Cybersecurity - Threat and Vulnerability Management - Cyber Defense Operations - Senior
Sacramento, CA, US, 95814
EY
Mit unseren vier integrierten Geschäftsbereichen — Wirtschaftsprüfung und prüfungsnahe Dienstleistungen, Steuerberatung, Unternehmensberatung und Strategy and Transactions — sowie unserem Branchenwissen unterstützen wir unsere Mandanten dabei,...Cybersecurity – Threat and Vulnerability Management – Cyber Defense Operations - Senior
In today’s cybersecurity threat landscape, businesses across all sectors turn to EY for reliable solutions to manage increasingly sophisticated threats and risks. As part of our Threat and Vulnerability Management team, you will be at the cutting edge of cyber defense, empowering organizations to combat the perpetual challenges that threaten global business operations. This role provides an opportunity to leverage your technical and business acumen to significantly impact cybersecurity on a worldwide scale, contributing to the mission of safeguarding the digital ecosystem for our clients.
The opportunity
Join our dynamic team as a Senior Cybersecurity Operations specialist, where you will play a pivotal role in safeguarding our organization's data and systems. You will be at the forefront of identifying and mitigating security threats, ensuring the integrity and confidentiality of our critical assets. This is your chance to develop and enhance our operational protocols and contribute to the evolution of our cybersecurity defenses.
Your key responsibilities
As a Senior Cybersecurity Operations specialist, you will monitor and protect against intrusions and breaches, prioritize and respond to security threats, and maintain operational excellence in our security systems. You will:
-
Develop and execute robust security protocols
-
Continuously improve our cybersecurity processes
-
Evaluate and mature enterprise-wide cyber defense controls
-
Expect to be challenged with complex problems and to learn from the best in the industry. This role may require travel and will be based at [Location], with the possibility of remote work arrangements.
-
Lead advanced threat analysis and manage incident escalation processes to elevate critical security issues.
-
Utilize Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM) platforms and Security Orchestration and Automation (SOAR) to identify and thwart potential threats.
-
Engage in comprehensive malware analysis and conduct forensic investigations to enhance threat intelligence.
-
Prioritize incidents and ensure effective execution of playbooks for streamlined response operations.
-
Conduct detailed log analysis and network traffic analysis to detect and respond to security anomalies.
-
Coordinate closely with our endpoint detection and response teams to ensure robust protective measures.
-
Implement and manage escalation procedures to safeguard sensitive and critical data assets.
-
Advocate and implement security best practices across the organization to ensure the highest levels of protection.
-
Lead incident triage and coordinate response efforts for high-stakes incidents.
-
Conduct proactive threat hunting and deep forensic analysis to mitigate Advanced Persistent Threats (APT).
-
Perform root cause analysis to derive actionable insights from security incidents.
-
Profile threat actors for enhanced understanding and strategic response to emerging threats.
-
Drive advanced configurations and improvement of SIEM systems for optimal efficacy.
-
Oversee security architecture reviews to identify and address potential vulnerabilities.
Skills and attributes for success
To thrive in this role, you should have a strong foundation in cybersecurity principles and be able to make informed decisions based on broad policies and your own expertise. You will need:
-
Experience in contributing to project delivery and meeting targets
-
Ability to coordinate junior colleagues and team members
-
Proficiency in tracking deliverables and project status
-
Effective Communication: Demonstrated ability to communicate professionally, both verbally and in writing, during interactions with clients, senior leadership, technical teams, support staff, vendors, and business partners.
-
Client Engagement: Strong interpersonal skills with the ability to listen, understand, and respond to clients' needs effectively.
-
Risk Management: Ability to identify when to escalate risks, issues, and opportunities for enhanced service delivery to the appropriate client and EY leadership.
-
Quality and Precision: Proven capability to create and deliver high-quality work products, including client reports and presentations, while adhering to service quality standards and program management requirements.
-
Collaborative Teamwork: Competence in working collaboratively in cross-functional, culturally diverse teams, including those that are geographically dispersed.
-
Analytical and Critical Thinking: Strong analytical and critical thinking skills, with the adeptness to process complex information and present it clearly and understandably.
-
Proactive Learning: A proactive mindset with a strong interest in staying current with the latest cyber threats and trends, continuously seeking to expand knowledge and expertise in the field.
- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
Tags: APT Automation Cyber defense EDR IDS Intrusion detection Log analysis Malware Risk management SIEM SOAR Strategy Threat intelligence Vulnerabilities Vulnerability management
Perks/benefits: Career development Flex hours Flex vacation Health care
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.