Cyber Incident Response - Junior Incident Coordinator
Alpharetta, GA, US, 30009
EY
Mit unseren vier integrierten Geschäftsbereichen — Wirtschaftsprüfung und prüfungsnahe Dienstleistungen, Steuerberatung, Unternehmensberatung und Strategy and Transactions — sowie unserem Branchenwissen unterstützen wir unsere Mandanten dabei,...EY Technology:
Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization.
EY Technology supports our technology needs through three business units:
Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster and pursue those opportunities more rapidly.
Enterprise Workplace Technology (EWT) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience.
Information Security (InfoSec) - InfoSec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems.
The opportunity
The Cyber & Investigative Services (CIS) Junior Incident Coordinator will exercise strong incident management techniques to coordinate security incident response to cybersecurity events or incidents stemming from suspected threats. Candidates for the role must have a strong comprehension of incident response plans and coordination of activities, work well with others, and have strong verbal and written communication skills. Including, a sense of diplomacy, ability to anticipate obstacles, and decision-making skills to handle the fast-paced world of incident management. Foundational skills in incident response, incident management, chain of custody, forensics, event analysis, and hands on cybersecurity skills are essential.
Your key responsibilities
- Coordinate response efforts to cyber incidents caused by external threats that may involve nontraditional working hours
- Serve as a liaison to different businesses and interface with fellow team members and colleagues on other security teams. As-needed, manage relationships with business partners, management, vendors, and external parties
- Drive integration with other corporate incident management programs to ensure consistency and alignment with peer support teams within IT
- Help lead small to medium sized projects as directed by leadership
- Be a champion for process and documentation. Develop and document processes to ensure consistent and scalable response operations, and ensure continuous improvement to the company’s incident response plan
- As requested, develop and deliver metrics to leadership
- Create ready-to-go draft communications and ensure timely reports/updates to leadership during and after an event
- Own and manage the teams internal action playbooks and knowledgebase
- Must be willing to be on-call off hours in rotation with other team members (Required)
Skills and attributes for success
- Resolution of security incidents by validating root cause and solutions
- Analyze findings in investigative matters, and develop fact-based reports
- Ability to identify and articulate opportunities for improvement while helping drive lessons learned activities
- Demonstrated integrity and judgment within a professional environment
- Inquisitive approach to analysis and peer review
- Application of emotional intelligence and calm under pressure
- Ability to appropriately balance work/personal priorities
To qualify for the role, you must have
- Education:
- Bachelors or Masters Degree in Computer Science, Information Systems, Engineering, a related field, or equivalent experience
- Experience:
- 5+ years’ experience in at least two of the following roles:
- Member of a Security Operations Center (SOC)
- Security Incident Response Analyst or supporting function (2 years minimum)
- eDiscovery or related role performing forensic functions
- Deep understanding of security threats, vulnerabilities, and incident response
- Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis
- Be familiar with a basic understanding of legalities surrounding electronic discovery and analysis
- Understanding of regulatory stipulations regarding security incidents
- Experience with SIEM technologies (i.e. Splunk)
- Deep understanding of both Windows and Unix/Linux based operating systems
- 5+ years’ experience in at least two of the following roles:
Ideally, you’ll also
- Candidates must hold or be willing to pursue related professional certifications such as GCFE, GCFA, GCIH, CISA, CISM, CISSP, or CCIM
What we look for
- Demonstrated integrity in a professional environment
- Ability to work independently
- Have a global mind-set for working with different cultures and backgrounds
- Knowledgeable in business industry standard security incident response process, procedures, and life-cycle
- Excellent organizational skills and strong attention to detail
- Excellent teaming skills
- Excellent social, communication, and writing skills
- Excellent customer service skills required
We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
Tags: CISA CISM CISSP Computer Science Forensics GCFA GCFE GCIH Incident response Linux Malware SIEM SOC Splunk Strategy UNIX Vulnerabilities Windows
Perks/benefits: Career development Flex hours Flex vacation Health care Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.