TC-CS-Cyber Architecture OT and Engineering-Email Security -Senior

Bengaluru, KA, IN, 560048

EY

Tarjoamme palveluita, jotka auttavat ratkaisemaan asiakkaidemme vaikeimmat haasteet

View all jobs at EY

Apply now Apply later

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. 

 

 

 

 

EY- Cyber Security (AEET) – Consulting – Senior

As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Endpoint Security tools/solutions. The main duties of the person in this role will include proper care and administration of the Email Security and EDR\XDR tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc.

 

The opportunity

We’re looking for Senior Security consultant in the Risk Consulting team to work on various infrastructure and endpoint protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop.

 

Your key responsibilities

  • Design, implement, and maintain Email security solutions (Proofpoint/M365) to safeguard Email flow,
  • Manage and respond to the security alerts triggered for email security solution.
  • Collaborate with cross-functional teams to integrate security solutions and ensure seamless operations.
  • Monitor and analyse security incidents, responding promptly to security breaches and user incidents.
  • Stay updated on industry best practices and emerging security threats, adapting security protocols as needed.
  • Perform regular security audits and security assessments to identify and mitigate risks.
  • Develop and maintain security documentation, policies, and procedures.
  • Provide technical support and guidance to other IT teams to enhance overall security posture.
  • Troubleshoot and resolve security-related issues in a timely manner.
  • Continuously improve and optimize security processes and procedures to enhance efficiency and effectiveness.

 

Skills and attributes for success

  • Should be a good team player.
  • Excellent verbal and written communication skill.
  • Proficient Documentation and Power Point skills
  • Good social, communication and technical writing skills
  • Should interface with internal and external clients.
  • Strong analytical/problem solving skills.
  • Ability to prioritize tasks and work accurately under pressure in order to meet deadlines.
  • Should understand and follow workplace policies and procedures.
  • Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager.

 

To qualify for the role, you must have

  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • 6 to 8 years of professional experience in information security with a focus on email security, security incident management, EDR solutions.
    • Hands-on experience on Proofpoint email security and its components.
    • Design, implement and maintain email solution, EDR solutions at enterprise levels.
    • Should have deep knowledge on ITIL process.
    • Handle security escalations as L2/L3.
    • Strong understanding of email security, M365, EDR solution and technology.
    • Experience with Proofpoint incident handling process and risk mitigation.
    • Implementation and Configuration of email security solution alerts and triaging based on security impact and business requirement.
    • Implementation and Configuration of email EDR solution along with security architecture inline to business requirement.
    • Setting up access controls and policies to govern who can access, modify, or delete protected data.
    • Ensuring that data security practices align with regulatory compliance requirements, industry standards, and specific organizational policies.
    • Creating AdHoc dashboards and insights on Security posture of application.
    • Configuring monitoring and alerting systems to detect and respond to security incidents and unauthorized access.
    • Implement and configure the integration of Security tools.
    • Developing and implementing endpoint security policies and best practices.
    • Create and maintain procedural documents (SOP's)
    • Secondary skill required: Encyption/O365/AV/Certificate
  • Relevant certifications such as CISSP, CISM, or relevant certificates are a plus.
  • Proficiency in security tools and technologies.
  • Excellent problem-solving skills and attention to detail.
  • Strong communication and teamwork skills.
  • Ability to work independently and manage multiple tasks.
  • Willingness to stay current with evolving security technologies and threats.
  • Ability to communicate in a clear and concise manner.

 

Ideally, you’ll also have

  • Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire.
  • To expect some weekend work and 20%-30% travel based on job requirement.

 

What we look for

  • A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills.
  • An opportunity to be a part of market-leading, multi-disciplinary team of 1600 + professionals, in the only integrated global transaction business worldwide.
  • Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries

 

What working at EY offers

At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are.

You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer:

  • Support, coaching and feedback from some of the most engaging colleagues around
  • Opportunities to develop new skills and progress your career
  • The freedom and flexibility to handle your role in a way that’s right for you

 

EY | Building a better working world 


 
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.  


 
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.  


 
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.  

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Audits CEH CISM CISSP Compliance CompTIA Computer Science EDR Endpoint security ITIL Monitoring NetOps Risk management Security assessment Strategy XDR

Perks/benefits: Career development Startup environment

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.