EY Technology :
Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently.
We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day.
Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients.
Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization.
EY Technology supports our technology needs through three business units :
Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-
based opportunities faster and pursue those opportunities more rapidly.
Enterprise Workplace Technology (EWT) EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services.
EWT will also support our internal technology needs by focusing on a better user experience.
Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems.
The Identity & Access Management (IAM)SolutionsSecurity Architect sits in the InfoSec organization as a hands-on role focused on the security architecture in the IAM space supportingdirectory &cloudservices.
The architect works directly with the Business, Projects, Engineering and Operational resources through collaboration and mentoring to shape the cloud IAM capabilities for the Firm.
The IAM Solution Security Architect’s role is a technical position which will support IAM engagements in the development of IAM architectures, provide advice and guidance to client teams in line with strategic direction of IAM.
The IAM SolutionsSecurity Architect will work with other Architects, Service Owners, and Project teams to provide a consensus-
based enterprise solution that is scalable, adaptable and synchronized with the ever-changing business needs.
Your key responsibilities
Subject-matter expert that has expertise across all IAM topics as it relates to both cloud and design of Active Directory, AD LDS, Azure AD and Ping Identity products including the relationship between on-
prem and cloud architectures.
Drive the adoption of Directory services, Authentication and Authorization reference architectures for existing, new and emerging IAM technologies.
Drive the adoption of creative solutions to address complex, global IAM problems.
Participate in Identity and Access Management enterprise governance processes and drive IAM standards adoption.
Develop effective architecture solutions that not only satisfy immediate project requirements but also deliver a coherent, reusable, reliable and phased architecture to help the business grow and change while aligning to strategic vision.
Create, maintain and align the Firm’s Information Security policies and standards with industry best practices and business needs in the adoption of cloud services and technologies.
Represent Information Security on organizational project teams and ensure adherence to existing security policies and standards.
Manage the successful technical delivery of Information Security projects and services for our customers by working directly with key business stakeholders, executives and project teams.
Security architects are often the technical lead on initiatives and as such must drive the vision and alignment of the solution delivery.
This is not a project manager role.
Deliver technical security configuration architecture expertise in implementing cross-organizational information sharing.
Develop solutions and recommendations for issues caused by process challenges, emerging threats and technology changes.
Technical Skills Required
The individual in this role must be knowledgeable in general aspects of Information Security.
Must have in-depth experience architecting IAM solutions within Microsoft Azure (strong preference) or Amazon Web Services (AWS), or potentially other cloud vendors.
Must have in-depth experience and intimately familiarity with IAM related protocols such as SAML, SCIM, OpenID and OAuth.
Must have in-depth experience with Federation and SSO concepts and technologies particularly solutions based on ADFS and Ping Identity product set.
Must have In-depth experience with Microsoft Azure, particularly Azure AD and architecture designs connecting Azure to enterprise infrastructure (on-prem).
Must have in-depth experience with Directories (AD, UnboundID / PingDirectory, AD LDS, Azure AD, LDAP in general etc...).
Nice to have Skills
In-depth of experience of architecting and configuring Microsoft Windows OS technology including Kerberos, NTLM, SPNs, TCP / IP, IPSec, Firewalls, Load Balancers, AD Forests, Domains, Sites, Trusts, Group Policies, and Organizational Units.
Strong understanding of cloud computing architecture, technical design and implementations, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) delivery models.
Good understanding of Microsoft Forefront Identity Management, Microsoft Exchange, Quest Active Roles Server (ARS), Office 365 identity and access management, Multi-
factor authentication, Privileged Identity Management (Cyber Ark and / or Azure PIM),
Experience working with cloud security and governance tools, and cloud access security brokers (CASBs).
Personal attributes for Success
Strong team player and consensus forming individual.
Excellent customer service and communication (oral / written) skills with technical and non-technical audience.
Strong critical thinking and analytical skills and ability to think out of the box .
Must be able to work independently or with a team, under minimum supervision.
Consults to key customers and senior management on project design and development scope.
To qualify for the role, you must have
Bachelor’s or Master’s degree in Information Assurance, Computer Science, Information Systems or related field of study.
12+ years of practical IT architectural experience is required. 5+ years of direct Information Security - Identity and Access Management experience as detailed in the technical skills section.
A security industry certification is required including but not limited to CISSP, SSCP, CISM, SANS GSEC, ECSA, ECSP, and Security+
What working at EY offers
We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-
being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer :
Support, coaching and feedback from some of the most engaging colleagues around
Opportunities to develop new skills and progress your career
The freedom and flexibility to handle your role in a way that’s right for you
EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities.
While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance.
As a global leader in assurance, tax, transaction and advisory services, we’re using the finance products, expertise and systems we’ve developed to build a better working world.
That starts with a culture that believes in giving you the training, opportunities and creative freedom to make things better.
Whenever you join, however long you stay, the exceptional EY experience lasts a lifetime. And with a commitment to hiring and developing the most passionate people, we’ll make our ambition to be the best employer by 2020 a reality.
If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible.
Join us in building a better working world.