Job Description

div style=font-family:Arial; EY, we’re all in to shape your future with confidence. /ppWe’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. /ppJoin EY and help to build a better working world. /p/divdiv style=font-family:Arial; /divpspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongEY - Cyber Security – Enterprise Security Architect - Manager/strong/span/ppspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongJob Listing Detail:/strong At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. We’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all./span/pp /ppspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongThe Opportunity:/strong We’re looking for a Manager in our Cyber Security team with a strong focus on Enterprise Security Architecture. You will be responsible for defining, designing, integrating, and implementing innovative security solutions that enhance our service delivery quality and strategically elevate technology-driven transformation for our clients. This is a fantastic opportunity to be part of a leading firm while being instrumental in the rollout of next-generation security solutions./span/pp /ppspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongYour Key Responsibilities:/strong/span/pulli style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDesign, build, test, and implement enterprise security architecture solutions that align with organizational goals and security standards./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptCollaborate with clients to assess their security architecture needs and develop tailored solutions that enhance security posture and compliance./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptOversee the integration of security systems with existing IT infrastructure, ensuring seamless functionality and user experience./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptConduct risk assessments and audits related to security architecture, providing recommendations for improvements./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptStay current with security trends, technologies, and best practices to ensure our solutions remain competitive and effective./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptMentor and guide junior team members, fostering a culture of continuous learning and professional development./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDrive discussions with senior stakeholders to align security architecture strategies with business objectives and regulatory requirements./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptImplement Zero Trust Architecture principles to enhance security posture and minimize risk across the enterprise./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDevelop and deliver training sessions on security architecture best practices and technologies for clients and internal teams./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptConduct Threat Modeling exercises to identify potential security risks and develop mitigation strategies./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptReview and assess Cloud Security configurations to ensure compliance with best practices and organizational policies./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDesign and evaluate Network Architecture to ensure robust security measures are integrated into the infrastructure./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptPerform Configuration Reviews to identify vulnerabilities and recommend improvements./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptCreate Solution Blueprints and conduct Architecture Reviews to ensure alignment with security standards and business objectives./span/li/ulp /ppspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongSkills and Attributes for Success:/strong/span/pulli style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptProven experience in enterprise security architecture design and implementation, with a strong understanding of security frameworks and governance./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptDeep technical knowledge of security technologies, including firewalls, VPNs, intrusion detection/prevention systems, and endpoint security solutions./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptStrong understanding of Zero Trust Architecture and its application in enterprise security./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExcellent analytical and problem-solving skills, with the ability to assess complex security challenges and develop effective solutions./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExcellent communication skills, both verbal and written, with the ability to engage effectively with technical and non-technical stakeholders./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptAbility to manage multiple projects simultaneously and adapt to changing priorities in a fast-paced environment./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExperience in project management methodologies and tools, with a focus on delivering high-quality results on time and within budget./span/li/ulp /ppspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongTo Qualify for the Role, You Must Have:/strong/span/pulli style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif; years of experience in Information Technology, with a specialization in Cyber Security and Enterprise Security Architecture./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptProfessional-level knowledge in security engineering and architecture assessments./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptStrong hands-on experience with security technologies, including firewalls, VPNs, NAC, SDWAN, WAF, and EDR/XDR solutions./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExperience in Zero Trust Security Strategy and Implementation./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptRelevant industry certifications (, CISSP, CISM, SABSA, or TOGAF)./span/li/ulp /ppspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongIdeally, You’ll Also Have:/strong/span/pulli style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptStrong interpersonal skills and the ability to build relationships with clients and team members./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExperience working in a consulting environment, with a focus on delivering value to clients./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif; proactive approach to identifying and addressing security challenges./span/li/ulp /ppspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptstrongWhat We Look For:/strong/span/pulli style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptProfessionals with strong technical acumen, consulting mindset, and enthusiasm to learn in a fast-paced environment./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptAbility to lead cyber consulting discussions with SMEs and senior client stakeholders./span/lili style=font-family:arial, helvetica, sans-serif;font-size:10.0ptspan style=font-family:arial, helvetica, sans-serif;font-size:10.0ptExperience in RFP responses, proposal building, effort estimation, and go-to-market activities is a plus./span/li/uldiv style=font-family:Arial;font-size:1.0empbEY | Building a better working world /b/ppEY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets./ppEnabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow./ppEY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories./p/div

Apply for this Position

Ready to join ? Click the button below to submit your application.

Submit Application