14 Ofertas de Prosegur en Argentina
Data Loss Prevention
Publicado hace 19 días
Trabajo visto
Descripción Del Trabajo
Employment type: Full-Time
Job DescriptionReq#: R
En Accenture Argentina buscamos profesionales apasionados por la innovación que quieran aprender y superarse día a día para sumarse a nuestros equipos de Technology.
¿Querés formar parte de la transformación digital y ser parte de proyectos desafiantes e innovadores?
Qué Desafíos Te Esperan:
- Trabajarás con el resto del equipo global en la resolución de problemas y la implementación de políticas en las implementaciones de MAC.
- El analista de soporte trabajará con el proveedor en la resolución de problemas y utilizará a su jefe de turno de Argentina como punto de escalada para problemas complejos que requieran la participación del proveedor.
Lo que te hará exitoso:
- Conocimientos en Data Loss Prevention (deseable).
- Conocimientos en Endpoint protection, MAC OS, Application Vulnerability, Forensic Analysis o aplicaciones de seguridad.
- Contar con un nivel de inglés avanzado (must have).
Un lugar de trabajo único, descubrí los beneficios que tenemos para vos:
- Pedidos Ya
- Prepaga Swiss Medical sin costo para vos y tu grupo familiar primario
- Reintegro de Conectividad
- Gimnasio 100% Bonificado
- Flexibilidad de saldo de vacaciones
- Jornada Flex
- Certificaciones bonificadas
- Día de cumpleaños libre
- Bonos
- Accenture Days: 5 días extra libres al año.
- Paquete de beneficios flexibles
- Licencias de Paternidad & Maternidad Extendida
- Ayuda Económica para Guardería y muchos más.
Tenemos a disposición oficinas en CABA, Córdoba, Mar del Plata y Rosario . Y si estás en otras provincias, nuestras posiciones son remotas , para que puedas trabajar desde tu casa.
EN ACCENTURE, LA IGUALDAD IMPULSA LA INNOVACIÓN
¿Sabías que Accenture fue elegida la compañía más diversa e inclusiva del mundo? Creemos que la fuerza laboral del futuro es una fuerza igualitaria para todos.
Todas las decisiones referidas al proceso de selección de empleo se tomarán sin hacer distinción, exclusión o preferencia alguna basada en motivos de raza, color, género, orientación sexual, discapacidad, edad, religión, opinión política o sindical, nacionalidad u origen socioeconómico ni ninguna otra prevista en la legislación vigente, que tengan por efecto anular o alterar la igualdad de oportunidades o de trato entre los candidatos.
Igualdad de oportunidades laborales
Todas las decisiones referidas al empleo se tomarán sin discriminar por edad, raza, credo, color, religión, sexo, nacionalidad, linaje, discapacidad, situación de excombatiente o veterano de guerra, orientación sexual, identidad o expresión de género, información genética, estado civil, ciudadanía, ni ningún otro factor protegido por la legislación nacional, provincial o local.
Como parte del proceso de contratación no se obligará a los candidatos a divulgar registros penales cancelados o cerrados referidos a condenas judiciales o arrestos.
Accenture tiene el compromiso de proporcionar oportunidades laborales a nuestros excombatientes, veteranas y veteranos de guerra.
About the companyAccenture plc is an Irish-domiciled multinational company that provides consulting and processing services.
#J-18808-LjbffrSecurity Engineer - EY Global Delivery Services
Hoy
Trabajo visto
Descripción Del Trabajo
Press Tab to Move to Skip to Content Link
Location: CABA
Other locations: Primary Location Only
Date: Jul 21, 2025
Requisition ID:
Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
The opportunityIdentity and Access Management (IAM) organization, a part of Information Security which enables over 330,000 individuals across 140+ countries to access systems and information securely. As a member of the Identity and Access Management (IAM) team this position will contribute towards execution of an IAM roadmap that meets security requirements, including but not limited to security for, a complex Active Directory (AD) environment, hybrid cloud deployment, mobile computing, policy driven security, SSO, user provisioning/de-provisioning, and federation focusing on multiple protocols (SAML, OpenID, Azure AD)
We offer opportunities to develop new skills and progress your career receiving support, coaching and feedback from colleagues around the world. This role will give you an opportunity to work with some of the best talent in the industry!
