Cyber Defense Forensics Analyst III
Company: EY
Location: Richmond
Posted on: March 20, 2023
|
|
Job Description:
At EY, you'll have the chance to build a career as unique as you
are, with the global scale, support, inclusive culture and
technology to become the best version of you. And we're counting on
your unique voice and perspective to help EY become even better,
too. Join us and build an exceptional experience for yourself, and
a better working world for all.
EY Technology:
Technology has always been at the heart of what we do and deliver
at EY. We need technology to keep an organization the size of ours
working efficiently. We have 250,000 people in more than 140
countries, all of whom rely on secure technology to be able to do
their job every single day. Everything from the laptops we use, to
the ability to work remotely on our mobile devices and connecting
our people and our clients, to enabling hundreds of internal tools
and external solutions delivered to our clients. Technology
solutions are integrated in the client services we deliver and is
key to us being more innovative as an organization.
EY Technology supports our technology needs through three business
units:
Client Technology (CT) - focuses on developing new technology
services for our clients. It enables EY to identify new
technology-based opportunities faster and pursue those
opportunities more rapidly.
Enterprise Workplace Technology (EWT) - EWT supports our Core
Business Services functions and will deliver fit-for-purpose
technology infrastructure at the cheapest possible cost for quality
services. EWT will also support our internal technology needs by
focusing on a better user experience.
Information Security (Info Sec) - Info Sec prevents, detects,
responds and mitigates cyber-risk, protecting EY and client data,
and our information management systems.
The opportunity
Cyber Triage and Forensics (CTF) Incident Analyst will work as a
senior member of the technical team responsible for security
incident response for EY. The candidate will work as an escalation
point for suspect or confirmed security incidents. Responsibilities
include performing digital forensic analysis, following security
incident response best practices, malware analysis, identify
indicators of compromise, support remediation or coordinate
remediation efforts of a security incident, and develop
documentation to support the security incident response
process.
Your key responsibilities
Investigate, coordinate, bring to resolution, and report on
security incidents as they are escalated or identified
Forensically analyze end user systems and servers found to have
possible indicators of compromise
Analysis of artifacts collected during a security incident/forensic
analysis
Identify security incidents through 'Hunting' operations within a
SIEM and other relevant tools
Interface and communicate with server owners, system custodians,
and IT contacts to pursue security incident response activities,
including: obtaining access to systems, digital artifact
collection, and containment and/or remediation actions
Provide consultation and assessment on perceived security
threats
Maintain, manage, improve and update security incident process and
protocol documentation
Regularly provide reporting and metrics on case work
Resolution of security incidents by identifying root cause and
solutions
Analyze findings in investigative matters, and develop fact based
reports
Be on-call to deliver global incident response
Skills and attributes for success
Resolution of security incidents by identifying root cause and
solutions
Analyze findings in investigative matters, and develop fact-based
reports
Demonstrated integrity and judgment within a professional
environment
Ability to appropriately balance work/personal priorities
To qualify for the role, you must have
Bachelors or Masters Degree in Computer Science, Information
Systems, Engineering or a related field
5+ years experience in incident response, computer forensics
analysis and/or malware reverse engineering;
Understanding of security threats, vulnerabilities, and incident
response;
Understanding of electronic investigation, forensic tools, and
methodologies, including: log correlation and analysis,
forensically handling electronic data, knowledge of the computer
security investigative processes, malware identification and
analysis;
Be familiar with legalities surrounding electronic discovery and
analysis;
Experience with SIEM technologies (i.e. Splunk);
Deep understanding of both Windows and Unix/Linux based operating
systems;
Ideally, you'll also
Hold or be willing to pursue related professional certifications
such as GCFE, GCFA or GCIH
Background in security incident response in Cloud-based
environments, such as Azure
Programming skills in Powershell, Python and/or C/C++ Understanding
of the best security practices for network archtecture and server
configuration
What we look for
Demonstrated integrity in a professional environment
Ability to work independently
Have a global mind-set for working with different cultures and
backgrounds
Knowledgeable in business industry standard security incident
response process, procedures, and life-cycle
Excellent teaming skills
Excellent social, communication, and writing skills
What we offer
We offer a comprehensive compensation and benefits package where
you'll be rewarded based on your performance and recognized for the
value you bring to the business. The salary range for this job in
most geographic locations in the US is $87,200 to $158,200. The
salary range for New York City Metro Area, Washington State and
California (excluding Sacramento) is $104,600 to $179,00.
Individual salaries within those ranges are determined through a
wide variety of factors including but not limited to education,
experience, knowledge, skills and geography. In addition, our Total
Rewards package includes medical and dental coverage, pension and
401(k) plans, and a wide range of paid time off options. Under our
flexible vacation policy, you'll decide how much vacation time you
need based on your own personal circumstances. You'll also be
granted time off for designated EY Paid Holidays, Winter/Summer
breaks, Personal/Family Care, and other leaves of absence when
needed to support your physical, financial, and emotional
well-being.
--- Continuous learning: You'll develop the mindset and skills to
navigate whatever comes next.
--- Success as defined by you: We'll provide the tools and
flexibility, so you can make a meaningful impact, your way.
--- Transformative leadership: We'll give you the insights,
coaching and confidence to be the leader the world needs.
--- Diverse and inclusive culture: You'll be embraced for who you
are and empowered to use your voice to help others find theirs.
Please apply to this role only through the 'Apply' link (not
through the local office). Your application will then be routed to
the appropriate recruiting team
The exceptional EY experience. It's yours to build.
EY - Building a better working world
EY exists to build a better working world, helping to create
long-term value for clients, people and society and build trust in
the capital markets.
Enabled by data and technology, diverse EY teams in over 150
countries provide trust through assurance and help clients grow,
transform and operate.
Working across assurance, consulting, law, strategy, tax and
transactions, EY teams ask better questions to find new answers for
the complex issues facing our world today.
EY is an equal opportunity, affirmative action employer providing
equal employment opportunities to applicants and employees without
regard to race, color, religion, age, sex, sexual orientation,
gender identity/expression, national origin, protected veteran
status, disability status, or any other legally protected basis, in
accordance with applicable law.
Keywords: EY, Richmond , Cyber Defense Forensics Analyst III, Professions , Richmond, Virginia
Click
here to apply!
|