Accenture logo
CIFR Cloud Consultant - Accenture USA Bookmark Share Print 669 1 0

Listing Description

 

This career opportunity is to join the Accenture team and make an impact to defend one of our client's corporate networks from advanced and targeted attacks. This position will be responsible for providing Incident response services that contribute to leading or supporting active incidents on the client’s corporate network. The objective is to work in a team environment and improve our client’s cybersecurity posture.

You'll work as part of a team, collaborating with other Accenture employees. Together, the Accenture team will work on active incidents and reporting back to the client on findings that will aid in the containment, mitigation, and remediation process of the incident. Also, develop content that would support the areas of improvement for the current operations, technology capability, and collaboration.

·         Deliver exceptional client services, including communicating with the client throughout the entire incident lifecycle of a high-risk incident. – 25%

·         Remain highly responsive to all intake of different types of incidents – 15%

·         Develop reliable reports that provide the breakdown of analysis and mitigation, and remediation plant to recover from the incident. – 40%

·         Develop standardized documents focused on the processes, procedures, and guidelines of the security operations. – 20%

Position Overview

SOC Operations provides the opportunity to work in dedicated network defense environments with a focus on threat identification, incident response, cyber threat intelligence infusion, and mitigations to ensure defensive resiliency. The Senior Cloud Incident Response Consultant role will work in a team environment to aid in identifying actionable threat intelligence and monitor SIEM and security technologies, with a focus on Cloud Incident Response, threat identification, incident response, cyber threat intelligence infusion, and mitigations to ensure defensive resiliency and verify potential threat activity. Daily activities will include detailed case management documentation and incident handling of both on premises and cloud systems; use of your expert skillset to guide junior analysts in advanced analysis of network logs, threat intelligence data, malicious code samples, processing of mitigations, Cloud Security Architecture, and determination and escalation of threat detections. You will serve as a Seasoned Incident Responder in advanced SOC and Cloud Security Architecture to help maintain a defensive state of discovery and alert capabilities for clients and work collaboratively in a team environment with various touchpoints, handoffs, and continuous prioritization.

 

Required Qualifications:

·         Experience working in a Security Operations Center or similar environment providing incident handling and response, intrusion detection, analysis, cyber threat intelligence, threat determination, and mitigations processing and tracking.

·         Experience in security operations process creation or process enhancement aligned to industry standard frameworks.

·         Experience triaging threats derived from various intakes to include security technology alerts, user reported tickets, and other internal SOC organizations. 

·         Experience working across organizational lines of business to implement mitigations, remediations, and countermeasures resulting from cyber threat intrusions.

·         Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents.

·         Experience working with various network and system security technologies to include SIEM (such as Splunk ES, Securonix, IBM QRadar, HP ArcSight, and/or McAfee ESM/Nitro), data analytics platforms, endpoint tools, network technologies and appliances, etc.

·         Advanced proficiency in cyber threat intelligence parsing, correlation and alerting rule creation, packet analysis, encryption and obfuscation techniques, malware handling and analysis, digital forensics, indicator of compromise (IOC) management, network flow data, advanced endpoint security technologies and big-data parsing/querying.

·         Knowledge of the cyber threat landscape to include different types of adversaries, campaigns, and the motivations that drive them.

·         Demonstrated professional experience in a technical coach or mentor capacity.

·         Proven Incident Response experience in the major Cloud Computing verticals MicroSoft, Amazon, Google, etc..

·         Proficient technical writing and technical content creation, for audiences of varying technical abilities.

·         Advanced proficiency with common scripting languages, regular expression (regex), in addition to analysis of Cloud, on-premise, removable media asset types.

 

Desired Qualifications:

·         Certifications: CISSP, GCIH, GCFA, GCFE, GMON, GPCS, GSEC, or other relevant security certifications.

·         Experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email security platforms.

·         Knowledge of industrial control systems, compliance standards (e.g., NERC CIP), and related cyber security standards (e.g., IEC 62443).

 

 


Listing Details

  • Salary: $140000 - $190000
  • Citizenship: Us Citizen
  • Incentives: Bonus

 

  • Education: Bachelors Degree
  • Travel: Travel 25
  • Telework: Full Telecommute



About Us

NinjaJobs is a community-run job platform developed by information security professionals. Our unique approach of focusing strictly on cybersecurity positions allows us to personalize the user experience.

Our Contacts

1765 Greensboro Station Pl.
Suite 900
Tysons Corner Va 22102

(703) 594-7765