GMS Manager – Incident Response

Posted 5hrs ago

Employment Information

Industry
Education
Salary
Experience
Job Type

Report this job

Job expired or something wrong with this job?

Job Description

SOC IR Manager handling high-priority incidents at EY, leading a cybersecurity operations team on threat responses. Collaborating globally and mentoring team members in incident management.

Responsibilities:

  • The Security Operations Center (SOC) IR Manager leads and handles complex and high-priority incidents
  • Lead the response to high-severity incidents, coordinating with other teams as necessary
  • Gather and preserve evidence, perform data collection, conduct a structured analysis of forensic data and present findings to stakeholders
  • Work closely with other IT and security teams to address security incidents
  • Conduct thorough investigations to determine the root cause of incidents
  • Analyze and interpret packet captures using network protocol analyzers such as Wireshark and TCPdump
  • Perform endpoint analysis, live response, and memory collection and analysis
  • Proactively search for threats and vulnerabilities within the environment
  • Stay updated on the latest security trends, threats, and technologies
  • Analyze threat intelligence to identify potential risks
  • Formulate response and recovery steps for security incidents
  • Review and improve incident response processes and playbooks
  • Document incidents, response actions, and lessons learned for future reference
  • Prepare detailed incident reports and executive summaries for management and stakeholders
  • Lead and manage incident response calls
  • Lead post-incident reviews to assess the effectiveness of the response and identify areas for improvement
  • Provide guidance and mentorship to incident responders

Requirements:

  • Experience with digital forensics tools and techniques to investigate incidents
  • Proficient in utilizing SIEM solutions such as Splunk, Microsoft Sentinel, LogScale, Google Chronicle, IBM QRadar, or equivalent tools for effective incident response and analysis
  • Experienced in leveraging EDR/XDR solutions like CrowdStrike, Microsoft Defender, SentinelOne, Cortex XSIAM, Carbon Black, or similar platforms
  • Understanding of security principles, techniques, and technologies such as SANS Top 20 Critical Security Controls and OWASP Top 10
  • In-depth knowledge of network protocols, operating systems, and security technologies
  • Proficiency in incident detection and response tools
  • Familiarity with malware analysis and reverse engineering
  • Proficiency in scripting languages (e.g., Python, PowerShell) for automating tasks and processes
  • Ideal candidate will have 8+ years of security related experience in areas such Security Operations, Incident Response, and Forensic Investigation
  • Analytical mindset & has the aptitude to learn on the fly
  • Strong problem-solving abilities to analyze complex incidents
  • Excellent verbal and written communication skills
  • Ideally, you’ll also have Bachelor’s Degree relevant to Information Technology
  • Related Certification such as CEH, CHFI, Sec+, ITILv3, GCFA, ECIH, GCIH, CySA+, etc

Benefits:

  • Support, coaching and feedback from some of the most engaging colleagues around
  • Opportunities to develop new skills and progress your career
  • The freedom and flexibility to handle your role in a way that’s right for you