Your key responsibilitiesThe IAM Identity Provisioning Administrator provides operational support guidance. Coordination and follow up on user
Security Consultant - EY Global Delivery Services
Hoy
Trabajo visto
Descripción Del Trabajo
Press Tab to Move to Skip to Content Link
Location: CABA
Other locations: Primary Location Only
Date: Jul 22, 2025
Requisition ID:
Job summaryAs a Security Consultant within EY’s internal Security Consulting and Assurance team, the individual will be a trusted advisor to EY’s Audit Technologies portfolio. Overarching responsibilities will include: direct engagement in delivery on programs and projects, defining security architectures, providing security guidance, identifying and prioritizing security-related requirements, promoting secure-by-default designs and facilitating delivery of information security services throughout the system development life cycle (SDLC). The role will also direct technology teams in the implementation of appropriate risk treatment and mitigation options to address security vulnerabilities. Security Consultants are responsible for the translation of vulnerabilities into business risk terminology for communication to business stake holders.
Essential functions of the job- Define security architectures and provide pragmatic security guidance that balance business benefit and risks.
- Engage technology teams in order to evaluate and prescribe security controls at all touchpoints throughout the technology architecture
- Define security configuration standards for platforms and technologies
- Provide knowledge sharing and technical assistance to other team members
- Act as Subject Matter Expert (SME) in responsible technologies and have deep technical understanding of responsible portfolios
- Perform risk assessments of information systems and infrastructure
- Maintain and enhance the Information Security risk assessment methodology
- Develop appropriate risk treatment and mitigation options to address security risks identified during security review or audit
- Translate technical vulnerabilities into business risk terminology for business units and recommend corrective actions to customers and project stake-holders
- Cloud technologies (MS Azure specifically)
- Strategic skills to analyze technology architectures and software solutions, identify security risk and prescribe mitigating security measures in accordance with the firm’s risk tolerance level.
- Five or more years working experience with the architecture, design and engineering of web-based multi-tier information systems or network infrastructures
- Experience with security architecture, design and assessment of accounting and auditing systems.
- Ability to appropriately balance firm security needs with business impact & benefit
- Ability to facilitate compromise to incrementally advance security strategy and objectives
- An overall understanding of the business objectives of EY with an ability to build relationships with business partners and across EY IT
- Ability to team well with others to facilitate and enhance the understanding & compliance to security policies
- Experience facilitating meetings with multiple customers and technical staff, including building consensus and mediating compromise
- High degree of tolerance for ambiguity
- Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies
- Experience working with common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT
An advanced degree in Computer Science or a related discipline, or equivalent work experience
Required Experience- Five or more years of experience in security architecture, application security, networking, data center configuration, cloud technology, and the management of a significant Information Security risk functions
- 8 or more years of experience in an Information Security or Information Technology discipline
- Experience in the Agile development lifecycle
- Experience in managing the communication of security findings and recommendations to IT project teams and management
- Exceptional judgment, tact, and decision-making ability
- Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change
- Outstanding management, interpersonal, communication, organizational, and decision-making skills
- Strong English language skills are required
- Experience with cloud technology solutions, particularly MS Cloud
- Experience in technologies such as block chain, RPA, AI, etc.
- Knowledge of the Scaled Agile Framework
Candidates are preferred to hold or be actively pursuing related professional certifications within the GIAC family of certifications or CISSP, CISM or CISA
Select how often (in days) to receive an alert:
EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.
#J-18808-LjbffrSecurity Engineer - EY Global Delivery Services
Publicado hace 18 días
Trabajo visto
Descripción Del Trabajo
Press Tab to Move to Skip to Content Link
Location: CABA
Other locations: Primary Location Only
Date: Jul 21, 2025
Requisition ID:
Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
The opportunityIdentity and Access Management (IAM) organization, a part of Information Security which enables over 330,000 individuals across 140+ countries to access systems and information securely. As a member of the Identity and Access Management (IAM) team this position will contribute towards execution of an IAM roadmap that meets security requirements, including but not limited to security for, a complex Active Directory (AD) environment, hybrid cloud deployment, mobile computing, policy driven security, SSO, user provisioning/de-provisioning, and federation focusing on multiple protocols (SAML, OpenID, Azure AD)
We offer opportunities to develop new skills and progress your career receiving support, coaching and feedback from colleagues around the world. This role will give you an opportunity to work with some of the best talent in the industry!
