At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Government and Public Sector - Technology Consulting - Cybersecurity Risk Compliance – Senior Consultant From strategy to execution, the Government & Public Sector (“GPS”) practice of Ernst & Young (“EY”) provides a full range of consulting and audit services to help our Federal, State, Local and Education clients implement new ideas to help achieve their mission outcomes. We deliver real change and measurable results through our diverse, high-performing teams, quality work at the highest professional standards, operational know-how from across our global organization, and creative and bold ideas that drive innovation. We enable our government clients to achieve their mission of protecting the nation and serving the people; increasing public safety; improving healthcare for our military, veterans, and citizens; delivering essential public services; and helping those in need. EY is ready to help our government build a better working world. The Opportunity EY GPS is seeking a detail-oriented and experienced professional to support the implementation, documentation, and self-assessment of security controls in accordance with the NIST Risk Management Framework (RMF). The ideal candidate will have hands-on experience with key federal frameworks and guidance, including NIST SP 800-37 Rev. 2, 800-53A Rev. 5, 800-30 Rev. 5, 800-60, 800-59, 800-23, 800-47, 800-34 Rev. 5, and 800-84, FIPS 199, 200, and 191, and be capable of guiding systems through the full RMF lifecycle. 1. Categorize: Define the system criticality and authorization type required 2. Select: Determine applicable controls to meet and leverage (e.g. inheritance from cloud or other provider, enterprise services, etc.) 3. Implement: Develop security architecture, system security plan (SSP) and implement required cybersecurity controls 4. Assess: Conduct self-security assessment, collect artifacts and input package (Assessment Report and artifacts) 5. Authorize: Authorizing Official reviews and approves package 6. Monitor: Mitigate any findings from assessment, update package based upon system changes, conduct operational cybersecurity tasks and support continuous authorization.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level