Cyber - Digital Identity SME - Senior - Consulting
Listed on 2026-02-07
-
IT/Tech
Cybersecurity, IT Consultant
Cyber - Digital Identity SME - Senior
Location:
Anywhere in Country
At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help build a better working world.
In a rapidly changing IT environment, clients from all industries look to us for trusted solutions for their increasingly complex risks and vulnerabilities. As part of our digital identity (DI) and privileged access management (PAM) teams you’ll be at the heart of that goal, helping clients gain insight and context to their complex PAM environments and assessing, improving, and building infrastructure, processes and policies to meet both current and next‑generation PAM needs.
Theopportunity
You will be responsible for leading projects or elements of multiple client engagements, including service delivery, business development, and related activities. You’ll work alongside respected industry professionals, learning about and using the latest tools and techniques to identify and overcome some of the most relevant and pressing security issues in the world.
Key responsibilitiesOur digital identity and PAM services assist clients in aligning security management strategy with business goals by managing who has access to which resources and services, and enforcing business, privacy, and security policies. Supported by strategic alliances with third‑party vendors, we provide a broad range of services including strategy, assessment, testing, and implementation of PAM solutions.
- Current state privileged access management assessments
- Capability maturity and benchmarking assessments
- Developing PAM strategy and road maps
- Target operating model and governance
- PAM policies, procedures, and standards
- Vendor analysis and assessments
- Design and architecture for PAM transformation
- PAM process and policies design and re‑engineering
- Implementation, expansion, and integrations
- PAM solution migrations
- Discovery, remediation, and onboarding of privileged accounts and secrets
- Operation process automation
- Effectively lead and motivate client engagement teams and provide technical leadership in the assessment, design, and implementation of security and IT risk solutions
- Foster an innovative and inclusive team‑oriented work environment; mentor junior consultants
- Consistently deliver quality client services; manage risk and ensure key stakeholders are kept informed about progress and expected outcomes; support business development opportunities
- Use knowledge of the current IT environment and industry trends to identify engagement and client service issues, and communicate this information effectively
- A bachelor’s degree in a related field and approximately 5 years of related work experience, or a graduate degree and approximately 4 years of related work experience
- Experience in one or more of the following:
- Privileged access management solutions including design or implementation of PAM technologies (Cyber Ark, Beyond Trust, Delinea, Hashi Corp)
- Role‑based access control including design and development of user access roles
- Secret management solutions and understanding of Dev Ops (Ansible, Jenkins, Gitlab, Kubernetes, Terraform) and cloud (Azure, AWS, GCP)
- Operating systems:
Windows, Linux, Unix - Experience with IGA solutions (SailPoint, Saviynt)
- Experience in scripting and programming languages (Power Shell, Java, C#) and Microsoft Office (Word, PowerPoint, Visio)
- Understanding of access control concepts including directory services, SAML, LDAP, PKI
- Experience in process definition, workflow design, and process mapping
- Valid driver’s license (U.S.) and passport; willingness to travel internationally (40‑60%)
- Strong presentation and communication skills; ability to speak with director and VP level stakeholders
- CISSP, CISM, CISA, CIPT, CIPM, CRISC or other relevant certifications desired; non‑certified hires are required to become certified within one year from the date of hire
- Vendor certifications for Cyber Ark, Beyond Trust, Delinea, Hashi Corp desired
We’re interested in…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).