Your key responsibilitiesThe IAM Identity Provisioning Administrator provides operational support guidance. Coordination and follow up on user
Security Consultant - EY Global Delivery Services
Publicado hace 18 días
Trabajo visto
Descripción Del Trabajo
Press Tab to Move to Skip to Content Link
Location: CABA
Other locations: Primary Location Only
Date: Jul 22, 2025
Requisition ID:
Job summaryAs a Security Consultant within EY’s internal Security Consulting and Assurance team, the individual will be a trusted advisor to EY’s Audit Technologies portfolio. Overarching responsibilities will include: direct engagement in delivery on programs and projects, defining security architectures, providing security guidance, identifying and prioritizing security-related requirements, promoting secure-by-default designs and facilitating delivery of information security services throughout the system development life cycle (SDLC). The role will also direct technology teams in the implementation of appropriate risk treatment and mitigation options to address security vulnerabilities. Security Consultants are responsible for the translation of vulnerabilities into business risk terminology for communication to business stake holders.
Essential functions of the job- Define security architectures and provide pragmatic security guidance that balance business benefit and risks.
- Engage technology teams in order to evaluate and prescribe security controls at all touchpoints throughout the technology architecture
- Define security configuration standards for platforms and technologies
- Provide knowledge sharing and technical assistance to other team members
- Act as Subject Matter Expert (SME) in responsible technologies and have deep technical understanding of responsible portfolios
- Perform risk assessments of information systems and infrastructure
- Maintain and enhance the Information Security risk assessment methodology
- Develop appropriate risk treatment and mitigation options to address security risks identified during security review or audit
- Translate technical vulnerabilities into business risk terminology for business units and recommend corrective actions to customers and project stake-holders
- Cloud technologies (MS Azure specifically)
- Strategic skills to analyze technology architectures and software solutions, identify security risk and prescribe mitigating security measures in accordance with the firm’s risk tolerance level.
- Five or more years working experience with the architecture, design and engineering of web-based multi-tier information systems or network infrastructures
- Experience with security architecture, design and assessment of accounting and auditing systems.
- Ability to appropriately balance firm security needs with business impact & benefit
- Ability to facilitate compromise to incrementally advance security strategy and objectives
- An overall understanding of the business objectives of EY with an ability to build relationships with business partners and across EY IT
- Ability to team well with others to facilitate and enhance the understanding & compliance to security policies
- Experience facilitating meetings with multiple customers and technical staff, including building consensus and mediating compromise
- High degree of tolerance for ambiguity
- Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies
- Experience working with common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT
An advanced degree in Computer Science or a related discipline, or equivalent work experience
Required Experience- Five or more years of experience in security architecture, application security, networking, data center configuration, cloud technology, and the management of a significant Information Security risk functions
- 8 or more years of experience in an Information Security or Information Technology discipline
- Experience in the Agile development lifecycle
- Experience in managing the communication of security findings and recommendations to IT project teams and management
- Exceptional judgment, tact, and decision-making ability
- Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change
- Outstanding management, interpersonal, communication, organizational, and decision-making skills
- Strong English language skills are required
- Experience with cloud technology solutions, particularly MS Cloud
- Experience in technologies such as block chain, RPA, AI, etc.
- Knowledge of the Scaled Agile Framework
Candidates are preferred to hold or be actively pursuing related professional certifications within the GIAC family of certifications or CISSP, CISM or CISA
Select how often (in days) to receive an alert:
EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.
