EY SOC Operations Analyst in Madison, Wisconsin
SOC Operations Analyst
Core Business Services
Requisition # UNI00IH8
Post Date Jun 18, 2021
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
From strategy to execution, the Government & Public Sector (GPS) practice of Ernst & Young LLP provides a full range of consulting and audit services to help our Federal, State, Local and Education clients implement new ideas to help achieve their mission outcomes. We deliver real change and measurable results through our diverse, high-performing teams, quality work at the highest professional standards, operational know-how from across our global organization, and creative and bold ideas that drive innovation. We enable our government clients to achieve their mission of protecting the nation and serving the people; increasing public safety; improving healthcare for our military, veterans and citizens; delivering essential public services; and helping those in need. EY is ready to help our government build a better working world.
Our GPS Technology Organization is a structure within the US GPS practice that implements and maintains a new operate and technology model designed specifically to support U.S. defense and Government engagements.
Under limited supervision, as the Security Operations Center (SOC) Analyst II, you will report to the US SOC Lead/Manager. You’ll work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. You’ll perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint. You should have familiarity with the principles of network and endpoint security, current threat and attack trends, a basic understanding of the OSI model, and have a working knowledge of defence in depth strategies.
You must be competent to work at a technical level, be capable of identifying threats and vectors that cause security events and be able to follow defined procedures for mitigating said threats. The position requires experience analysing malware and other related cyber threats and implementing and maintaining security and analysis solutions for large enterprises, with knowledge on large scale threat analysis of event data from commercial and open source infrastructure technology platforms
The GPS SOC team provides 24-hour coverage seven days a week. After an initial two weeks period for on-boarding, depending on the business need, you will be assigned to a Sunday – Wednesday or Wednesday – Saturday shift. Shifts run ten hours per day to facilitate issue hand-off.
Your key responsibilities
Respond to network and host-based security events
Participate in detecting, investigating, and resolving security events
Capable of working independently while supporting a SOC Analyst I as necessary
Identify and propose areas for improvement within the SOC
Provide documentation and project support
Act as second and/or third-tier support for the SOC Analyst I
Act as a peer group leader to help train support staff
Serve as an escalation point for difficult problems and complex inquiries
Server as shift lead when necessary
Conduct detailed security event analysis from network traffic attributes and host-based attributes (binary analysis, etc) to identify information security incidents
Provide feedback on security control capability gaps based of security intrusion trends
Develop and maintain analytical procedures to improve security incident identification efficiency
Demonstrate ability to drive process improvements and identify gaps
Opportunity to work remotely.
Skills and attributes for success
Information Security Principles, Technologies, and Practices
Proven experience with multiple security event detection platforms
Thorough understanding of TCP/IP
Understand basic IDS / IPS rules to identify and/or prevent malicious activity
Demonstrated integrity in a professional environment
Good social, communication and technical writing skills
Comfortable navigating and troubleshooting Linux and Windows system issues
To qualify for the role, you must have
Bachelor in Computer Science, Information Systems, Information Security or 3-4 years of related work experience
Minimum of 3-4 years of experience in one or more of the following:
Working in a Security Monitoring/Security Operations Center environment (SOC)
Experience investigating security events, threats and/or vulnerabilities
Understanding of electronic investigation and log correlation Proficiency with the latest intrusion detection platforms; working knowledge of Linux and/or Windows systems administration (Including AD)
Scripting or programming (Shell scripting, Python, PowerShell, Perl, Java, etc.)
Conduct detailed security event analysis from network traffic attributes and host-based attributes (memory analysis, binary analysis, etc) to identify information security incidents
Ability to obtain and maintain Top secret security clearance
Ideally, you’ll also have
Desired skill: Previous leadership experience as a team lead or supervisor.
Desired Certifications: GCIH, CEH, GCFA, GCIA, GSEC, GIAC, SSCP, Security What we look for
Individuals with strong business and technical acumen who demonstrate drive, vision, teaming and purpose and are passionate about helping our clients achieve their goals.
What we offer
We offer a competitive compensation package where you’ll be rewarded based on your performance and recognized for the value you bring to our business. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
The exceptional EY experience. It’s yours to build.
*EY | Building a better working world *
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
EY is an equal opportunity, affirmative action employer providing equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, national origin, protected veteran status, disability status, or any other legally protected basis, in accordance with applicable law.