CIS Junior Incident Coordinator

5 - 8 years

5 - 8 Lacs

Posted:1 week ago| Platform: Foundit logo

Apply

Skills Required

Work Mode

Remote

Job Type

Full Time

Job Description

Cyber & Investigative Services Junior Incident Coordinator

EY Technology:

Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day.Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients.Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization.

EY Technology

Client Technology (CT)

Enterprise Workplace Technology (EWT)

Information Security (InfoSec)

The opportunity

The Cyber & Investigative Services (CIS) Junior Incident Coordinator will exercise strong incident management techniques to coordinate security incident response to cybersecurity events or incidents stemming from suspected threats.Candidates for the role must have a strong comprehension of incident response plans and coordination of activities, work well with others, and have strong verbal and written communication skills. Including, a sense of diplomacy, ability to anticipate obstacles, and decision-making skills to handle the fast-paced world of incident management. Foundational skills in incident response, incident management, chain of custody, forensics, event analysis, and hands on cybersecurity skills are essential.

Your key responsibilities

  • Coordinate response efforts to cyber incidents caused by external threats that may involve nontraditional working hours
  • Serve as a liaison to different businesses and interface with fellow team members and colleagues on other security teams. As-needed, manage relationships with business partners, management, vendors, and external parties
  • Drive integration with other corporate incident management programs to ensure consistency and alignment with peer support teams within IT
  • Help lead small to medium sized projects as directed by leadership
  • Be a champion for process and documentation. Develop and document processes to ensure consistent and scalable response operations, and ensure continuous improvement to the company's incident response plan
  • As requested, develop and deliver metrics to leadership
  • Create ready-to-go draft communications and ensure timely reports/updates to leadership during and after an event
  • Own and manage the teams internal action playbooks and knowledgebase
  • Must be willing to be on-call off hours in rotation with other team members(Required)

Skills and attributes for success

  • Resolution of security incidents by validating root cause and solutions
  • Analyze findings in investigative matters, and develop fact-based reports
  • Ability to identify and articulate opportunities for improvement while helping drive lessons learned activities
  • Demonstrated integrity and judgment within a professional environment
  • Inquisitive approach to analysis and peer review
  • Application of emotional intelligence and calm under pressure
  • Ability to appropriately balance work/personal priorities

To qualify for the role, you must have

  • Education:
  • Bachelors or Masters Degree in Computer Science, Information Systems, Engineering, a related field, or equivalent experience
  • Experience:

  • 5+ years experience in at least two of the following roles:
  • Member of a Security Operations Center (SOC)
  • Security Incident Response Analyst or supporting function (2 years minimum)
  • eDiscovery or related role performing forensic functions
  • Deep understanding of security threats, vulnerabilities, and incident response
  • Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis
  • Be familiar with a basic understanding of legalities surrounding electronic discovery and analysis
  • Understanding of regulatory stipulations regarding security incidents
  • Experience with SIEM technologies (i.e. Splunk)
  • Deep understanding of both Windows and Unix/Linux based operating systems

Ideally, you'll also

  • Candidates must hold or be willing to pursue related professional certifications such as GCFE, GCFA, GCIH, CISA, CISM, CISSP, or CCIM

What we look for

  • Demonstrated integrity in a professional environment
  • Ability to work independently
  • Have a global mind-set for working with different cultures and backgrounds
  • Knowledgeable in business industry standard security incident response process, procedures, and life-cycle
  • Excellent organizational skills and strong attention to detail
  • Excellent teaming skills
  • Excellent social, communication, and writing skills
  • Excellent customer service skills required

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You

Mumbai City, Maharashtra, India

Bengaluru, Karnataka, India