at Accenture in Wilmington, Delaware, United States
Elevator PitchThis career opportunity is to join the Accenture team and make an impact to defend one of our client’s corporate networks from advanced and targeted attacks. This position will be responsible for providing Incident response services that contribute to leading or supporting active incidents on the client’s corporate network. The objective is to work in a team environment and improve our client’s cybersecurity posture.
Day to DayYou’ll work as part of a team, collaborating with other Accenture employees. Together, the Accenture team will work on active incidents and reporting back to the client on findings that will aid in the containment, mitigation, and remediation process of the incident. Also, develop content that would support the areas of improvement for the current operations, technology capability, and collaboration.
Initial Tasks Breakdown:
+ Deliver exceptional client services, including communicating with the client throughout the entire incident lifecycle of a high-risk incident. – 25%
+ Remain highly responsive to all intake of different types of incidents – 15%
+ Develop reliable reports that provide the breakdown of analysis and mitigation, and remediation plant to recover from the incident. – 40%
+ Develop standardized documents focused on the processes, procedures, and guidelines of the security operations. – 20%
SOC Operations provides the opportunity to work in dedicated network defense environments with a focus on threat identification, incident response, cyber threat intelligence infusion, and mitigations to ensure defensive resiliency. The Senior Cloud Incident Response Consultant role will work in a team environment to aid in identifying actionable threat intelligence and monitor SIEM and security technologies, with a focus on Cloud Incident Response, threat identification, incident response, cyber threat intelligence infusion, and mitigations to ensure defensive resiliency and verify potential threat activity. Daily activities will include detailed case management documentation and incident handling of both on premises and cloud systems; use of your expert skillset to guide junior analysts in advanced analysis of network logs, threat intelligence data, malicious code samples, processing of mitigations, Cloud Security Architecture, and determination and escalation of threat detections. You will serve as a Seasoned Incident Responder in advanced SOC and Cloud Security Architecture to help maintain a defensive state of discovery and alert capabilities for clients and work collaboratively in a team environment with various touchpoints, handoffs, and continuous prioritization.
+ Experience working in a Security Operations Center or similar environment providing incident handling and response, intrusion detection, analysis, cyber threat intelligence, threat determination, and mitigations processing and tracking.
+ Experience in security operations process creation or process enhancement aligned to industry standard frameworks.
+ Experience triaging threats derived from various intakes to include security technology alerts, user reported tickets, and other internal SOC organizations.
+ Experience working across organizational lines of business to implement mitigations, remediations, and countermeasures resulting from cyber threat intrusions.
+ Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents.
+ Experience working with various network and system security technologies to include SIEM (such as Splunk ES, Securonix, IBM QRadar, HP ArcSight, and/or McAfee ESM/Nitro), data analytics platforms, endpoint tools, network technologies and appliances, etc.
+ Advanced proficiency in cyber threat intelligence parsing, correlation and alerting rule creation, packet analysis, encryption and obfuscation techniques, malware handling and analysis, digital forensics, indicator of compromise (IOC) management, network flow data, advanced endpoint security technologies and big-data parsing/querying.
+ Knowledge of the cyber threat landscape to include different types of adversaries, campaigns, and the motivations that drive them.
+ Demonstrated professional experience in a technical coach or mentor capacity.
+ Proven Incident Response experience in the major Cloud Computing verticals MicroSoft, Amazon, Google, etc..
+ Proficient technical writing and technical content creation, for audiences of varying technical abilities.
+ Advanced proficiency with common scripting languages, regular expression (regex), in addition to analysis of Cloud, on-premise, removable media asset types.
+ Certifications: CISSP, GCIH, GCFA, GCFE, GMON, GPCS, GSEC, or other relevant security certifications.
+ Experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email security platforms.
+ Knowledge of industrial control systems, compliance standards (e.g., NERC CIP), and related cyber security standards (e.g., IEC 62443).
What We Believe
We have an unwavering commitment to diversity with the aim that every one of our people has a full sense of belonging within our organization. As a business imperative, every person at Accenture has the responsibility to create and sustain an inclusive environment.
Inclusion and diversity are fundamental to our culture and core values. Our rich diversity makes us more innovative and more creative, which helps us better serve our clients and our communities. Read more here (https://www.accenture.com/us-en/about/inclusion-diversity/us-workforce)
Equal Employment Opportunity Statement
Accenture is an Equal Opportunity Employer. We believe that no one should be discriminated against because of their differences, such as age, disability, ethnicity, gender, gender identity and expression, religion or sexual orientation.
All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
Accenture is committed to providing veteran employment opportunities to our service men and women.
For details, view a copy of the Accenture Equal Opportunity and Affirmative Action Policy Statement (https://www.accenture.com/\_acnmedia/Careers/PDF-9/Accenture-Annual-Policy-Statement-Regarding-EEO-2018-Applicant.pdf) .
Requesting An Accommodation
Accenture is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired.
If you would like to be considered for employment opportunities with Accenture and have accommodation needs for a disability or religious observance, please call us toll free at 1 (877) 889-9009, send us an email (https://www.accenture.com/us-en/contact-us) or speak with your recruiter.
Other Employment Statements
Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States.
Candidates who are currently employed by a client of Accenture or an affiliated Accenture business may not be eligible for consideration.
Job candidates will not be obligated to disclose sealed or expunged records of convTo view full details and how to apply, please login or create a Job Seeker account