GMS Manager – Incident Response
Posted 5hrs ago
Employment Information
Report this job
Job expired or something wrong with this job?
Job Description
SOC IR Manager handling high-priority incidents at EY, leading a cybersecurity operations team on threat responses. Collaborating globally and mentoring team members in incident management.
Responsibilities:
- The Security Operations Center (SOC) IR Manager leads and handles complex and high-priority incidents
- Lead the response to high-severity incidents, coordinating with other teams as necessary
- Gather and preserve evidence, perform data collection, conduct a structured analysis of forensic data and present findings to stakeholders
- Work closely with other IT and security teams to address security incidents
- Conduct thorough investigations to determine the root cause of incidents
- Analyze and interpret packet captures using network protocol analyzers such as Wireshark and TCPdump
- Perform endpoint analysis, live response, and memory collection and analysis
- Proactively search for threats and vulnerabilities within the environment
- Stay updated on the latest security trends, threats, and technologies
- Analyze threat intelligence to identify potential risks
- Formulate response and recovery steps for security incidents
- Review and improve incident response processes and playbooks
- Document incidents, response actions, and lessons learned for future reference
- Prepare detailed incident reports and executive summaries for management and stakeholders
- Lead and manage incident response calls
- Lead post-incident reviews to assess the effectiveness of the response and identify areas for improvement
- Provide guidance and mentorship to incident responders
Requirements:
- Experience with digital forensics tools and techniques to investigate incidents
- Proficient in utilizing SIEM solutions such as Splunk, Microsoft Sentinel, LogScale, Google Chronicle, IBM QRadar, or equivalent tools for effective incident response and analysis
- Experienced in leveraging EDR/XDR solutions like CrowdStrike, Microsoft Defender, SentinelOne, Cortex XSIAM, Carbon Black, or similar platforms
- Understanding of security principles, techniques, and technologies such as SANS Top 20 Critical Security Controls and OWASP Top 10
- In-depth knowledge of network protocols, operating systems, and security technologies
- Proficiency in incident detection and response tools
- Familiarity with malware analysis and reverse engineering
- Proficiency in scripting languages (e.g., Python, PowerShell) for automating tasks and processes
- Ideal candidate will have 8+ years of security related experience in areas such Security Operations, Incident Response, and Forensic Investigation
- Analytical mindset & has the aptitude to learn on the fly
- Strong problem-solving abilities to analyze complex incidents
- Excellent verbal and written communication skills
- Ideally, you’ll also have Bachelor’s Degree relevant to Information Technology
- Related Certification such as CEH, CHFI, Sec+, ITILv3, GCFA, ECIH, GCIH, CySA+, etc
Benefits:
- Support, coaching and feedback from some of the most engaging colleagues around
- Opportunities to develop new skills and progress your career
- The freedom and flexibility to handle your role in a way that’s right for you



















