• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Cyber Security – Data Protection (Manager) Job – EY – LA

Cyber Security – Data Protection (Manager) Job – EY – LA

2021-05-25 by Geo

Los Angeles CA

Cyber Security – Data Protection – Manager Multiple Positions – Ernst & Young U.S. LLP, Los Angeles, CA

Note: We may earn a commission from products or services when you click on a link and make a purchase.

Lead teams to assist clients with defining technical and business requirements for data protection solutions. Help design and implement data protection governance, processes, and technology to identify and protect the data that is most impactful to the business from a financial, operational, regulatory or reputational perspective. Deliver new systems and improvements to existing systems customized to meet the clients’ data protection needs. Devise methods to add new functionality to the existing technologies to address new threats and tactics. Produce new playbooks as threats change and new data protection tools and controls emerge and train the clients’ end users. Participate in client meetings to advise clients on multiple data protection products and solutions including enterprise data loss prevention, data classification, digital rights management, cloud data loss prevention/cloud access security brokers, tokenization, file, and database encryption.

Manage and motivate teams with diverse skills and backgrounds. Consistently deliver quality client services by monitoring progress. Demonstrate in-depth technical capabilities and professional knowledge. Maintain long-term client relationships and networks. Cultivate business development opportunities.

Full time employment, Monday – Friday, 40 hours per week, 830 am – 530 pm

Motley Fool Stock Advisor

Minimum Requirements

Bachelor’s degree in Computer Engineering, Technology Management, Information Systems, Engineering, Business Administration or related, and 5 years of progressive post-bachelor’s experience; or a Master’s degree in Computer Engineering, Technology Management, Information Systems, Engineering, Business Administration or related, and 4 years of experience.

Must have 4 years of experience in the following

  • Information security concepts and methods, including vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures and governance;
  • Networking (TCP/IP or OSI model), operating system fundamentals (Windows, UNIX, or mainframe), security technologies (firewalls or IDS/IPS) and application programming/scripting languages (C, Java, Perl, or Shell);
  • Technical architecture experience integrating data protection software into clients’ infrastructure; network architecture design, implementation and administration;
  • Operating systems, virtual machine environments, mainframe security packages, and relational database management systems.

Must have 4 years of experience in one of the following regulatory requirements and/or compliance issues affecting clients related to privacy and data protection PCI DSS, GLBA, Basel II, EU Data Protection Directive, International Cross Border and U.S. State Data Privacy Laws.


Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Must have 4 years of experience in 3 of the following areas

  • Data leakage/content monitoring and filtering;
  • Secure messaging/email encryption;
  • Mobile device security;
  • Disk, file, device, and database encryption;
  • Key management/Public Key Infrastructure (PKI);
  • Data classification and privacy policies;
  • Digital Rights Management (DRM);
  • Logging, monitoring, and security event management; and/or
  • Secure information storage.
  • Must have 3 years of technical architecture experience integrating data protection software into clients’ infrastructure and applications.
  • Must have 2 years of experience leading teams of Cyber Security advisory/consulting professionals
  • Must be eligible to obtain a professional certification such as CIPP, CIPT, CISA, CISM, CISSP, CRISC, PMP or other related certification within one year of hire.
  • Travel required to meet client needs up to 80%, of which 10% may be international.
  • Employer will accept any suitable combination of education, training or experience.

TO APPLY Please apply on-line at ey.com/en_us/careers, and click on “Find jobs” (Job Number – LOS004FV).


Amazon Web Services Training On Demand

Amazon Web Services Logo
  • AWS Fundamentals: Going Cloud-Native
  • AWS Fundamentals Specialization

EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, national origin, protected veteran status, disability status, or any other legally protected basis, in accordance with applicable law.

This particular position at Ernst & Young in the United States requires the qualified candidate to be a “United States worker” as defined by the U.S. Department of Labor regulations at 20 CFR 656.3. You can review this definition at https//www.gpo.gov/fdsys/pkg/CFR-2011-title20-vol3/pdf/CFR-2011-title20-vol3-sec656-3.pdf at the bottom of page 750. Please feel free to apply to other positions that do not require you to be a “U.S. worker”.

LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version