Senior Consultant - Security Operations Analyst - Level 3 - Cyber Security What if your most rewarding experiences couldn't be captured by a resume? At EY we believe that whoever you are, your uniqueness helps us stand apart. We bring together extraordinary people, like you, to build a better working world. What's in it for you? As a Level 3 Security Analyst, you will play a vital role in protecting our clients from cyber threats. You will operate with a high degree of autonomy in both incident response and threat hunting and be a key influencer in strategic cybersecurity decisions. As a senior analyst in any SOC, you will co-ordinate incident response on a day-to-day basis, lead continuous improvement in L1 and L2 triage processes and perform threat analysis that will lead to better detection capability for our services. Key Responsibilities Develop a strong understanding of incident response frameworks and best practices. Lead the investigation and response to security incidents, leveraging advanced technical skills and threat intelligence. Triage security alerts, perform in-depth analysis to determine root cause and impact, and develop effective containment and remediation strategies. Collaborate with cross-functional teams to coordinate incident response activities and ensure timely communication. Act as the primary point of contact for incident escalations from Tier 1/2 analysts. Perform advanced triage, including deep-dive analysis of security events and logs to determine incident severity, scope, and potential impact. Lead incident response efforts, coordinating activities across various teams to contain, investigate, and remediate security breaches. Develop and execute incident response plans, ensuring proper communication and documentation throughout the incident lifecycle. Investigate potential threats identified through security alerts, anomalies, or intelligence reports. Conduct independent research and analysis to identify potential attack vectors and vulnerabilities. Utilize threat intelligence and attack frameworks (e.g., MITRE ATT&CK) to create realistic attack scenarios. Translate threat intelligence into actionable detection and hunting strategies. Utilize SIEM (Security Information and Event Management) and other security tools to identify and analyze potential threats. Develop and fine-tune security rules and correlation logic to improve threat detection capabilities. Maintain detailed documentation of security incidents, investigations, and response actions. Provide guidance and mentorship to junior SOC analysts. Assist in developing and delivering security awareness training programs. What we're looking for Here is our 'wish list' but don't worry if you don't tick all the boxes. We're interested in your passion, strengths, what you want to learn, and how far you want to go. Bachelor's degree in Computer Science, Information Security, or a related field. Minimum 5-7 years of experience in a SOC or security analyst role. Proven track record of successfully identifying, analyzing, and responding to security incidents. Strong background in formulation and execution of threat hunt scenarios and the development of subsequent use cases to uplift detection capability. Relevant industry certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or CompTIA Security+ are highly desirable. In-depth knowledge of Sentinel, MS Defender, other Threat centric tools, IDS/IPS, email security, vulnerability scanners and other security technologies. Apply now… we're over 9,000 perspectives in Australia and we're ready to welcome yours. #J-18808-Ljbffr