#J-18808-LjbffrBusiness Security Consultant - EY Global Delivery Services
Hoy
Trabajo visto
Descripción Del Trabajo
Press Tab to Move to Skip to Content Link
Location: CABA
Other locations: Primary Location Only
Date: Jul 24, 2025
Requisition ID:
Business Security Consultant
You are seeking a position that allows you to demonstrate your information security skills, experience and ability to solve complex problems. This position is an opportunity to embed information security in a strategic investment by the EY Tax practice that is intended to enable innovation and disruptive new services:
Your key responsibilities
This position is a leading and consulting role in designing, developing and implementing all aspects of security for complex global applications based on Microsoft Azure technology and generally the Microsoft technology stack. The role is very much an individual contributor capable of supporting multiple project teams. In other words, it is not a program management or oversight role, but one that requires detailed participation in the design, implementation and certification of security controls across the multiple projects/applications. This requires knowledge of various IT system architecture and Cloud technology, as well as supporting technology such as IAM, network security, firewalls, user
Business Security Consultant - EY Global Delivery Services
Publicado hace 18 días
Trabajo visto
Descripción Del Trabajo
Press Tab to Move to Skip to Content Link
Location: CABA
Other locations: Primary Location Only
Date: Jul 24, 2025
Requisition ID:
Business Security Consultant
You are seeking a position that allows you to demonstrate your information security skills, experience and ability to solve complex problems. This position is an opportunity to embed information security in a strategic investment by the EY Tax practice that is intended to enable innovation and disruptive new services:
Your key responsibilities
This position is a leading and consulting role in designing, developing and implementing all aspects of security for complex global applications based on Microsoft Azure technology and generally the Microsoft technology stack. The role is very much an individual contributor capable of supporting multiple project teams. In other words, it is not a program management or oversight role, but one that requires detailed participation in the design, implementation and certification of security controls across the multiple projects/applications. This requires knowledge of various IT system architecture and Cloud technology, as well as supporting technology such as IAM, network security, firewalls, user
Sé el primero en saberlo
Acerca de lo último Prosegur Empleos en Argentina !
Chief information security officer
Publicado hace 19 días
Trabajo visto
Descripción Del Trabajo
Accomplishing the mission of SANDBOX Cybersecurity & Information Security program requires a CISO with strong leadership skills, executive presence, security knowledge and effective placement within the organization. The attributes of the required CISO are:
- Leadership: The CISO must provide executive leadership in developing, planning, coordinating, administering, managing, staffing and supervising all information security-related operations. The CISO must provide overall leadership to the Information Security program and its coordination with complimentary programs including Corporate Continuity, Privacy, Regulatory Compliance, Corporate Security, Risk Management, Corporate Sourcing, Human Resources and Legal Counsel as well as integrate closely with Line of Business executives.
Executive Presence: The CISO serves as a spokesperson for the Information Security program including presentations to the Board of Directors, addressing concerns expressed by Auditors, vendors, and customers, and appearing as a featured speaker in Industry and regional information security seminars, symposia, courses, etc. The CISO must have the executive presence to effectively represent the company’s position regarding information security matters and the ability to influence other company executives in the achievement of their business objectives in a manner consistent with the security program objectives. Simultaneously, the CISO must possess effective communication skills and an ability to interact with personnel at all levels in the organization.
- Security Knowledge: The CISO will decide or recommend the company’s stance on numerous information security issues and, as such, must have a solid basis of security knowledge upon which to draw. The CISO must possess strong analytical and diagnostic abilities to understand and apply theoretical concepts to practical problems. The CISO must have strong information security skills derived from having at least ten years experience in Information Technology and five to seven years of direct Information Security experience. The CISO should be a Certified Information Systems Security Professional (CISSP).
The CISO is responsible for overseeing all aspects of information security within the organization. The CISO implements and supports all of the company's information security initiatives. CISO acts as a focus and resource for information security matters, taking direction from Upper Management and Chief Technology Officer. CISO investigates and recommends secure solutions that implement information security policy and standards. CISO coordinates Corporate Information Security (CIS) activities and manages CIS staff. CISO oversees, implements and monitors regulatory requirements and Company’s information security posture against those requirements.
The fundamental job responsibilities of this position are:
- Leadership of Company’s Cybersecurity & Information Security program – Represent Company’s Information Security program, internally and externally, directing the focus, activities, and priorities. Work directly with senior management to identify, define and confirm the key threats to the information and financial assets of the Company.
- Direct and monitor security procedures and practices – Define roles and responsibilities regarding information security operations and review the various reports and logs available. Investigate and report on irregularities. Develop a management control program that proactively identifies threats to the organization including conducting periodic risk assessments.
- Develop security policies and standards – Develop and enhance existing security policies to adequately reflect Company’s strategy for securing information assets. Policies will reflect business needs, changing technologies and potential threats to the organization.
