p style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=color:blackWhat if we didn’t focus on who you are now, but who you could become?/span/strong/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackHere at EY, you’ll have the chance to build a truly exceptional experience. We’ll empower you with the latest technology, surround you with high-performing teams, and provide the global scale and diverse and inclusive culture you need to discover your full potential. Through our coaching and training programs, you’ll develop the skillsets you need to stay relevant today and, in the future, – all while building a network of colleagues, mentors, and leaders who will be on the journey with you at EY and beyond./span/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=line-height:150%;margin:0.0cm 0.0cm 8.0pt;font-size:11.0pt;font-family:Calibri, sans-serifstrongThe exceptional EY experience. Its yours to build./strong/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=color:blackThe opportunity: your next adventure awaits/span/strong/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackTechnology has transformed how organizations operate, introducing new opportunities while amplifying risks related to cybersecurity, governance, and data protection. In this rapidly evolving environment, maintaining digital trust requires not only protecting information assets but also demonstrating accountability, regulatory compliance, and sound risk management practices./span/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackOur Cybersecurity capability offer Governance, Risk and Compliance (GRC), and Data Privacy Consulting Services are designed to help organizations strengthen their security posture, align with regulatory expectations, and enable resilient business operations. We assist clients in understanding emerging threats, managing cyber and privacy risks, and implementing frameworks that balance security, compliance, and performance./span/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackAs a Senior Consultant, you will play a key role in advising clients on how to design, assess, and implement cybersecurity and privacy governance programs. You will be involved in activities such as:/span/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=color:blackYour key responsibilities/span/strong/pp style=margin:0.0cm;text-align:justify;text-indent:0.5pt;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackstrongCybersecurity Governance and Framework Implementation/strong/span/pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackDevelop and implement cybersecurity governance frameworks aligned to NIST, ISO 27001, CIS Controls, or other recognized standards./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackDefine and operationalize security policies, procedures, and control frameworks/span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackAssess current maturity levels and develop target operating models for cybersecurity and GRC./span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:black/span/pp style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackRisk Management and Compliance Advisory/span/strong/pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackConduct cybersecurity and IT risk assessments, control design reviews, and compliance evaluations./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackSupport the development of risk management methodologies, risk registers, and key risk indicators./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackAssist clients in achieving and maintaining compliance with relevant regulations and standards (e.g., GDPR, POPIA, ISO 27001, PCI DSS)./span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:black /span/strong/pp style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackData Privacy and Protection Services/span/strong/pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackDesign and implement privacy governance programs and data protection controls/span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackPerform privacy impact assessments (PIAs) and data protection impact assessments (DPIAs)./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackDevelop privacy policies, consent frameworks, and data subject rights management processes./span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:black /span/strong/pp style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackCybersecurity and Privacy Assurance/span/strong/pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackSupport internal audits, compliance testing, and control effectiveness assessments./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackReview third-party and vendor security practices to identify gaps and recommend improvements./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackProvide independent assurance on cybersecurity and privacy controls to client stakeholders./span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackstrongIncident Preparedness and Response Support/strong/span/pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackAdvise clients on cyber incident response governance and data breach management processes./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackAssist in defining roles, escalation protocols, and regulatory notification requirements./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackSupport post-incident reviews and lessons-learned reporting./span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:black /span/strong/pp style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackTraining and Awareness/span/strong/pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackDesign and deliver cybersecurity and privacy awareness programs./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackBuild organizational capability and foster a culture of compliance and security accountability./span/li/ulp style=margin:0.0cm;text-align:justify;text-indent:0.5pt;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:black /span/strong/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=color:blackSkills and attributes for success/span/strong/pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackAbility to efficiently understand client organizations and their business model and to tailor relevant processes to privacy requirements/span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackCommunicate effectively with different stakeholders (e.g., business, legal, IT, security…) about data protection and privacy matters/span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackHave an analytical mindset, strive for quality and can work in a result-oriented environment/span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=color:blackTo qualify for the role, you must have/span/strong/pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackA recognized university degree in information technology, or other relevant discipline with 2-3 years of working experiences, preferably in the consulting space or industry/span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:#1a1a24Approximately 2-5 years of experience working will be an advantage./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackPrior experience with relevant cybersecurity frameworks, data protection and privacy regulations, industry standards and frameworks/span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackPossession of relevant qualifications such as ISO 27001 Lead Auditor / Lead Implementer, CISA, CIPT, CIPP/E and or CISSP as well as involvement in industry related organizations (e.g. IAPP, ISACA, (ISC)²) will be an advantage/span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackStrong written and verbal communication skills and presentation skills/span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=color:blackIdeally, you’ll also have/span/strong/pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackPrior experience as part of a cybersecurity or data protection team./span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=color:blackWhat we look for/span/strong/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackHighly motivated individuals with excellent problem-solving skills and the ability to prioritize shifting workloads in a rapidly changing industry. An effective communicator, you’ll be a confident team player that collaborates with people from various teams while looking to develop your career in a dynamic organization./span/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=color:blackWhat we offer/span/strong/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackEY offers a competitive remuneration package where you’ll be rewarded for your individual and team performance. We are committed to being an inclusive employer and are happy to consider flexible working arrangements. Plus, we offer:/span/pp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pul style=margin-top:0.0cm;margin-bottom:0.0cmli style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackContinuous learning:/span/strongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:black You’ll develop the mindset and skills to navigate whatever comes next./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackSuccess as defined by you:/span/strongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:black We’ll provide the tools and flexibility, so you can make a meaningful impact, your way./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackTransformative leadership: /span/strongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackWe’ll give you the insights, coaching and confidence to be the leader the world needs./span/lili style=margin:0.0cm 0.0cm 0.0cm 0.0px;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:blackDiverse and inclusive culture:/span/strongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:black You’ll be embraced for who you are and empowered to use your voice to help others find theirs./span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:#1a1a24 /span/strong/pp style=margin:0.0cm 0.0cm 8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifstrongWhat you can expect/strong/pul style=margin-top:0.0cm;margin-bottom:0.0cm type=discli style=color:black;line-height:115%;margin-top:0.0cm;margin-right:0.0cm;margin-bottom:8.0pt;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:115%;font-family:#39;EYInterstate Light#39;Submit your CV, ID and fully up-to-date academic transcripts when applying/span/lili style=color:black;line-height:115%;margin-top:0.0cm;margin-right:0.0cm;margin-bottom:8.0pt;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:115%;font-family:#39;EYInterstate Light#39;Only shortlisted candidates can expect to be invited for an in person or video interview with one of our dynamic Recruiters/span/li/ulp style=margin:0.0cm;text-align:justify;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=color:blackApply today/span/strong/pp style=margin:0.0cm;text-align:justify;text-indent:0.5pt;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:#1a1a24We encourage you to apply early to get the best opportunity to secure an offer to join EY.  #BetterBeginsNow/span/pp style=margin:0.0cm;text-align:justify;text-indent:0.5pt;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:#1a1a24EY will recommend applicants to read our privacy statement prior to completing the pre application form above: a href=https://www.ey.com/en_gl/privacy-statementhttps://www.ey.com/en_gl/priv… style=margin:0.0cm;text-align:justify;text-indent:0.5pt;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serif /pp style=margin:0.0cm;text-align:justify;text-indent:0.5pt;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:#1a1a24Join us in Shaping The Future With Confidence. Apply now/span/strong/pp style=margin:0.0cm;text-align:justify;text-indent:0.5pt;line-height:150%;background-color:white;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:9.0pt;line-height:150%;font-family:#39;EYInterstate Light#39;;color:#1a1a24Only shortlisted candidates will be contacted./span/p

Is a Remote Job?
No

At EY, our purpose is Building a better working world. The insights and quality services we provide help build trust and confidence in the capital markets and in economies the world over. We develop...

Apply Now