EY
Overview
Cyber Defense Forensics Analyst role at EY. Join a global team focused on protecting EY and client information assets through incident response, digital forensics, and proactive security operations. Responsibilities
Investigate, coordinate, bring to resolution, and report on security incidents as they are identified Forensically analyze end user systems and servers with possible indicators of compromise Analyze artifacts collected during security incidents and forensic analyses Identify security incidents through hunting within a SIEM and other relevant tools Interface with server owners, system custodians, and IT contacts to pursue incident response activities, including access provisioning, artifact collection, and containment or remediation actions Provide consultation and assessment on perceived security threats Maintain, manage, and improve incident response process and protocol documentation Provide regular reporting and metrics on case work Resolve security incidents by identifying root cause and implementing solutions Analyze investigative findings and develop fact-based reports Be on-call to deliver global incident response Qualifications
Bachelor’s or Master’s Degree in Computer Science, Information Systems, Engineering, or related field 5+ years of experience in incident response, computer forensics analysis and/or malware reverse engineering Understanding of security threats, vulnerabilities, and incident response Experience with electronic investigation, forensic tools and methodologies (log correlation, handling electronic data, malware identification/analysis) Familiarity with legalities surrounding electronic discovery and analysis Experience with SIEM technologies (e.g., Splunk) Deep understanding of Windows and Unix/Linux operating systems Ideal/Preferred
Hold or pursue related professional certifications such as GCFE, GCFA, or GCIH Background in security incident response in cloud environments (e.g., Azure) Programming skills in PowerShell, Python, and/or C/C++ Understanding of best security practices for network architecture and server configuration What We Look For
Demonstrated integrity in a professional environment Ability to work independently Global mindset for working with diverse cultures and backgrounds Knowledgeable in standard security incident response processes and lifecycles Strong teamwork, communication, and writing skills What We Offer
The compensation ranges below comply with applicable pay transparency laws. EY offers a comprehensive compensation and benefits package including medical and dental coverage, retirement plans, paid time off, and more. Specific salary ranges vary by location and experience. Continuous learning and development opportunities Flexible, performance-driven environment Transformative leadership and career growth Diverse and inclusive culture EY is an equal opportunity, affirmative action employer. We provide reasonable accommodation to qualified applicants with disabilities and veterans as required by law.
#J-18808-Ljbffr
Cyber Defense Forensics Analyst role at EY. Join a global team focused on protecting EY and client information assets through incident response, digital forensics, and proactive security operations. Responsibilities
Investigate, coordinate, bring to resolution, and report on security incidents as they are identified Forensically analyze end user systems and servers with possible indicators of compromise Analyze artifacts collected during security incidents and forensic analyses Identify security incidents through hunting within a SIEM and other relevant tools Interface with server owners, system custodians, and IT contacts to pursue incident response activities, including access provisioning, artifact collection, and containment or remediation actions Provide consultation and assessment on perceived security threats Maintain, manage, and improve incident response process and protocol documentation Provide regular reporting and metrics on case work Resolve security incidents by identifying root cause and implementing solutions Analyze investigative findings and develop fact-based reports Be on-call to deliver global incident response Qualifications
Bachelor’s or Master’s Degree in Computer Science, Information Systems, Engineering, or related field 5+ years of experience in incident response, computer forensics analysis and/or malware reverse engineering Understanding of security threats, vulnerabilities, and incident response Experience with electronic investigation, forensic tools and methodologies (log correlation, handling electronic data, malware identification/analysis) Familiarity with legalities surrounding electronic discovery and analysis Experience with SIEM technologies (e.g., Splunk) Deep understanding of Windows and Unix/Linux operating systems Ideal/Preferred
Hold or pursue related professional certifications such as GCFE, GCFA, or GCIH Background in security incident response in cloud environments (e.g., Azure) Programming skills in PowerShell, Python, and/or C/C++ Understanding of best security practices for network architecture and server configuration What We Look For
Demonstrated integrity in a professional environment Ability to work independently Global mindset for working with diverse cultures and backgrounds Knowledgeable in standard security incident response processes and lifecycles Strong teamwork, communication, and writing skills What We Offer
The compensation ranges below comply with applicable pay transparency laws. EY offers a comprehensive compensation and benefits package including medical and dental coverage, retirement plans, paid time off, and more. Specific salary ranges vary by location and experience. Continuous learning and development opportunities Flexible, performance-driven environment Transformative leadership and career growth Diverse and inclusive culture EY is an equal opportunity, affirmative action employer. We provide reasonable accommodation to qualified applicants with disabilities and veterans as required by law.
#J-18808-Ljbffr