assist in development of GPS client security and data protection (confidentiality) plans.
  • Monitor regulatory or other developments in INFOSEC principles, regulatory requirements and leading practices.

Leadership, Team and Budget

  • Role model a leadership style that brings infrastructure, application and cybersecurity professionals together to collaborate constructively on the design, implementation and operation of controls.
  • Build and mentor a highperforming organization spanning Policy/GRC, AppSec/DevSecOps, Security Engineering/Architecture, SOC/IR, and ThirdParty & SupplyChain Risk.
  • Own the cybersecurity budget and vendor portfolio; rationalize tools and services for value, performance, and compliance.
  • Participate in purchasing and enhancement of third-party tools for GPS.
  • Augment and potentially streamline existing Vendor Supplier Risk Assurance Program during evaluation of subcontractor compliance with applicable cybersecurity and data protection clauses.
  • Drive a securityfirst culture: ongoing training, phishing simulations, secure coding education, and leadership engagement including data protection and awareness and role-based training programs.
  • Coordinate and respond to annual (or more frequent) independent risk assessments and cyber security reviews.

Qualifications:

  • 12+ years of progressive cybersecurity leadership, including 5+ years at the enterprise or businessunit executive level.
  • 5+ years FISMA related experience
  • Bachelor’s degree in IT-related field or bachelor’s degree in non-IT related field with a total of 10 years of information security experience
  • Master’s degree preferred
  • Ability to obtain and maintain Top Secret clearance
  • US citizenship required
  • Must have government sector experience
  • Thorough knowledge and understanding of:
    • FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
    • DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting
    • NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
    • NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations
    • GSAM 552.239-70, Information Technology Security Plan and Security Authorization, 552.239-71, Security Requirements for Unclassified Information Technology Resources and similar clauses in agency FAR supplements
    • FISMA
  • Specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with the Risk Management Framework
  • Proven experience in the Defense Industrial Base with DFARS/CMMC and NIST SP 800171 implementation and audits (including POA&M and SPRS management).
  • Experience with FEDRAMP compliance authorization and monitoring
  • Deep expertise securing Azure Government and Microsoft 365 GCC High environments
  • Experience working with other Government cloud communities, including AWS
  • Experience working with classified environments, achieving/maintaining ATOs, overseeing classified systems under NISPOM and DoD RMF, and working understanding of SCIF operations
  • Knowledge and experience with vulnerability scanning execution, assessment, and analysis
  • Knowledge and experience of networks, including LAN and WAN
  • Knowledge and experience with application security, database security, and network security
  • Experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, FIPS, and NIST guidelines
  • Handson leadership of DevSecOps and software security programs covering GitHub/Azure DevOps/Jenkins with SAST/DAST/SCA, IaC/container security, SBOMs, and supplychain controls.
  • Demonstrated analytical, problem-solving, organizational, interpersonal and communication skills required.
  • The ability to collaborate effectively with diverse stakeholders, including client-facing, legal, finance and contracting teams, executives, engineers, customers and assessors on a wide variety of tasks, as needed.
  • Ability to foster professionalism and demonstrate integrity and confidentiality in all actions.
  • Ability to demonstrate flexibility when required, sense urgency, organize and prioritize work, and achieve against tight deadlines.
  • The ability to interpret and communicate regulatory requirements related to cybersecurity and data protection.
  • Possession of excellent written/verbal communications skills.
  • Possession of excellent analytical skills, including strict attention to detail.
  • Ability to assess and weigh current and evolving security threats in an operational environment
  • Possession of Information Systems Security Professional certification (CISSP)
  • Certifications such as CISSP, CISM, CCISO, CCSP, CRISC, CISA, PMP, and relevant GIAC credentials preferred

What we offer you

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $235,700 to $466,700. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $282,900 to $530,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more
Yesterday
I

Intel Network Security Engineer- Automation Developer United States, Texas

Limitless High-tech career opportunities - Expoint
Design and implement secure, scalable automation solutions. Lead development ofInfrastructure-as-Codeand orchestration tools to improve execution velocity, reduce operational overhead, and enhance system reliability. Develop, test, and deploy Ansible playbooks and...
תיאור:
Job Description:

Intel's Information Security organization enables Intel to provide secure products, solutions, and services which meet U.S. regulatory requirements. The Information Security organization supports the unique IT information Security and Compliance requirements for Intel federal projects that deliver products and/or services to the US Government (USG). As part of this team, you will help us grow our secure solution suite to meet U.S. Government requirements. The Intel Information Security organization is seeking a Senior Infrastructure Automation Developer to join our team. This role is ideal for a technically strong and forward-thinking individual who can lead by example, influence architectural decisions, and drive automation and integration efforts in a highly regulated environment. Business travel is required as needed.Primary Responsibilities:

  • Design and implement secure, scalable automation solutions.
  • Lead development ofInfrastructure-as-Codeand orchestration tools to improve execution velocity, reduce operational overhead, and enhance system reliability.
  • Develop, test, and deploy Ansible playbooks and Python scripts to automate provisioning, configuration, and management of network devices and services
  • Collaborate with cross-functional teams to define long-term technical direction and roadmap for secure enclave automation.
  • Implement robust monitoring and alerting systems to proactively identify and resolve network issues, leveraging automation for remediation and reporting.
  • Package and deploy applications in compliance with IT and federal security standards.
  • Troubleshoot and resolve technical issues in automation processes, ensuring high reliability and minimal manual intervention.
  • Contribute to system hardening, patching, and compliance automation using industry and DoD standards (e.g., STIG).
  • Support system integration, monitoring, and operational continuity.

You must possess the below minimum qualifications to be initially considered for this position. Preferred qualifications are in addition to the minimum requirements and are considered a plus factor in identifying top candidates. Experience listed below would be obtained through a combination of your degree, research and or relevant previous job and or internship experiences.
Minimum Qualifications:

  • U.S. Citizenship.
  • Ability to obtain a U.S. Government Security Clearance.
  • Bachelor's degree and 3+ years of applicable experience.
  • 1+ years of experience with CI/CD pipelines and version control systems (e.g., Git, GitHub, GitLab).
  • 1+ years of experience in Linux system administration and scripting (Python, Bash, Shell).
  • 1+ years of experience withInfrastructure-as-Codetools (e.g., Ansible).


Preferred Qualifications:

  • Active U.S. Government Top Secret (TS) Security Clearance with SCI eligibility.
  • Bachelor's degree in Computer Science or related field.
  • Good understanding of networking fundamentals (TCP/IP, routing, switching, VLANs, firewalls, etc.)
  • Ability to thrive in dynamic and fast-paced environments.
  • Certifications such as Cisco DevNet, Red Hat Ansible, CompTIA Network+, Python.
  • Experience with embedded software development and system integration.
  • Experience with Cross Domain Solutions (CDS) and DevSecOps principles.
  • Experience with network analysis tools (e.g., Splunk, Wireshark).
  • Experience with secure enclave operations.
  • Experience network equipment and software-defined networking.
  • Strong understanding of IT infrastructure, system patching, and secure deployment practices.
Experienced HireShift 1 (United States of America)US, California, Santa ClaraUS, Arizona, Phoenix, US, Oregon, Hillsboro
Position of Trust

offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here:

Annual Salary Range for jobs which could be performed in the US: 89,150.00 USD - 173,830.00 USD The range displayed on this job posting reflects the minimum and maximum target compensation for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific compensation range for your preferred location during the hiring process.

