Senior Security Analyst - Information Security | EY Global Delivery Services

at  EY

Capital Federal, Buenos Aires, Argentina -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate21 Jan, 2025Not Specified21 Oct, 20243 year(s) or aboveForensics,Scripting,Threat Analysis,Perl,Technology Platforms,Project Support,Python,Java,PowershellNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

CYBER TRIAGE AND FORENSICS – SECURITY ANALYST II

Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.

SKILLS AND ATTRIBUTES FOR SUCCESS

  • Information Security Principles, Technologies, and Practices
  • Demonstrable experience with multiple security event detection platforms
  • Thorough understanding of TCP/IP
  • Understand basic IDS / IPS rules to identify and/or prevent malicious activity
  • Demonstrated integrity in a professional environment
  • Good social, communication and technical writing skills
  • Comfortable navigating and troubleshooting Linux and Windows system issues
  • Ability to participate in detecting, investigating, and resolving security events
  • Capable of working independently
  • Identify and propose areas for improvement within the Cyber Triage and Forensics

The position requires the candidate have some knowledge of how malware behaves and other related cyber threats and implementing and maintaining security and analysis solutions for large enterprises, with knowledge on large scale threat analysis of event data from commercial and open-source infrastructure technology platforms

  • Respond to network and host-based security events
  • Participate in detecting, investigating, and resolving security events
  • Capable of working independently while supporting CTF Analyst I as necessary
  • Identify and propose areas for improvement within the Cyber Triage and Forensics
  • Provide documentation and project support
  • Act as second and/or third-tier support for the CTF Analyst I
  • Act as a peer group leader to help train support staff
  • Serve as an escalation point for difficult problems and complex inquiries
  • Server as shift lead when necessary
  • Conduct detailed security event analysis from network traffic attributes and host-based attributes (binary analysis, etc) to identify information security incidents
  • Provide feedback on security control capability gaps based off security intrusion trends
  • Develop and maintain analytical procedures to improve security incident identification efficiency
  • Demonstrate ability to drive process improvements and identify gap

Experience:

  • Minimum of 3-4 years of experience in one or more of the following:
  • Working in a Security Monitoring/Security Operations Center environment (SOC)
  • Experience investigating security events, threats and/or vulnerabilities
  • Understanding of electronic investigation and log correlation proficiency with the latest intrusion detection platforms; working knowledge of Linux and/or Windows systems administration (Including AD).
  • Scripting or programming (Shell scripting, Python, PowerShell,Perl, Java, etc.)
  • Conduct detailed security event analysis from network traffic attributes and host-based attributes (memory analysis, binary analysis, etc) to identify information security incident

Responsibilities:

YOUR KEY RESPONSIBILITIES

You will work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. The CTF Analyst II will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint.
The CTF Analyst II must be competent to work at a technical level, be capable of identifying threats and vectors that cause security events and be able to follow defined procedures for mitigating said threats.

The position requires the candidate have some knowledge of how malware behaves and other related cyber threats and implementing and maintaining security and analysis solutions for large enterprises, with knowledge on large scale threat analysis of event data from commercial and open-source infrastructure technology platforms

  • Respond to network and host-based security events
  • Participate in detecting, investigating, and resolving security events
  • Capable of working independently while supporting CTF Analyst I as necessary
  • Identify and propose areas for improvement within the Cyber Triage and Forensics
  • Provide documentation and project support
  • Act as second and/or third-tier support for the CTF Analyst I
  • Act as a peer group leader to help train support staff
  • Serve as an escalation point for difficult problems and complex inquiries
  • Server as shift lead when necessary
  • Conduct detailed security event analysis from network traffic attributes and host-based attributes (binary analysis, etc) to identify information security incidents
  • Provide feedback on security control capability gaps based off security intrusion trends
  • Develop and maintain analytical procedures to improve security incident identification efficiency
  • Demonstrate ability to drive process improvements and identify gaps

TO QUALIFY FOR THE ROLE YOU MUST HAVE

Bachelors in computer science, Information Systems, Information Security or 3-4 years of related work experience.

Experience:

  • Minimum of 3-4 years of experience in one or more of the following:
  • Working in a Security Monitoring/Security Operations Center environment (SOC)
  • Experience investigating security events, threats and/or vulnerabilities
  • Understanding of electronic investigation and log correlation proficiency with the latest intrusion detection platforms; working knowledge of Linux and/or Windows systems administration (Including AD).
  • Scripting or programming (Shell scripting, Python, PowerShell,Perl, Java, etc.)
  • Conduct detailed security event analysis from network traffic attributes and host-based attributes (memory analysis, binary analysis, etc) to identify information security incidents

Desired skill: Previous leadership experience as a team lead or supervisor.

As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer:

  • Continuous learning: You will develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way.
  • Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs


REQUIREMENT SUMMARY

Min:3.0Max:4.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Proficient

1

Capital Federal, Buenos Aires, Argentina