Salary
💰 $76,400 - $157,500 per year
Tech Stack
AWSAzureCloudFirewallsGoogle Cloud PlatformMicroservices
About the role
- Role: leading and consulting in designing, developing and implementing all aspects of security for complex global applications based on Microsoft Azure technology and the Microsoft technology stack.\n
- The role is an individual contributor capable of supporting multiple project teams; not a program management or oversight role, but requires participation in the design, implementation and certification of security controls across the multiple projects/applications.\n
- Requires knowledge of various IT system architecture and Cloud technology, as well as supporting technology such as IAM, network security, firewalls, user account management, audit and logging, and other security concepts as outlined in ISO27001, OWASP and related security standards.\n
- Should have knowledge of 3rd Party security assessments and applicability of SOC1 and SOC2 reports and concepts of vendor risk management.\n
- The position requires being able to work remotely and will leverage EY’s collaboration tools such as Teams, SharePoint, and AzureDevOps.\n
- Significantly working security experience and knowledge in the design, implementation and operation of security controls in one of the following areas: Agile & DevOps Methodologies, Application Security, Cloud Security, Infrastructure Security, Identity and Access Management.\n
- To qualify, you must have 5 years of experience across complex IT architectures including cloud and on-premises solutions; degree and certifications; strong English communication anticipated."
Requirements
- 5 years of experience in implementing, advising on, and consulting about security configurations across complex IT architectures, including cloud environments (primarily Microsoft's, but also including a range of IaaS, PaaS, and SaaS offerings from multiple vendors)\n
- In-depth knowledge of IT system architecture concepts and cloud technologies, along with associated technologies such as Identity and Access Management (IAM), network security, firewalls, software development best practices, systems auditing, system hardening, and other security principles as outlined in ISO27001, OWASP, and related security standards.\n
- Proficiency in interpreting security reports (SAST and DAST) and testing outcomes for applications, providing advice on necessary corrections and security measures based on policies and non-functional requirements.\n
- Knowledge of GRC tool to work closely with Compliance team on handling remediation plans of security related issues.\n
- A degree in Computer Science or a related field.\n
- Security certifications\n
- Operational Security – Experience with defining operational models and procedures for business solutions including the operation and maintenance of infrastructure and application security controls.\n
- Information Security Standards – Knowledge of common information security standards such as ISO 27001/27002, NIST CSF, FEDRAMP, CSA and CIS Controls.\n
- Cloud security certifications such as AZ-300 Azure Architect Technologies, CISSP or security related certifications.\n
- Product Management – working with a broader business team on aspects of security that affect all phases from concept to design to implementation and then operational support.