Threat Exposure Management Senior Manager

Melbourne, VIC, AU, 3000

EY

Mit unseren vier integrierten Geschäftsbereichen — Wirtschaftsprüfung und prüfungsnahe Dienstleistungen, Steuerberatung, Unternehmensberatung und Strategy and Transactions — sowie unserem Branchenwissen unterstützen wir unsere Mandanten dabei,...

View all jobs at EY

Apply now Apply later

 

 

 

Threat Exposure Management Senior Manager  

 

What if you didn't focus on who you are now, but who you could become?

 

At EY we believe that whoever you are, your uniqueness helps us stand apart. 

 

We bring together extraordinary people, like you, to build a better working world. 

 

What’s in it for you?   

 

As a Senior Manager in our cybersecurity practice you will lead on client engagements, ensure effective stakeholder engagement and team management to deliver exceptional client experience. As an expert in threat exposure management, you will be able to speak with authority in the security industry and use that voice to drive practice growth. 

 

This role is responsible for helping our clients develop strategies and implement solutions for managing technical vulnerabilities for their technology estate and coordinating their resolution while reporting key metrics to the leadership team to provide an accurate representation of their residual cyber risk from vulnerable systems and applications. 

 

Leveraging and growing your expertise in vulnerability management, threat exposure management, attack surface management, threat intelligence, defensive security, infrastructure protection, incident response, and operational security you will quickly become a leader in one of EY’s most interesting growth areas.   

 

Your key responsibilities

  • Lead and develop EY’s threat exposure management offerings.
  • Help clients reduce cyber risk by providing solutions for proactively monitoring for internal and external threats and vulnerabilities and advising on mitigating them.
  • Be the expert in threat intelligence, vulnerability intelligence, vulnerability management, threat hunting and threat analytics.
  • Establish and help clients operate a prioritization framework for vulnerability management and governance.
  • Lead engagements to ensure a rapid response to high-risk vulnerabilities.
  • Provide consultation on projects to improve the data quality of asset management tools.
  • Continually improve the vulnerability management offering, process and procedures and direct others as needed.

 

 

What we’re looking for 

 

 

Here’s our ‘wish list’ but don’t worry if you don’t tick all the boxes. We’re interested in your strengths, what you want to learn, and how far you want to go. 

 

  • Proven experience developing and managing a vulnerability management program or threat exposure management program at one or more organizations

  • Ability to deliver successful Cyber Security engagements both as an individual contributor and leader
  • Proven experience as a Cyber Security practitioner with the knowledge to provide industry best-practice advice to clients in the areas of threat detection, incident response, threat hunting and purple teaming
  • Experience with Information Security domains - in particular one or more of the following: Threat exposure management, Threat Detection & Response, and Breach Support. This experience should include both advisory and implementation experience. 
  • Experience leading implementation and operations capability for security operations centres
  • Strong program / project delivery on major security uplift programs.
  • 7+ years’ experience in cybersecurity.
  • 3+ years leading vulnerability management or threat exposure management functions.
  • Experience in complex networks related to software patching and processes.
  • Experience in translating threat intelligence into business risk indicators.
  • Familiarity with modern technologies and security approaches i.e., cloud security.
  • Experience with leading and implementing vulnerability scanning and risk-based vulnerability management platforms.
  • Practical experience with security technologies such as firewalls, web and mail gateway filtering, AV, IDS/IPS, WAF, SIEM, FIM, IDAM, security monitoring, threat intelligence and security analytics.
  • Basic understanding of secure software development and related guidelines / standards (e.g., OWASP Top 10).
  • Ability to execute within an agile or waterfall project environment.
     

Our roles can be adjusted to work flexibly with the potential of reduced hours to balance your time between the home and office. Please speak with us about potential options. 

 

What we can offer you 

 

 

Acknowledgement of Country 

 

EY acknowledges the Traditional Owners and Custodians of the lands on which EY offices are located around Australia. We pay our respects to their cultures, and to their Elders — past, present, and emerging. Find out more about our vision for reconciliation at www.ey.com/au/reconciliation 

 

Apply now… we’re over 9,000 perspectives in Australia and we’re ready to welcome yours.  

  
Diversity, equity, and inclusiveness (DE&I) are core to who we are, how we work and how we live our values. We hold a collective commitment to continue to drive an environment where all differences are valued, practices are equitable, and everyone experiences a sense of belonging— where people are inspired to team and lead inclusively in their interactions every day. We encourage applications from people of all ages, nationalities, abilities, cultures, sexual orientations, and gender identities and are committed to providing an equitable and barrier free recruitment experience for all. We encourage you to share any support and adjustments you need to be your best and participate equitably in our recruitment process. We understand sharing your needs with us can be daunting, so if you have questions before or during your application, we welcome you to get in touch at contactrecruitment@au.ey.com or +61 3 8650 7788 (option 2). Anything you tell us will be kept completely confidential. 

 

The exceptional EY experience. It’s yours to build. 

#LI-Hybrid  

 

 

EY | Building a better working world 

 

Our preferred applicant will be required to undertake employment screening by EY or our external third-party provider.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Agile Analytics Cloud Firewalls Governance IAM IDS Incident response IPS Monitoring OWASP SIEM Threat detection Threat intelligence Vulnerabilities Vulnerability management

Perks/benefits: Career development Competitive pay Equity / stock options Parental leave Wellness

Regions: Asia/Pacific Europe
Country: Australia

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.