Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
1.0 years
0 Lacs
Hyderābād
On-site
Company: Qualcomm India Private Limited Job Area: Finance & Accounting Group, Finance & Accounting Group > Internal Audit General Summary: Auditor, IT Internal Audit – Hyderabad Qualcomm is a company of inventors that unlocked 5G - ushering in an age of rapid acceleration in connectivity and new possibilities that will transform industries, create jobs, and enrich lives. But this is just the beginning. It takes inventive minds with diverse skills, backgrounds, and cultures to transform 5Gs potential into world-changing technologies and products. This is the Invention Age - and this is where you come in. This is a unique opportunity to join Qualcomm’s finance and accounting organization based in Hyderabad in the Corporate Internal Audit & Advisory Services (IA & AS) team. The department focuses on assisting the Audit Committee and management teams in the improvement of processes that manage risks related to achieving Qualcomm’s business objectives. Using Qualcomm’s risk-based audit methodology, the IT auditor will assist in the execution of internal audits. Specifically, the responsibilities include: Providing U.S. based time zone coverage as needed (up to 50% of time) Supporting the creation of initial planning memos and process flowcharts Identifying and assessing initial risks and control activities Designing audit procedures to evaluate control effectiveness Performing audit testing, identifying deviations from expected control activities, and effectively communicating observations to the audit team Leveraging data analytics throughout the audit process where feasible Staying abreast of changes in the business and industry to assess impacts to the company’s risk profile Contributing to the development of new concepts, techniques, and making continuous process improvements for the overall IA team All Qualcomm employees are expected to actively support diversity on their teams, and in the Company. One to three years of relevant experience in internal auditing, external auditing, or SOX compliance within a global public company (preferably in the high-tech industry), Big 4/mid-tier accounting firm or other fast-paced corporate setting Strong understanding of IT general controls, cybersecurity frameworks (e.g. NIST, COBIT), and ERP systems Fluent English; multi-lingual capability is a plus Successful candidate will possess the following characteristics: As feasible, ability to travel (infrequently) to Qualcomm’s domestic and international locations (e.g., U.S., Europe) Semiconductor business experience or familiarity Strong communication (oral and written) and presentation skills Fast learner with strong interpersonal, organization, analytical, critical thinking, and problem-solving skills Ability to work in a flexible and non-hierarchical team environment Willingness to get things done and take responsibility Ability to recognize and apply a sense of urgency, when necessary Comfortable with ambiguity Positive attitude, professional maturity, good work ethic Ability to work independently, handle multiple projects simultaneously and multi-task to meet deadlines with high-quality deliverables Controls, risk assessment, risks, internal audit, IT Bachelor's degree in Accounting, Finance, Computer Science, cyber security, or related field. CPA, CA, CIA, CISA, CFE, or other credentials, a plus. Minimum Qualifications: Bachelor's degree. 1+ year of Finance, Accounting, or related work experience. Completed advanced degree in a relevant field may be substituted for up to one year (Master’s = one year) of work experience. Applicants : Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies : Our Careers Site is only for individuals seeking a job at Qualcomm. Staffing and recruiting agencies and individuals being represented by an agency are not authorized to use this site or to submit profiles, applications or resumes, and any such submissions will be considered unsolicited. Qualcomm does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers.
Posted 6 days ago
5.0 years
0 Lacs
India
On-site
The Plant IT PFS Lead lead the implementation of IT enablers in the plant to support the Company's process efforts in terms of flexible and lean manufacturing, error proofing and manufacturing execution systems. Work in a multi shift operation - to support daily operations and provide technical support for IT applications and Plant Floor Systems whilst maintaining governance and controls Education Qualification Bachelor's degree or equivalent qualification in a technical discipline Industry or professional certification in a related area is a plus Master's degree work in a related technical field is desirable No. of Years of Experience Minimum of 5 year experience in a related field for GSR 7 Professional Exposure (Technical Skills) Experience of progressive responsibilities within IT Hands-on experience in multiple roles across the spectrum of applications and/or technologies Experience of working in a global environment ITIL awareness Preferred previous experiences Experience of IT Application management and infrastructure support in a complex manufacturing environment with preference to the automotive industry. Program/Project management utilizing project delivery tools and techniques. Experience of working within a large cross-functional organization. Functional Skills Analytical analysis ability in support of application/DBMS/ Server Problem solving, technical analysis and a good solid understanding of the latest antivirus products, SeOS, Server Tools (GICC/SAT), all Microsoft related Server product packages, engineering software and related knowledge of engineering processes within a manufacturing environment. Solid network topology competence and preferably Cisco EXPOSURE. Relevant Project Management skills, understanding of COBIT /ISO 9001 standards in an automotive industry. Management skills as the person may manage others within the IT department. Ability to interact with Global teams and be able to provide immediate application/network/server issue support/resolution when required. Behavioural Skills Team player with superior communication skills and proven ability to work under pressure of delivery as well as timelines. Good analytical skills, problem solving abilities and willingness to work hard in support of the overall project effort. Ability to create documentation to assist in training of later recruited staff and ongoing support of the environment Special Knowledge/Skills Required Understanding of a typical Global Operations Support Model, ITSM (IT Service Management and ITIL (IT Infrastructure Processes) preferably in an automotive production system, Knowledge of Data Center Operations and emergency procedures, Understanding of Disaster recovery processes and Business continuity in case of emergency or disaster. Varied knowledge of industry related quality processes, technology used, Network related tools (Netaps/ALC/ TCP/IP/WAN / WAS / VLAN / LAN / MCSE / CCSE (Checkpoint) and Global Incident logging tools (Request center/GICC/SAT) Any Others Ability to work shifts/overtime on short notice/weekends and public holidays - Shift Leader Flexibility to support other sites Exposure to Network Infrastructure/deskside processes and OA environments, MPN (Manufacturing networks), CPN and Server administrations and support processes (server access/server analysis and troubleshooting) Experience in managing and maintaining locally hosted applications and servers in a data center Financial skills to support order procurement process and support the annual IT budget process and annual IT Cycle Plan Good communication skills in order to facilitate and co-ordinate meetings with Senior Management within the Plant related to IT Issues Management skills - will manage Manufacturing Purchased Services Employees, Manage SPOC resources and Manage Junior Salaried IT Employees Key Roles & Responsibilities: Leads Plant floor application portfolio management including incident, problem, change, release, capacity, configuration, demand, and consumption processes, health of the portfolio, business continuity, and disaster recovery testing. Performs / oversee & governs daily Plant floor systems health and initiates appropriate actions as needed. Ensures utilization of appropriate Ford standard processes (e.g. ITIL, system development methodology, development to production checklist). Communicates effectively with the business partner and IT teams to support day-to-day operations Ensures security management activities are instituted and reviewed at appropriate time frame Leads project(s) within an application portfolio to improve overall operations performance (e.g. 8-D, 6-Sigma), special projects, or management initiatives. Ensure I.T. BCP & DR plans are tested annually (where applicable) and that DR facilities are checked for 100% operation & tape backups and loads. Interaction with IT professionals such as Network Engineers, Security & Control Engineers, Application Development Teams, Application Maintenance Teams, Database Administrators and Architects Provides escalation support and troubleshooting for system hardware, software, and/or operating systems Interact with management and peers/subordinates to present technical subjects Ability to work with minimal supervision. Strong communications skills to communicate directly with off-shore teams, Regional management, and business partners while engaging external IT SME’s/Vendors to resolve production issues. Builds and maintains strong relationship with appropriate customer base (depending on location, this may include the plant operating committee), internal IT partners, and/or internal environment related support organizations and vendors Operating budget management / planning and Spend management. Manage purchased services engagement effectively as per SLA.
