EY
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.
Cyber Triage and Forensics (CTF) Incident Analyst The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following standard incident response methodologies, analyzing malware, identifying indicators of compromise, supporting remediation, and developing documentation to support the security incident response process.
Your Key Responsibilities
Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
Forensically analyze end user systems and servers found to have possible indicators of compromise
Analyze artifacts collected during a security incident/forensic analysis
Identify security incidents through “Hunting” operations within a SIEM and other relevant tools
Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including obtaining access to systems, collecting digital artifacts, and containing and/or remediating actions
Provide consultation and assessment on perceived security threats
Maintain, manage, improve and update security incident process and protocol documentation
Regularly provide reporting and metrics on case work
Resolve security incidents by identifying root cause and solutions
Analyze findings in investigative matters and develop fact‑based reports
Be on‑call to deliver global incident response
Skills And Attributes For Success
Resolve security incidents by identifying root cause and solutions
Analyze findings in investigative matters and develop fact‑based reports
Proven integrity and judgment within a professional environment
Ability to appropriately balance work/personal priorities
To qualify for the role you must have
Bachelor’s or Master’s Degree in Computer Science, Information Systems, Engineering or a related field
5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering
Understanding of security threats, vulnerabilities, and incident response
Understanding of electronic investigation, forensic tools, and methodologies, including log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis
Familiarity with the legalities surrounding electronic discovery and analysis
Experience with SIEM technologies (e.g., Splunk)
Deep understanding of both Windows and Unix/Linux based operating systems
Ideally, you’ll also have
Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
Background in security incident response in cloud‑based environments, such as Azure
Programming skills in PowerShell, Python and/or C/C++
Understanding of the best security practices for network architecture and server configuration
What We Look For
Demonstrated integrity in a professional environment
Ability to work independently
Have a global mindset for working with different cultures and backgrounds
Knowledgeable in business industry‑standard security incident response process, procedures, and life cycle
Excellent teaming skills
Excellent social, communication, and writing skills
What We Offer The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for the New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Salaries are determined through a wide variety of factors including, but not limited to, education, experience, knowledge, skills and geography. In addition, the Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. The flexible vacation policy lets you decide how much time off you need. You’ll also be granted time off for designated EY Paid Holidays, winter/summer breaks, personal/family care, and other leaves of absence when needed to support your physical, financial, and emotional well‑being.
Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
EY accepts applications for this position on an ongoing basis.
EY is an equal opportunity, affirmative action employer providing equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1‑800‑EY‑HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY’s Talent Shared Services Team (TSS) or email the TSS at ssc.customersupport@ey.com.
#J-18808-Ljbffr
Cyber Triage and Forensics (CTF) Incident Analyst The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following standard incident response methodologies, analyzing malware, identifying indicators of compromise, supporting remediation, and developing documentation to support the security incident response process.
Your Key Responsibilities
Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
Forensically analyze end user systems and servers found to have possible indicators of compromise
Analyze artifacts collected during a security incident/forensic analysis
Identify security incidents through “Hunting” operations within a SIEM and other relevant tools
Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including obtaining access to systems, collecting digital artifacts, and containing and/or remediating actions
Provide consultation and assessment on perceived security threats
Maintain, manage, improve and update security incident process and protocol documentation
Regularly provide reporting and metrics on case work
Resolve security incidents by identifying root cause and solutions
Analyze findings in investigative matters and develop fact‑based reports
Be on‑call to deliver global incident response
Skills And Attributes For Success
Resolve security incidents by identifying root cause and solutions
Analyze findings in investigative matters and develop fact‑based reports
Proven integrity and judgment within a professional environment
Ability to appropriately balance work/personal priorities
To qualify for the role you must have
Bachelor’s or Master’s Degree in Computer Science, Information Systems, Engineering or a related field
5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering
Understanding of security threats, vulnerabilities, and incident response
Understanding of electronic investigation, forensic tools, and methodologies, including log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis
Familiarity with the legalities surrounding electronic discovery and analysis
Experience with SIEM technologies (e.g., Splunk)
Deep understanding of both Windows and Unix/Linux based operating systems
Ideally, you’ll also have
Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
Background in security incident response in cloud‑based environments, such as Azure
Programming skills in PowerShell, Python and/or C/C++
Understanding of the best security practices for network architecture and server configuration
What We Look For
Demonstrated integrity in a professional environment
Ability to work independently
Have a global mindset for working with different cultures and backgrounds
Knowledgeable in business industry‑standard security incident response process, procedures, and life cycle
Excellent teaming skills
Excellent social, communication, and writing skills
What We Offer The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for the New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Salaries are determined through a wide variety of factors including, but not limited to, education, experience, knowledge, skills and geography. In addition, the Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. The flexible vacation policy lets you decide how much time off you need. You’ll also be granted time off for designated EY Paid Holidays, winter/summer breaks, personal/family care, and other leaves of absence when needed to support your physical, financial, and emotional well‑being.
Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
EY accepts applications for this position on an ongoing basis.
EY is an equal opportunity, affirmative action employer providing equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1‑800‑EY‑HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY’s Talent Shared Services Team (TSS) or email the TSS at ssc.customersupport@ey.com.
#J-18808-Ljbffr