Logo
EY

Cyber Defense Forensics Analyst

EY, Washington, District of Columbia, us, 20022

Save Job

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.

Cyber Triage and Forensics (CTF) Incident Analyst The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following standard incident response methodologies, analyzing malware, identifying indicators of compromise, supporting remediation, and developing documentation to support the security incident response process.

Your Key Responsibilities

Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified

Forensically analyze end user systems and servers found to have possible indicators of compromise

Analyze artifacts collected during a security incident/forensic analysis

Identify security incidents through “Hunting” operations within a SIEM and other relevant tools

Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including obtaining access to systems, collecting digital artifacts, and containing and/or remediating actions

Provide consultation and assessment on perceived security threats

Maintain, manage, improve and update security incident process and protocol documentation

Regularly provide reporting and metrics on case work

Resolve security incidents by identifying root cause and solutions

Analyze findings in investigative matters and develop fact‑based reports

Be on‑call to deliver global incident response

Skills And Attributes For Success

Resolve security incidents by identifying root cause and solutions

Analyze findings in investigative matters and develop fact‑based reports

Proven integrity and judgment within a professional environment

Ability to appropriately balance work/personal priorities

To qualify for the role you must have

Bachelor’s or Master’s Degree in Computer Science, Information Systems, Engineering or a related field

5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering

Understanding of security threats, vulnerabilities, and incident response

Understanding of electronic investigation, forensic tools, and methodologies, including log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis

Familiarity with the legalities surrounding electronic discovery and analysis

Experience with SIEM technologies (e.g., Splunk)

Deep understanding of both Windows and Unix/Linux based operating systems

Ideally, you’ll also have

Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH

Background in security incident response in cloud‑based environments, such as Azure

Programming skills in PowerShell, Python and/or C/C++

Understanding of the best security practices for network architecture and server configuration

What We Look For

Demonstrated integrity in a professional environment

Ability to work independently

Have a global mindset for working with different cultures and backgrounds

Knowledgeable in business industry‑standard security incident response process, procedures, and life cycle

Excellent teaming skills

Excellent social, communication, and writing skills

What We Offer The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for the New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Salaries are determined through a wide variety of factors including, but not limited to, education, experience, knowledge, skills and geography. In addition, the Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. The flexible vacation policy lets you decide how much time off you need. You’ll also be granted time off for designated EY Paid Holidays, winter/summer breaks, personal/family care, and other leaves of absence when needed to support your physical, financial, and emotional well‑being.

Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.

Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.

Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.

Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

EY accepts applications for this position on an ongoing basis.

EY is an equal opportunity, affirmative action employer providing equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1‑800‑EY‑HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY’s Talent Shared Services Team (TSS) or email the TSS at ssc.customersupport@ey.com.

#J-18808-Ljbffr