Posted 6 days ago
1.0 - 3.0 years
0 - 0 Lacs
Vadodara
On-site
Greetings from Acumen 360° HR Solution!!! We have an excellent job opportunity for "ITGS Auditor" with one of our Organization (Vadoara) location. Requirement : ITGS Auditor Qualification : DISA / CISA Experience : 1-3 Years JOB DESCRIBTION: Test and document IT General Controls across systems Identify control gaps & support remediation efforts Assistant with audit, walkthroughs, evidence collections Strong documentation , communications & analytical skills Familiar with SOX , COBIT , ISO 27001 Comfortable working with global clients or audit teams Job Types: Full-time, Permanent, Fresher Pay: ₹50,000.00 - ₹90,000.00 per month Benefits: Paid time off Schedule: Day shift Morning shift Work Location: In person
Posted 6 days ago
2.0 - 4.0 years
4 - 6 Lacs
Gurugram
Hybrid
Your day at NTT DATA The Security Technical Architect is a seasoned subject matter expert, responsible for designing robust security architectures for our systems, applications, and infrastructure. collaborate with cross-functional teams to ensure that technF2:F6ology solutions are secure, compliant, and aligned with industry best practices. Expertise in protecting sensitive data, mitigating risks, and maintaining the confidentiality, integrity, and availability of organizational systems is crucial in this role. What youll be doing Key Responsibilities: Designs and develops comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs. Viewed as a trusted technical advisor to the client. Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle. Provides pre-sales technical support and expertise in analyzing client requirements, in conjunction with the clients current collaboration capabilities. Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains. Evaluates and selects security technologies, tools, and frameworks to support our security architecture Ensures technical solutions will accomplish the clients objectives. Defines and enforces security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team. Develops or produces the technical design document to match the solution design specifications. Working with the relevant internal stakeholders, participate or lead in scope of work determination, product pricing and RFP/RFI responses. Assists with the determination of outsourcing, product pricing and collaborates with others to develop an implementation solution. Responsible for influencing and guiding members of the Sales team and to ensure that they are equipped to close deals and maintain visibility of forecasting and sales pipeline in order to influence potential deals. Manages client proof of concept (POC) initiatives, which will require the involvement of the appropriate resources, and setup and delivery of the POC. On all assigned engagements, owns the proposed solution and transitions the build / implementation to the delivery team. Specifically relating to opportunity pursuit this role will evaluate each opportunity for alignment with organizational capabilities and business policy, prepare the executive summary that outlines all of the information gathered from the client in regard to their needs, as understood, document the proposed technology solution, document the statement of work along with all labor requirements, work with the relevant internal stakeholders to prepare the pricing format that will be supplied to the customer, perform the actual solution design and prepare a parts list outlining equipment to be provided, develop and manage a proof-of-concept as such may be required, engage all technical resources required for an accurate solution design, prepare a network diagram outlining the proposed solution, document all deliverables and what constitutes a successful completion, review the final parts list as supplied and submit all information to the applicable bid team for final assembly, verify the proposals accuracy and sign off on the final documents to be presented to the client, assist during the final presentation to the client as appropriate. Knowledge and Attributes: Solid client engagement skills coupled solid technical consulting aptitude. Understanding of the vendors products business and technology positioning. Excellent analytical and problem-solving skills, with the ability to assess risks, analyze complex security issues, and propose effective solutions. Ability to collaborate and communicate effectively with team members, contributing to their success. Broad product knowledge integrated with technology understanding. Strong knowledge of security domains, including network security, application security, cloud security, data protection, identity and access management, cryptography, and secure coding practices. Proficiency in enterprise architecture principles, frameworks (such as TOGAF), and architectural patterns for designing secure and scalable systems. In-depth understanding of security regulations, standards, and frameworks (such as ISO 27001, NIST, PCI DSS) and their practical application Basic understanding of key vendor subscription models such as Cisco EA 3.0. Academic Qualifications and Certifications: Bachelors degree in information technology, computer science or information systems or a related field. Certification and working knowledge of Enterprise Architecture methodologies (for example, TOGAF, Zachman, SOA, ITIL, COBIT, etc.). Vendor product, sales and technology certifications. Software and programming languages, for example, C++. SAFe Scaled Agile certification advantageous. Additional certifications, such as CISSP, CISM, or GIAC are highly desirable. Required Experience: Seasoned professional technical experience within a large scale (preferably multi-national) technology services environment Seasoned experience as a Security Technical Architect or a similar role, designing and implementing security architectures for complex systems and applications. Seasoned experience in a professional technical role. Seasoned hands-on experience with security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM, vulnerability scanners, and secure coding analysis tools. Experience in project management methodologies.
Posted 1 week ago
2.0 - 6.0 years
4 - 8 Lacs
Hyderabad
Work from Office
Your day at NTT DATA The Senior Infrastructure and Operations Engineer is an advanced subject matter expert, responsible for ensuring the availability of the infrastructure service platforms and/or software. This role responds to situations where standard procedures have failed to fix problems in non-functioning infrastructure service platforms and/or software. This role designs system configurations, documents and manages the installation of a new network, and maintains and upgrades existing systems as necessary and later support the operation of overall IT services offered by the company. What youll be doing Key Responsibilities: Performs operational tasks to resolve all incidents / requests in a timely manner and within agreed Service Level Agreement (SLA). Update tickets with resolution tasks performed. Maintains network and services availability by performing maintenance and health checks. Supports, assists or leads engineering, design and problem isolation. Provides third level support to all incidents, requests and identify the root cause of incidents and problems. Communicates with other teams and clients for extending support. Executes changes with clear identification of risks and mitigation plans to be captured into the change record. Escalates all tickets to seek right focus from other teams, if needed continue the escalations to management. Establishes monitoring for platform infrastructure. Leads and manages all initial client escalation for operational issues. Contributes to the change management process by logging all change requests with complete details for standard and non-standard including patching and any other changes to Configuration Items. Ensures all changes are carried out with proper change approvals. Plans and executes approved maintenance activities. Performs any other related task as required. Knowledge and Attributes: Advanced knowledge in Microsoft Solutions, i.e. design and implementation of Windows Server platforms, Office 365 migrations, Active Directory, Group Policy, System Centre Configuration. Advanced understanding of network switches, network routing, MPLS, network administration, network integration, network security and network advancement. Advanced knowledge in architecture, design, configuration, and deployment within the Microsoft Azure platform. Advanced understanding of server and desktop hardware/operating systems, networks, firewalls. Excellent oral, written and presentation communication skills. Advanced knowledge of IT infrastructure management processes, techniques, risks and best practices. Advanced knowledge of infrastructure technologies such as system management, system/network administration and development. Advanced knowledge of server administration, data center operations, project and change management principles and practices. Ability to facilitate discussions in order to address emerging problems and opportunities. Ability to handle multi-task, set priorities and meet deadlines. Advanced knowledge and understanding of information systems technology areas. Academic Qualifications and Certifications: Bachelors degree or equivalent in Information Technology or a related field. Relevant certifications such as CCIE/CCNP/ITIL/COBIT/PMP/CISA/CISM certifications. Required Experience: Advanced experience in similar IT roles, with a focus on IT infrastructure engineering and operations. Proven working experience in a large-scale organization. Advanced experience with IT frameworks ITIL, MoF, CoBIT, Run SAP. Advanced experience supporting IT infrastructure and service delivery. Advanced experience working with vendors and/or service providers. Advanced experience, judgment and drive to plan, make decisions and accomplish individual and team goals. Advanced experience working in a team-oriented, collaborative environment. Workplace type On-site Working
Posted 1 week ago
5.0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (Strategy, Risk, Compliance and Resilience) – Technology Consulting – Senior As part of our EY Strategy, Risk, Compliance and Resilience (SRCR) Technology Consulting team, you would work on various SRCR projects for our customers across the globe. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GDS within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. The opportunity We’re looking for Senior Security Consultant with expertise in cyber / information security, risk and controls concepts. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Engage in Cyber Strategy & Governance, Cyber Risk & Compliance, Cyber Resilience, Cyber Transformation and Co-Sourcing, Application & Network Security engagements Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress. Execute the engagement requirements, along with review of work by junior team members. Help prepare reports and schedules that will be delivered to clients and other parties. Develop and maintain productive working relationships with client personnel. Build strong internal relationships within EY Consulting Services and with other services across the organization Contribute to people related initiatives including recruiting and retaining Cyber Transformation professionals Maintain an educational program to continually develop personal skills of staff Understand and follow workplace policies and procedures Building a quality culture at GDS Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members Manage the performance management for the direct reportees, as per the organization policies. Foster teamwork and lead by example; training and mentoring of project resources Participating in the organization-wide people initiatives Skills And Attributes For Success Hands-on experience of more than 5 years with key components of cybersecurity including (but not limited to): Vendor/3rd Party Risk Management & Assessment Cyber Strategy & Governance, Cyber Transformation, Cyber Dashboarding Regulations/standards such as ISO 27001, PCI DSS, HIPAA, HITRUST, GDPR, CCPA, FISMA/FEDRAMP, COBIT, OWASP Top 10, NIST 800-53 Business Continuity & Disaster Recovery Must have experience in working in client facing roles, interacting with the third parties, assessing different kinds of environments (IT and non-IT) and ability to apply cyber security concepts in all these sectors. Experienced in creation and review of security policy/procedures, and in performing risk assessments. Good to have experience in assessing ITGC requirements across various industries including both Cybersecurity and resilience requirements. Should have a good understanding of VAPT process, common application security vulnerabilities, exploitation techniques and remediation measures. Basic understanding of Network Security and network architecture diagram reviews, access and perimeter control, vulnerability management and intrusion detection, firewall rule-based reviews. Good understanding of logging and monitoring tools (SIEM). Knowledge in any one of the SIEM tools is a plus. To qualify for the role, you must have: BE - B. Tech / MCA / M. Tech/ MBA with background in computer science and programming. More than 5 Years of relevant experience. Strong Excel and PowerPoint skills. Should be proficient in leading medium to large engagements and coach junior staff. Ideally, you’ll also have CISSP, CISA, CISM, CEH, ISO 27001 Lead Auditor and Lead Implementer. Project management skills. What We Look For A team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (Strategy, Risk, Compliance and Resilience) – Technology Consulting – Senior As part of our EY Strategy, Risk, Compliance and Resilience (SRCR) Technology Consulting team, you would work on various SRCR projects for our customers across the globe. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GDS within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. The opportunity We’re looking for Senior Security Consultant with expertise in cyber / information security, risk and controls concepts. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Engage in Cyber Strategy & Governance, Cyber Risk & Compliance, Cyber Resilience, Cyber Transformation and Co-Sourcing, Application & Network Security engagements Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress. Execute the engagement requirements, along with review of work by junior team members. Help prepare reports and schedules that will be delivered to clients and other parties. Develop and maintain productive working relationships with client personnel. Build strong internal relationships within EY Consulting Services and with other services across the organization Contribute to people related initiatives including recruiting and retaining Cyber Transformation professionals Maintain an educational program to continually develop personal skills of staff Understand and follow workplace policies and procedures Building a quality culture at GDS Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members Manage the performance management for the direct reportees, as per the organization policies. Foster teamwork and lead by example; training and mentoring of project resources Participating in the organization-wide people initiatives Skills And Attributes For Success Hands-on experience of more than 5 years with key components of cybersecurity including (but not limited to): Vendor/3rd Party Risk Management & Assessment Cyber Strategy & Governance, Cyber Transformation, Cyber Dashboarding Regulations/standards such as ISO 27001, PCI DSS, HIPAA, HITRUST, GDPR, CCPA, FISMA/FEDRAMP, COBIT, OWASP Top 10, NIST 800-53 Business Continuity & Disaster Recovery Must have experience in working in client facing roles, interacting with the third parties, assessing different kinds of environments (IT and non-IT) and ability to apply cyber security concepts in all these sectors. Experienced in creation and review of security policy/procedures, and in performing risk assessments. Good to have experience in assessing ITGC requirements across various industries including both Cybersecurity and resilience requirements. Should have a good understanding of VAPT process, common application security vulnerabilities, exploitation techniques and remediation measures. Basic understanding of Network Security and network architecture diagram reviews, access and perimeter control, vulnerability management and intrusion detection, firewall rule-based reviews. Good understanding of logging and monitoring tools (SIEM). Knowledge in any one of the SIEM tools is a plus. To qualify for the role, you must have: BE - B. Tech / MCA / M. Tech/ MBA with background in computer science and programming. More than 5 Years of relevant experience. Strong Excel and PowerPoint skills. Should be proficient in leading medium to large engagements and coach junior staff. Ideally, you’ll also have CISSP, CISA, CISM, CEH, ISO 27001 Lead Auditor and Lead Implementer. Project management skills. What We Look For A team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
As an Auditor, your job role will be planning, organizing and performing internal audits and handling the audit end to end for various compliance such as ISO 27001, RBI, SEBI, ITGC, NIST, PCI DSS. Manage risk assessment of internal processes and develop risk and control matrix (RCM) in line with COBIT, ISO, and ITIL best practices and recommendations Document control testing procedures, results and findings Review IT controls around user access management, change management, backup and restoration management, SDLC, database and operating system baseline security, and incident management. Evaluate SOC reports (Type I and II) of service organizations, and report on IT control issues and gaps to IT Controllership. Report audit/assessment results, remediation plans, timelines and key metrics to management Assisting with the support & ongoing maintenance of the ISO 27001 ISMS certification. As a Consultant, review of policies and procedures by co ordinating with various stakeholders. Perform pre and post-implementation reviews of system implementations or enhancements. Evaluate information general computing controls and provide value-added feedback. Test compliance with those controls. Coordinate with ISO 27001, HIPPA, EHNAC, PCI, HITRUST and IT teams as applicable. Planning and developing security policy and standard documents. Privacy Framework Implementation. Desired Qualification and Skills: Having good communication skills. Bachelor or Master’s degree, preferably in Computer Science or any related field of expertise. Must have certifications such as ISO 27001 LA/CISA/CISM. Experience with security and standards frameworks especially Implementing and auditing ISO/IEC 27000 series, NIST Cybersecurity Framework, PCI DSS, HIPAA, RBI Guidelines, SEBI Guidelines etc. Strong understanding of security principals: audit, policies, guidelines, and compliance. Deep understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management. Continuously looking to grow and develop your technical and professional skills with a commitment to build and grow your cybersecurity career to the next level. Excellent written and communications skills for both technical and non-technical stake holders. Good teamwork and time management skills. Show more Show less
Posted 1 week ago
1.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Company Qualcomm India Private Limited Job Area Finance & Accounting Group, Finance & Accounting Group > Internal Audit General Summary Auditor, IT Internal Audit – Hyderabad Qualcomm is a company of inventors that unlocked 5G - ushering in an age of rapid acceleration in connectivity and new possibilities that will transform industries, create jobs, and enrich lives. But this is just the beginning. It takes inventive minds with diverse skills, backgrounds, and cultures to transform 5Gs potential into world-changing technologies and products. This is the Invention Age - and this is where you come in. This is a unique opportunity to join Qualcomm’s finance and accounting organization based in Hyderabad in the Corporate Internal Audit & Advisory Services (IA & AS) team. The department focuses on assisting the Audit Committee and management teams in the improvement of processes that manage risks related to achieving Qualcomm’s business objectives. Responsibilities Using Qualcomm’s risk-based audit methodology, the IT auditor will assist in the execution of internal audits. Specifically, the responsibilities include: Providing U.S. based time zone coverage as needed (up to 50% of time) Supporting the creation of initial planning memos and process flowcharts Identifying and assessing initial risks and control activities Designing audit procedures to evaluate control effectiveness Performing audit testing, identifying deviations from expected control activities, and effectively communicating observations to the audit team Leveraging data analytics throughout the audit process where feasible Staying abreast of changes in the business and industry to assess impacts to the company’s risk profile Contributing to the development of new concepts, techniques, and making continuous process improvements for the overall IA team All Qualcomm employees are expected to actively support diversity on their teams, and in the Company. One to three years of relevant experience in internal auditing, external auditing, or SOX compliance within a global public company (preferably in the high-tech industry), Big 4/mid-tier accounting firm or other fast-paced corporate setting Strong understanding of IT general controls, cybersecurity frameworks (e.g. NIST, COBIT), and ERP systems Fluent English; multi-lingual capability is a plus Successful Candidate Will Possess The Following Characteristics As feasible, ability to travel (infrequently) to Qualcomm’s domestic and international locations (e.g., U.S., Europe) Semiconductor business experience or familiarity Strong communication (oral and written) and presentation skills Fast learner with strong interpersonal, organization, analytical, critical thinking, and problem-solving skills Ability to work in a flexible and non-hierarchical team environment Willingness to get things done and take responsibility Ability to recognize and apply a sense of urgency, when necessary Comfortable with ambiguity Positive attitude, professional maturity, good work ethic Ability to work independently, handle multiple projects simultaneously and multi-task to meet deadlines with high-quality deliverables Controls, risk assessment, risks, internal audit, IT Bachelor's degree in Accounting, Finance, Computer Science, cyber security, or related field. CPA, CA, CIA, CISA, CFE, or other credentials, a plus. Minimum Qualifications Bachelor's degree. 1+ year of Finance, Accounting, or related work experience. Completed advanced degree in a relevant field may be substituted for up to one year (Master’s = one year) of work experience. Applicants : Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies : Our Careers Site is only for individuals seeking a job at Qualcomm. Staffing and recruiting agencies and individuals being represented by an agency are not authorized to use this site or to submit profiles, applications or resumes, and any such submissions will be considered unsolicited. Qualcomm does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers. 3076736 Show more Show less
Posted 1 week ago
8.0 - 12.0 years
30 - 35 Lacs
Mumbai
Work from Office
About The Role : Role Purpose: As GRC (Governance, Risk, and Compliance) Manager is responsible for overseeing and managing the risk assessment, remediation, and monitoring of information and technology process risks. This role involves ensuring that all risk and compliance activities are performed effectively by various control functions. The GRC Manager also serves as an internal consultant, providing guidance to operating functions and business lines on risk-related matters. Additionally, they are tasked with identifying, assessing, quantifying, reporting, communicating, mitigating, and monitoring process risks to ensure the organization''s overall security and compliance posture. Responsibilities Ensure strong governance on risk and compliance performed by various control functions. Manage risk assessment, remediation, and monitoring of information and technology process risks. Serve as an internal risk consultant to operating functions and business lines. Identify, assess, quantify, report, communicate, mitigate, and monitor process risks. Support the implementation of information security policies. Discuss risk closure, mitigation, and acceptance with stakeholders. Ensure periodic entitlement reviews are completed, and risks are managed to an acceptable level. Collaborate with control functions to track and mitigate identified risks. Work with technology leaders to identify control gaps. Act as a subject matter expert for risk and controls related to operations. Maintain strong working relationships with stakeholders. Review and refine policies and processes based on industry best practices. Track identified risks and ensured their closure within defined timelines. Prepare and maintain risk heat maps and risk registers. Required Skills Excellent executive-level communication skills. Strong working relationships with team members and the ability to motivate them. Knowledge in areas such as Application Security, Data Security, Identity Access Management, Information, Infrastructure Technology, GDPR, and ISO Audits. Solid understanding of Risk Management Lifecycle and exposure to standards like SOX, COBIT, PCI-DSS, NIST Control, etc. Understanding of Security incident response aspects is desirable. Good analytical, problem-solving, and interpersonal skills. B.E in Computer Science/Information Technology or equivalent qualification with 8-12 years of experience. Industry-recognized certification in information security such as CISSP, CISM, CISA, etc.
Posted 1 week ago
8.0 - 12.0 years
10 - 15 Lacs
Bengaluru
Work from Office
About The Role :About The Role : Technology GRC Manager C1 Role Purpose: As GRC (Governance, Risk, and Compliance) Manager is responsible for overseeing and managing the risk assessment, remediation, and monitoring of information and technology process risks. This role involves ensuring that all risk and compliance activities are performed effectively by various control functions. The GRC Manager also serves as an internal consultant, providing guidance to operating functions and business lines on risk-related matters. Additionally, they are tasked with identifying, assessing, quantifying, reporting, communicating, mitigating, and monitoring process risks to ensure the organization''s overall security and compliance posture. Responsibilities: Ensure strong governance on risk and compliance performed by various control functions. Manage risk assessment, remediation, and monitoring of information and technology process risks. Serve as an internal risk consultant to operating functions and business lines. Identify, assess, quantify, report, communicate, mitigate, and monitor process risks. Support the implementation of information security policies. Discuss risk closure, mitigation, and acceptance with stakeholders. Ensure periodic entitlement reviews are completed, and risks are managed to an acceptable level. Collaborate with control functions to track and mitigate identified risks. Work with technology leaders to identify control gaps. Act as a subject matter expert for risk and controls related to operations. Maintain strong working relationships with stakeholders. Review and refine policies and processes based on industry best practices. Track identified risks and ensured their closure within defined timelines. Prepare and maintain risk heat maps and risk registers. Required Skills: Excellent executive-level communication skills. Strong working relationships with team members and the ability to motivate them. Knowledge in areas such as Application Security, Data Security, Identity Access Management, Information, Infrastructure Technology, GDPR, and ISO Audits. Solid understanding of Risk Management Lifecycle and exposure to standards like SOX, COBIT, PCI-DSS, NIST Control, etc. Understanding of Security incident response aspects is desirable. Good analytical, problem-solving, and interpersonal skills. B.E in Computer Science/Information Technology or equivalent qualification with 8-12 years of experience. Industry-recognized certification in information security such as CISSP, CISM, CISA, etc.
Posted 1 week ago
0.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Ready to shape the future of work At Genpact, we don&rsquot just adapt to change&mdashwe drive it. AI and digital innovation are redefining industries, and we&rsquore leading the charge. Genpact&rsquos AI Gigafactory, our industry-first accelerator, is an example of how we&rsquore scaling advanced technology solutions to help global enterprises work smarter, grow faster, and transform at scale. From large-scale models to agentic AI, our breakthrough solutions tackle companies most complex challenges. If you thrive in a fast-moving, tech-driven environment, love solving real-world problems, and want to be part of a team that&rsquos shaping the future, this is your moment. Genpact (NYSE: G) is an advanced technology services and solutions company that delivers lasting value for leading enterprises globally. Through our deep business knowledge, operational excellence, and cutting-edge solutions - we help companies across industries get ahead and stay ahead. Powered by curiosity, courage, and innovation, our teams implement data, technology, and AI to create tomorrow, today. Get to know us at genpact.com and on LinkedIn, X, YouTube, and Facebook. We are inviting applications for the role of Senior Manager, IT-SOX In this role, you will be responsible for delivering solution offerings primarily related to IT & Application Controls Assurance. Demonstrate IT operational risk knowledge/experience including design of effective control processes, development of test requirements and/or testing controls for effectiveness Responsibilities . Ensure client service delivery per the quality guidelines & methodologies. . Build and maintain client relationships by understanding and being responsive to client needs and ensuring high quality of deliverables. . Contribute to people and knowledge development initiatives by developing training material and conducting training . Demonstrate strong analytical thinking and communication skills including the ability to research and understand complex processes and effectively communicate them to interested parties . Demonstrate superior relationship building and relationship management skills Qualifications we seek in you! Minimum qualifications / skills . B.E., BTECH, MTECH, MCA, MBA . IT SOX, ITAC experience . SAP controls/audit experience . SOC and interface controls experience . IT audit experience preferred . CISA/CISM/ other risk certification including cloud security preferred Preferred qualifications / skills . Experiences in providing Risk & Advisory services to clients on SOX readiness, SOC, Internal audits, ITAC&rsquos, across Business Processes and ERPs and across Operating systems (Windows, UNIX, Mainframe), databases (HANA, Oracle, SQL), key reports. . Conducted SOC1 / SOC2 Readiness Assessment, compliance to COSO & COBIT Frameworks, IPE testing and interface controls testing . Supported clients / projects pertaining to Data Security & Privacy involving HIPPA, GDPR and PCI DSS . Performed Risk assessment, Controls Design, implementation, operating effectiveness reviews, including experiences of Control Rationalization and Automation . Reviews / Benchmarking of Policies and Procedures pertaining to SDLCs, Change management, Access Management, Backup management, etc . Built / reviewed Third-Party Risk Management Frameworks, including focused on Information Security, carried out Supply Chain Security assessments . Assisted organizations to set up process for data subject access rights in coordination with GDPR regulation, and mitigate risk with respect data leakage . Significant experience in managing large projects around IT and application controls assurance . Good understanding of ITGC and application control framework around ERPs and complex IT environment such as the system of engagement, digital tools, cloud application infrastructure . Able to lead a team and lead client conversations in recommending controls around digital implementation and regular status updates . Experience in working with the implementation team specifically to implement application configuration, interface, and business process controls . Experience in solution and practice development, lead conversations with internal business leads and sales partners to identify opportunities and avenues to embed required solution . In-depth knowledge/experience of business processes (AP/RTR/AR etc.), systems, and infrastructure including project management, change management, access management, and data processing operations such as job scheduling and monitoring, problem management, and backups Why join Genpact . Be a transformation leader - Work at the cutting edge of AI, automation, and digital innovation . Make an impact - Drive change for global enterprises and solve business challenges that matter . Accelerate your career - Get hands-on experience, mentorship, and continuous learning opportunities . Work with the best - Join 140,000+ bold thinkers and problem-solvers who push boundaries every day . Thrive in a values-driven culture - Our courage, curiosity, and incisiveness - built on a foundation of integrity and inclusion - allow your ideas to fuel progress Come join the tech shapers and growth makers at Genpact and take your career in the only direction that matters: Up. Let&rsquos build tomorrow together. Genpact is an Equal Opportunity Employer and considers applicants for all positions without regard to race, color, religion or belief, sex, age, national origin, citizenship status, marital status, military/veteran status, genetic information, sexual orientation, gender identity, physical or mental disability or any other characteristic protected by applicable laws. Genpact is committed to creating a dynamic work environment that values respect and integrity, customer focus, and innovation. Furthermore, please do note that Genpact does not charge fees to process job applications and applicants are not required to pay to participate in our hiring process in any other way. Examples of such scams include purchasing a %27starter kit,%27 paying to apply, or purchasing equipment or training.
Posted 1 week ago
0.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About VOIS In 2009, VOIS started operating in India and now has established global delivery centers in Pune, Bangalore and Ahmedabad. With more than 14,500 employees, VOIS India supports global markets and group functions of Vodafone and delivers best-in-class customer experience through multi-functional services in the areas of Information Technology, Networks, Business Intelligence and Analytics, Digital Business Solutions (Robotics & AI), Commercial Operations (Consumer & Business), Intelligent Operations, Finance Operations, Supply Chain Operations and HR Operations and more. About VOIS India VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value and enhancing quality and efficiency across 28 countries, and operating from 7 locations: Albania, Egypt, Hungary, India, Romania, Spain and the UK. Over 29,000 highly skilled individuals are dedicated to being Vodafone Group's partner of choice for talent, technology, and transformation. We deliver the best services across IT, Business Intelligence Services, Customer Operations, Business Operations, HR, Finance, Supply Chain, HR Operations, and many more. Established in 2006, VOIS has evolved into a global, multi-functional organization, a Centre of Excellence for Intelligent Solutions focused on adding value and delivering business outcomes for Vodafone Job Description Role Purpose The 2nd Line Assurance function will be responsible for monitoring and mitigating key technology risks, driving a risk awareness culture and promoting a risk-sensitive approach to processes, architectures, applications and platforms within Technology. The key technology risks currently in scope for Assurance are Cyber Security, Technology Resilience, IT Transformation, Shadow IT and Lifecycle Management. We monitor risk by working closely with local markets and Group functions testing key controls established in our policies. We mitigate risk by identifying corrective actions and reporting to key stakeholders, including the Technology leadership team and various board committees Core competencies, knowledge and experience: A technical degree :-preferred -BE/Btech Knowledge of relevant Frameworks (e.g. SOX, ISO 27001/27002, COBIT, etc) Detailed knowledge of some of the following platforms: Databases (SQL, Oracle, MySQL etc.) Reporting packages (Power BI, Qlik View, Business Objects etc.) Programming (XML, Javascript, or ETL frameworks) Applications (CRM, HR) Operating Systems (LINUX, Windows) IT Networks, Firewalls, VPNs GSM Network Infrastructure Telecommunications experience VOIS Equal Opportunity Employer Commitment India: VOIS is proud to be an Equal Employment Opportunity Employer. We celebrate differences and we welcome and value diverse people and insights. We believe that being authentically human and inclusive powers our employees growth and enables them to create a positive impact on themselves and society. We do not discriminate based on age, colour, gender (including pregnancy, childbirth, or related medical conditions), gender identity, gender expression, national origin, race, religion, sexual orientation, status as an individual with a disability, or other applicable legally protected characteristics. As a result of living and breathing our commitment, our employees have helped us get certified as a Great Place to Work in India for four years running. We have been also highlighted among the Top 5 Best Workplaces for Diversity, Equity, and Inclusion, Top 10 Best Workplaces for Women, Top 25 Best Workplaces in IT & IT-BPM and 10th Overall Best Workplaces in India by the Great Place to Work Institute in 2023. These achievements position us among a select group of trustworthy and high-performing companies which put their employees at the heart of everything they do. By joining us, you are part of our commitment. We look forward to welcoming you into our family which represents a variety of cultures, backgrounds, perspectives, and skills! Apply now, and we'll be in touch!
