×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Defense Forensics Analyst

Job in City of Rochester, Rochester, Monroe County, New York, 14602, USA
Listing for: EY
Full Time position
Listed on 2025-12-18
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Location: City of Rochester

Cyber Defense Forensics Analyst

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. EY maintains high-ethical standards and integrity among its employees and expects candidates to demonstrate these qualities. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play.

Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets. Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.

The

opportunity

Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identifying indicators of compromise, supporting remediation or coordinating remediation efforts of a security incident, and developing documentation to support the security incident response process.

Your

Key Responsibilities
  • Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified.
  • Forensically analyze end‑user systems and servers found to have possible indicators of compromise.
  • Analyze artifacts collected during a security incident/forensic analysis.
  • Identify security incidents through ‘Hunting’ operations within a SIEM and other relevant tools.
  • Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including obtaining access to systems, digital artifact collection, and containment and/or remediation actions.
  • Provide consultation and assessment on perceived security threats.
  • Maintain, manage, improve and update security incident process and protocol documentation.
  • Regularly provide reporting and metrics on case work.
  • Resolve security incidents by identifying root cause and solutions.
  • Analyze findings in investigative matters, and develop fact‑based reports.
  • Be on‑call to deliver global incident response.
Skills and Attributes for Success
  • Resolution of security incidents by identifying root cause and solutions.
  • Analyze findings in investigative matters, and develop fact‑based reports.
  • Proven integrity and judgment within a professional environment.
  • Ability to appropriately balance work/personal priorities.
To qualify for the role you must have
  • Bachelor’s or Master’s Degree in Computer Science, Information Systems, Engineering or a related field.
  • 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering.
  • Understanding of security threats, vulnerabilities, and incident response.
  • Understanding of electronic investigation, forensic tools, and methodologies, including log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis.
  • Familiarity with legalities surrounding electronic discovery and analysis.
  • Experience with SIEM technologies (e.g. Splunk).
  • Deep understanding of both Windows and Unix/Linux based operating systems.
Ideally, you’ll also have
  • Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH.
  • Background in security incident response in cloud‑based environments, such as Azure.
  • Programming skills in Power Shell, Python and/or C/C++.
  • Understanding of the best security practices for network architecture and server configuration.
What We Look For
  • Demonstrated integrity in a professional environment.
  • Ability to work independently.
  • Have a global mind‑set for working with different cultures and backgrounds.
  • Knowledgeable in business industry standard security…
Position Requirements
5+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary