Salary $120,600 - $198,800 a year
Full job description
At ey, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of youAnd we’re counting on your unique voice and perspective to help ey become even better, tooJoin us and build an exceptional experience for yourself, and a better working world for all.
From strategy to execution, the government & public sector (gps) practice of ernst & young llp provides a full range of consulting and audit services to help our federal, state, local and education clients implement new ideas to help achieve their mission outcomesWe deliver real change and measurable results through our diverse, high-performing teams, quality work at the highest professional standards, operational know-how from across our global organization, and creative and bold ideas that drive innovationWe enable our government clients to achieve their mission of protecting the nation and serving the people; increasing public safety; improving healthcare for our military, veterans and citizens; delivering essential public services; and helping those in needEy is ready to help our government build a better working world.
Our gps technology organization is a structure within the us gps practice that implements and maintains a new operate and technology model designed specifically to support u.sDefense and government engagements.
As the digital forensics & incident response (dfir) lead, you’ll exercise strong incident management techniques to coordinate security incident response to information security events or incidents stemming from suspected internal or external threats.
Your key responsibilities
Acquire/collect computer artifacts (e.g., malware, system/user logs, data artifacts) in support of cyber defense engagements
Triage system assets and determine evidentiary value
Correlate forensic findings to network events in support of developing an intrusion narrative
Collect and document system state information (e.gRunning processes, network connections)
Perform forensic triage of an incident to include determining scope, urgency and potential impact
Track and document forensic analysis from initial participation through resolution
Collect, process, preserve, analyze and present computer related evidence while maintaining chain of custody requirements
Coordinate with gps enclave staff and enclave support personnel to validate/investigate alerts or additional preliminary findings
Conduct analysis of forensic images, and available evidence in support of forensic write-ups for inclusion in reports and written products
Assist to document and publishing computer network defense (cnd) guidance and reports pertaining to incident findings
The role will likely be 100% remote and require <10% travel
Occasional weekend and off hours work to support the businessIt will also require a rotational on-call schedule
Skills and attributes for success
Demonstrated integrity and judgment within a professional environment
Ability to appropriately balance work/personal priorities
Ability to work independently
Have a global mind-set for working with different cultures and backgrounds
Knowledgeable in business industry standard security incident response process, procedures, and life-cycle
Excellent organizational skills and strong attention to detail
Excellent teaming skills
Excellent social, communication, and writing skills
Excellent customer service skills required
Strong comprehension of incident response plans and coordination of activities
Foundational skills in incident response, incident management, chain of custody, forensics, event analysis
Hands on cyber security skills
Sense of diplomacy
Ability to anticipate obstacles
Decision-making skills to handle the fast-paced world of incident management
To qualify for the role, you must have
Bachelors or masters degree in computer science, information systems, engineering or a related field or a hs diploma and 4-6 years of host or digital forensics experience
7 years of direct relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools
In depth understanding of saas, paas and iaas in the cloud environment
Ability to create forensically sound duplicates of evidence (forensic images)
Ability to author cyber investigative reports documenting digital forensics findings
Proficiency with analysis and characterization of cyber-attacks
Proficiency with proper evidence handing procedures and chain of custody protocols
Skilled in identifying different classes of attacks and attack stages (mitre att&ck)
Understanding of system and application security threats and vulnerabilities
Understanding of proactive analysis of systems and networks, to include creating trust levels of critical resources
Able to work collaboratively across physical and virtual locations
Action-oriented and have a proactive approach to problem solving
Proficiency with windows os.
Ability to obtain and maintain top secret security clearance
Must present verification that you have been fully vaccinated for covid-19 before your start dateIf you are not able to be vaccinated because of a medical condition or disability or because of a sincerely held religious belief, an accommodation will be considered upon request.
Ideally, you’ll also
Ability to provide knowledge of strategies/architectures involved in implementing m365/azure authentication with respect to nist 800-171 and/or cmmc l3 controls
Advanced experience and proficiency across various aspects of it operations (e.gNetworking, virtualization, identity, security, business continuity, disaster recovery, data management, governance)
Experience and understanding in acquisition, processing and analysis of digital evidence from cloud native platforms
Fundamental understanding of apis and proficiency with powershell/powershell modules leveraged to conduct api queries as they relate to azure/m365
Proficiency with scripting languages (e.gBash, python, powershell, js) for automation of hunt tools used in commercial cloud environments
Ability to develop tools, architecture and configurations in azure environment to support identifying threat actor activity
Understanding of azure administration, m365 administration and/or development/devops, with advanced level skills in at least one of these domains
Understand of how azure/m365 platform protection is implemented and what security operations features are made available
Fundamental understanding of nist 800-171 and cmmc level 3 security controls
One or more of the following certifications
Ence, ftk, cce, cfce, cissp, kubernetes security specialist-az-900: azure fundamentals
Az-500: azure security technologies
Az-303: azure architect technologies
Az-304: azure architect design
Az-104: azure administrator
Sans sec504: hacker tools, techniques, exploits, and incident handling
Sans sec401: security essentials - network, endpoint, and cloud
Sans sec 510, public cloud security: aws, azure, and gcp
Sans for509: enterprise cloud forensics and incident response
Sans sec 541: cloud monitoring and threat detection
Sans sec588: cloud penetration testing
What we look for
Individuals with strong business and technical acumen who demonstrate drive, vision, teaming and purpose and are passionate about helping our clients achieve their goals.
What we offer
We offer a competitive compensation package where you’ll be rewarded based on your performance and recognized for the value you bring to our businessIn addition, our total rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off optionsUnder our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstancesYou’ll also be granted time off for designated ey paid holidays, winter/summer breaks, personal/family care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
Continuous learning: you’ll develop the mindset and skills to navigate whatever comes next.
Success as defined by you: we’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
Transformative leadership: we’ll give you the insights, coaching and confidence to be the leader the world needs.
Diverse and inclusive culture: you’ll be embraced for who you are and empowered to use your voice to help others find theirs.
Denver salary range: $120,600 - 198,800
Hartford salary range: $120,600 - 198,800
Stamford salary range: $132,600 - 218,800
Las vegas salary range: $120,600 - 198,800
If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
The exceptional ey experienceIt’s yours to build.
Ey | building a better working world
Ey exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
Enabled by data and technology, diverse ey teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
Working across assurance, consulting, law, strategy, tax and transactions, ey teams ask better questions to find new answers for the complex issues facing our world today.
Ey is an equal opportunity, affirmative action employer providing equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, national origin, protected veteran status, disability status, or any other legally protected basis, in accordance with applicable law.