Job Description

div no-style=font-family:Arial; EY, we’re all in to shape your future with confidence. /ppWe’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. /ppJoin EY and help to build a better working world. /p/divdiv no-style=font-family:Arial; /divpspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongEY - Cyber Security – Enterprise Security Architect - Manager/strong/span/ppspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongJob Listing Detail:/strong At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. We’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all./span/pp /ppspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongThe Opportunity:/strong We’re looking for a Manager in our Cyber Security team with a strong focus on Enterprise Security Architecture. You will be responsible for defining, designing, integrating, and implementing innovative security solutions that enhance our service delivery quality and strategically elevate technology-driven transformation for our clients. This is a fantastic opportunity to be part of a leading firm while being instrumental in the rollout of next-generation security solutions./span/pp /ppspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongYour Key Responsibilities:/strong/span/pulli no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDesign, build, test, and implement enterprise security architecture solutions that align with organizational goals and security standards./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptCollaborate with clients to assess their security architecture needs and develop tailored solutions that enhance security posture and compliance./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptOversee the integration of security systems with existing IT infrastructure, ensuring seamless functionality and user experience./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptConduct risk assessments and audits related to security architecture, providing recommendations for improvements./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptStay current with security trends, technologies, and best practices to ensure our solutions remain competitive and effective./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptMentor and guide junior team members, fostering a culture of continuous learning and professional development./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDrive discussions with senior stakeholders to align security architecture strategies with business objectives and regulatory requirements./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptImplement Zero Trust Architecture principles to enhance security posture and minimize risk across the enterprise./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDevelop and deliver training sessions on security architecture best practices and technologies for clients and internal teams./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptConduct Threat Modeling exercises to identify potential security risks and develop mitigation strategies./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptReview and assess Cloud Security configurations to ensure compliance with best practices and organizational policies./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDesign and evaluate Network Architecture to ensure robust security measures are integrated into the infrastructure./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptPerform Configuration Reviews to identify vulnerabilities and recommend improvements./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptCreate Solution Blueprints and conduct Architecture Reviews to ensure alignment with security standards and business objectives./span/li/ulp /ppspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongSkills and Attributes for Success:/strong/span/pulli no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptProven experience in enterprise security architecture design and implementation, with a strong understanding of security frameworks and governance./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDeep technical knowledge of security technologies, including firewalls, VPNs, intrusion detection/prevention systems, and endpoint security solutions./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptStrong understanding of Zero Trust Architecture and its application in enterprise security./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExcellent analytical and problem-solving skills, with the ability to assess complex security challenges and develop effective solutions./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExcellent communication skills, both verbal and written, with the ability to engage effectively with technical and non-technical stakeholders./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptAbility to manage multiple projects simultaneously and adapt to changing priorities in a fast-paced environment./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExperience in project management methodologies and tools, with a focus on delivering high-quality results on time and within budget./span/li/ulp /ppspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongTo Qualify for the Role, You Must Have:/strong/span/pulli no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif; years of experience in Information Technology, with a specialization in Cyber Security and Enterprise Security Architecture./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptProfessional-level knowledge in security engineering and architecture assessments./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptStrong hands-on experience with security technologies, including firewalls, VPNs, NAC, SDWAN, WAF, and EDR/XDR solutions./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExperience in Zero Trust Security Strategy and Implementation./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptRelevant industry certifications (, CISSP, CISM, SABSA, or TOGAF)./span/li/ulp /ppspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongIdeally, You’ll Also Have:/strong/span/pulli no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptStrong interpersonal skills and the ability to build relationships with clients and team members./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExperience working in a consulting environment, with a focus on delivering value to clients./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif; proactive approach to identifying and addressing security challenges./span/li/ulp /ppspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongWhat We Look For:/strong/span/pulli no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptProfessionals with strong technical acumen, consulting mindset, and enthusiasm to learn in a fast-paced environment./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptAbility to lead cyber consulting discussions with SMEs and senior client stakeholders./span/lili no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan no-style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExperience in RFP responses, proposal building, effort estimation, and go-to-market activities is a plus./span/li/uldiv no-style=font-family:Arial;font-size:1.0empbEY | Building a better working world /b/ppEY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets./ppEnabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow./ppEY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories./p/div

Apply for this Position

Ready to join ? Click the button below to submit your application.

Submit Application