Expoint - all jobs in one place

המקום בו המומחים והחברות הטובות ביותר נפגשים

Limitless High-tech career opportunities - Expoint

EY Business Security Consultant - EY Global Delivery Services 
Argentina, Autonomous City of Buenos Aires, Buenos Aires 
473792697

03.09.2024

Your key responsibilities

This position is a leading role in designing, developing and implementing all aspects of security for complex global applications based on Microsoft Azure technology and generally the Microsoft technology stack. The role is very much an individual contributor capable of supporting multiple project teams. In other words, it is not a program management or oversight role, but one that requires detailed participation in the design, implementation and certification of security controls across the multiple projects/applications. This requires knowledge of various IT system architecture and Cloud technology, as well as supporting technology such as IAM, network security, firewalls, user account management, audit and logging, and other security concepts as outlined in ISO27001, OWASP and related security standards. Also should have knowledge of 3rd Party security assessments and applicability of SOC1 and SOC2 reports and concepts of vendor risk management.

Skills and attributes for success

Significant working security experience and knowledge in the design, implementation and operation of security controls in one of the following areas:

• Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment.

• Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and microservices architecture.

• Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud based solutions in Microsoft Azure and Azure PAAS services (SQL, Service Bus, Service Fabric, Data Lake, PowerBI)

• Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions.

• Identity and Access Management - Active Directory based Identity and Access Management and Authorization design experience and integration with IDaaS and Federation technologies.

To qualify for the role you must have 3-5 years of experience in:

  • Significant experience in implementing security in a Microsoft Azure environment and practical knowledge of implementing global systems using a primarily PAAS architecture.
  • Direct knowledge of IT system architecture concepts and Cloud technology, as well as supporting technology such as IAM, network security, firewalls, user account management, audit and logging, and other security concepts as outlined in ISO27001, OWASP and related security standards.
  • Advanced degree in Computer Science or a related discipline; or equivalent work experience.
  • Strong communication skills and ability to work with stakeholders ranging from developer to architects to business leaders to EY’s clients.

Ideally, you’ll also have

Although not required, it is preferred that candidates possess additional working security experience and knowledge in one or more of the following areas:

• Operational Security – Experience with defining operational models and procedures for business solutions including the operation and maintenance of infrastructure and application security controls.

• Information Security Standards – Knowledge of common information security standards such as: ISO 27001/27002, NIST CSF, FEDRAMP, CSA and CIS Controls.

• Cloud security certifications such as AZ-300 Azure Architect Technologies

• Product Management – working with a broader business team on aspects of security that affect all phases from concept to design to implementation and then operational support.