Posted 1 week ago
0.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About VOIS In 2009, VOIS started operating in India and now has established global delivery centers in Pune, Bangalore and Ahmedabad. With more than 14,500 employees, VOIS India supports global markets and group functions of Vodafone and delivers best-in-class customer experience through multi-functional services in the areas of Information Technology, Networks, Business Intelligence and Analytics, Digital Business Solutions (Robotics & AI), Commercial Operations (Consumer & Business), Intelligent Operations, Finance Operations, Supply Chain Operations and HR Operations and more. About VOIS India VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value and enhancing quality and efficiency across 28 countries, and operating from 7 locations: Albania, Egypt, Hungary, India, Romania, Spain and the UK. Over 29,000 highly skilled individuals are dedicated to being Vodafone Group's partner of choice for talent, technology, and transformation. We deliver the best services across IT, Business Intelligence Services, Customer Operations, Business Operations, HR, Finance, Supply Chain, HR Operations, and many more. Established in 2006, VOIS has evolved into a global, multi-functional organization, a Centre of Excellence for Intelligent Solutions focused on adding value and delivering business outcomes for Vodafone Job Description Role Purpose The 2nd Line Assurance function will be responsible for monitoring and mitigating key technology risks, driving a risk awareness culture and promoting a risk-sensitive approach to processes, architectures, applications and platforms within Technology. The key technology risks currently in scope for Assurance are Cyber Security, Technology Resilience, IT Transformation, Shadow IT and Lifecycle Management. We monitor risk by working closely with local markets and Group functions testing key controls established in our policies. We mitigate risk by identifying corrective actions and reporting to key stakeholders, including the Technology leadership team and various board committees Core competencies, knowledge and experience: A technical degree :-preferred -BE/Btech Knowledge of relevant Frameworks (e.g. SOX, ISO 27001/27002, COBIT, etc) Detailed knowledge of some of the following platforms: Databases (SQL, Oracle, MySQL etc.) Reporting packages (Power BI, Qlik View, Business Objects etc.) Programming (XML, Javascript, or ETL frameworks) Applications (CRM, HR) Operating Systems (LINUX, Windows) IT Networks, Firewalls, VPNs GSM Network Infrastructure Telecommunications experience VOIS Equal Opportunity Employer Commitment India: VOIS is proud to be an Equal Employment Opportunity Employer. We celebrate differences and we welcome and value diverse people and insights. We believe that being authentically human and inclusive powers our employees growth and enables them to create a positive impact on themselves and society. We do not discriminate based on age, colour, gender (including pregnancy, childbirth, or related medical conditions), gender identity, gender expression, national origin, race, religion, sexual orientation, status as an individual with a disability, or other applicable legally protected characteristics. As a result of living and breathing our commitment, our employees have helped us get certified as a Great Place to Work in India for four years running. We have been also highlighted among the Top 5 Best Workplaces for Diversity, Equity, and Inclusion, Top 10 Best Workplaces for Women, Top 25 Best Workplaces in IT & IT-BPM and 10th Overall Best Workplaces in India by the Great Place to Work Institute in 2023. These achievements position us among a select group of trustworthy and high-performing companies which put their employees at the heart of everything they do. By joining us, you are part of our commitment. We look forward to welcoming you into our family which represents a variety of cultures, backgrounds, perspectives, and skills! Apply now, and we'll be in touch!
Posted 1 week ago
0 years
0 Lacs
Gurugram, Haryana, India
Remote
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Security Consultant Job Summary: As an Information Security Consultant, the individual will be responsible for providing security guidance to IT project teams responsible for delivering business solutions leveraging new market technologies in Travel, Meeting & Events industry. The Information Security Consultant will identify and prioritize security-related requirements, promote secure-by-default designs and ensure information systems and infrastructure will be secured throughout system development life cycle (SDLC). The Information Security Consultant will also be expected to perform risk assessments of 3rd party information systems and infrastructure, develop appropriate risk treatment and mitigation options, and effectively articulate findings and recommendations to IT project teams, Suppliers and management. The successful candidate should have solid background in application and/or infrastructure development, broad experience over an array of information security and technical disciplines and be able to provide pragmatic, business-aligned security guidance. The Information Security Consultant will be expected to work on multiple projects and tasks concurrently. EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 280,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster, and pursue those opportunities more rapidly. Enterprise Technology (ET) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity The Business Enablement Security Consulting group reports to Deputy CISO of Enterprise Workplace Technology in a hands-on role, focused on the secure design, architecture and development for applications. Most of the work will require dealing with 3rd parties, CBS is engaging with, to procure their Cloud based, mobile enabled services to enhance EY employees experience. This will include working on complex Travel solutions, Meetings & Events apps, Ground Transportation, Workplace Experience enhancement etc. These services are evolving & does offer lot of opportunities to be market leader with Security in mind. EY as an organization is big promoter of such innovative ideas & deploy these services across the globe. The Security Consultant works directly with Architects, Developers, IAM engineers, Project Managers, Supplier and other resources (as deem fit); through collaboration and mentoring, they help teams to deliver secure business solutions. The Security Consultant’s role is a technical position which will support the global strategies and architecture vision as it relates to the development of secure design, build, deployment and operation of business applications and related infrastructure. Your Key Responsibilities This position is an individual contributor capable of supporting multiple project teams in the design, implementation and certification of security controls across IT systems – constituting new platforms/products used with in EY. This requires knowledge of various IT system architecture and technology like Travel solutions, Meeting & Events leaders apps etc hosted in different Cloud environments with mobile apps offerings, as well as supporting technology such as IAM, network security, firewalls, user account management, audit & logging, and other security concepts as outlined in ISO27001, OWASP and related security standards. Also consultants should have knowledge of how to assess 3rd Party security assessments and applicability of SOC1, SOC2 reports and concepts of vendor risk management. Skills And Attributes For Success Significant working security experience (with automation platform is a plus) and knowledge in the design, implementation and operation of security controls in any two or more of the following areas (Application Security & Mobile Security preferable): Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and micro services architecture. Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud-based solutions in Microsoft Azure and Azure PAAS services Mobile Security –Technical understanding of Mobile Security standards, mobile platforms, mobile testing and experience designing security configuration and controls within mobile device-based solutions. Add-on experience of Mobile app integration with Microsoft InTune plaftform will be an advantage. Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions. Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment. Identity and Access Management - Active Directory based Identity and Access Management and Authorization design experience and integration with IDaaS and Federation technologies. To qualify for the role you must have Eight or more years of IT industry experience with minimum eight years of relevant experience in Information Security discipline A Bachelor's/Master’s degree in Computer Science or a related discipline, or equivalent work experience Experiencing in reviewing Mobile applications & platforms, with knowledge of Cloud Environment set up, and knowledge of common information security requirements for such platforms is a plus Experience providing and validating security requirements related to information system design and implementation Experience providing and validating security requirements related to a broad range of operating systems and databases Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies Experience in the use of tools and methods to identify security exposures and business risks Familiarity with information system attack methods and vulnerabilities Ideally, you’ll may also have Candidates are preferred to hold or be actively pursuing related professional certifications such as CISSP, CISM or CISA Knowledge of common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT Working experience with the design and engineering of web-based multi-tier information systems and architecture design Working experience with web technologies and programming languages Working experience with operating systems and database platforms Working experience with mobile applications and mobile enterprise application platforms Working experience with more than one of these technologies, i.e. Java, .NET, Oracle, SQL, C++, WebSphere, Sharepoint, IIS, etc. Working experience with Cloud & Mobile solutions. What We Look For Ability to team well with others to facilitate and enhance the understanding & compliance to security policies Ability to work effectively with customers, management, staff members, vendors, and consultants and articulate findings and recommendations Strong English communication and writing skills are required Strong judgment and analytical ability Excellent interpersonal, communication, organizational, and project management skills Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change Demonstrated integrity in a professional environment Willingness to work in CET timezone, to support US & EU initiatives, being flexible when required What Working At EY Offers We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
4.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About Us As a Fortune 50 company with more than 400,000 team members worldwide, Target is an iconic brand and one of America's leading retailers. Joining Target means promoting a culture of mutual care and respect and striving to make the most meaningful and positive impact. Becoming a Target team member means joining a community that values different voices and lifts each other up. Here, we believe your unique perspective is important, and you'll build relationships by being authentic and respectful. Overview About TII At Target, we have a timeless purpose and a proven strategy. And that hasn’t happened by accident. Some of the best minds from different backgrounds come together at Target to redefine retail in an inclusive learning environment that values people and delivers world-class outcomes. That winning formula is especially apparent in Bengaluru, where Target in India operates as a fully integrated part of Target’s global team and has more than 4,000 team members supporting the company’s global strategy and operations. Internal Audit provides independent assurance and risk insights to and collaborates with business owners across the enterprise. You’ll use professional judgment, analytics, agile concepts and other innovations daily. You’ll understand, assess the effectiveness of and help improve risk management capabilities (e.g., processes and controls) for Target’s strategic, business and compliance objectives. Roles & Responsibilities As an Auditor, you will be a part of the Internal Audit team and responsible for: Demonstrating a strong acumen for risks & controls in areas like Finance, HR, Corporate Real Estate, Supply Chain, Vendor Management, Marketing, etc. Performing walkthrough, testing and reporting on internal controls in compliance with Sarbanes-Oxley Act (SOX) and Internal Controls over Financial Reporting (ICoFR). Participating in IT & Business process walkthroughs in collaboration with the control owners, 2nd line teams & Target’s external auditors, documenting the process narratives & developing detailed test procedures. Performing Design & Operating effectiveness testing for assigned IT General Controls (ITGC) areas like logical access, change management, backup operations & job scheduling. Performing Design & Operating effectiveness testing for assigned IT Application Controls for various standard and off-the-shelf applications (ITAC) while adhering to Internal Audit & PCAOB standards. Demonstrating a good understanding of US GAAP & Indian Accounting Standards, Labor laws & Companies Act requirements. Testing configuration of standard applications (Like SAP, Oracle, etc.) and non-SAP application, reviewing variations, Interface Controls testing, building sample scenarios, source code reviews and key reports testing. Developing a strong understanding of Target’s risk management framework, internal policies & control procedures and ensuring control objectives are met during the course of the engagement. Planning & executing internal financial, operational and/or compliance audits in adherence to the Internal Audit Policies & Procedures Ensuring all work papers meet the documentation & quality requirements throughout the lifecycle of an engagement (Planning, Fieldwork, Reporting & Wrap – Up) Communicating any findings noted during the testing and working with the internal audit business auditors, 2nd line team, control owners & external auditors to assess the impact of the findings. Managing relationships with key internal & external stakeholders and ensure adherence to project timelines & deliverables. Identifying opportunities for use of Data Analytics & Automation to enhance Internal Audit’s ability to perform efficient testing/audit. Demonstrating a high level of engagement at work by closely interacting with HQ Internal Audit Team, participating in Internal Audit engagements, trainings, team building & community relations activities Being independent, innovative & proactive in taking steps for your personal development by willingly taking on stretch assignments, cross-functional engagements & acquiring new skills. Job duties may change at any time due to business needs About You 3 or 4 year college degree (Accounting, Commerce, IT or related field preferred). 