GMS-Senior- Email Security-ProofPoint
Listed on 2026-02-11
-
IT/Tech
Cybersecurity, IT Consultant
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
EmailSecurity – Senior
As part of our EY-Cyber security in the Technology Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Endpoint & Email Security tools/solutions. The main duties of the person in this role will include proper care and administration of the Email Security and EDR/XDR tools, monitoring and responding to the alerts that generate from the tool.
This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc.
We’re looking for Senior Security consultant in the Technology Consulting team to work on various infrastructure and endpoint protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop.
Yourkey responsibilities
- Design, implement, and maintain Email security solutions (Proofpoint/M365) to safeguard Email flow.
- Manage and respond to the security alerts triggered for email security solution.
- Collaborate with cross-functional teams to integrate security solutions and ensure seamless operations.
- Monitor and analyse security incidents, responding promptly to security breaches and user incidents.
- Stay updated on industry best practices and emerging security threats, adapting security protocols as needed.
- Perform regular security audits and security assessments to identify and mitigate risks.
- Develop and maintain security documentation, policies, and procedures.
- Provide technical support and guidance to other IT teams to enhance overall security posture.
- Troubleshoot and resolve security-related issues in a timely manner.
- Continuously improve and optimize security processes and procedures to enhance efficiency and effectiveness.
- Should be a good team player.
- Excellent verbal and written communication skill.
- Proficient Documentation and Power Point skills.
- Good social, communication and technical writing skills.
- Should interface with internal and external clients.
- Strong analytical/problem solving skills.
- Ability to prioritize tasks and work accurately under pressure in order to meet deadlines.
- Should understand and follow workplace policies and procedures.
- Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager.
- Bachelor’s degree in computer science, Information Security, or a related field.
- 4 to 7 years of professional experience in information security with a focus on email security, security incident management, EDR solutions.
- Hands‑on experience on email security (e.g., phishing Campaigns), phishing Campaigns and its components.
- Hands‑on experience on EDR solutions (e.g., Crowd Strike, Defender, Carbon Black) at enterprise levels.
- Design, implement and maintain email solution, EDR solutions at enterprise levels.
- Should have deep knowledge on ITIL process.
- Handle security escalations as L2/L3.
- Strong understanding of email security, M365, EDR solution and technology.
- Experience with Proofpoint incident handling process and risk mitigation.
- Implementation and Configuration of email security solution alerts and triaging based on security impact and business requirement.
- Implementation and Configuration of email EDR solution along with security architecture inline to business requirement.
- Setting up access controls and policies to govern who can access, modify, or delete protected data.
- Ensuring that data security practices align with regulatory compliance…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).