This role will require an on-site presence. * Job posting details (such as work model, location or time type) are subject to change.
Show more

משרות נוספות שיכולות לעניין אותך

Yesterday
EY

EY Data Governance Risk Compliance Officer United States, New York, New York

Limitless High-tech career opportunities - Expoint
Conducting in-depth financial analysis and identifying key areas of concern. Developing tailored strategies to address financial and operational challenges. Collaborating with stakeholders, including lenders, investors, and management, to facilitate negotiations....
תיאור:

: Associate-National-SaT-SaT - TCF - Capital and Debt Advisory - Mumbai

SaT - TCF - Capital and Debt Advisory :

Whether clients are preserving, optimizing, raising or investing, our Connected Capital Solutions (CCS) are our five go-to-market offerings that help drive competitive advantage and increased returns through improved decision-making. The CCS include Strategy, Corporate Finance, Buy and Integrate, Sell and Separate and Reshaping Results, and are underpinned by our Connected Capital Technologies.


Technical Excellence

  • Conducting in-depth financial analysis and identifying key areas of concern
  • Developing tailored strategies to address financial and operational challenges
  • Collaborating with stakeholders, including lenders, investors, and management, to facilitate negotiations
  • Monitoring key performance indicators and reporting progress to clients and senior management
  • Assisting in the preparation of improvement plans and business recovery models
  • Drive PMO for fast-track strategy implementation

Qualification

  • Educational qualifications: Chartered Accountant (CA) or Master of Business Administration (MBA) from a reputed institution
  • Strong technical skills – Corporate Finance
  • Strong analytical and problem-solving skills
  • Proficient in excel business modelling, BI tools
  • Excellent communication and stakeholder management abilities
  • Ability to think and drive next steps
  • Willingness to travel

Experience

  • Experience: 3-6 years of relevant experience in corporate


People with the ability to work in a collaborative manner to provide services across multiple client departments while following the commercial and legal requirements. You will need a practical approach to solving issues and complex problems with the ability to deliver insightful and practical solutions. We look for people who are agile, curious, mindful, and able to sustain positive energy, while being adaptable and creative in their approach.If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible.

Show more

משרות נוספות שיכולות לעניין אותך

Yesterday
AM

Applied Materials Operational Technology OT Security Engineer United States, California

Limitless High-tech career opportunities - Expoint
Develop secure architectures for OT systems, including ICS, SCADA, PLCs, and HMIs. Conduct design and architecture reviews to ensure compliance with security standards (e.g., ISA/IEC 62443, NIST 800-82). Implement network...
תיאור:

$124,000.00 - $171,000.00Santa Clara,CA

About the Role

This is not just another security role—it’s a chance to. You’ll combinewith
strategic architectural vision, ensuring our industrial ecosystems remain secure, compliant, and future-ready.

The OT Security Engineer is responsible for safeguarding industrial control systems (ICS), SCADA environments, and other OT assets against cyber threats. This role ensures the confidentiality, integrity, and availability of critical infrastructure systems while maintaining operational functionality. The engineer integrates cybersecurity best practices into OT environments, balancing security with operational requirements

Security Architecture & Design

  • Develop secure architectures for OT systems, including ICS, SCADA, PLCs, and HMIs.
  • Conduct design and architecture reviews to ensure compliance with security standards (e.g., ISA/IEC 62443, NIST 800-82).
  • Implement network segmentation, secure remote access, and least-privilege models across IT/OT boundaries.
  • Drive architectural reviews and influence security strategy across the enterprise

Risk Management & Compliance

  • Perform risk assessments and vulnerability analysis for OT environments.
  • Ensure compliance with regulatory frameworks (e.g., RMF, ISO 27001).

Advanced Vulnerability Management

  • Lead vulnerability assessments for PLCs, SCADA, IIoT devices , and industrial networks.
  • Develop proactive remediation strategies aligned with industry frameworks and operational priorities.
  • Integrate threat intelligence into architecture and vulnerability workflows.

