Cyber Triage Forensics Shift Lead - EY Global Delivery Services

CABA, B, AR, 1001

EY

Mit unseren vier integrierten Geschäftsbereichen — Wirtschaftsprüfung und prüfungsnahe Dienstleistungen, Steuerberatung, Unternehmensberatung und Strategy and Transactions — sowie unserem Branchenwissen unterstützen wir unsere Mandanten dabei,...

View all jobs at EY

Apply now Apply later

Cyber Triage and Forensics – Shift Lead 

Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. 

Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. 

The opportunity 

The CTF Shift Lead at EY plays a critical role in maintaining the efficiency and effectiveness of the Cyber Triage and Forensics team's daily operations. Tasked with managing the performance of Junior and Senior Triage Analysts, this position ensures that the team responds swiftly to threats and manages case queues effectively. The Shift Lead's involvement in analysis and triage, combined with their responsibility for setting performance expectations and providing technical leadership, is essential for upholding high standards of cybersecurity practices. Reporting to the global leadership team, the Shift Lead's insights and updates are vital for informed decision-making and strategic alignment within the organization's cybersecurity efforts. 

Your key responsibilities 

You will work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. The CTF Analyst II will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint.  

  • Manage day-to-day operations and performance of the CTF Analysts 

  • Ensure prompt and efficient response to email and case queues 

  • Distribute workload among the threat hunting team and oversee their activities 

  • Participate in the analysis and triage of security events 

  • Provide technical leadership and mentorship to junior analysts 

  • Set clear performance expectations and manage team performance 

  • Report case status and significant incident updates to the global lead 

  • Update Standard Operating Procedures (SOPs) and drive continuous improvement within the team 

  • Coordinate with the Technical Lead for incident and investigation support as needed 

Skills and attributes for success 

  • Familiarity with the principles of network and endpoint security, current threat and attack trends, and a basic understanding of the OSI model 

  • Working knowledge of Defense in depth strategies 

  • Understanding Information Security Principles, Technologies, and Practices 

  • Demonstrable experience with multiple security event detection platforms 

  • Thorough understanding of TCP/IP and basic IDS/IPS rules to identify and/or prevent malicious activity 

  • Demonstrated integrity in a professional environment 

  • Good social, communication, and technical writing skills 

  • Comfortable navigating and troubleshooting Linux and Windows system issues  

To qualify for the role you must have 

  • A Bachelor's degree in Computer Science, Information Systems, Information Security, or equivalent work experience (3-4 years). 

  • A minimum of 4-5 years of experience in a Security Monitoring/Security Operations Center environment (SOC), investigating security events, threats, and/or vulnerabilities. 

  • Understanding of electronic investigation and log correlation with proficiency in the latest intrusion detection platforms. 

  • Working knowledge of Linux and/or Windows systems administration, including Active Directory. 

  • Scripting or programming skills (Shell scripting, Python, PowerShell, Perl, Java, etc.).  

Ideally, you’ll also have 

  • Desired certifications such as SSCP, CEH, GCIH, GCFA, GCIA, GSEC, GIAC, Security+. 

  • Previous leadership experience as a team lead or supervisor  

What we offer 

As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: 

  • Continuous learning: You will develop the mindset and skills to navigate whatever comes next. 

  • Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. 

  • Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. 

  • Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. 

We ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application or interview process, to perform essential job functions and to receive other benefits and privileges of employment. Please contact us to request accommodations. 

EY is committed to being an inclusive employer, and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. 

If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. 

Make your mark.  

Apply now. 

  

  

  

  

  

  

 

 

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Active Directory Application security CEH Computer Science CTF Cyber defense Endpoint security Forensics GCFA GCIA GCIH GIAC GSEC IDS Intrusion detection IPS Java Linux Monitoring Perl PowerShell Python Scripting SOC SSCP Strategy TCP/IP Vulnerabilities Windows

Perks/benefits: Career development Flex hours Team events

Region: South America
Country: Argentina

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.