Search by job, company or skills

EY

Security Operations Center Analyst (Tier 3)

new job description bg glownew job description bg glownew job description bg svg
  • Posted 26 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.

Be part of our global client network and play a critical role in building a better working world for our people, for our clients and for our communities.

The opportunity

We are looking for professional who are interested to build their career in Cyber Security as SOC Analyst Tier 3 responsible for handling advanced and high-severity incidents, threat hunting, and the continuous improvement of SOC detection capabilities. They serve as escalation points for Tier 1 and Tier 2 analysts and lead incident response for the most critical threats.

Your key responsibilities

  • Lead investigations into major security incidents and data breaches, coordinating with internal and external stakeholders as necessary.
  • Conduct proactive threat hunting activities using advanced analytics and threat intelligence.
  • Develop and implement advanced detection and response tools, rules, and automation.
  • Perform deep-dive forensic analysis on affected systems and networks.
  • Mentor and train Tier 1 and Tier 2 analysts on advanced security concepts and incident response techniques.
  • Collaborate with threat intelligence teams to contextualize and operationalize threat data.
  • Continuously assess and improve SOC processes, technologies, and detection methodologies.
  • Participate in and lead post-incident reviews and lessons-learned sessions.
  • Contribute to tabletop exercises and incident response simulations.
  • Support compliance and audit activities as required.

Skills and attributes for success

  • Proficient in Splunk SIEM
  • Expert-level knowledge of security monitoring tools, threat analysis, and digital forensics.
  • Proficiency in scripting and automation (Python, PowerShell, etc.).
  • Advanced understanding of cyber threat intelligence and TTPs (tactics, techniques, procedures).
  • Ability to lead and coordinate cross-functional response teams under pressure.
  • Strong written and verbal communication skills for technical and executive audiences.
  • Experience developing and improving SOC processes and technologies.

To qualify for the role, you must have

  • Minimum qualifications of Bachelor's Degree in Information Security/ Computer Science/ Information Technology or any other relevant courses
  • 47+ years in security operations, incident response, or a related cybersecurity field, with a track record of leading complex investigations.

Ideally, you also have

  • Advanced certifications (e.g., GIAC GCIA, GCFA, CISSP, OSCP) are highly preferred.

What we offer

EY offers a contractual employment with competitive remuneration package commensurate with your work experience, where you'll be rewarded for your individual and team performance. We are committed to being an inclusive employer with predictable flexibility at the workplace.

We also offer:

Continuous learning: You'll develop the mindset and skills to navigate whatever comes next.

Success as defined by you: We'll provide the tools and flexibility, so you can make a meaningful impact, your way.

Transformative leadership: We'll give you the insights, coaching and confidence to be the leader the world needs.

Diverse and inclusive culture: You'll be embraced for who you are and empowered to use your voice to help others find theirs.

The exceptional EY experience. It's yours to build.

EY | Building a better working world

More Info

Job Type:
Industry:
Employment Type:

About Company

Job ID: 140193529

Similar Jobs