DFIR Incident Coordinator - Team Lead
United States Infra / Networks / Telecom
Job description
Join our Core Business Services (CBS) team and you will help support the important business enablement functions that keep our organization running strong. As a CBS professional, you will work across teams to provide the knowledge, resources and tools that help EY deliver exceptional quality service to our clients, win in the marketplace and support EY’s growth and profitability. Major teams within CBS include Finance, Information Technology, Human Resources, Enterprise Support Services, Brand Marketing and Communications, Business Development, Knowledge and Risk Management.
With so many offerings, you have the opportunity to develop your career through a broad scope of engagements, mentoring and formal learning. That’s how we develop outstanding leaders who team to deliver on our promises to all of our stakeholders, and in so doing, play a critical role in building a better working world for our people, for our clients and for our communities. Sound interesting? Well this is just the beginning. Because whenever you join, however long you stay, the exceptional EY experience lasts a lifetime.
Job summary:
The DFIR Incident Response Coordinator Team Lead will exercise strong incident management techniques to coordinate security incident response to cybersecurity events or incidents stemming from suspected internal or external threats while overseeing a global team of individuals fulfilling similar roles. Candidates for the role must have a strong comprehension of incident response plans and coordination of activities, work well with other people and have strong verbal and written communication skills, a sense of diplomacy, ability to anticipate obstacles, and decision-making skills to handle the fast-paced world of incident management. Foundational skills in incident response, incident management, chain of custody, forensics, event analysis, and hands on cyber security skills are essential. Prior experience in management mandatory.
Key responsibilities:
· Coordinate response efforts to cyber incidents caused by external threats that may involve nontraditional working hours
· Serve as a liaison to different businesses and interface with fellow team members and colleagues on other security teams. As-needed, manage relationships with business partners, management, vendors, and external parties
· Drive integration with other corporate incident management programs to ensure consistency and alignment with peer support teams within IT
· Help lead small to medium sized projects as directed by leadership
· Be a champion for process and documentation. Develop and document processes to ensure consistent and scalable response operations and ensure continuous improvement to the company s incident response plan
· As requested, develop and deliver metrics to leadership
· Create ready-to-go draft communications and ensure timely reports/updates to leadership during and after an event
· Own and manage the teams internal action playbooks and knowledgebase
· Managerial oversight of the global coordinator team
Knowledge, skills and experience requirements:
· Demonstrated integrity in a professional environment
· Global mind-set for working with different cultures and backgrounds
· Knowledgeable in business industry standard security incident response process, procedures, and life-cycle
· Excellent organizational skills and strong attention to detail
· Excellent teaming skills
· Excellent verbal and written communication skills and the ability to interact professionally with a diverse group, executives, managers, and subject matter experts
· Excellent customer service skills required
· Must be willing to be on-call off hours in rotation with other team members (Required)
· 2-3+ years of related cybersecurity architecture, engineering, or SOC work experience
· 5+ years of overall IT related experience
· Experience in managing a team of individuals in a similar capacity
· Deep understanding of security threats, vulnerabilities, and incident response
· Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis
· Be familiar with a basic understanding of legalities surrounding electronic discovery and analysis
Qualifications, certifications and education requirements:
· Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field
· Candidates must hold or be willing to pursue related professional certifications such as GCFE, GCFA, GCIH, CISM, or CISSP