Enable job alerts via email!

Cyber Incident Response - Incident Coordinator

EY

Cleveland (OH)

Hybrid

USD 90,000 - 120,000

Full time

8 days ago

Job summary

A leading global consulting firm is looking for a Cyber Incident Response - Incident Coordinator to manage incident responses to cybersecurity events. The ideal candidate will have 7+ years of experience in security incident response and a degree in Computer Science or a related field. Responsibilities include coordinating responses to incidents, integrating with management programs, and developing scalable processes. A hybrid work model is offered, with 40-60% in-person attendance required.

Benefits

Comprehensive benefits package
Flexible vacation policy
Support for personal and family leaves

Qualifications

  • 7+ years experience in SOC, Incident Response Analyst, or forensic roles.
  • Deep understanding of security threats and incident management.
  • Experience with regulatory stipulations and malware analysis.

Responsibilities

  • Coordinate response efforts to external cyber incidents.
  • Drive integration with other corporate incident management programs.
  • Develop and document processes for scalable response operations.

Skills

Incident response techniques
Verbal and written communication
Diplomacy and decision-making
Forensics and event analysis
Emotional intelligence under pressure

Education

Bachelor’s or Master’s Degree in Computer Science

Tools

SIEM technologies (e.g., Splunk)
Windows and Unix/Linux OS

Job description

Join to apply for the Cyber Incident Response - Incident Coordinator role at EY.

Get AI-powered advice on this job and more exclusive features.

At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.

EY Technology:

Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization.

EY Technology supports our technology needs through three business units:

  • Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster and pursue those opportunities more rapidly.
  • Enterprise Workplace Technology (EWT) – supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience.
  • Information Security (InfoSec) - prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems.

The opportunity

The Cyber & Investigative Services (CIS) Incident Coordinator will exercise strong incident management techniques to coordinate security incident response to cybersecurity events or incidents stemming from suspected threats. Candidates for the role must have a strong understanding of incident response plans and coordination of activities, work well with others, and have strong verbal and written communication skills. Including, a sense of diplomacy, ability to anticipate obstacles, and decision-making skills to handle the fast-paced world of incident management. Foundational skills in incident response, incident management, chain of custody, forensics, event analysis, and hands-on cybersecurity skills are essential.

Your Key Responsibilities

  1. Coordinate response efforts to cyber incidents caused by external threats that may involve nontraditional working hours
  2. Serve as a liaison to different businesses and interface with fellow team members and colleagues on other security teams. As-needed, manage relationships with business partners, management, vendors, and external parties
  3. Drive integration with other corporate incident management programs to ensure consistency and alignment with peer support teams within IT
  4. Help lead small to medium sized projects as directed by leadership
  5. Be a champion for process and documentation. Develop and document processes to ensure consistent and scalable response operations, and ensure continuous improvement to the company’s incident response plan
  6. As requested, develop and deliver metrics to leadership
  7. Create ready-to-go draft communications and ensure timely reports/updates to leadership during and after an event
  8. Own and manage the teams internal action playbooks and knowledgebase
  9. Must be willing to be on-call off-hours in rotation with other team members (Required)

Skills And Attributes For Success

  • Resolution of security incidents by validating root cause and solutions
  • Analyze findings in investigative matters, and develop fact-based reports
  • Ability to identify and articulate opportunities for improvement while helping drive lessons learned activities
  • Demonstrated integrity and judgment within a professional environment
  • Inquisitive approach to analysis and peer review
  • Application of emotional intelligence and calm under pressure
  • Ability to appropriately balance work/personal priorities

To qualify for the role, you must have

  • Education: Bachelor’s or Master’s Degree in Computer Science, Information Systems, Engineering, or related field, or equivalent experience
  • Experience: 7+ years’ experience in roles such as SOC member, Security Incident Response Analyst/support, or forensic functions. Deep understanding of security threats, incident response, electronic investigation, forensic tools, malware analysis, and familiarity with legalities and regulatory stipulations. Experience with SIEM technologies (e.g., Splunk), and both Windows and Unix/Linux OS.

Ideally, you’ll also

  • Hold or be willing to pursue certifications such as GCFE, GCFA, GCIH, CISA, CISM, CISSP, or CCIM

What We Look For

  • Integrity, independence, cultural awareness, organizational skills, teamwork, communication, customer service skills

What We Offer You

The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary ranges. At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more.

  • Reward based on performance, with a comprehensive benefits package including medical, dental, pension, 401(k), and paid time off.
  • Hybrid work model: most roles involve in-person work 40-60% of the time.
  • Flexible vacation policy and support for personal, family, and other leaves.

Are you ready to shape your future with confidence? Apply today.

EY accepts applications on an ongoing basis. For California residents, additional info is available. EY values high ethical standards and integrity, expecting all candidates to demonstrate these qualities.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs