Senior Consultant - Security Operations Analyst - Level 3 - Cyber Security

Melbourne, VIC, AU, 3000

Applications have closed

EY

Mit unseren vier integrierten Geschäftsbereichen — Wirtschaftsprüfung und prüfungsnahe Dienstleistungen, Steuerberatung, Unternehmensberatung und Strategy and Transactions — sowie unserem Branchenwissen unterstützen wir unsere Mandanten dabei,...

View all jobs at EY

 

 

 

 What if your most rewarding experiences couldn’t be captured by a resume?

 

At EY we believe that whoever you are, your uniqueness helps us stand apart. 

 

We bring together extraordinary people, like you, to build a better working world.

 

What’s in it for you? 

 

As a Level 3 Security Analyst, you will play a vital role in protecting our clients from cyber threats. You will operate with a high degree of autonomy in both incident response and threat hunting and be a key influencer in strategic cybersecurity decisions. As a senior analyst in any SOC, you will co-ordinate incident response on a day-to-day basis, lead continuous improvement in L1 and L2 triage processes and perform threat analysis that will lead to better detection capability for our services.

 

Key Responsibilities

  • Develop a strong understanding of incident response frameworks and best practices.
  • Lead the investigation and response to security incidents, leveraging advanced technical skills and threat intelligence.
  • Triage security alerts, perform in-depth analysis to determine root cause and impact, and develop effective containment and remediation strategies.
  • Collaborate with cross-functional teams to coordinate incident response activities and ensure timely communication.
  • Act as the primary point of contact for incident escalations from Tier 1/2 analysts.
  • Perform advanced triage, including deep-dive analysis of security events and logs to determine incident severity, scope, and potential impact.
  • Lead incident response efforts, coordinating activities across various teams to contain, investigate, and remediate security breaches.
  • Develop and execute incident response plans, ensuring proper communication and documentation throughout the incident lifecycle.
  • Investigate potential threats identified through security alerts, anomalies, or intelligence reports.
  • Conduct independent research and analysis to identify potential attack vectors and vulnerabilities.
  • Utilize threat intelligence and attack frameworks (e.g., MITRE ATT&CK) to create realistic attack scenarios.
  • Translate threat intelligence into actionable detection and hunting strategies.
  • Utilize SIEM (Security Information and Event Management) and other security tools to identify and analyze potential threats.
  • Develop and fine-tune security rules and correlation logic to improve threat detection capabilities.
  • Maintain detailed documentation of security incidents, investigations, and response actions.
  • Provide guidance and mentorship to junior SOC analysts.
  • Assist in developing and delivering security awareness training programs.

 

What we’re looking for

 

Here is our ‘wish list’ but don’t worry if you don’t tick all the boxes. We’re interested in your passion, strengths, what you want to learn, and how far you want to go. 

 

  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • Minimum 5-7 years of experience in a SOC or security analyst role.
  • Proven track record of successfully identifying, analyzing, and responding to security incidents.
  • Strong background in formulation and execution of threat hunt scenarios and the development of subsequent use cases to uplift detection capability
  • Relevant industry certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or CompTIA Security+ are highly desirable.
  • In-depth knowledge of Sentinel, MS Defender, other Threat centric tools, IDS/IPS, email security, vulnerability scanners and other security technologies. 

 

What we can offer you

 

Acknowledgement of Country

 

EY acknowledges the Traditional Owners and Custodians of the lands on which EY offices are located around Australia. We pay our respects to their cultures, and to their Elders — past, present, and emerging. Find out more about our vision for reconciliation at www.ey.com/au/reconciliation

 

Apply now… we’re over 9,000 perspectives in Australia and we’re ready to welcome yours. 

 

Diversity, equity, and inclusiveness (DE&I) are core to who we are, how we work and how we live our values. We hold a collective commitment to continue to drive an environment where all differences are valued, practices are equitable, and everyone experiences a sense of belonging — where people are inspired to team and lead inclusively in their interactions every day. We encourage applications from people of all ages, nationalities, abilities, cultures, sexual orientations, and gender identities and are committed to providing an equitable and barrier free recruitment experience for all. We encourage you to share any support and adjustments you need to be your best and participate equitably in our recruitment process. We understand sharing your needs with us can be daunting, so if you have questions before or during your application, we welcome you to get in touch at  contactrecruitment@au.ey.com. Anything you tell us will be kept completely confidential.

 

The exceptional EY experience. It’s yours to build.

 

#LI-Hybrid 

 

EY | Building a better working world 

 

Our preferred applicant will be required to undertake employment screening by EY or our external third-party provider.

 

#LI-Hybrid

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: CISSP CompTIA Computer Science GCIH GIAC IDS Incident response IPS MITRE ATT&CK Sentinel SIEM SOC Threat detection Threat intelligence Vulnerabilities

Perks/benefits: Career development Team events

Regions: Asia/Pacific Europe
Country: Australia

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.