• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Technology Consulting – Cyber Security – Manger -EY

Technology Consulting – Cyber Security – Manger -EY

2021-06-07 by Geo

NYC Job Listing - New York

Technology Consulting – Cyber Security (Cyber Transformation) (Manager) (Multiple Positions), Ernst & Young U.S. LLP, Iselin, NJ

Note: We may earn a commission from products or services when you click on a link and make a purchase.


Provide advisory services on technology risk and security to help clients protect themselves against cyber attacks by conducting security capability and solutions assessments, delivering information security transformation, designing and implementing GRC technology solutions, performing program risk management, and delivering IT assurance. Enable enterprise clients to make better security and risk decisions, and reduce the cost of managing overall security risk. Work with clients to deliver sustainable, measurable results in transforming information security programs, identifying and responding to cyber threats, managing identity and access effectively and efficiently, and/or mitigating the risk of information loss and addressing privacy regulations. Help enterprises build cyber security models to protect company data against cyber threats. Help clients improve Identity and Access Management (IAM) processes to meet compliance needs and improve operational efficiency. Develop new privacy and data protection strategies to secure information while balancing regulatory requirements with business needs. Plan, implement, upgrade, and monitor security measures for the protection of computer networks and information. Ensure appropriate security controls are in place that will safeguard digital files and electronic infrastructure. Confer with clients to discuss issues such as computer data access needs, security violations, and programming changes. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.

Manage and motivate teams with diverse skills and backgrounds. Consistently deliver quality client services by monitoring progress. Demonstrate in-depth technical capabilities and professional knowledge. Maintain long-term client relationships and networks. Cultivate business development opportunities.

Full time employment, Monday – Friday, 40 hours per week, 830 am – 530 pm

Minimum Requirements

Must have a Bachelor’s degree in Management Information Systems (MIS), Computer Science, Engineering, Business, Accounting, Finance or a related field and 5 years of progressive, post-baccalaureate combined experience in consulting, advisory, cybersecurity assessment, or auditing. Alternatively, will accept a Master’s degree in Management Information Systems (MIS), Computer Science, Engineering, Business, Accounting, Finance or a related field and 4 years of combined experience in consulting, advisory, cybersecurity assessment, or auditing.

Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Must have 4 years of experience working in Information Security and/or IT Management.

Must have 4 years of experience in either

  • Strategy, design, development, and/or implementation of Information Security systems, including vulnerability assessments, privacy assessments, intrusion detection, incident response, security policy creation, enterprise security strategies, architectures, and/or governance; or
  • Experience in information security regulatory requirements and compliance issues.

Must have 1 year of experience in at least 2 of the following

  • Network management, including TCP/IP and OSI-model security technologies, including firewalls, intrusion detection and intrusion prevention.
  • Security Control design and implementation, pre/post go-live support, and training.
  • Security and Privacy Information Systems assessments, data analysis, design, architecture, implementation, management, and reporting.
  • Security and Risk Standards, including ISO 27001-2, PCI DSS, NIST, ITIL, COBIT, and HITRUST.
  • Cloud security architecture, assessment, implementation, and/or operation.
  • Product security and connected products security, including Internet of Things (IoT) devices.
  • Third-party risk management, including use of sensitive data and supply chain security.

Must have 1 year of supervisory experience.

Must be eligible to obtain certification such as CIPP, CIPT, CISA, CISM, CISSP, CRISC, PMP, or similar within 1 year of hire.

Requires travel up to 80%, of which 20% may be international, to serve client needs.

Employer will accept any suitable combination of education, training or experience.

TO APPLY Please apply on-line at ey.com/en_us/careers, and click on “Find jobs” (Job Number – ISE001HL).

LinkedIn Apply
Apply on LinkedIn

EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, national origin, protected veteran status, disability status, or any other legally protected basis, in accordance with applicable law.

This particular position at Ernst & Young in the United States requires the qualified candidate to be a “United States worker” as defined by the U.S. Department of Labor regulations at 20 CFR 656.3. You can review this definition at https//www.gpo.gov/fdsys/pkg/CFR-2011-title20-vol3/pdf/CFR-2011-title20-vol3-sec656-3.pdf at the bottom of page 750. Please feel free to apply to other positions that do not require you to be a “U.S. worker”.

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version