Innovation & Collaboration

  • Partner with engineering, operations, and IT teams to embed security into the system lifecycle .
  • Evaluate emerging technologies and tools to strengthen OT/IoT security posture.
  • Work closely with facilities and lab manufacturing teams to integrate security into operational workflows.
  • Provide guidance and training to lab, manufacturing team personnel on OT security best practices

What We’re Looking For

  • Deep expertise in OT/IoT security architecture and vulnerability management.
  • 7–10 years in OT/ICS cybersecurity with proven experience designing secure industrial environments.
  • Strong knowledge of ICS protocols (Modbus, OPC, Ethernet/IP) and industrial control systems.
  • Familiarity with ISA/IEC 62443 , Purdue Model, NIST CSF , ISO 27001.
  • Hands-on experience with Armis, Dragos, Claroty , or similar platforms.

Preferred Qualifications

  • Experience in highly regulated environments (energy, manufacturing, pharma).
  • Knowledge of threat modeling and penetration testing for OT systems.
  • Familiarity with emerging technologies like IoT in industrial environments.
  • Semiconductor or advanced manufacturing experience.
  • Knowledge of SEMI standards (E187/E188/E191).
  • Certifications: GICSP , CISSP , or equivalent.

Soft Skills:

  • Strong communication skills for cross-functional collaboration.
  • Ability to translate technical security concepts for non-technical stakeholders.

Full time

Assignee / Regular

Show more

משרות נוספות שיכולות לעניין אותך

Yesterday
BOA

Bank Of America Identity Access Management IAM Security Administration Speci... United States, Massachusetts, Boston

Limitless High-tech career opportunities - Expoint
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information...
תיאור:


This job is responsible for developing and supporting enterprise-wide information security policies, procedures, and standards. Key responsibilities include applying knowledge of laws, rules, regulations, and information security concepts (e.g., NIST, COBIT, ISO) to establish and maintain policies, validate alignment of processes and controls to requirements, and report on adherence to policy requirements. Job expectations include using data analytics and partnering with internal teams to verify policy compliance, identify gaps in coverage, and support remediation activities.

LOB Overview:

  • Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities and operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.

Responsibilities:

  • Support the implementation and ongoing management of access provisioning solutions across enterprise platforms, ensuring alignment with security policies and regulatory requirements.

  • Apply working knowledge of Active Directory , Microsoft Azure, Amazon Web Services (AWS), and Mainframe , Oracle and SQL databases , file systems , and enterprise storage , with a focus on enforcing least privileged access .

  • Assist in maintaining access control policies , group structures , and role-based access models to support scalable and secure provisioning.

  • Collaborate with application owners and infrastructure teams to implement access requirements for new and existing systems.

  • Participate in automation initiatives to streamline provisioning and de-provisioning workflows , integrating with identity governance platforms and HR systems and IAM controls.

  • Conduct periodic access reviews , entitlement audits , and certification campaigns to ensure compliance and identify access anomalies.

  • Investigate and remediate access-related incidents, working closely with cybersecurity and risk teams to address vulnerabilities and improve controls.

  • Stay current with emerging IAM technologies, regulatory changes, and industry best practices to continuously enhance the access provisioning program.

  • Prepare metrics, reports, and recommendations to senior leadership and audit teams regarding access provisioning effectiveness and risk posture.

Required Qualifications:

  • 3-5+ years experience in Identity and Access Management, with a focus on access provisioning across enterprise environments.

  • Working knowledge of Active Directory , Microsoft Azure AWS, Mainframe , Oracle Database , SQL Server , Windows and Unix file systems , and enterprise storage platforms .

  • Understanding of IAM governance frameworks , platforms ( e.g., SailPoint, Saviynt ) role-based access control (RBAC) , group policy management , and privileged access management (PAM) tools, CyberArk, Hashi Corp and Beyond Trust.

  • Experience with automated provisioning/de-provisioning workflows , including integration with HR systems to demonstrate proficiency in scripting and automation (e.g., PowerShell, Python) to support scalable access provisioning and audit processes.

  • Familiarity with cloud infrastructure security and access controls in hybrid environments, particularly within Microsoft Azure AWS and Oracle Cloud .

  • Ability to conduct access reviews , entitlement audits , and risk assessments to identify and remediate access-related vulnerabilities.

  • Excellent analytical, problem-solving, and communication skills, with the ability to collaborate across technical and business teams.

