EY
Cyber Triage and Forensics - Junior Analyst
At EY, we empower individuals to shape a better future. Our Information Security professionals enable EY to work securely and deliver secure products and services, providing rapid detection and response to security events.
The Cyber Defense Response Center (CTF) is responsible for monitoring and detecting information security events that could adversely impact EY assets. Candidates will work with senior cyber security experts to develop skills in modern security tools and practices.
Key Responsibilities
Perform real‑time monitoring and analysis of logs and alerts from a multitude of security devices, determining the validity of security incidents.
Work across functions to detect, respond to, and investigate information security incidents, maintaining and following procedures for event alerting.
Operate at a technical level to identify threats and vectors that trigger security events and apply defined procedures for mitigation.
Assist in the classification, research, and analysis of security events occurring on network or endpoint systems.
Skills & Attributes for Success
Respond to network, cloud, and host‑based security events.
Investigate and resolve security events independently.
Propose improvements within the Cyber Triage and Forensics team.
Excellent interpersonal and communication skills.
Qualifications
Bachelor’s degree in Computer Science, Information Systems, Engineering, or 2–3 years of related experience.
Minimum of 1–2 years of experience in a Security Operations Center (SOC) or related environment.
Hands‑on experience investigating security events, analyzing log output, and conducting threat and vulnerability analysis.
Proficiency with intrusion detection platforms and electronic investigation/log correlation.
Working knowledge of Windows systems administration (including Active Directory) and/or Linux.
Preferred Qualifications
Strong knowledge of information security principles, technologies, and practices.
Experience with multiple security event detection platforms.
Thorough understanding of TCP/IP and the OSI model.
Demonstrated integrity and professional conduct.
Comfortable navigating and troubleshooting Windows system issues.
Relevant security certifications (e.g., CompTIA Security+, CISSP, GSEC, etc.).
Compensation & Benefits The base salary range for this role in the US is $60,400 to $109,600. Other geographic locations follow local salary guidelines. EY offers a comprehensive benefits package including medical and dental coverage, pension and 401(k) plans, and paid time off.
Equal Employment Opportunity EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities.
#J-18808-Ljbffr
The Cyber Defense Response Center (CTF) is responsible for monitoring and detecting information security events that could adversely impact EY assets. Candidates will work with senior cyber security experts to develop skills in modern security tools and practices.
Key Responsibilities
Perform real‑time monitoring and analysis of logs and alerts from a multitude of security devices, determining the validity of security incidents.
Work across functions to detect, respond to, and investigate information security incidents, maintaining and following procedures for event alerting.
Operate at a technical level to identify threats and vectors that trigger security events and apply defined procedures for mitigation.
Assist in the classification, research, and analysis of security events occurring on network or endpoint systems.
Skills & Attributes for Success
Respond to network, cloud, and host‑based security events.
Investigate and resolve security events independently.
Propose improvements within the Cyber Triage and Forensics team.
Excellent interpersonal and communication skills.
Qualifications
Bachelor’s degree in Computer Science, Information Systems, Engineering, or 2–3 years of related experience.
Minimum of 1–2 years of experience in a Security Operations Center (SOC) or related environment.
Hands‑on experience investigating security events, analyzing log output, and conducting threat and vulnerability analysis.
Proficiency with intrusion detection platforms and electronic investigation/log correlation.
Working knowledge of Windows systems administration (including Active Directory) and/or Linux.
Preferred Qualifications
Strong knowledge of information security principles, technologies, and practices.
Experience with multiple security event detection platforms.
Thorough understanding of TCP/IP and the OSI model.
Demonstrated integrity and professional conduct.
Comfortable navigating and troubleshooting Windows system issues.
Relevant security certifications (e.g., CompTIA Security+, CISSP, GSEC, etc.).
Compensation & Benefits The base salary range for this role in the US is $60,400 to $109,600. Other geographic locations follow local salary guidelines. EY offers a comprehensive benefits package including medical and dental coverage, pension and 401(k) plans, and paid time off.
Equal Employment Opportunity EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities.
#J-18808-Ljbffr