- Promote security awareness – Provide information on Company’s security policies and practices to employees and company affiliates.
- Create an environment that encourages the participation of business managers, External and Internal Audit, insurance and legal staff in the Information Security program.
- Coordinate security-related activities including Corporate Continuity, Privacy, Cybersecurity Regulatory Compliance, Cyber Risk Management, Cybersecurity aspects of Corporate Sourcing and Legal Counsel. Ensure all security related tasks are completed and that adequate provisions and practices are in place.
- Ensure adequate security provisions for existing and new applications and systems – Be aware of and review the security features of new applications and systems to ensure that they meeting existing security policies and standards.
- Take leadership role in the design, development, testing, integration, implementation and maintenance of security systems that protect key information assets. Maintain configuration profiles of all systems.
- Maintain awareness of changes in industry and threats – Attend courses and seminars as required to maintain a high level of proficiency in the field of information security. Network with other industry security professionals. Develop security skill sets of the CIS staff.
- Degree in technology-related field required.
- Professional security management certification would be an asset.
- Minimum of 3 years of experience in a combination of risk management, information security and IT jobs.
- Excellent written and verbal communication skills and high level of personal integrity.
- Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams.
- Experience with contract and vendor negotiations and management including managed services.
- Technical background: AWS CLOUD, DNS, Routing, authentication, VPN, proxy, DDOS, threat modeling, Firewalls, intrusion detection, protocols, digital identity & authentication technologies.
- Knowing of regulation standards: PCI, HIPAA, GLBA.
- Experience in Crypto, Smart Contracts Desirable.
Chief information security officer
Hoy
Trabajo visto
Descripción Del Trabajo
Accomplishing the mission of SANDBOX Cybersecurity & Information Security program requires a CISO with strong leadership skills, executive presence, security knowledge and effective placement within the organization. The attributes of the required CISO are:
- Leadership: The CISO must provide executive leadership in developing, planning, coordinating, administering, managing, staffing and supervising all information security-related operations. The CISO must provide overall leadership to the Information Security program and its coordination with complimentary programs including Corporate Continuity, Privacy, Regulatory Compliance, Corporate Security, Risk Management, Corporate Sourcing, Human Resources and Legal Counsel as well as integrate closely with Line of Business executives.
Executive Presence: The CISO serves as a spokesperson for the Information Security program including presentations to the Board of Directors, addressing concerns expressed by Auditors, vendors, and customers, and appearing as a featured speaker in Industry and regional information security seminars, symposia, courses, etc. The CISO must have the executive presence to effectively represent the company’s position regarding information security matters and the ability to influence other company executives in the achievement of their business objectives in a manner consistent with the security program objectives. Simultaneously, the CISO must possess effective communication skills and an ability to interact with personnel at all levels in the organization.
- Security Knowledge: The CISO will decide or recommend the company’s stance on numerous information security issues and, as such, must have a solid basis of security knowledge upon which to draw. The CISO must possess strong analytical and diagnostic abilities to understand and apply theoretical concepts to practical problems. The CISO must have strong information security skills derived from having at least ten years experience in Information Technology and five to seven years of direct Information Security experience. The CISO should be a Certified Information Systems Security Professional (CISSP).
The CISO is responsible for overseeing all aspects of information security within the organization. The CISO implements and supports all of the company's information security initiatives. CISO acts as a focus and resource for information security matters, taking direction from Upper Management and Chief Technology Officer. CISO investigates and recommends secure solutions that implement information security policy and standards. CISO coordinates Corporate Information Security (CIS) activities and manages CIS staff. CISO oversees, implements and monitors regulatory requirements and Company’s information security posture against those requirements.
The fundamental job responsibilities of this position are:
- Leadership of Company’s Cybersecurity & Information Security program – Represent Company’s Information Security program, internally and externally, directing the focus, activities, and priorities. Work directly with senior management to identify, define and confirm the key threats to the information and financial assets of the Company.
- Direct and monitor security procedures and practices – Define roles and responsibilities regarding information security operations and review the various reports and logs available. Investigate and report on irregularities. Develop a management control program that proactively identifies threats to the organization including conducting periodic risk assessments.
- Develop security policies and standards – Develop and enhance existing security policies to adequately reflect Company’s strategy for securing information assets. Policies will reflect business needs, changing technologies and potential threats to the organization.