1st shift (United States of America)

Show more

משרות נוספות שיכולות לעניין אותך

08.12.2025
EY

EY Risk Consulting - Tech SAP & Security Senior Consultant United States, New York, New York

Limitless High-tech career opportunities - Expoint
You will leverage your SAP experience and project management skills, to effectively support client engagement teams and provide technical expertise in the assessment, design, and implementation of controls, security, and...
תיאור:

Every challenge and every opportunity an organization faces today demands change. And with change comes risk. As a Risk Technology professional, you will be addressing client issues such as business performance variability, business and process controls transformation, application security integrity, governance, risk, and control (GRC) technology enablement, continuous controls monitoring, and IT risk management. You will belong to an international network of specialists helping our clients transform risk functions and implement technology solutions that support risk management and governance. With rapid growth across the SAP and Governance, Risk and Compliance (GRC) space, we’re looking for people who understand the challenges of risk management and can focus on improving business performance using GRC technologies.

As a member of our Risk Technology national practice, you will belong to a network of professionals helping our clients implement technology solutions to enrich and improve decision making, provide visibility and transparency of risk and compliance to stakeholders, and automate manual processes.

We will support you with career-long training and coaching to develop your skills in risk strategy, risk function design, risk management and performance enhancement.

Your key responsibilities

Leveraging your knowledge of IT environments and industry trends, you will work across competencies, service lines and sectors to develop innovation solutions to build and sustain risk management and governance programs for our clients. You will support EY teams responsible for transforming risk functions and implementing leading practice technology solutions.

Skills and attributes for success

  • You will leverage your SAP experience and project management skills, to effectively support client engagement teams and provide technical expertise in the assessment, design, and implementation of controls, security, and IT risk solutions.
  • Deliver facts, analyses, and recommendations in an accurate, clear, and concise manner.
  • Foster relationships with client personnel at appropriate levels
  • Drive high-quality work products on your team within expected timeframes and budget.

To qualify for the role, you must have

  • A bachelor’s or master’s degree and approximately 2-3 years of related work experience
  • Demonstrate an understanding of SAP business processes (e.g., purchase-to-pay, record-to-report, order-to-cash)
  • Experience testing controls, sensitive access, and segregation of duties.
  • Basic project management and client service skills
  • Strong written and verbal communication skills
  • Strong analytical and problem-solving skills
  • Excellent teaming skills
  • A valid driver’s license in the US and a valid passport required; willingness and ability to travel both domestically and internationally to meet client needs.

Ideally, you’ll also have

  • Prior experience as a consultant or client-serving professional.
  • Industry related certification (e.g., CPA/CA, CISA, RICS)
  • Strong understanding of IT industry trends
  • Foundational understanding of SAP auditing

What we offer you
At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $102,500 to $187,900. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $122,900 to $213,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more

משרות נוספות שיכולות לעניין אותך

08.12.2025
BOA

Bank Of America Sr Network Security Engineer Cloud exp required United States, Massachusetts, Boston

Limitless High-tech career opportunities - Expoint
Serves as a subject matter expert for one or more engineering initiatives and is the point of contact for clients. Contributes to defining and ensuring security requirements are met based...
תיאור:

Job Description:

We are seeking a skilled and motivated Network Security Engineer to join our GIS Core Engineering team. The Network Security Engineer is a key individual contributor that has accountability for researching, designing, engineering, implementing, and supporting network security solutions. You will utilize in-depth technical knowledge and business requirements to help design and implement a secure solution to meet customer / client needs while protecting the Bank's assets. Develops and implements security standards, procedures, and guidelines for multiple platforms and diverse environment. Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results.

It is imperative that you have a solid knowledge of network security domains such as DDoS, Segmentation, Network Access, Web Content Inspection, Perimeter Defense, and Network monitoring. You will regularly collaborate with experts both in country and in other regions, so excellent communication skills are very important. If you are seeking a demanding role within Global Information Security (GIS) and have the required skills, this will be a great opportunity for you. Typically, applicants should have 5 to 7 years of cybersecurity or engineering experience.

