p class=MsoNormalstronguspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifJob Description: Cyber Security Solution Architect, Senior Consultant, Cybersecurity, Technology Consulting /span/u/strong/pp class=MsoNormalspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifAt EY, we develop you with future-focused skills and equip you with world-class experiences. We empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams./span/pp class=MsoNormalspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifWe work together across our full spectrum of services and skills powered by technology and AI, so that business, people and the planet can thrive together. /span/pp class=MsoNormalspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifWe’re all in, are you?/span/pp class=MsoNormalspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifJoin EY and shape your future with confidence./span/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifAbout the opportunity/span/strong/pp class=MsoNormal style=text-align:justify;text-justify:inter-ideographspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifEY Singapore is a member of the whole global EY network, you will be part of an international connected team of specialists helping our clients with their most complex cybersecurity needs and contributing toward their business resilience./span/pp class=MsoNormal style=text-align:justify;text-justify:inter-ideographspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifYou will belong to an international connected team of specialists helping our clients with their most complex information security needs and contributing toward their business resilience. As a cybersecurity consultant, you will work with a team of cyber security experts to implement security solutions for our clients and support the clients in their desire to protect the business. We are looking for a strongCyber/strong strongSecurity Solution Architect/strong within the Cybersecurity team in our Singapore office. This role is offered on a flexible full-time basis./span/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifYour key responsibilities:/span/strong/pp class=MsoListParagraphCxSpFirst style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifTranslate client’s business requirements and risk assessments into secure and resilient architectures to secure assets and data/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifImplementation of robust and scalable security solutions aligned with business objectives, regulatory requirements, and industry best practices (e.g., NIST, ISO 27001)/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifDeep understanding of cyber security principles, technologies, and best practices, with practical architectural design and communication skills/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifCollaborate client’s engineering, development, and operations teams to ensure the effective implementation and maintenance of security controls/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifParticipate in risk assessments and translate identified risks into actionable security architecture designs and controls./span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifDevelopment and maintenance of security standards, policies, and procedures/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifDesign and implement secure cloud architectures (e.g., AWS, Azure, GCP) and ensure adherence to cloud security best practices/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifDesign and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and segmentation strategies/span/pp class=MsoListParagraphCxSpLast style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifTechnical leadership and guidance to security engineers and other technical teams on security architecture and implementation/span/pp class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serif /span/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifSkills amp; attributes for success:/span/strong/pp class=MsoListParagraphCxSpFirst style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifStrong understanding of security frameworks and standards (e.g., NIST CSF, ISO 27001, SOC 2)/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifAble to adapt communication styles for security architectures and solutions to technical and non-technical stakeholders/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifAbility to connect and communicate effectively with cross-functional teams to ensure security is integrated throughout the development lifecycle/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifStay abreast of the latest cyber security threats, trends, and technologies/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifStrong understanding of cloud security controls for different cloud platforms /span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifStrong understanding on security controls and how it will translate to security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM, vulnerability management, and endpoint security /span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifFamiliarity with threat intelligence platforms and methodologies/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifExperience with scripting languages (e.g., Python, Bash) and automation tools is a plus/span/pp class=MsoListParagraphCxSpMiddle style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifAnalytical, problem-solving, and critical thinking skills/span/pp class=MsoListParagraphCxSpLast style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifStrong communication, presentation, and interpersonal skills/span/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serif /span/strong/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifTo qualify for the role, you must have/span/strong/pp class=MsoNormal style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:10.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifBachelor’s degree in Computer Science, Information Security, or a related field preferred/span/pp class=MsoNormal style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:10.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifMin 5 Years of Experience working in in cyber security, with a significant focus on security architecture and design/span/pp class=MsoNormal style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:10.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifPrior experience with designing and implementing security solutions across various domains, including network security, cloud security, application security, data security/span/pp class=MsoNormal style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:10.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifExperience with cloud security platforms and services for GCC and non-GCC (e.g., AWS, Azure)/span/pp class=MsoNormal style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:10.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifRelevant security certifications such as CISSP, CISM, CCSP, AWS Certified Security – Specialty, Azure Security Engineer Associate/span/pp class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serif /span/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifIdeally, you’ll also have/span/strong/pp class=MsoListParagraphCxSpFirst style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifUnderstanding of DevSecOps principles and practices/span/pp class=MsoListParagraphCxSpLast style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:11.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifFamiliarity with Artificial Intelligence scenarios for cyber security/span/pp class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serif /span/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifWhat we look for/span/strong/pp class=MsoNormal style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:10.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifHighly motivated individuals with excellent problem-solving skills and the ability to prioritize shifting workloads in a rapidly changing industry./span/pp class=MsoNormal style=text-indent:-18.0pt;margin:0.0cm 0.0cm 0.0cm 18.0ptspan style=font-size:10.0pt;line-height:115%;font-family:Symbolspan·span style=font:7.0pt #39;Times New Roman#39;       /span/span/spanspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifAn effective communicator, you’ll be a confident leader equipped with strong people management skills and a genuine passion to make things happen in a dynamic organization./span/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifWhat we look for/span/strong/pp class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifHighly motivated individuals with excellent problem-solving skills and the ability to prioritize shifting workloads in a rapidly changing industry. An effective communicator, you’ll be a confident team player that collaborates with people from various teams while looking to develop your career in a dynamic organization./span/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifWhat working at EY offers/span/strong/pp class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifEY offers a competitive remuneration package where you’ll be rewarded for your individual and team performance. We are committed to being an inclusive employer and are happy to consider flexible working arrangements. Plus, we offer:/span/pp class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serif /span/pul style=margin-top:0.0cm type=discli class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifContinuous learning: You’ll develop the mindset and skills to navigate whatever comes next./span/lili class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifSuccess as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way./span/lili class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifTransformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs./span/lili class=MsoNormal style=margin-bottom:0.0cmspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifDiverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs./span/li/ulp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serif /span/strong/pp class=MsoNormal style=margin-bottom:0.0cmstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serifCompany description /span/strong/pp class=MsoNormal style=margin-bottom:0.0cm;line-height:normalspan style=font-size:11.0pt;font-family:#39;Calibri#39;, sans-serif;color:blackEY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets./span/pp class=MsoNormal style=margin-bottom:0.0cm;line-height:normalspan style=font-size:11.0pt;font-family:#39;Calibri#39;, sans-serif;color:blackEnabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow./span/pp class=MsoNormal style=margin-bottom:0.0cm;line-height:normalspan style=font-size:11.0pt;font-family:#39;Calibri#39;, sans-serif;color:blackEY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories./span/pp class=MsoNormal style=margin-bottom:0.0cm;line-height:normalspan style=font-size:11.0pt;font-family:#39;Calibri#39;, sans-serif;color:blackAll in to shape the future with confidence./span/pp class=MsoNormalstrongspan style=font-size:11.0pt;line-height:115%;font-family:#39;Calibri#39;, sans-serif /span/strong/p

Is a Remote Job?
No

At EY, our purpose is Building a better working world. The insights and quality services we provide help build trust and confidence in the capital markets and in economies the world over. We develop...

Apply Now