Configure and tune cloud-native and third-party threat detection platforms across multi-cloud environments.
Configure and manage Web Application Firewalls (WAFs) to protect against OWASP Top 10 threats and emerging attack vectors.
Provide subject matter expertise during incident escalation and ability to triage and lead major incident manage calls related to potential availability investigations
Conduct deep packet inspection and network traffic analysis using tools like Wireshark, Tcpdump, and cloud-native telemetry.
Develop and implement bot detection and mitigation strategies using behavioral analytics and ML-based tools.
Align detection frameworks with MITRE ATT&CK, NIST SP 800-53, CIS Benchmarks, and CSA CCM.
Partner with SIEM and SOAR teams for automated alerting, investigation, and response.
Provide technical leadership and mentorship to SOC analysts and engineering teams.
Required Skills & Abilities:
Deep expertise in cloud security across AWS, Azure, GCP, and OCI.
Hands-on experience with WAFs (e.g., AWS WAF, Azure Front Door, Akamai, Imperva).
Proficiency in network traffic analysis and anomaly detection.
Strong understanding of bot behavior, detection techniques, and mitigation tools.
Familiarity with SIEM platforms (e.g., Splunk, Elastic, Sentinel) and SOAR tools (e.g., Tines, Cortex XSOAR).
Knowledge of threat intelligence platforms and integration strategies.
Experience with scripting (Python, Bash, PowerShell) for automation and data parsing.
Strong analytical and forensic investigation skills.
Excellent communication and documentation abilities.
Certifications such as GIAC Cloud Threat Detection (GCTD), GIAC Network Forensic Analyst (GNFA), Security specialization for major cloud platforms such as AWS, GCP, Azure, OCI.
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.