Key Responsibilities:

  • Serves as a subject matter expert for one or more engineering initiatives and is the point of contact for clients

  • Contributes to defining and ensuring security requirements are met based on BofA standards and Policies.

  • Incorporates basic architecture components including threat-models, diagrams, and technological requirements for in solution development.

  • Understands and utilizes basic network, virtualization, and datacenter technologies for deployment strategies.

  • Leads the delivery of the major engineering milestones and acts as the critical decision maker with regards to technical design and implementation

  • Documents and communicates required information for deployment, maintenance, support, and business functionality.

  • Adheres to team delivery/release process and cadence pertaining to solution deployment and release.

  • Identifies and raises risks or potential vulnerabilities at all stages of the security-engineering process

  • Works closely with a diverse set of stakeholders with varying priorities to debate and negotiate paths forward

  • Navigates and works effectively across a complex, geographically dispersed organization

Required Qualifications:

· Strong fundamental understanding of information security principles, risks, and controls and of cyber security operations functions.

· Knowledge of how Web Based internet facing applications are deployed and set up and experience architecting complex enterprise cybersecurity solutions for data in transit across web, email and b2b environments. Including technology that provides proxy control, malware inspection, SSL termination, and Data Loss Prevention (DLP).

· Understanding of how Content Delivery Networks (CDNs) work, how they are designed to provide application services, and how they are used to mitigate network security threats.

· Detailed knowledge of Network Security solutions such as DDOS mitigations techniques, WAF, etc.

· Knowledge Solid experience with designing, evaluating, and deploying network security solutions for outbound, inbound, and lateral network traffic. Experience engineering web content inspection solutions using tools such as Skyhigh Web gateway, Trellix (Fireeye), and F5 LTM/APM/SSLO.

· Experience deploying proxies in the cloud (AWS) and experience with SASE platforms

· Experience coordinating delivery of project/changes milestones, ensures projects stay on target, escalating and identifying roadblocks.

· Ability to quickly diagnose the problem areas and come up with solutions and/or workarounds

· Ability to translate business needs into requirements and experience understand analyzing the technical feasibility and design against the requirements.

Effective communication skills and must be comfortable in delivering messages across a wide spectrum of individuals having varying degrees of technical understanding.

· Ability to work independently on various initiatives with little oversight.

· Strong analytical skills/problem solving/conceptual thinking.

· Motivated and willing to learn.

Desired Qualifications

· Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).

· Experience deploying security solutions in virtual environments such as VMWare, AWS, Azure

· Experience integrating network security solutions with IAAS, PAAS and SAAS components such as Zscaler, O365, etc.

· Experience deploying security solutions in email environments.

· Experience with Data Governance, Model Risk Management and Application Management.

· Ability to work with Technical and Non-Technical business owners.

· Experience in large enterprise environments.

· Assist with internal efficiencies projects and development.

· Familiarity with industry standard endpoint tools.

· Relevant certifications: CCNA, CCNP, CISSP, or CEH.

This job will be open and accepting applications for a minimum of seven days from the date it was posted.

1st shift (United States of America)

Show more

משרות נוספות שיכולות לעניין אותך

Limitless High-tech career opportunities - Expoint
The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across...
תיאור:

Responsibilities

  • The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across all environments, platforms and applications used or desired for use by GPS. Responsibilities include:
  • Strategy, Governance and Risk Management
  • Development and execution of a multiyear cybersecurity strategy and investment roadmap aligned to business objectives and federal contract requirements.
  • Development, management and maintenance of the GPS IT security risk management policy and/or procedural documentation mapped to NIST SP 800-37 (RMF), NIST SP 80053, NIST SP 800171, NIST SP 800161 (CSCRM), and NIST SP 800218 (SSDF)
  • Ownership of the enterprise risk assessment (ERA), business impact analysis (BIA), and security metrics; present posture and material risk to the COO on a recurring cadence.

