Cyber Security-Cyber Transformation-Mgr-Multiple Positions
Dallas, TX, US, 75219
EY
EY provides consulting, assurance, tax and transaction services that help solve our client’s toughest challenges and build a better working world for all.Cyber Security - Cyber Transformation (Manager) (Multiple Positions)(1502771), Ernst & Young U.S. LLP, Dallas, TX.
Provide advisory services on technology risk and security to help clients protect themselves against cyber attacks by conducting security capability and solutions assessments, delivering information security transformation, designing and implementing GRC technology solutions, performing program risk management, and delivering IT assurance. Enable enterprise clients to make better security and risk decisions, and reduce the cost of managing overall security risk. Work with clients to deliver sustainable, measurable results in transforming information security programs, identifying and responding to cyber threats, managing identity and access effectively and efficiently, and/or mitigating the risk of information loss and addressing privacy regulations. Help enterprises build cyber security models to protect company data against cyber threats. Help clients improve Identity and Access Management (IAM) processes to meet compliance needs and improve operational efficiency. Develop new privacy and data protection strategies to secure information while balancing regulatory requirements with business needs. Plan, implement, upgrade, and monitor security measures for the protection of computer networks and information. Ensure appropriate security controls are in place that will safeguard digital files and electronic infrastructure. Confer with clients to discuss issues such as computer data access needs, security violations, and programming changes. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
Manage and motivate teams with diverse skills and backgrounds. Consistently deliver quality client services by monitoring progress. Demonstrate in-depth technical capabilities and professional knowledge. Maintain long-term client relationships and networks. Cultivate business development opportunities.
Full time employment, Monday – Friday, 40 hours per week, 8:30 am – 5:30 pm.
MINIMUM REQUIREMENTS:
Must have a Bachelor’s degree in Management Information Systems (MIS), Computer Science, Engineering, Business, Accounting, Finance or a related field and 5 years of progressive, post-baccalaureate combined experience in consulting, advisory, cybersecurity assessment, or auditing. Alternatively, will accept a Master’s degree in Management Information Systems (MIS), Computer Science, Engineering, Business, Accounting, Finance or a related field and 4 years of combined experience in consulting, advisory, cybersecurity assessment, or auditing.
Must have 4 years of experience working in Information Security and/or IT Management.
Must have 4 years of experience in either:
- Strategy, design, development, and/or implementation of Information Security systems, including vulnerability assessments, privacy assessments, intrusion detection, incident response, security policy creation, enterprise security strategies, architectures, and/or governance; or
- Experience in information security regulatory requirements and compliance issues.
Must have 1 year of experience in at least 2 of the following:
- Network management, including TCP/IP and OSI-model security technologies, including firewalls, intrusion detection and intrusion prevention.
- Security Control design and implementation, pre/post go-live support, and training.
- Security and Privacy Information Systems assessments, data analysis, design, architecture, implementation, management, and reporting.
- Security and Risk Standards, including ISO 27001-2, PCI DSS, NIST, ITIL, COBIT, and HITRUST.
- Cloud security architecture, assessment, implementation, and/or operation.
- Product security and connected products security, including Internet of Things (IoT) devices.
- Third party risk management, including use of sensitive data and supply chain security.
Must have 1 year of supervisory experience.
Must be eligible to obtain certification such as CIPP, CIPT, CISA, CISM, CISSP, CRISC, PMP, or similar within 1 year of hire.
Requires travel up to 80%, of which 20% may be international, to serve client needs.
Employer will accept any suitable combination of education, training or experience.
Please apply on-line at ey.com/en_us/careers and click on "Careers - Job Search”, then “Search Jobs" (Job Number - 1502771).
What we offer We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary for this job is $165,005.00 per year. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
Tags: Audits CIPP CISA CISM CISSP Cloud COBIT Compliance Computer Science CRISC Finance Firewalls Governance HITRUST IAM Incident response Internet of Things Intrusion detection Intrusion prevention ISO 27001 ITIL Monitoring NIST PCI DSS Privacy Product security Risk management Strategy TCP/IP
Perks/benefits: Career development Flex hours Flex vacation Health care Startup environment
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Product Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Security Specialist jobs
- Open Chief Information Security Officer jobs
- Open Staff Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cybersecurity Specialist jobs
- Open Security Operations Analyst jobs
- Open Sr. Security Engineer jobs
- Open Security Consultant jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open ISO 27001-related jobs
- Open Threat intelligence-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Malware-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open APIs-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open SaaS-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open IDS-related jobs
- Open DevOps-related jobs
- Open DoD-related jobs