
Specialist, SOC
at KPMG
Posted 6 days ago
No clicks
- Compensation
- Not specified USD
- City
- Not specified
- Country
- United States
Currency: $ (USD)
Monitor security alerts in real-time using SIEM and other tools, triage incidents, investigate root causes, and coordinate remediation with cross-functional teams. Analyze network traffic and logs to identify threats, create detailed incident reports, and provide actionable insights. Stay current on threats and best practices while contributing to security procedures and training. This role emphasizes integrity, teamwork, and client communications in a dynamic advisory environment.
The KPMG Advisory practice is at the forefront of transformation, offering excellent opportunities for individuals to advance their careers and expertise with KPMG. Looking ahead, we anticipate continued evolution and success within the practice, fostering both personal and professional development, thereby creating new pathways for growth. In this ever-changing market environment, our professionals must be adaptable and thrive in a collaborative, team-driven culture. At KPMG, our people are our number one priority. With a wealth of learning and career development opportunities, a world-class training facility, and leading market tools, we help our people continue to grow both professionally and personally. If you're looking for a firm with a strong team connection where you can be your whole self, have an impact, advance your skills, deepen your experiences, and have the flexibility and access to constantly find new areas of inspiration and expand your capabilities, then consider a career in Advisory.
KPMG is currently seeking a Specialist, SOC to join our Managed Services practice.
- Monitor security alerts, events, and incidents in real-time using Security Information and Event Management (SIEM) and other security tools, and perform initial triage of security alerts by assessing severity, relevance, and urgency to determine the appropriate response
- Investigate security incidents, identify potential root causes, perform remediation actions, assist in developing mitigation strategies, and follow playbooks and reference guides during case triage and incident investigations
- Analyze network traffic, system logs, and other data sources to identify patterns and anomalies indicative of security threats, and review and report on the efficacy of security monitoring tools to ensure optimal performance and effectiveness
- Create detailed incident reports, maintain accurate records of security incidents and their resolutions, and assist in preparing reports on security incidents, trends, and operational metrics ensuring transparency and actionable insights
- Collaborate with cross-functional teams, including incident responders and system administrators, to contain and remediate security incidents, and communicate effectively with clients and stakeholders by providing timely updates on incident status and remediation progress
- Stay informed of emerging cybersecurity threats, vulnerabilities, and industry best practices through threat intelligence sources and research, and assist in the development and implementation of security procedures and best practices while participating in ongoing security awareness and technical security training
- Act with integrity, professionalism, and personal responsibility to uphold KPMG's respectful and courteous work environment
- Minimum one year of recent experience in a relevant field, with a strong interest in cybersecurity, and a basic understanding of cybersecurity principles, technologies, and network defense concepts.
- Bachelor's degree in computer science, information technology, cybersecurity, management information systems, or a related field is required
- Familiarity with IT Security frameworks (such as MITRE, Cyber Kill Chain) is preferred, along with strong analytical and critical thinking skills and keen attention to detail
- Keen sense of ownership and accountability with an eagerness to learn, and ability to quickly learn security products, tools, and processes to maintain the team's proficiency
- Preferred experience with SIEM tools (such as Microsoft Sentinel, IBM QRadar, LogRhythm), basic knowledge of data analysis/visualization tools (e.g., Excel, Tableau, Power BI, SQL), relevant certifications such as CompTIA Security+, CySA+, or equivalent, and familiarity with Python or any scripting language.
- Excellent verbal and written communication skills with the ability to articulate technical information clearly, and the ability to work effectively in a global team environment and drive results in a matrixed organization
- Travel may be required based on business needs
- Applicants must be authorized to work in the U.S. without the need for employment-based visa sponsorship now or in the future. KPMG LLP will not sponsor applicants for U.S. work visa status for this opportunity (no sponsorship is available for H-1B, L-1, TN, O-1, E-3, H-1B1, F-1, J-1, OPT, CPT or any other employment-based visa).
https://kpmg.com/us/en/how-we-work/pay-transparency.html/?id=M105_6_25

