Your key responsibilities
- Support a technical team with a focuse on the following responsibilities:
- Define security architectures and provide pragmatic security guidance that balance business benefit and risks
- Engage IT project teams throughout the SDLC to identify and prioritize applicable security controls and provide guidance on how to implement these controls
- Perform threat modeling and risk assessments of information systems, applications and infrastructure
- Maintain and enhance the Information Security risk assessment and certification methodologies
- Define security configuration standards for shared and multi-tenant platforms and technologies
- Develop appropriate risk treatment and mitigation options to address security risks identified during security review or audit
- Translate technical vulnerabilities into business risk terminology for business units and recommend corrective actions to customers and project stakeholders
- Provide knowledge sharing and technical assistance to other team members
- Act as Subject Matter Expert (SME) in responsible technologies and have deep technical understanding of responsible services and technology portfolios
Skills and attributes for success
Significant working security experience and knowledge in the design, implementation, and operation of security controls in the following areas:
- Identity and Access Management – Experience with Azure Active Directory (AAD) based Identity and Access Management and Authorization design and integration with API, IDaaS, and Federation technologies.
- Cloud Security – Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud-based solutions e.g., Microsoft Azure and Azure PAAS services or another cloud platform (GCP, AWS, IBM, AliCloud, etc.)
- Infrastructure Security – Experience with the integration of cloud native infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, Web Application Firewalls (WAFs), Application and API Gateways, intrusion detection and prevention, security monitoring, and data encryption solutions.
- Application Security - Experience with the design and testing of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and microservices architecture.
- Strong leadership and organizational skills
- Ability to appropriately balance firm security needs with business impact & benefit
- Ability to facilitate compromise to incrementally advance security strategy and objectives
- Ability to team well with others to facilitate and enhance the understanding & compliance to security policies
Although not required, it is preferred that candidates possess additional working security experience and knowledge in one or more of the following areas:
- Operational Security – Experience with defining operational security models and procedures for business solutions including the operation and maintenance of infrastructure and application security controls.
- Information Security Standards – Knowledge of common information security standards such as: ISO 27001/27002, CSA and CIS Controls, NIST CSF, PCI/DSS, FEDRAMP.
- Product Management – working with broader business and technology teams on aspects of security that affect all phases of PI Planning from concept to design to implementation and then operational support.
- Agile & DevSecOps Methodologies – Experience promoting automated security features in pipelines and security testing as a central feature in Agile workflows as a contributing member within an Agile development or DevOps environment.
To qualify for the role, you must have:
- Advanced degree in Computer Science or a related discipline; or equivalent work experience.
- Candidates are preferred to hold or be actively pursuing related professional certifications within the GIAC family of certifications or CISSP, CISM or CISA or similar cloud-security oriented certifications.
- Five or more years of experience in the management of a significant Information Security risk management function
- Experience in managing the communication of security findings and recommendations to IT project teams, business leadership and technology management executives
Ideally, you’ll also have
- Exceptional judgment, tact, and decision-making ability
- Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change
- Excellent , communication, organizational, and decision-making skills
- Strong English language skills are required
We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings, and a wide range of discounts, offers and promotions. Plus, we offer:
- Support, coaching and feedback from some of the most engaging colleagues around
- Opportunities to develop new skills and progress your career
- The freedom and flexibility to handle your role in a way that’s right for you
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.