Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

EY Cyber Triage Forensics Shift Lead 
India, Karnataka, Bengaluru 
155681975

11.03.2025

Your key responsibilities

  • You will work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. The CTF Analyst II will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint.
  • Manage day-to-day operations and performance of the CTF Analysts
  • Ensure prompt and efficient response to email and case queues
  • Distribute workload among the threat hunting team and oversee their activities
  • Participate in the analysis and triage of security events
  • Provide technical leadership and mentorship to junior analysts
  • Set clear performance expectations and manage team performance
  • Report case status and significant incident updates to the global lead
  • Update Standard Operating Procedures (SOPs) and drive continuous improvement within the team
  • Coordinate with the Technical Lead for incident and investigation support as needed

Skills and attributes for success

  • Familiarity with the principles of network and endpoint security, current threat and attack trends, and a basic understanding of the OSI model
  • Working knowledge of Defense in depth strategies
  • Understanding Information Security Principles, Technologies, and Practices
  • Demonstrable experience with multiple security event detection platforms
  • Thorough understanding of TCP/IP and basic IDS/IPS rules to identify and/or prevent malicious activity
  • Demonstrated integrity in a professional environment
  • Good social, communication, and technical writing skills
  • Comfortable navigating and troubleshooting Linux and Windows system issues
  • To qualify for the role you must have
  • A Bachelor's degree in Computer Science, Information Systems, Information Security, or equivalent work experience (3-4 years).
  • A minimum of 4-5 years of experience in a Security Monitoring/Security Operations Center environment (SOC), investigating security events, threats, and/or vulnerabilities.
  • Understanding of electronic investigation and log correlation with proficiency in the latest intrusion detection platforms.
  • Working knowledge of Linux and/or Windows systems administration, including Active Directory.
  • Scripting or programming skills (Shell scripting, Python, PowerShell, Perl, Java, etc.).

Ideally, you’ll also have

  • Desired certifications such as SSCP, CEH, GCIH, GCFA, GCIA, GSEC, GIAC, Security+.
  • Previous leadership experience as a team lead or supervisor

What we offer

As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer:

  • Continuous learning: You will develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way.
  • Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs.



EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.