CMS-Senior-Incident Responder
Ernst & Young
All India, Pune • 1 month ago
Experience: 5 to 9 Yrs
PREMIUM
Deal of the Day
--:--:--
15 Days Free Trial
After Free Trial → Flat 50% OFF
Upgrade to CVX24 Premium
- Free Resume Writing
-
Get a Verified Blue tick
- See who viewed your profile
- Unlimited chat with recruiters
- Rank higher in recruiter searches
- Get up to 10× more recruiter visibility
- Auto-forward profile to 10 top recruiters
- Receive verified recruiter messages directly
- Unlock hidden jobs, not visible to free users
$0
Activate
$0
A small token amount will be charged to verify.
Get Refund in 48 Hours.
Free Earplugs Delivery Only after Payment of Rs. 99 for Five Consecutive Months.
After free-trial 6 Months subscription will be auto Activated @ $
1
(Cancel Anytime). Quoted price includes 50% discount.
Enter Your Details
Job Description
In your role at EY, you'll have the chance to be part of a team of bright minds in cyber security, working together to provide the best solutions for clients. As a Security Operations Center (SOC) Level 3 (L3) team member, your responsibilities will include:
- Leading the response to high-severity incidents, coordinating with other teams as needed.
- Gathering and preserving evidence, performing data collection, and conducting structured analysis of forensic data.
- Working closely with IT and security teams to address security incidents.
- Analyzing network packet captures and performing endpoint analysis.
- Proactively searching for threats and vulnerabilities within the environment.
- Staying updated on the latest security trends and technologies.
- Formulating response and recovery steps for security incidents.
- Reviewing and improving incident response processes.
- Documenting incidents, response actions, and lessons learned.
- Providing guidance and mentorship to lower-level incident responders.
To qualify for this role, you must have:
- Experience with digital forensics tools and techniques.
- Proficiency in utilizing SIEM solutions such as Splunk, Microsoft Sentinel, etc.
- Experience with EDR/XDR solutions like CrowdStrike, Microsoft Defender, etc.
- Understanding of security principles, techniques, and technologies.
- In-depth knowledge of network protocols, operating systems, and security technologies.
- Proficiency in incident detection and response tools.
- Familiarity with malware analysis and reverse engineering.
- Proficiency in scripting languages for automating tasks.
- 5+ years of security-related experience.
- Analytical mindset and willingness to work in a 24/7 operations center.
- Strong problem-solving abilities and excellent communication skills.
Additionally, having a Bachelors Degree relevant to Information Technology and related certifications such as CEH, CHFI, Sec+, etc., would be ideal.
EY offers you the opportunity to work on inspiring projects, with a focus on education, coaching, and personal development. You will have the support of engaging colleagues, opportunities to develop new skills, and the freedom to handle your role in a way that suits you best. EY is committed to building a better working world by providing long-term value for clients, people, and society through trust, data, and technology. In your role at EY, you'll have the chance to be part of a team of bright minds in cyber security, working together to provide the best solutions for clients. As a Security Operations Center (SOC) Level 3 (L3) team member, your responsibilities will include:
- Leading the response to high-severity incidents, coordinating with other teams as needed.
- Gathering and preserving evidence, performing data collection, and conducting structured analysis of forensic data.
- Working closely with IT and security teams to address security incidents.
- Analyzing network packet captures and performing endpoint analysis.
- Proactively searching for threats and vulnerabilities within the environment.
- Staying updated on the latest security trends and technologies.
- Formulating response and recovery steps for security incidents.
- Reviewing and improving incident response processes.
- Documenting incidents, response actions, and lessons learned.
- Providing guidance and mentorship to lower-level incident responders.
To qualify for this role, you must have:
- Experience with digital forensics tools and techniques.
- Proficiency in utilizing SIEM solutions such as Splunk, Microsoft Sentinel, etc.
- Experience with EDR/XDR solutions like CrowdStrike, Microsoft Defender, etc.
- Understanding of security principles, techniques, and technologies.
- In-depth knowledge of network protocols, operating systems, and security technologies.
- Proficiency in incident detection and response tools.
- Familiarity with malware analysis and reverse engineering.
- Proficiency in scripting languages for automating tasks.
- 5+ years of security-related experience.
- Analytical mindset and willingness to work in a 24/7 operations center.
- Strong problem-solving abilities and excellent communication skills.
Additionally, having a Bachelors Degree relevant to Information Technology and related certifications such as CEH, CHFI, Sec+, etc., would be ideal.
EY offers you the opportunity to work on inspiring projects, with a focus on education, coaching, and personal development. You will have the support of engaging colleagues, opportunities to develop new skills, and the freedom to handle your role in a way that suits you best. EY is committed to building a better working world by providing long-term value for clients, people, and society through trust, data, and technology.
Skills Required
Posted on: March 29, 2026
Relevant Jobs
Step 2 of 2