3-6 years of internal or external audit experience focused on SOX 302/404 audit & compliance. Working Knowledge of auditing business processes, ITGC & ITAC Exposure to Risk Management and Governance Frameworks/ Systems & ERP systems Experience in SAP IT Controls audit, SAP security baseline & best practices in SAP Security is preferred. Knowledge of key IT regulations, standards and benchmarks used by the IT industry (e.g. SOX, COBIT, SSAE18/ISAE 3402 etc.) Strong self-directed work habits, exhibiting initiative, drive, creativity, maturity, self- assurance, and professionalism. Experienced in using data and analytical tools, including MS-Excel, to solve business problems. Preferences CIA, CA, ACCA, CPA, CIMA, CISA Big 4, retail experience is a plus. Useful Links- Life at Target- https://india.target.com/ Benefits- https://india.target.com/life-at-target/workplace/benefits Culture- https://india.target.com/life-at-target/belonging Show more Show less
Posted 1 week ago
0 years
0 Lacs
Kochi, Kerala, India
Remote
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Security Consultant Job Summary: As an Information Security Consultant, the individual will be responsible for providing security guidance to IT project teams responsible for delivering business solutions leveraging new market technologies in Travel, Meeting & Events industry. The Information Security Consultant will identify and prioritize security-related requirements, promote secure-by-default designs and ensure information systems and infrastructure will be secured throughout system development life cycle (SDLC). The Information Security Consultant will also be expected to perform risk assessments of 3rd party information systems and infrastructure, develop appropriate risk treatment and mitigation options, and effectively articulate findings and recommendations to IT project teams, Suppliers and management. The successful candidate should have solid background in application and/or infrastructure development, broad experience over an array of information security and technical disciplines and be able to provide pragmatic, business-aligned security guidance. The Information Security Consultant will be expected to work on multiple projects and tasks concurrently. EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 280,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster, and pursue those opportunities more rapidly. Enterprise Technology (ET) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity The Business Enablement Security Consulting group reports to Deputy CISO of Enterprise Workplace Technology in a hands-on role, focused on the secure design, architecture and development for applications. Most of the work will require dealing with 3rd parties, CBS is engaging with, to procure their Cloud based, mobile enabled services to enhance EY employees experience. This will include working on complex Travel solutions, Meetings & Events apps, Ground Transportation, Workplace Experience enhancement etc. These services are evolving & does offer lot of opportunities to be market leader with Security in mind. EY as an organization is big promoter of such innovative ideas & deploy these services across the globe. The Security Consultant works directly with Architects, Developers, IAM engineers, Project Managers, Supplier and other resources (as deem fit); through collaboration and mentoring, they help teams to deliver secure business solutions. The Security Consultant’s role is a technical position which will support the global strategies and architecture vision as it relates to the development of secure design, build, deployment and operation of business applications and related infrastructure. Your Key Responsibilities This position is an individual contributor capable of supporting multiple project teams in the design, implementation and certification of security controls across IT systems – constituting new platforms/products used with in EY. This requires knowledge of various IT system architecture and technology like Travel solutions, Meeting & Events leaders apps etc hosted in different Cloud environments with mobile apps offerings, as well as supporting technology such as IAM, network security, firewalls, user account management, audit & logging, and other security concepts as outlined in ISO27001, OWASP and related security standards. Also consultants should have knowledge of how to assess 3rd Party security assessments and applicability of SOC1, SOC2 reports and concepts of vendor risk management. Skills And Attributes For Success Significant working security experience (with automation platform is a plus) and knowledge in the design, implementation and operation of security controls in any two or more of the following areas (Application Security & Mobile Security preferable): Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and micro services architecture. Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud-based solutions in Microsoft Azure and Azure PAAS services Mobile Security –Technical understanding of Mobile Security standards, mobile platforms, mobile testing and experience designing security configuration and controls within mobile device-based solutions. Add-on experience of Mobile app integration with Microsoft InTune plaftform will be an advantage. Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions. Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment. Identity and Access Management - Active Directory based Identity and Access Management and Authorization design experience and integration with IDaaS and Federation technologies. To qualify for the role you must have Eight or more years of IT industry experience with minimum eight years of relevant experience in Information Security discipline A Bachelor's/Master’s degree in Computer Science or a related discipline, or equivalent work experience Experiencing in reviewing Mobile applications & platforms, with knowledge of Cloud Environment set up, and knowledge of common information security requirements for such platforms is a plus Experience providing and validating security requirements related to information system design and implementation Experience providing and validating security requirements related to a broad range of operating systems and databases Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies Experience in the use of tools and methods to identify security exposures and business risks Familiarity with information system attack methods and vulnerabilities Ideally, you’ll may also have Candidates are preferred to hold or be actively pursuing related professional certifications such as CISSP, CISM or CISA Knowledge of common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT Working experience with the design and engineering of web-based multi-tier information systems and architecture design Working experience with web technologies and programming languages Working experience with operating systems and database platforms Working experience with mobile applications and mobile enterprise application platforms Working experience with more than one of these technologies, i.e. Java, .NET, Oracle, SQL, C++, WebSphere, Sharepoint, IIS, etc. Working experience with Cloud & Mobile solutions. What We Look For Ability to team well with others to facilitate and enhance the understanding & compliance to security policies Ability to work effectively with customers, management, staff members, vendors, and consultants and articulate findings and recommendations Strong English communication and writing skills are required Strong judgment and analytical ability Excellent interpersonal, communication, organizational, and project management skills Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change Demonstrated integrity in a professional environment Willingness to work in CET timezone, to support US & EU initiatives, being flexible when required What Working At EY Offers We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
0 years
0 Lacs
Trivandrum, Kerala, India
Remote
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Security Consultant Job Summary: As an Information Security Consultant, the individual will be responsible for providing security guidance to IT project teams responsible for delivering business solutions leveraging new market technologies in Travel, Meeting & Events industry. The Information Security Consultant will identify and prioritize security-related requirements, promote secure-by-default designs and ensure information systems and infrastructure will be secured throughout system development life cycle (SDLC). The Information Security Consultant will also be expected to perform risk assessments of 3rd party information systems and infrastructure, develop appropriate risk treatment and mitigation options, and effectively articulate findings and recommendations to IT project teams, Suppliers and management. The successful candidate should have solid background in application and/or infrastructure development, broad experience over an array of information security and technical disciplines and be able to provide pragmatic, business-aligned security guidance. The Information Security Consultant will be expected to work on multiple projects and tasks concurrently. EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 280,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster, and pursue those opportunities more rapidly. Enterprise Technology (ET) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity The Business Enablement Security Consulting group reports to Deputy CISO of Enterprise Workplace Technology in a hands-on role, focused on the secure design, architecture and development for applications. Most of the work will require dealing with 3rd parties, CBS is engaging with, to procure their Cloud based, mobile enabled services to enhance EY employees experience. This will include working on complex Travel solutions, Meetings & Events apps, Ground Transportation, Workplace Experience enhancement etc. These services are evolving & does offer lot of opportunities to be market leader with Security in mind. EY as an organization is big promoter of such innovative ideas & deploy these services across the globe. The Security Consultant works directly with Architects, Developers, IAM engineers, Project Managers, Supplier and other resources (as deem fit); through collaboration and mentoring, they help teams to deliver secure business solutions. The Security Consultant’s role is a technical position which will support the global strategies and architecture vision as it relates to the development of secure design, build, deployment and operation of business applications and related infrastructure. Your Key Responsibilities This position is an individual contributor capable of supporting multiple project teams in the design, implementation and certification of security controls across IT systems – constituting new platforms/products used with in EY. This requires knowledge of various IT system architecture and technology like Travel solutions, Meeting & Events leaders apps etc hosted in different Cloud environments with mobile apps offerings, as well as supporting technology such as IAM, network security, firewalls, user account management, audit & logging, and other security concepts as outlined in ISO27001, OWASP and related security standards. Also consultants should have knowledge of how to assess 3rd Party security assessments and applicability of SOC1, SOC2 reports and concepts of vendor risk management. Skills And Attributes For Success Significant working security experience (with automation platform is a plus) and knowledge in the design, implementation and operation of security controls in any two or more of the following areas (Application Security & Mobile Security preferable): Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and micro services architecture. Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud-based solutions in Microsoft Azure and Azure PAAS services Mobile Security –Technical understanding of Mobile Security standards, mobile platforms, mobile testing and experience designing security configuration and controls within mobile device-based solutions. Add-on experience of Mobile app integration with Microsoft InTune plaftform will be an advantage. Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions. Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment. Identity and Access Management - Active Directory based Identity and Access Management and Authorization design experience and integration with IDaaS and Federation technologies. To qualify for the role you must have Eight or more years of IT industry experience with minimum eight years of relevant experience in Information Security discipline A Bachelor's/Master’s degree in Computer Science or a related discipline, or equivalent work experience Experiencing in reviewing Mobile applications & platforms, with knowledge of Cloud Environment set up, and knowledge of common information security requirements for such platforms is a plus Experience providing and validating security requirements related to information system design and implementation Experience providing and validating security requirements related to a broad range of operating systems and databases Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies Experience in the use of tools and methods to identify security exposures and business risks Familiarity with information system attack methods and vulnerabilities Ideally, you’ll may also have Candidates are preferred to hold or be actively pursuing related professional certifications such as CISSP, CISM or CISA Knowledge of common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT Working experience with the design and engineering of web-based multi-tier information systems and architecture design Working experience with web technologies and programming languages Working experience with operating systems and database platforms Working experience with mobile applications and mobile enterprise application platforms Working experience with more than one of these technologies, i.e. Java, .NET, Oracle, SQL, C++, WebSphere, Sharepoint, IIS, etc. Working experience with Cloud & Mobile solutions. What We Look For Ability to team well with others to facilitate and enhance the understanding & compliance to security policies Ability to work effectively with customers, management, staff members, vendors, and consultants and articulate findings and recommendations Strong English communication and writing skills are required Strong judgment and analytical ability Excellent interpersonal, communication, organizational, and project management skills Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change Demonstrated integrity in a professional environment Willingness to work in CET timezone, to support US & EU initiatives, being flexible when required What Working At EY Offers We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Sanand, Gujarat, India
On-site
Job Description The Plant IT PFS Lead lead the implementation of IT enablers in the plant to support the Company's process efforts in terms of flexible and lean manufacturing, error proofing and manufacturing execution systems. Work in a multi shift operation - to support daily operations and provide technical support for IT applications and Plant Floor Systems whilst maintaining governance and controls Responsibilities Key Roles & Responsibilities: Leads Plant floor application portfolio management including incident, problem, change, release, capacity, configuration, demand, and consumption processes, health of the portfolio, business continuity, and disaster recovery testing. Performs / oversee & governs daily Plant floor systems health and initiates appropriate actions as needed. Ensures utilization of appropriate Ford standard processes (e.g. ITIL, system development methodology, development to production checklist). Communicates effectively with the business partner and IT teams to support day-to-day operations Ensures security management activities are instituted and reviewed at appropriate time frame Leads project(s) within an application portfolio to improve overall operations performance (e.g. 8-D, 6-Sigma), special projects, or management initiatives. Ensure I.T. BCP & DR plans are tested annually (where applicable) and that DR facilities are checked for 100% operation & tape backups and loads. Interaction with IT professionals such as Network Engineers, Security & Control Engineers, Application Development Teams, Application Maintenance Teams, Database Administrators and Architects Provides escalation support and troubleshooting for system hardware, software, and/or operating systems Interact with management and peers/subordinates to present technical subjects Ability to work with minimal supervision. Strong communications skills to communicate directly with off-shore teams, Regional management, and business partners while engaging external IT SME’s/Vendors to resolve production issues. Builds and maintains strong relationship with appropriate customer base (depending on location, this may include the plant operating committee), internal IT partners, and/or internal environment related support organizations and vendors Operating budget management / planning and Spend management. Manage purchased services engagement effectively as per SLA. Qualifications Education Qualification Bachelor's degree or equivalent qualification in a technical discipline Industry or professional certification in a related area is a plus Master's degree work in a related technical field is desirable No. Of Years Of Experience Minimum of 5 year experience in a related field for GSR 7 Professional Exposure (Technical Skills) Experience of progressive responsibilities within IT Hands-on experience in multiple roles across the spectrum of applications and/or technologies Experience of working in a global environment ITIL awareness Preferred Previous Experiences Experience of IT Application management and infrastructure support in a complex manufacturing environment with preference to the automotive industry. Program/Project management utilizing project delivery tools and techniques. Experience of working within a large cross-functional organization. Functional Skills Analytical analysis ability in support of application/DBMS/ Server Problem solving, technical analysis and a good solid understanding of the latest antivirus products, SeOS, Server Tools (GICC/SAT), all Microsoft related Server product packages, engineering software and related knowledge of engineering processes within a manufacturing environment. Solid network topology competence and preferably Cisco EXPOSURE. Relevant Project Management skills, understanding of COBIT /ISO 9001 standards in an automotive industry. Management skills as the person may manage others within the IT department. Ability to interact with Global teams and be able to provide immediate application/network/server issue support/resolution when required. Behavioural Skills Team player with superior communication skills and proven ability to work under pressure of delivery as well as timelines. Good analytical skills, problem solving abilities and willingness to work hard in support of the overall project effort. Ability to create documentation to assist in training of later recruited staff and ongoing support of the environment Special Knowledge/Skills Required Understanding of a typical Global Operations Support Model, ITSM (IT Service Management and ITIL (IT Infrastructure Processes) preferably in an automotive production system, Knowledge of Data Center Operations and emergency procedures, Understanding of Disaster recovery processes and Business continuity in case of emergency or disaster. Varied knowledge of industry related quality processes, technology used, Network related tools (Netaps/ALC/ TCP/IP/WAN / WAS / VLAN / LAN / MCSE / CCSE (Checkpoint) and Global Incident logging tools (Request center/GICC/SAT) Any Others Ability to work shifts/overtime on short notice/weekends and public holidays - Shift Leader Flexibility to support other sites Exposure to Network Infrastructure/deskside processes and OA environments, MPN (Manufacturing networks), CPN and Server administrations and support processes (server access/server analysis and troubleshooting) Experience in managing and maintaining locally hosted applications and servers in a data center Financial skills to support order procurement process and support the annual IT budget process and annual IT Cycle Plan Good communication skills in order to facilitate and co-ordinate meetings with Senior Management within the Plant related to IT Issues Management skills - will manage Manufacturing Purchased Services Employees, Manage SPOC resources and Manage Junior Salaried IT Employees Show more Show less
Posted 1 week ago
15.0 - 17.0 years
20 - 25 Lacs
Chandigarh
Work from Office
Job Summary We are seeking a seasoned Observability Architect to define and lead our end-to-end observability strategy across highly distributed, cloud-native, and hybrid environments. This role requires a visionary leader with deep hands-on experience ... Observability Architect - CLOUDEQ SOFTWARE INDIA PRIVATE LIMITED Observability Architect Posted 105 weeks ago Job Description Job Summary We are seeking a seasoned Observability Architect to define and lead our end-to-end observability strategy across highly distributed, cloud-native, and hybrid environments. This role requires a visionary leader with deep hands-on experience in New Relic and a strong working knowledge of other modern observability platforms like Datadog, Prometheus/Grafana, Splunk, OpenTelemetry, and more. You will design scalable, resilient, and intelligent observability solutions that empower engineering, SRE, and DevOps teams to proactively detect issues, optimize performance, and ensure system reliability. This is a senior leadership role with significant influence over platform architecture, monitoring practices, and cultural transformation across global teams. Key Responsibilities Architect and implement full-stack observability platforms, covering metrics, logs, traces, synthetics, real user monitoring (RUM), and business-level telemetry using New Relic and other tools like Datadog, Prometheus, ELK, or AppDynamics. Design and enforce observability standards and instrumentation guidelines for microservices, APIs, front-end applications, and legacy systems across hybrid cloud environments. Experience in OpenTelemetry adoption, ensuring vendor-neutral, portable observability implementations where appropriate. Build multi-tool dashboards, health scorecards, SLOs/SLIs, and integrated alerting systems tailored for engineering, operations, and executive consumption. Collaborate with engineering and DevOps teams to integrate observability into CI/CD pipelines, GitOps, and progressive delivery workflows. Partner with platform, cloud, and security teams to provide end-to-end visibility across AWS, Azure, GCP, and on-prem systems. Lead root cause analysis, system-wide incident reviews, and reliability engineering initiatives to reduce MTTR and improve MTBF. Evaluate, pilot, and implement new observability tools/technologies aligned with enterprise architecture and scalability requirements. Deliver technical mentorship and enablement, evangelizing observability best practices and nurturing a culture of ownership and data-driven decision-making. Drive observability governance and maturity models, ensuring compliance, consistency, and alignment with business SLAs and customer experience goals. Required Qualifications 15+ years of overall IT experience, hands-on with application development, system architecture, operations in complex distributed environments, troubleshooting and integration for applications and other cloud technology with observability tools. 5+ years of hands-on experience with observability tools such as New relic, Datadog, Prometeus, etc. including APM, infrastructure monitoring, logs, synthetics, alerting, and dashboard creation. Proven experience and willingness to work with multiple observability stacks, such as: Datadog, Dynatrace, AppDynamics Prometheus, Grafana, etc. Elasticsearch, Fluentd, Kibana (EFK/ELK) Splunk, OpenTelemetry, Solid knowledge of Kubernetes, service mesh (e.g., Istio), containerization (Docker) and orchestration strategies. Strong experience with DevOps and SRE disciplines, including CI/CD, IaC (Terraform, Ansible), and incident response workflows. Fluency in one or more programming/scripting languages: Java, Python, Go, Node.js, Bash. Hands-on expertise in cloud-native observability services (e.g., CloudWatch, Azure Monitor, GCP Operations Suite). Excellent communication and stakeholder management skills, with the ability to align technical strategies with business goals. Preferred Qualifications Architect level Certifications in New Relic, Datadog, Kubernetes, AWS/Azure/GCP, or SRE/DevOps practices. Experience with enterprise observability rollouts, including organizational change management. Understanding of ITIL, TOGAF, or COBIT frameworks as they relate to monitoring and service management. Familiarity with AI/ML-driven observability, anomaly detection, and predictive alerting. Why Join Us? Lead enterprise-scale observability transformations impacting customer experience, reliability, and operational excellence. Work in a tool-diverse environment, solving complex monitoring challenges across multiple platforms. Collaborate with high-performing teams across development, SRE, platform engineering, and security. Influence strategy, tooling, and architecture decisions at the intersection of engineering, operations, and business. Unit #E1J, First Floor, Tower B, Godrej Eternia, Plot #70, Industrial Area, Phase 1, Chandigarh Chandigarh, Chandigarh, 160002 You have already applied for this job with this account.
Posted 1 week ago
5.0 - 10.0 years
11 - 16 Lacs
Chennai
Work from Office
Your work days are brighter here. At Workday, we value our candidates privacy and data security. Workday will never ask candidates to apply to jobs through websites that are not Workday Careers. Please be aware of sites that may ask for you to input your data in connection with a job posting that appears to be from Workday but is not. In addition, Workday will never ask candidates to pay a recruiting fee, or pay for consulting or coaching services, in order to apply for a job at Workday. About the Team The Change & Release Enablement team is the engine that powers the reliable delivery of Workday s software releases and infrastructure updates across our private and public cloud datacenters. We minimize disruption to our customers operations while simultaneously enabling rapid innovation for our engineering teams. By developing and leveraging industry-leading methodologies and frameworks, we support the resiliency and velocity of Workdays services, directly contributing to customer satisfaction and business agility. About the Role Workday is seeking a motivated and detail-oriented individual contributor to support and contribute to our change and release management practices within a complex, multi-cloud production environment. This is an exciting opportunity to join a growing team focused on ensuring compliance, operational efficiency, and increasing automation. As part of a global team of domain experts and process architects, you will be part of a collaborative and innovative community. In this role, you will contribute to the development, implementation, and consistent application of effective change and release management practices across Workday s Product & Technology organization. About You Responsibilities: Contribute to the design, implementation, and management of specific ITSM processes, with a strong focus on change and release management best practices, ensuring alignment with industry standards and organizational needs within their scope of responsibility. Collaborate with the team to provide support and contribute expertise in Jira/JSM capabilities, including advanced configuration, development, and automation, to enhance change and release workflows.. Participate in and execute tasks within projects focused on automating and enhancing change and release processes, applying DevOps principles to improve efficiency and speed of delivery. Contribute to the management of process documentation lifecycle, including updates and maintenance, ensuring accuracy and accessibility. Support US and Ireland teams in executing critical and strategic programs. Support the US and Ireland team for weekly service updates and CAB governance. Participate in the global 24x7 operations (aka on-call rotation) to govern emergency releases to address critical customer issues. Basic Qualifications: Bachelors degree in a relevant field (e.g., Computer Science, Information Technology) or equivalent experience. 5+ Years of experience in IT Service Management process frameworks such as ITIL, COBIT etc with strong experience in process improvement. 2+ years of strong, hands-on experience in leading high impact CAB meetings, driving effective decisions and seamless coordination 2+ years of experience working on Change/Release Management process operations and leading Root Cause Analysis as part of a global team. 2+ years of experience with ITSM tools capabilities (preferablyJira/JSM), including advanced configuration, development, and automation for change and release management. Excellent communication, collaboration, and leadership skills. Proactively identifies opportunities to optimize workflows and boost productivity. Other Qualifications: Familiarity with software engineering principles, Source Code Management, DevOps, CI/CD pipelines, Infrastructure as Code and Technical Operations ITIL certification is a plus Ability to assert and hold one s ground in the matters of policy enforcement, industry best practices and compliance Understanding of data centers, cloud platforms, software deployments, observability tools, and databases. Experience in a SaaS environment. An advantage would be: Some foundational knowledge of AI and a curiosity about AI agents, with any hands-on exposure being a significant benefit. Our Approach to Flexible Work With Flex Work, we re combining the best of both worlds: in-person time and remote. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. We know that flexibility can take shape in many ways, so rather than a number of required days in-office each week, we simply spend at least half (50%) of our time each quarter in the office or in the field with our customers, prospects, and partners (depending on role). This means youll have the freedom to create a flexible schedule that caters to your business, team, and personal needs, while being intentional to make the most of time spent together. Those in our remote "home office" roles also have the opportunity to come together in our offices for important moments that matter. Are you being referred to one of our roles? If so, ask your connection at Workday about our Employee Referral process!
Posted 1 week ago
8.0 - 13.0 years
13 - 18 Lacs
Chennai
Work from Office
Your work days are brighter here. At Workday, we value our candidates privacy and data security. Workday will never ask candidates to apply to jobs through websites that are not Workday Careers. Please be aware of sites that may ask for you to input your data in connection with a job posting that appears to be from Workday but is not. In addition, Workday will never ask candidates to pay a recruiting fee, or pay for consulting or coaching services, in order to apply for a job at Workday. About the Team The Change & Release Enablement team is the engine that powers the reliable delivery of Workday s software releases and infrastructure updates across our private and public cloud datacenters. We minimize disruption to our customers operations while simultaneously enabling rapid innovation for our engineering teams. By developing and leveraging industry-leading methodologies and frameworks, we support the resiliency and velocity of Workdays services, directly contributing to customer satisfaction and business agility. About the Role Workday is looking for a strategic, driven, and inspiring individual contributor with proven expertise in managing and automating change and release management practices within a complex, multi-cloud production environment. This role is pivotal in shaping a high-performing team focused on compliance, operational efficiency, and automation. As part of a global team of domain experts and process architects, you will join a community passionate about innovation and collaboration. In this role, you will lead the development, enhancement, and consistent application of gold-standard change and release management practices across Workday s Product & Technology organization. About You Responsibilities: Lead the design, implementation, and management of ITSM processes, with a strong emphasis on change and release management best practices, ensuring alignment with industry standards and the organizations needs. Provide expert-level support and guidance on Jira/JSM capabilities, including advanced configuration, development, and automation to support change and release workflows. Lead projects to automate and enhance change and release processes, integrating DevOps principles to improve efficiency and speed of delivery. Mentor and guide team members, fostering a collaborative and high-performing environment. Manage process documentation lifecycle, updates, etc.. Support US and Ireland teams in executing critical and strategic programs. Support the US and Ireland team for weekly service updates and CAB governance (including leading CAB meetings). Participate in the global 24x7 operations (aka on-call rotation) to govern emergency releases to address critical customer issues Basic Qualifications: Bachelors degree in a relevant field (e.g., Computer Science, Information Technology) or equivalent experience. 8+ Years of experience in IT Service Management process frameworks such as ITIL, COBIT etc with strong experience in process improvement. 5+ years of strong, hands-on experience in leading high impact CAB meetings, driving effective decisions and seamless coordination 3+ years of experience working on Change/Release Management process operations and leading Root Cause Analysis as part of a global team. 2+ years of experience with Jira/JSM product capabilities, including advanced configuration, development, and automation for change and release management. Excellent communication, collaboration, and leadership skills. Proactively identifies opportunities to optimize workflows and boost productivity. Other Qualifications: Strong familiarity with software engineering principles, Source Code Management, DevOps, CI/CD pipelines, Infrastructure as Code and Technical Operations ITIL certification is a plus Understanding of data centers, cloud platforms, software deployments, observability tools, and databases. Ability to assert and hold one s ground in the matters of policy enforcement, industry best practices and compliance Experience in a SaaS environment. An advantage would be: Some foundational knowledge of AI and a curiosity about AI agents, with any hands-on exposure being a significant benefit. Our Approach to Flexible Work With Flex Work, we re combining the best of both worlds: in-person time and remote. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. We know that flexibility can take shape in many ways, so rather than a number of required days in-office each week, we simply spend at least half (50%) of our time each quarter in the office or in the field with our customers, prospects, and partners (depending on role). This means youll have the freedom to create a flexible schedule that caters to your business, team, and personal needs, while being intentional to make the most of time spent together. Those in our remote "home office" roles also have the opportunity to come together in our offices for important moments that matter. Are you being referred to one of our roles? If so, ask your connection at Workday about our Employee Referral process!
Posted 1 week ago
4.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: GRC Desired Skill Set Any: Governance & Risk, Risk Assessment, Risk Management, GRC Archer, ITGC Control testing, Sox Experience Range: 4+ years Joining Location: PAN INDIA We are currently planning to do a Walk-In Interview on 14th June 2025 at TCS Bengaluru Date – 14th June 2025 (Saturday) Venue - Tata Consultancy Services, Think Campus, JRD Auditorium Cafeteria, Electronic City, Bangalore Job Description Role & Responsibilities: Security Framework Alignment and Related Controls Testing (NIST, CoBIT, ISO 27001) · SOX Testing for IT Controls · IT Compliance audits · Vendor Risk Assessments · Contribute to documentation of Information Security Policies, Standards, Processes, and Procedures. · Manage and perform cybersecurity assessments on emerging/ongoing business initiatives, third-party services · Evaluate third-party products/services by reviewing standardized questionnaires, evidencing their controls Show more Show less
Posted 1 week ago
0 years
0 Lacs
Kochi, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2