Defense Industrial Base Compliance (Classified & Unclassified)

  • Manage GPS compliance with DFARS 252.204-7012, 252.204-7020, and 252.204-7021. This includes:
    • Leading DFARS/CMMC readiness and ongoing compliance.
    • Serving as the Affirming Official (AO) and maintaining an accurate SPRS selfassessment score with defensible Plans of Action and Milestones (POAMs).
    • Achieving and maintaining CMMC certification at level 2.
    • Overseeing management and maintenance of POAMs.
  • Ensure systems operated for the government are designed properly and assessed against the appropriate requirements such as FedRAMP, Cloud Computing Security Requirements Guide, IRS 1075, and MARS-E.
  • Ensure safeguarding and incident reporting obligations for CUI (e.g., DFARS 252.2047012 72hour reporting) are met; coordinate with DC3/DIBNet and affected customers when necessary.
  • Oversee NISPOM compliance for classified systems; partner with FSO to achieve and maintain Authorizations to Operate (ATOs).
  • Ensure proper handling of exportcontrolled data (ITAR/EAR).
  • Prepare for and lead Program through contractually required assessments and customer audits; keep evidence, policies, configurations, and logs auditready.
  • Respond to government inspections or audits in coordination with EY Information Security and Risk Management.

Secure Cloud, Identity & Enterprise Platforms

  • Own security architecture and controls for Azure Government (Azure Gov) and Microsoft 365 GCC High tenants, including Conditional Access, PIM/PAM, encryption, logging/retention, and data governance for CUI.
  • Implement Zero Trust principles across identity, endpoints, networks, and workloads; drive continuous verification and leastprivilege.
  • Deploy and operate EDR/XDR, SIEM/SOAR, DLP, CASB/SSE/SASE, MDM, key management/HSM, and vulnerability/configuration management at scale.
  • Oversee user authorization process and ongoing attestation of user authorization and access.
  • Assist to resolve GPS practitioners’ access or other issues with Enclave environments.
  • Ongoing development, coordination and sustainment of Information Security Continuous Monitoring (ISCM) Program across all applications within the environment.

DevSecOps & Secure SDLC

  • Establish a software security program aligned to NIST SSDF (SP 800218) and EO 14028 expectations; integrate security into SDLC across GitHub and Azure DevOps.
  • Govern AppSec tooling and policy: SAST (e.g., Checkmarx), DAST (e.g., Qualys/AppScan), SCA/OSS (e.g., Mend), IaC/container/K8s scanning, and Wiz/Wiz Code; enforce buildtime gates and remediation SLAs.
  • Require SBOM generation, artifact signing/provenance (e.g., SLSA targets), and secrets management across all repositories and pipelines.

Detection, Response & Resilience

  • Develop, manage and maintain GPS incident response program.
  • Lead SOC and CSIRT functions: 24×7 monitoring, threat intelligence, purple/redteam exercises, and executive tabletop drills.
  • Maintain and test the Incident Response Plan and Cyber Crisis Playbook, including regulatory/customer communications and forensics preservation.

Effective Business Integration

  • Ensure development of fit-for-purpose solutions that support the business activities.
  • Manage integration of Firm applications into the GPS Enclave environment.
  • Understand and facilitate communication of EY’s IT disaster recovery and business continuity plans to GPS clients, potential clients and engagement teams (including engagement team responsibilities).
  • Augment existing Client Security Assurance reviews of data protection requirements contained in RFPs/RFQs to adequately respond, and assist in development of GPS client security and data protection (confidentiality) plans.
  • Monitor regulatory or other developments in INFOSEC principles, regulatory requirements and leading practices.

