EY Cyber Security Assistant Manager in GT, South Africa

Title: Cyber Security Assistant Manager

Location: ZA-GT-Johannesburg

Job Number: SOU0016L

Cyber threats, social media, massive data storage, privacy requirements and continuity of the business as usual require heavy information security measures. As an information security specialist, you will lead the implementation of security solutions for our clients and support the clients in their desire to protect the business. You will belong to an international connected team of specialists helping our clients with their most complex information security needs and contributing toward their business resilience. You will be working with our Advanced Security Centers to access the most sophisticated tools available to fight against cybercrime.

We will support you with career-long training and coaching to develop your skills. As EY is a global leading service provider in this space, you will be working with the best of the best in a collaborative environment. So whenever you join, however long you stay, the exceptional EY experience lasts a lifetime.

Qualifications:

The EY cyber security team is looking for a number of staff members across levels from Assistant Manager to Associate Director.

As a Cyber Security Consultant, you will contribute technical insights to client engagements and internal projects. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You'll also identify potential business opportunities for EY within existing engagements and the market. The more senior the role, the higher the expectation around winning market opportunities.

Experience:

Ideally you will have experience with a globally recognised professional services firm or large corporations with industry experience in a number of the following areas:

Experience in assessing an implementing security and risk standards including ISO 2700X, NIST, ITIL, COBIT

Systems security skills in assessment, design, architecture, management and reporting

Conduct Information Security Assessment against EY Methodology and leading practice frameworks and common standards.

Conduct attack and penetration on infrastructure, network, web application and source code review.

Assist client in managing and transforming their Information Security Programs.

Assist client in managing their Business continuity and disaster recovery.

Assist clients in designing and implementing their identify and access management solutions

Assist client in managing their information protection and data privacy.

Evaluate and analyze threat, vulnerability, impact and risk to security issues discovered from security assessments.

Advise clients on the IT security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the systems.

· Application control and security implementation, program and project delivery design, architecture and solution design,

Industry related certification required (e.g.CISSP, CISM, CISA, CIA, CIA)

To qualify all applicants must have:

At least 4 years of professional experience in either a technical IT Risk or an IT Security role

Strong project management skills and interpersonal skills

Advanced written and verbal communication skills and presentation skills, Strong analytical, interpersonal.

Strong interest in the field of information security

Creative, independent with good problem solving skills

Be willing to travel as required

Client service delivery and able to manage multiple engagement teams and projects

Experience in coaching and supervising junior team members

Demonstrated integrity within a professional environment

Have a drive to build a team and grow your technical information security career to the next level

You may also have a Bachelor's and/or post graduate degree in computer science, information systems, engineering, or a related major (such as accounting).

The successful candidate must hold or be willing to pursue related professional certifications such as the CISSP, CISM, and/or CISA

CA / CIA advantageous