Cyber SDC - Attack Surface Monitoring Analyst - Senior - Consulting - Location OPEN
Dallas, TX, US, 75219
EY
Mit unseren vier integrierten Geschäftsbereichen — Wirtschaftsprüfung und prüfungsnahe Dienstleistungen, Steuerberatung, Unternehmensberatung und Strategy and Transactions — sowie unserem Branchenwissen unterstützen wir unsere Mandanten dabei,...In an ever-evolving IT landscape, EY stands as a beacon of trust for clients across diverse industries seeking reliable solutions to address their intricate risks and vulnerabilities. As a vital member of our Cloud Security team, you will play a central role in achieving this objective by empowering clients to comprehend and navigate their complex Enterprise Identity environments. Your expertise will be instrumental in evaluating, enhancing, and devising innovative solutions, processes, and policies to cater to each client's unique IAM requirements. This is an opportunity to leverage both your technical prowess and business acumen to drive our mission and make a significant impact on global cybersecurity.
The opportunity
We are seeking an experienced Attack Surface Monitoring professional to join our cybersecurity team as a Lead Engineer. The ideal candidate will be responsible for identifying and managing the attack surface of our organization through comprehensive monitoring and analysis. This role requires a strong understanding of open-source intelligence (OSINT) and reconnaissance techniques, as well as the ability to conduct thorough assessments of externally accessible resources.
Your Key Responsibilities
- Conduct regular OSINT and reconnaissance activities to discover externally accessible resources related to the organization.
- Perform manual reviews of discovered assets to confirm their validity as company-owned resources.
- Collaborate with internal teams to ensure accurate identification and classification of assets.
- Execute port scans, service discovery, and low-impact vulnerability scans against identified resources.
- Analyze scan results to identify potential vulnerabilities and security weaknesses.
- Conduct manual verification of discovered vulnerabilities to ensure accuracy and relevance.
- Compile a technical report of verified vulnerabilities.
Skills and Attributes for Success
- Proven experience in cybersecurity, specifically in attack surface monitoring, penetration testing and vulnerability management.
- Strong knowledge of OSINT techniques and reconnaissance methodologies.
- Proficiency in network scanning tools and vulnerability assessment frameworks.
- Excellent analytical and problem-solving skills.
- Excellent documentation skills of technical findings and vulnerabilities.
To qualify for the role you must have
- A bachelor's degree in a related field and approximately 4 years of related work experience; or a graduate degree and approximately 3 years of related work experience.
- Experience in executing attack surface monitoring, penetration testing or vulnerability management projects
- Updated knowledge of the latest exploits and security trends.
- Well-versed and hands-on experience with OSINT techniques and vulnerability scanners.
- A valid driver's license in the US and/or a valid passport are required; Willingness and ability to travel
Ideally, you’d also have
- Knowledge of Windows, Linux, Unix, any other major operating systems.
- Certifications such as OSCP, OSWP, GPEN, GWAPT, OSCE, OSEE, GXPN, CISSP, CISM, PMP, CREST Certified Simulated Attack Manager
- Experience with scripting languages (e.g., Python, Bash) for automation of tasks.
- Familiarity with the latest exploits, tactics, techniques and procedures (TTP), vulnerability remediation and security trends for OSINT, network and web applications
- Understanding of network security and popular attacks vectors.
- Understanding of web-based application vulnerabilities (OWASP Top 10).
- Strong analytical and problem-solving abilities.
- Excellent communication skills, both written and verbal.
- Ability to work collaboratively in a team environment.
What we look for
We’re interested in intellectually curious people with a genuine passion for cyber security. With your broad exposure across ASM, we’ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us – but also to the industry at large. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
What we offer We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $73,100 to $132,900. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $87,600 to $151,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
Tags: ASM Automation Bash CISM CISSP Cloud CREST Exploits GPEN GWAPT GXPN IAM Linux Monitoring Network security OSCE OSCP OSEE OSINT OSWP OWASP Pentesting Python Scripting Strategy Travel UNIX Vulnerabilities Vulnerability management Vulnerability scans Windows
Perks/benefits: Career development Flex hours Flex vacation Health care
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.