Leadership, Team and Budget

  • Role model a leadership style that brings infrastructure, application and cybersecurity professionals together to collaborate constructively on the design, implementation and operation of controls.
  • Build and mentor a highperforming organization spanning Policy/GRC, AppSec/DevSecOps, Security Engineering/Architecture, SOC/IR, and ThirdParty & SupplyChain Risk.
  • Own the cybersecurity budget and vendor portfolio; rationalize tools and services for value, performance, and compliance.
  • Participate in purchasing and enhancement of third-party tools for GPS.
  • Augment and potentially streamline existing Vendor Supplier Risk Assurance Program during evaluation of subcontractor compliance with applicable cybersecurity and data protection clauses.
  • Drive a securityfirst culture: ongoing training, phishing simulations, secure coding education, and leadership engagement including data protection and awareness and role-based training programs.
  • Coordinate and respond to annual (or more frequent) independent risk assessments and cyber security reviews.

Qualifications:

  • 12+ years of progressive cybersecurity leadership, including 5+ years at the enterprise or businessunit executive level.
  • 5+ years FISMA related experience
  • Bachelor’s degree in IT-related field or bachelor’s degree in non-IT related field with a total of 10 years of information security experience
  • Master’s degree preferred
  • Ability to obtain and maintain Top Secret clearance
  • US citizenship required
  • Must have government sector experience
  • Thorough knowledge and understanding of:
    • FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
    • DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting
    • NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
    • NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations
    • GSAM 552.239-70, Information Technology Security Plan and Security Authorization, 552.239-71, Security Requirements for Unclassified Information Technology Resources and similar clauses in agency FAR supplements
    • FISMA
  • Specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with the Risk Management Framework
  • Proven experience in the Defense Industrial Base with DFARS/CMMC and NIST SP 800171 implementation and audits (including POA&M and SPRS management).
  • Experience with FEDRAMP compliance authorization and monitoring
  • Deep expertise securing Azure Government and Microsoft 365 GCC High environments
  • Experience working with other Government cloud communities, including AWS
  • Experience working with classified environments, achieving/maintaining ATOs, overseeing classified systems under NISPOM and DoD RMF, and working understanding of SCIF operations
  • Knowledge and experience with vulnerability scanning execution, assessment, and analysis
  • Knowledge and experience of networks, including LAN and WAN
  • Knowledge and experience with application security, database security, and network security
  • Experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, FIPS, and NIST guidelines
  • Handson leadership of DevSecOps and software security programs covering GitHub/Azure DevOps/Jenkins with SAST/DAST/SCA, IaC/container security, SBOMs, and supplychain controls.
  • Demonstrated analytical, problem-solving, organizational, interpersonal and communication skills required.
  • The ability to collaborate effectively with diverse stakeholders, including client-facing, legal, finance and contracting teams, executives, engineers, customers and assessors on a wide variety of tasks, as needed.
  • Ability to foster professionalism and demonstrate integrity and confidentiality in all actions.
  • Ability to demonstrate flexibility when required, sense urgency, organize and prioritize work, and achieve against tight deadlines.
  • The ability to interpret and communicate regulatory requirements related to cybersecurity and data protection.
  • Possession of excellent written/verbal communications skills.
  • Possession of excellent analytical skills, including strict attention to detail.
  • Ability to assess and weigh current and evolving security threats in an operational environment
  • Possession of Information Systems Security Professional certification (CISSP)
  • Certifications such as CISSP, CISM, CCISO, CCSP, CRISC, CISA, PMP, and relevant GIAC credentials preferred

What we offer you

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $235,700 to $466,700. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $282,900 to $530,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more
תכננו את מהלך הקריירה הבא שלכם בתעשיית ההייטק עם אקספוינט! הפלטפורמה שלנו מציעה מגוון רחב של משרות United States, Illinois, Information Security Officer באזור United States, ומעניקה לכם גישה לחברות הטובות ביותר בתחום. בין אם אתם מחפשים אתגר חדש או שינוי נוף, אקספוינט תקל על מציאת התאמת העבודה המושלמת עבורכם. עם מנוע החיפוש הקל לשימוש שלנו, תוכלו למצוא במהירות הזדמנויות עבודה ולחבור לחברות מובילות. הירשמו היום ועשו את הצעד הבא בקריירת ההיי-טק שלכם עם Expoint.