EY

Security Operations Center Analyst (Tier 3)

Posted: just now

Job Description

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.Be part of our global client network and play a critical role in building a better working world for our people, for our clients and for our communities.The opportunityWe are looking for professional who are interested to build their career in Cyber Security as SOC Analyst Tier 3 responsible for handling advanced and high-severity incidents, threat hunting, and the continuous improvement of SOC detection capabilities. They serve as escalation points for Tier 1 and Tier 2 analysts and lead incident response for the most critical threats. Your key responsibilitiesLead investigations into major security incidents and data breaches, coordinating with internal and external stakeholders as necessary.Conduct proactive threat hunting activities using advanced analytics and threat intelligence.Develop and implement advanced detection and response tools, rules, and automation.Perform deep-dive forensic analysis on affected systems and networks.Mentor and train Tier 1 and Tier 2 analysts on advanced security concepts and incident response techniques.Collaborate with threat intelligence teams to contextualize and operationalize threat data.Continuously assess and improve SOC processes, technologies, and detection methodologies.Participate in and lead post-incident reviews and lessons-learned sessions.Contribute to tabletop exercises and incident response simulations.Support compliance and audit activities as required. Skills and attributes for successProficient in Splunk SIEMExpert-level knowledge of security monitoring tools, threat analysis, and digital forensics.Proficiency in scripting and automation (Python, PowerShell, etc.).Advanced understanding of cyber threat intelligence and TTPs (tactics, techniques, procedures).Ability to lead and coordinate cross-functional response teams under pressure.Strong written and verbal communication skills for technical and executive audiences.Experience developing and improving SOC processes and technologies.To qualify for the role, you must haveMinimum qualifications of Bachelor’s Degree in Information Security/ Computer Science/ Information Technology or any other relevant courses4–7+ years in security operations, incident response, or a related cybersecurity field, with a track record of leading complex investigations.Ideally, you also have Advanced certifications (e.g., GIAC GCIA, GCFA, CISSP, OSCP) are highly preferred.What we offerEY offers a contractual employment with competitive remuneration package commensurate with your work experience, where you’ll be rewarded for your individual and team performance. We are committed to being an inclusive employer with predictable flexibility at the workplace.We also offer: Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs. The exceptional EY experience. It’s yours to build. EY | Building a better working world

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In