Consultant - Security Operations Centre, Cyber Security
Melbourne, VIC, AU, 3000
EY
Mit unseren vier integrierten Geschäftsbereichen — Wirtschaftsprüfung und prüfungsnahe Dienstleistungen, Steuerberatung, Unternehmensberatung und Strategy and Transactions — sowie unserem Branchenwissen unterstützen wir unsere Mandanten dabei,...
Could the skills you build here unlock doors anywhere?
At EY we believe that whoever you are, your uniqueness helps us stand apart.
We bring together extraordinary people, like you, to build a better working world.
What’s in it for you?
You’ll work with a valued based team of amazing Technologists who are always growing, learning, and adapting, in and out of the office. We’re looking to recruit a Security Analyst at the Consultant level.
Your key responsibilities:
-
Monitor and respond to security alarms\alerts\incidents in Security tools such as SIEM, EDR and NDR
-
Escalate true positive detections to Senior Security Analysts, SOC Engineering, and/or customers
-
Manage client requests\tickets
-
Deliver services according to service targets (SLA’s) and quality standards
-
Follow ITIL practices regarding service request, incident, problem and change management
-
Contribute to SOC continuous improvement program
-
Communicate effectively with customers, teammates, and management.
What we’re looking for:
Here’s our ‘wish list’ but don’t worry if you don’t tick all the boxes. We’re interested in your strengths, what you want to learn, and how far you want to go.
-
Experience within Information Security, especially in a security operations and vulnerability discovery OR information operations/incident role
-
Strong working knowledge of at least three of the following security tools: host-based antivirus, anti-spam gateway solutions, firewalls, IDS/IPS, server and network device hardening, data loss prevention, forensics software, vulnerability management, website security
-
Experience utilizing security tools such as: Splunk, Sentinel, Crowdstrike, Microsoft Defender and ServiceNow
-
Knowledge of general security concepts and methods
It's great, but not required, if you have:
-
Experience with Windows, Linux, UNIX, any other major operating systems.
-
Ability to mesh sound technical and security practices to problem solving
-
Demonstrate in-depth technical capabilities and professional knowledge.
-
Additional certifications and training preferred in the following areas: Network Security certifications (CISSP, Security+, SANS, ISACA, Vendor Certificates), Project Management training/certification, and Quality Management (ITIL, Six Sigma, TQM, etc.) training/certification
What we can offer you
-
Explore how a career at EY is yours to build at www.ey.com/au/careerdevelopment
-
Discover how, when and where you can work at www.ey.com/au/flexibility
-
Learn about our commitment to DE&I at www.ey.com/au/diversity-inclusiveness
-
Understand how our benefits can support you at www.ey.com/au/benefits
Acknowledgement of Country
EY acknowledges the Traditional Owners and Custodians of the lands on which EY offices are located around Australia. We pay our respects to their cultures, and to their Elders — past, present, and emerging. Find out more about our vision for reconciliation at www.ey.com/au/reconciliation
Apply now… we’re over 9,000 perspectives in Australia and we’re ready to welcome yours.
At EY we take inclusivity seriously, and we’re committed to removing barriers and improving the employment prospects of people with disability or long-term health conditions. We encourage you to share any support and adjustments you need to be your best and participate equitably in our recruitment process. We understand sharing your needs with us can be daunting, so if you have questions before or during your application, we welcome you to get in touch at contactrecruitment@au.ey.com or +61 3 8650 7788 (option 2). Anything you tell us will be kept completely confidential.
EY | Building a better working world
Our preferred applicant will be required to undertake employment screening by EY or our external third-party provider.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Antivirus CISSP CrowdStrike EDR Firewalls Forensics IDS IPS ISACA ITIL Linux Network security SANS Sentinel SIEM SOC Splunk UNIX Vulnerability management Windows
Perks/benefits: Career development Health care
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.