Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

EY Government Public Sector - Service Delivery 
United States, Texas, San Antonio 
803234807

16.12.2024

The Service Delivery Center is made up of high-performing, US-based resources who work closely with our experienced professionals to deliver project-based work and managed services to our federal clients. The Service Delivery Center is a core component of the Government & Public Sector practice (GPS).

Cyber threats continue to evolve and pose serious risks within the business environment. Our Cybersecurity – NextGen Security Operations Center (SOC) services assist our clients to defend their environment and respond when threats are detected utilizing sophisticated tools available to fight against cybercrime

Your Key Responsibilities

The Senior Analyst provides seasoned cybersecurity troubleshooting, analysis, and technical expertise, oversees the work of junior team members, and serves as escalation point for more complex technical issues.

  • Provide technical guidance in NextGen SOC service operations and delivery to other junior members of the SDC team
  • Collaborate with on-site GPS NextGen SOC consultants in identifying process improvements, enhancing existing NextGen SOC solutions and operating NextGen SOC processes as required
  • Monitor progress and manage risk while ensuring stakeholders are kept informed about progress and expected outcomes
  • Leverage knowledge of industry trends to identify engagement and client service issues; communicate this information to the on-site engagement team through written correspondence and verbal presentations.
  • Additional responsibilities include the following areas:
    • Analyze persistent vulnerabilities, perform root cause analysis and investigate potential false positives
    • Perform configuration and deploy vulnerability scanning, dynamic application security scanners, and network assessment tools
    • Track vulnerabilities from discovery through remediation
    • Provide guidance to junior staff on vulnerability remediation, countermeasures, and risk mitigation
    • Responsible for full-spectrum incident response including event discovery, alert notification, investigation, facilitation of containment, facilitating of resolution, and event reporting
    • Perform the activities necessary for the immediate, short-term rapid resolution of incidents to minimize risk exposure and production down-time
    • Proactive monitoring of internal and external-facing environment using specialized security applications
    • Proactively research and monitor security-related information sources to aid in the identification of threats to client networks, systems and intellectual property
    • Use MITRE ATT&CK, VERIS, and Kill Chain concepts to develop, prioritize and execute threat hunting and attack and penetration scenarios relative to objectives.
    • Assess available data, relevant security controls/technologies and risk to develop a methodology to hunt for threats iteratively and repeatable

Skills and attributes for Success

  • Ability to produce high-quality work products within expected timeframes
  • Strong client and relationship building skills
  • Strong communications (both written and verbal) skills
  • Strong presentation skills
  • Leadership experience

To qualify for the role, you must have

  • Bachelor’s degree in a related field
  • Minimum of 3 years of related experience
  • CISSP, C|EH, Security+ or other relevant certification
  • Must be able to obtain and maintain a Secret-level clearance or higher
  • Must be willing to work in a 24/7 environment: 8 and 12 hour shift work – flexibility to be on call after hours, weekends and holidays
  • Experience in one or more of the following areas:
    • Troubleshooting, analysis, and technical expertise to resolve incidents and service requests
    • Troubleshooting day-to-day operational processes such as security monitoring, data correlation, security operations etc.
    • Analysis of security events and incidents, to determine root cause and provide resolution
    • Internal and external ticketing systems for ITIL-based incident, problem and change management
    • Common scripting languages (Python, Bash, PowerShell, etc.) or SQL
    • SIEM integration and dashboard development (e.g. Splunk, QRadar)
    • Security Orchestration and Automation technologies or development.
    • Integrating or implementing ITSM/ticketing systems solutions (e.g. Service Now, Remedy)
    • Common exploitation techniques and the applications of Common Weakness Enumeration (CWE) and Common Vulnerability Scoring System (CVSS)
    • Vulnerability scanning tools such as Qualys Vulnerability Management and Policy Compliance, Rapid7 Nexpose or InsightVM, Tenable Nessus or Security Center, etc.
  • Competence and experience of at least three of the following security tools: host-based antivirus, anti-spam gateway solutions, firewalls, IDS/IPS, server and network device hardening, data loss prevention, forensics software, vulnerability management, website security, cloud security
  • Working knowledge and experience with one or more of the following cybersecurity functional areas to include: Defense-in-depth, intelligence-driven strategies, vulnerability management, incident management, attack and penetration testing, configuration management, asset classification security operations, network systems, security principles, and application security
  • Flexibility to travel up to 20%

Ideally you’ll also have

  • Prior experience in a service delivery center or similar environment

What we offer
We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $73,100 to $132,900. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $87,600 to $151,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
  • Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
  • Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.