Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

EY TC-CS_Cyber Architecture-OT Engineering-InfrastructureSecurity-ACI 
India, Karnataka, Bengaluru 
422695220

15.09.2024

We’re looking for an Infrastructure Security professional with solution mindset and hands on security engineering expertise in Network Segmentation, On-Premise Micro segmentation (Cisco ACI) and On-Premise Identity Micro segmentation (Cisco ACI + AD), network security concepts, risk and controls concepts, architecture design. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the rollout of next generation market relevant solutions.

Your key responsibilities

  • A Security- Design & Architect professional who is responsible for designing, building, testing and implementing network security systems within an organisation’s IT network- On Prem & Cloud.
  • Professional is expected to have a thorough understanding of complex IT systems and stay up to date with the latest security standards, systems and authentication protocols, as well as best practice security products.
  • Identify requirements, design document and implement technical solutions for scalable and resilient network architecture.
  • Experience in building the networks by taking into consideration various factors like, bandwidth requirements, infrastructure requirements and security.
  • Enable micro segmentation for all on-premise crown jewels in Data Centers and Co-location facilities.
  • Enable Cisco ACI Identity Based Micro segmentation.
  • Individual should possess experience in planning, design, deployment, configuration, integration and management of network protection controls including Next gen firewalls- Palo Alto, Checkpoint, Fortinet, SDN Security, Cisco ACI, DDoS Protection, Cisco Firepower, IPS, VPN, Wireless security, NAC and network authentication solutions to protect IT assets and should be responsible for deployment of any changes, plug-ins, or configuration as requested by client.
  • Plan, design, deploy, configure, integrate, and manage WAF, proxy/Zscaler, ZPA, ZIA solutions.
  • Experience in building Zero Trust security architecture, strategy and solution design.
  • Experience in implementing micro-segmentation solutions including Guardicore and Illumio.
  • Possess hands on experience in segmenting networks, applications, and data to limit exposure to attacks.
  • Plan, design, deploy, configure, integrate and manage platform protection controls including virtualisation protection solutions on Hypervisors and thin client’s security solutions.
  • Good understanding of security concepts and technologies including, but not limited to TCP/IP, LDAP, DHCP, DNS, web filtering etc.
  • Should be well-versed with network documentation that includes network drawings, text descriptions and equipment configurations, designing HLDs and LLDs.


Skills and attributes for success

  • Serve as highly technical security expert to bring security transformation to both new and legacy infrastructure.
  • Deep technical understanding of architecture and solutioning of infrastructure security components.
  • Deep knowledge of services and service delivery approach and methodology for infrastructure security including governance and operating models.
  • Proven track record in building and maintaining trusted relationships with key internal and external stakeholders.
  • Willingness to travel and flex work timings as and when required.
  • Ability to change and adapt in a hyper-growth environment.
  • Self-starter and strategic thinker.
  • Drive C-suite/senior leadership level meetings and discussion.
  • Excellent oral and written communication skills and executive presence that enable effective engagement with senior stakeholders.
  • Ability to work independently and communicate the technical and security related issues to client/business stakeholders.
  • Clearly demonstrates proven extensive abilities with leveraging creative thinking and problem-solving skills, individual initiative, and utilizing Office 365, MS Office (Word, Excel, Access, PowerPoint) and Google Docs.
  • Communicating in an organized and knowledgeable manner in written and verbal formats including delivering clear requests for information and communicating potential conflicts.
  • Must communicate consistently and drive objectives, relying on fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance.
  • Good presentation, project management, facilitation and delivery skills as well as strong analytical and problem-solving capabilities.
  • Ability to create domain specific training content and deliver training effectively.
  • Develop/Implement automation solutions and capabilities that are clearly aligned to client business, technology and threat posture.
  • Demonstrates ability to track developments and changes in the digital business and threat environments to ensure that they're adequately addressed in client’s security strategy plans and architecture artefacts.


To qualify for the role, you must have

  • 8-11 years of experience in Information Technology experience, with specialization in Cyber Security roles that include multiple areas of specialization. Professional-level knowledge in areas from the following:
  • Security Engineering & Architecture assessments
  • Strong hands-on exp. in firewalls, VPNs, NAC, SDWAN, WAF, Proxy, EDR/XDR etc.
  • Expert level experience with deployment, maintenance and operations of one or more major network security Devices
  • Zero Trust Security Strategy and Implementation
  • Cloud Security Architecture
  • Entrepreneurial approach to solving security problems with consultative skills


Ideally, you’ll also have

  • Good soft skills i.e. verbal & written communication, technical document writing etc
  • Strong project management, negotiation and interpersonal skills
  • Prior experience working in Advisory or Technology Consulting industry
  • Customer orientation skills
  • Industry related certification (e.g. CISSP, CISA, CISM, SABSA, PRINCE2, TOGAF)


What we look for

  • A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills.
  • An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide.
  • Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries

You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer:

  • Support, coaching and feedback from some of the most engaging colleagues around
  • Opportunities to develop new skills and progress your career
  • The freedom and flexibility to handle your role in a way that’s right for you



EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.