Senior Threat Detection Analyst
London
Senior Threat Detection Analyst
Base Location: Hybrid/UK based (core office in London) plus network of 20 offices nationally: www.kpmg88careers.co.uk/experienced-professional/#LeBlender.OfficeLocations
The KPMG EWT function is a cornerstone of our business. We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in enterprise technology this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time.
KPMG is one of the world's largest and most respected consultancy businesses, we've supported the UK through times of war and peace, prosperity and recession, political and regulatory upheaval. We've proudly stood beside the institutions and businesses which make the UK what it is.
Why join KPMG EWT as a Senior Threat Detection Analyst?
The Team is an important function within Security Operations in KPMG. The team play a key role in ensuring that the business IT systems are protected and monitored from cyber threats. The team works with external MSSPs to monitor, analyse, report cyber security threats and respond accordingly. The team works with the different internal business capabilities to ensure that security monitoring service is embedded into their solutions. The team is also responsible for making sure that security monitoring is aligned with cyber threat landscape and business risks on an ongoing basis.
The person will be playing a key role in ensuring that the business IT systems are protected and monitored from threats, participate in the active monitoring of the security sensors and ensure that appropriate actions are taken as part of the Incident Response process, work with the different KPMG business capabilities to ensure that security monitoring service is embedded into their solutions.
You will be part of on-call rota for SOC and required to be on-call for one week at a time typically, during a month.
What will you be doing?
- Act as an escalation point for other security analysts in the SOC, including 3rd party MSSP
- Co-ordinate SOC team response and work with Threat Detection manager to improve triage processes
- Deputise Threat Detection Manager with full delegated responsibilities, when required
- Proactively monitor the network security sensors ensuring timely detection, investigation and remediation of potential threats in line with the incident management lifecycle
- Use the advanced security analytics toolsets to monitor for emerging threat patterns and vulnerabilities, attempted or successful breaches
- Work closely with other KPMG teams to ensure that all technologies are activity monitored including troubleshooting where necessary
- Interact with the Global Security Operations Centre (GSOC) & MSSP, including Incident response and intelligence sharing, escalating to management where required
- Triage and manage incidents, events and queries from the business to the relevant resolver group
- Contribute to the Continual Service Improvement of the teams' operations through proactive analysis, engagement and collaboration
- Detect, respond and coordinate response for security events while capturing essential details and artefacts
- Operationalise actionable intelligence reports from Threat Intelligence team and external sources
- Maintain event response documentation, participate in post-mortems, and write event reports
- Contribute to projects that enhance the security posture of KPMG
- Identify trends, potential new technologies, and emerging threats, which may impact KPMG
- Review and prioritise alerts based on Standard Operating Procedures
- Review and triage suspected security events reported by staff members or Security Monitoring platforms
- Accurately document work in Incident case management system as per defined standards
- Leverage multiple data sources to analyse detection alerts and staff reported cyber-attacks to identify which events require response activities based on Standard Operating Procedures
- Declare an incident and escalate it to Incident Response team, ensuring findings have been accurately captured in the Incident case management system as per defined standards
- Ensure that cases are accurately categorised to ensure the appropriate feedback is provided to the Detection and Response Engineering team and to facilitate reporting
- Identify and record gaps in visibility and security posture through the course of investigations as per defined Standard Operating Procedures
- Identify potential new detection logic and escalate to the Detection and Response Engineering team
- Hunt for threat indicators from log data and other available endpoint/network artefacts
What will you need to do it?
- Prior experience in Cyber Security
- Experience of working in a Security Operations Centre or Security Monitoring Team.
- Experience with managed security services and security consulting would be a plus
- Hands on SIEM and EDR tooling knowledge and experience including technologies such as Microsoft Sentinel, Microsoft Defender Suite etc.
- Experience in end-to-end information security incident management and mitigating and addressing threat vectors including Advanced Persistent Threat (APTs), Distributed Denial of Service (DDoS), Phishing, Malicious Payloads, Malware, etc
- Experience with Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Web Application, Firewalls, Firewall logs, systems logs, web logs, application logs and Security Information and Event Management (SIEM) systems
- Experience with technologies, tools, and process controls to minimise risk and data exposure.
- Experience in search query languages such as KQL, OSquery or SPL
- Solid experience of working in Cloud environments such as AWS, Azure, & GCP
- Experience with building threat-based Use Cases using frameworks such as MITRE ATT&CK
- Solid understanding of ISO 27001, Cyber Essentials/Essentials Plus, GDPR and other information security-related regulatory and compliance standards
- Understanding of security threats, attack scenarios, intrusion detection and incident management
- Ability to function effectively in a matrix structure
- Ability to deal with ambiguity and to keep a cool head when dealing with crisis or stressful situations
- Strong analytical skills
- Apply analytical rigor and demonstrate business acumen to understand complex business scenarios
- Fluent in English
Skills we’d love to see/Amazing Extras:
- Already holds, or can be SC cleared
- Bachelor’s degree in Computer Science or related field
- Information Security and/or Information Technology industry certification (CISSP, SANS GIAC, SC-200, AZ-500 or equivalent)
Our Locations:
With 20 sites across the UK, we can potentially facilitate office work, working from home, flexible hours, and part-time options. If you have a need for flexibility, please register and discuss this with our team.
Find out more:
Within Consulting we have a range of divisions and specialisms. Click the links to find out more below:
- Consulting at KPMG: www.kpmgcareers.co.uk/experienced-professional/consulting/
- ITs Her Future Women in Tech programme: www.kpmgcareers.co.uk/people-culture/it-s-her-future/
- KPMG Workability and Disability confidence: www.kpmgcareers.co.uk/experienced-professional/applying-to-kpmg/need-support-let-us-know/
For any additional support in applying, please click the links to find out more:
- Applying to KPMG: www.kpmgcareers.co.uk/experienced-professional/applying-to-kpmg/
- Tips for interview: www.kpmgcareers.co.uk/experienced-professional/applying-to-kpmg/application-advice/
- KPMG values: www.kpmgcareers.co.uk/experienced-professional/applying-to-kpmg/our-values/
- KPMG Competencies: www.kpmgcareers.co.uk/experienced-professional/applying-to-kpmg/kpmg-competencies/
KPMG Locations and FAQ: www.kpmgcareers.co.uk/faq/?category=Experienced+professionals
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics AWS Azure CISSP Cloud Compliance Computer Science DDoS EDR Firewalls GCP GDPR GIAC IDS Incident response Intrusion detection Intrusion prevention IPS ISO 27001 Malware MITRE ATT&CK Monitoring Network security SANS Sentinel SIEM SOC Threat detection Threat intelligence Vulnerabilities
Perks/benefits: Flex hours Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.