Cybersecurity Incident Response Triage Analyst
The Work
The Cybersecurity Incident Response Junior Analyst and Triage Analyst role will work in the CIRT team in the CISO organization. This role works on a shift under the analysis and triage team lead to relate, scope, and triage alerts and notifications from the SIEM, security sensors, ticketing system, walk-ins, and phone calls. Requires technical understanding to collaborate with the incident response and operations teams to qualify events as relevant and determine true and false positives. Knowledge in incident response lifecycles, common
cyber-attacks, and federal incident reporting requirements.
Primary responsibilities:
- Actively monitor and respond to cybersecurity incidents related to alerted policy violations
- Analyze and investigate incidents to determine their nature and scope.
- Coordinate with the lead and other Cybersecurity Incident Response Teams for effective incident resolution.
- Document incidents and response activities in detail.
- Stay updated with the latest cybersecurity threats and trends.
- Assist in developing and refining incident response strategies and procedures.
- Collaborate with operations teams, legal, human resources and management to investigate security issues and interview investigation subjects to determine true and false positives.
What you need
- US Citizenship required
- 1 - 2 years of experience in information security, or other equivalent combination of education or equivalent work experience.
- 1-year of experience performing event and log analysis including one or more of the following: Anti-Virus,
- Intrusion Detection Systems, Firewalls, Active Directory, Web Proxies, Data loss prevention tools and other security tools found in large enterprise network environments; along with experience working with Security Information and Event Management (SIEM) solutions.
- Excellent written and oral communication skills, attention to detail, and interpersonal skills.
- Familiarity with various network and host-based security applications and tools, such as network and host assessment/scanning tools, network and host-based intrusion detection systems, and other security software
packages. - Familiarity with various network and host-based security applications and tools, such as network and host assessment/scanning tools, network and host-based intrusion detection systems, and other security software
packages. - Familiarity with TCP/IP, common application layer protocols, and packet analysis of the same.
- Familiarity with static and dynamic malware analysis concepts.
- Experience with indicators of attack and compromise.
- Familiarity with Windows / Linux architecture and endpoint analysis of the same.
- Familiarity with basic data parsing and analysis tools, i.e., Excel, grep, sed, awk, regex, etc
Bonus if you have
- SANs GIAC Certifications including but not limited to GCED, GCLD, GCIH, GCFA, GREM
As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland. The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set, and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. We accept applications on an on-going basis and there is no fixed deadline to apply.
The pay range for the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland is:
$57,200 - $109,400 USD
Apply for this job
*
indicates a required field