In this role, you will provide full-spectrum systems engineering, integration, manufacturing, and life cycle. The selected candidate will develop and maintain Cyber Security Assessment and Authorization processes to evaluate compliance.
In this role, you will create, update and maintain various checklists, spreadsheets, databases, and dashboard and custom tool-sets to analyze compliance posture. The selected candidate will utilize and review network scans, tools and log files to report on system compliance, risk and threat levels.
The Information Security Policy Analyst is responsible for the creation of presentations, highlighting benefits of new and updated documents and communication messages, intended for EY leadership, stakeholders and general staff.
In this role, you will assimilate and apply new job related information in a timely manner. (i.e.: Quickly gains knowledge, understanding or skill; applies knowledge or skill; quickly learns to apply new technology).
In this role, the selected candidate will implement processes to document and monitor the network portfolio using a risk based approach; lead new and recurring network security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
In this role, you will be responsible to create, update and maintain appropriate documentation including on-boarding processes and procedures, operational issue tracking and resolution reporting, ticket management and validation analysis checklists.
In this role, the selected candidate must have the ability to compare and evaluate Yes courses of conduct and recommend a decision to project management after various possibilities have been considered.