Risk Adv - Tech Con - Cyber Sec - Cyber Threat Manag-Vul ID - Manager - Multiple Positions - 1500883
Houston, TX, US, 77010
Full Time Mid-level / Intermediate USD 145K+
EY
EY provides consulting, assurance, tax and transaction services that help solve our client’s toughest challenges and build a better working world for all.Risk Advisor, Technology Consulting - Cyber Security (Cyber Threat Management - Vulnerability ID) (Manager) (Multiple Positions), Ernst & Young U.S. LLP, Houston, TX.
Provide advisory services on technology risk and security to help clients protect themselves against cyber attacks. Define technical and business requirements for Threat and Vulnerability management solutions and business process and policies related to controlling access to systems and applications. Develop cyber threat and vulnerability management strategies relating to application penetration testing and application source code review. Pefrorm vulnerability and attack and penetration assessments in Internet, Intranet, and Wireless environments. Enable enterprise clients to make better security and risk decisions, and reduce the cost of managing overall security risk. Work with clients to deliver sustainable, measurable results in transforming information security programs, identifying and responding to cyber threats, managing identity and access effectively and efficiently, and/or mitigating the risk of information loss and addressing privacy regulations. Help enterprises build cyber security models to protect company data against cyber threats. Confer with clients to discuss issues such as computer data access needs, security violations, and programming changes.
Manage and motivate teams with diverse skills and backgrounds. Consistently deliver quality client services by monitoring progress. Demonstrate in-depth technical capabilities and professional knowledge. Maintain long-term client relationships and networks. Cultivate business development opportunities.
Full time employment, Monday – Friday, 40 hours per week, 8:30 am – 5:30 pm.
MINIMUM REQUIREMENTS:
Must have a Bachelor’s degree in Management Information Systems (MIS), Computer Science, Engineering, Business, Accounting, Finance or a related field and 5 years of progressive, post-baccalaureate advisory and/or systems integration work experience. Alternatively, will accept a Master’s degree in Management Information Systems (MIS), Computer Science, Engineering, Business, Accounting, Finance or a related field and 4 years of advisory and/or systems integration work experience.
Must have 4 years of experience working in Security, IT Management and/or Enterprise Resource Planning (ERP).
Must have 4 years of experience in Network Attack and Penetration testing; Security Testing of Web-based applications; and/or Application Security Code Assessments.
Must have 4 years of experience in the following:
- UNIX, NT, Networking and Wireless Security, and/or TCP/IP Networking.
- Java, C, C++, CH, ASP.NET, and/or .NET programming languages.
- Manual Attack and Penetration Testing without use of automated tools.
- Application development, including custom scripts or programs used for port scanning and vulnerability identification (including Python, PowerShell, Java, and/or Perl).
- Working with web-based application vulnerabilities.
Must have 2 years of experience leading teams of Cyber Security advisory/consulting professionals.
Must be eligible to obtain a professional certification such as CIPP, CIPT, CISA, CISM, CISSP, CRISC, PMP or other related certification within one year of hire.
Requires travel up to 80%, of which 20% may be international, to serve client needs.
Employer will accept any suitable combination of education, training or experience.
Please apply on-line at ey.com/en_us/careers and click on "Careers - Job Search”, then “Search Jobs" (Job Number - 1500883).
- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
Tags: Application security ASP.NET C CIPP CISA CISM CISSP Computer Science CRISC ERP Finance Java Monitoring Pentesting Perl PowerShell Privacy Python Strategy TCP/IP UNIX Vulnerabilities Vulnerability management
Perks/benefits: Career development Flex hours Flex vacation Health care Startup environment
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Officer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Cyber Security Specialist jobs
- Open Manager Pentest H/F jobs
- Open Cybersecurity Analyst jobs
- Open Product Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Staff Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Security Specialist jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open IT Security Engineer jobs
- Open Cybersecurity Specialist jobs
- Open Security Operations Analyst jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open SaaS-related jobs
- Open APIs-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open Java-related jobs
- Open Forensics-related jobs
- Open IDS-related jobs
- Open DevOps-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open DoD-related jobs