- Promote security awareness – Provide information on Company’s security policies and practices to employees and company affiliates.
- Create an environment that encourages the participation of business managers, External and Internal Audit, insurance and legal staff in the Information Security program.
- Coordinate security-related activities including Corporate Continuity, Privacy, Cybersecurity Regulatory Compliance, Cyber Risk Management, Cybersecurity aspects of Corporate Sourcing and Legal Counsel. Ensure all security related tasks are completed and that adequate provisions and practices are in place.
- Ensure adequate security provisions for existing and new applications and systems – Be aware of and review the security features of new applications and systems to ensure that they meeting existing security policies and standards.
- Take leadership role in the design, development, testing, integration, implementation and maintenance of security systems that protect key information assets. Maintain configuration profiles of all systems.
- Maintain awareness of changes in industry and threats – Attend courses and seminars as required to maintain a high level of proficiency in the field of information security. Network with other industry security professionals. Develop security skill sets of the CIS staff.
- Degree in technology-related field required.
- Professional security management certification would be an asset.
- Minimum of 3 years of experience in a combination of risk management, information security and IT jobs.
- Excellent written and verbal communication skills and high level of personal integrity.
- Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams.
- Experience with contract and vendor negotiations and management including managed services.
- Technical background: AWS CLOUD, DNS, Routing, authentication, VPN, proxy, DDOS, threat modeling, Firewalls, intrusion detection, protocols, digital identity & authentication technologies.
- Knowing of regulation standards: PCI, HIPAA, GLBA.
- Experience in Crypto, Smart Contracts Desirable.
Credential Protection Senior Security Analyst - EY Global Delivery Services
Hoy
Trabajo visto
Descripción Del Trabajo
Press Tab to Move to Skip to Content Link
Location: CABA
Other locations: Primary Location Only
Date: Jul 3, 2025
Requisition ID:
Today’s world is fueled by vast amounts of information, which means that data is even more valuable than ever before. Protecting data and information systems is central to doing business, and therefore everyone in EY Information Security has a critical role to play. Join a global team of almost 900 people who collaborate to support the business of EY by protecting EY and client information assets! Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond when things go wrong. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology service solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
The opportunityThe Supervising Security Analyst within the Identity & Access Management domain will be responsible for the operation, maintenance, and security of an Active Directory forest supporting multiple enterprise forests as part of a 24x7 Follow-the-Sun Operating Model. The Supervising Analyst will be responsible for protecting the highly privileged accounts and their associated credentials. The Supervising Analyst will also work with team members to enhance security monitoring tools with contextual information. You must be able to review vulnerability scans and provide an assessment of the vulnerabilities as they relate to the environment. The Supervising Analyst must be very proactive taking ownership to review various sources for security information and threats and determine the potential impact to the environment. Risk assessment techniques are a plus.
Your key responsibilities- Ability to manage and maintain an Active Directory forest infrastructure
- Ability to address and resolve common Windows and Active Directory issues
- Ability to locate and assimilate new information to provide context for security events
- Identifies and resolves complex issues on the engagement/ project, demonstrating a broad technical skillset.
- Solid understanding of security incident/ problem and change management and vulnerability management processes
- Executes Daily health check of security platforms and publishing health check report
- Execute Maintenance Procedures to keep the security systems patched and up to date
- Ability to recognize and research attacks and attack patterns
- Ability to prioritize events so that the most impactful are addressed first
- Ability to work effectively with clients, management staff members, vendors and consultants
- Ability to deliver projects on time and on budget
- Perform advanced analysis, troubleshooting, problem isolation of customers and partners issues and requests
- Evaluate and supervise control deficiencies and provide guidance to management related to improvement of existing policies, procedures, documentation and review processes.
- Demonstrated creative problem-solving skills including defining and resolving issues.
- Communicates critical areas of risk to the team and manager on a timely basis, consulting where appropriate to help resolve issues.
- Can quickly understand fast- moving situations, rapidly understands the context of different situations and responds to new challenges and demands effectively.
- Strong network and/or system admin background
- Strong knowledge of Windows Server technologies and Active Directory
- Experience with scripting languages especially PowerShell
- Experience with CyberArk Privileged