LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

SOC L2 Analyst - Cybersecurity Technology Consulting

at Ernst & Young

Back to all Cybersecurity jobs
Ernst & Young logo
Big Four

SOC L2 Analyst - Cybersecurity Technology Consulting

at Ernst & Young

JuniorNo visa sponsorshipCybersecurity

Posted 5 days ago

No clicks

Compensation
Not specified IDR

Currency: IDR

City
Not specified
Country
Indonesia

Join EY as a SOC L2 Analyst within Cybersecurity Technology Consulting to monitor, investigate, and respond to security incidents for client environments. You will assess incident severity, manage response efforts, and conduct in-depth analysis of security alerts. You will maintain awareness of the current threat landscape, participate in post-incident reviews, and provide recommendations to improve detection and response capabilities. You will mentor junior analysts and collaborate with cross-functional teams to strengthen the organization's security posture.

Key Responsibilities:

  • Assisting clients with monitoring, investigation and response to security incidents.
  • Effectively assess security incidents, determine their severity level, and manage response efforts with efficiency and precision.
  • Conduct research, analysis, and investigation of security alerts
  • Maintain a comprehensive awareness of the current threat landscape, including malware, phishing attacks, and advanced persistent threats (APTs).
  • Actively participate in post-incident reviews to identify lessons learned and recommend improvements to processes and technologies.
  • Provide feedback and recommendations to enhance detection and response capabilities
  • Participate in continuous improvement of security operations processes and toolsets
  • Provide guidance and leadership to the team during critical situations, ensuring effective decision-making and response.
  • Foster collaboration with cross-functional teams to enhance the overall security posture of the organization.
  • Mentor and train junior analysts, sharing knowledge and best practices to strengthen team capabilities.

 

Requirements:

  • Bachelor's degree in Computer Science, Information Technology, or a related field
  • Preferably 2+ years of experience in a Security Operations Center (SOC) or related cybersecurity role
  • Demonstrated ability to analyze, triage and remediate security incidents.
  • Moderate knowledge in SIEM tools such as Splunk, Microsoft Sentinel or similar platforms, along with a solid understanding of various log sources and their functions.
  • Moderate knowledge of security related technologies and their functions (Firewall, VPN, IDS/IPS, EDR, WAF, etc.)
  • Experience in developing SOC use cases in SIEM to correlate diverse logs, including the creation of new monitoring use case logic and enabling effective investigation of security alerts and incidents.
  • Experience in conducting investigations across various environments, including endpoints, networks, web applications, databases, and cloud resources
  • Moderate knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.)
  • Knowledge of Cyber Threat Intelligence, including the analysis of intelligence alerts, threat hunting, and providing actionable recommendations.

SOC L2 Analyst - Cybersecurity Technology Consulting

at Ernst & Young

Back to all Cybersecurity jobs
Ernst & Young logo
Big Four

SOC L2 Analyst - Cybersecurity Technology Consulting

at Ernst & Young

JuniorNo visa sponsorshipCybersecurity

Posted 5 days ago

No clicks

Compensation
Not specified IDR

Currency: IDR

City
Not specified
Country
Indonesia

Join EY as a SOC L2 Analyst within Cybersecurity Technology Consulting to monitor, investigate, and respond to security incidents for client environments. You will assess incident severity, manage response efforts, and conduct in-depth analysis of security alerts. You will maintain awareness of the current threat landscape, participate in post-incident reviews, and provide recommendations to improve detection and response capabilities. You will mentor junior analysts and collaborate with cross-functional teams to strengthen the organization's security posture.

Key Responsibilities:

  • Assisting clients with monitoring, investigation and response to security incidents.
  • Effectively assess security incidents, determine their severity level, and manage response efforts with efficiency and precision.
  • Conduct research, analysis, and investigation of security alerts
  • Maintain a comprehensive awareness of the current threat landscape, including malware, phishing attacks, and advanced persistent threats (APTs).
  • Actively participate in post-incident reviews to identify lessons learned and recommend improvements to processes and technologies.
  • Provide feedback and recommendations to enhance detection and response capabilities
  • Participate in continuous improvement of security operations processes and toolsets
  • Provide guidance and leadership to the team during critical situations, ensuring effective decision-making and response.
  • Foster collaboration with cross-functional teams to enhance the overall security posture of the organization.
  • Mentor and train junior analysts, sharing knowledge and best practices to strengthen team capabilities.

 

Requirements:

  • Bachelor's degree in Computer Science, Information Technology, or a related field
  • Preferably 2+ years of experience in a Security Operations Center (SOC) or related cybersecurity role
  • Demonstrated ability to analyze, triage and remediate security incidents.
  • Moderate knowledge in SIEM tools such as Splunk, Microsoft Sentinel or similar platforms, along with a solid understanding of various log sources and their functions.
  • Moderate knowledge of security related technologies and their functions (Firewall, VPN, IDS/IPS, EDR, WAF, etc.)
  • Experience in developing SOC use cases in SIEM to correlate diverse logs, including the creation of new monitoring use case logic and enabling effective investigation of security alerts and incidents.
  • Experience in conducting investigations across various environments, including endpoints, networks, web applications, databases, and cloud resources
  • Moderate knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.)
  • Knowledge of Cyber Threat Intelligence, including the analysis of intelligence alerts, threat hunting, and providing actionable recommendations.