divdivpspan style=font-family:arial, helvetica, sans-serifstrongspanSpecialist III, Identity and Access Management Controls/spanspan /span/strong/span/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanEY is a global leader in assurance, tax, transaction and advisory services. Technology is at the heart of what we do and deliver at EY. Technology solutions are integrated in the client services we deliver and are key to our innovation as an organization.  /spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanFueled by strategic investment in technology and innovation, Client Technology seeks to drive growth opportunities and solve complex business problems for our clients through building a robust platform for business and powerful product engine that are vital to innovation at scale. As part of Client Technology, you’ll work with technologists and business experts, blending EY’s deep industry knowledge and innovative ideas with our platforms, capabilities, and technical expertise. As a catalyst for change and growth, you’ll be at the forefront of integrating emerging technologies from AI to Data Analytics into every corner of what we do at EY. That means more growth for you, exciting learning opportunities, career choices, and the chance to make a real impact./spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanspanEY Technology:/span/spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanTechnology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day.  Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients.  Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization./spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanEY Technology/spanspan supports our technology needs through three business units:/spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanClient Technology (CT) -/span spanfocuses on developing new technology services for our clients. It enables EY to /spanspanidentify new technology-based opportunities faster and pursue those opportunities more rapidly./spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanEnterprise Workplace Technology (EWT) –/spanspan EWT /spanspansupports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience./spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanInformation Security (Info Sec) -/spanspan Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems.   /spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanThe opportunity/spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanThe Identity and Access Management Controls, Specialist role manages the development, implementation, and maintenance of the enterprise identity and access management control and governance program. The role also collaborates with IT and business teams to strengthen internal controls, support audits, address control gaps, and enhance the organizations security posture./spanspan /spanspan /span/span/p/divdivpstrongspan style=font-family:arial, helvetica, sans-serifspanYour key responsibilities/spanspan /span/span/strong/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanLeads the design, build, and deployment of identity and access management controls and governance program that is compliant with enterprise security standards and integrated with enterprise access administration infrastructure. Works closely with senior leadership and other IT teams to align strategies and projects with business objectives./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanLeads and oversees the implementation of changes to department policies and procedures to meet changing business needs and to achieve department objectives. Identifies opportunities for continuous improvement./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanServes as a point of escalation for complex issues that may require management intervention. Analyzes the security impact of complex requests or incident tickets escalated by the team and either provides resolution or escalates to higher management depending on the criticality. Assesses and immediately notifies leadership of security issues or quality control events that may have an impact on business operations./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanWorks closely with external auditors to represent Vanguard and respond to audit findings. Ensures completeness and accuracy of responses and evidencing./spanspan /span/span/p/li/ul/div/divdivdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanMaintains an active understanding of, and contributes to, the broader access management and information security discipline. Serves as thought leader across the enterprise and with external partners./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanParticipates on vendor software evaluation teams to analyze the security administration features and impacts of each package or release. May help define requirements, log issues and test upgrades and new releases./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanParticipates in special projects and performs other duties as assigned./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanCollaborate with IT and business teams to design, implement and maintain robust internal controls that address IT risks and safeguard organizational assets./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanSupport internal and external audits by assisting with risk mitigation based on audit findings, ensuring all control documentation is accurate and up-to-date./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanProactively identify potential gaps in IT controls and work with relevant teams to address weaknesses, enhancing the overall security posture of the organization./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanAssist with the development of risk management frameworks and contribute to the creation of policies aimed at strengthening the organization’s internal controls and mitigating IT-related risks./spanspan /span/span/p/li/ul/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpstrongspan style=font-family:arial, helvetica, sans-serifspanSkills and attributes for success/spanspan /span/span/strong/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanA team player with strong analytical, communication and interpersonal skills/spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanConstantly updating yourself about new technologies in the market/spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanA winning personality and the ability to become a trusted advisor to the stakeholders/spanspan /span/span/p/li/ul/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanTo qualify for the role, you must have/spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanMinimum 8 years of related work experience, including at least 5 years in risk management, controls assessment, or cybersecurity governance. /spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanBachelor’s degree (B.E./B.Tech) in Computer Science or IT, or Bachelor’s in Computer Applications (BCA) from a recognized institution./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanSupervisory experience preferred, with the ability to mentor and guide junior staff./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanProficiency in assessing and testing IT and cybersecurity controls using frameworks such as NIST, ISO 27001, and COBIT./spanspan /span/span/p/li/ul/div/divdivdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanHands-on experience with control gap analysis, risk assessment, and audit remediation processes./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanFamiliarity with IAM tools (SailPoint, Okta, CyberArk), governance platforms (Archer, ServiceNow), and privileged access management (PAM)./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanStrong understanding of international cybersecurity regulations and compliance standards (e.g., SOX, GDPR, HIPAA)./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanDetail-oriented with strong analytical and organizational abilities, capable of identifying security risks and implementing improvements./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanExcellent technical writing, documentation, and communication skills, with the ability to present findings to stakeholders./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanProblem-solving, conceptual thinking, and process improvement mindset, with a proactive approach to security enhancements./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanRelevant certifications preferred: Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or Certified Information Systems Security Professional (CISSP)./spanspan /span/span/p/li/ul/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpstrongspan style=font-family:arial, helvetica, sans-serifspanIdeally, you’ll also have/spanspan /span/span/strong/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanStrong verbal and written communication, facilitation, relationship-building, presentation and negotiation skills./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanBe highly flexible, adaptable, and creative./spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanComfortable interacting with senior executives (within the firm and at the client)/spanspan /span/span/p/li/ul/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpstrongspan style=font-family:arial, helvetica, sans-serifspanWhat we look for/spanspan /span/span/strong/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanStrong teamwork, work ethic, product mindset, client centricity and a relentless commitment to EY values./spanspan /span/span/p/li/ul/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanWhat working at EY offers /spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/div/divdivdivpspan style=font-family:arial, helvetica, sans-serifspanWe offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer:/spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanSupport, coaching and feedback from some of the most engaging colleagues around/spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanOpportunities to develop new skills and progress your career/spanspan /span/span/p/li/ul/divdivul style=list-style-type:discli style=font-family:arial, helvetica, sans-serifpspan style=font-family:arial, helvetica, sans-serifspanThe freedom and flexibility to handle your role in a way that’s right for you/spanspan /span/span/p/li/ul/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanspanEY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance./span/spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serifstrongspanAbout EY/span/strongspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanAs a global leader in assurance, tax, transaction and advisory services, we’re using the finance products, expertise and systems we’ve developed to build a /spanspanb/spanspanetter working world. That starts with a culture that believes in giving you the training, opportunities and /spanspancreative/spanspan freedom to make things better. /spanspanWhenever you join, however long you stay, the exceptional EY experience lasts a lifetime. /spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanIf you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible./spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanMake your mark. /spanspan /span/span/p/divdivpspan style=font-family:arial, helvetica, sans-serif /span/p/divdivpspan style=font-family:arial, helvetica, sans-serifspanApply now./spanspan /span/span/p/div/div

Is a Remote Job?
No

At EY, our purpose is Building a better working world. The insights and quality services we provide help build trust and confidence in the capital markets and in economies the world over. We develop...

Apply Now