KPMG - Montvale, NJ

posted 2 months ago

Full-time - Mid Level
Montvale, NJ
Professional, Scientific, and Technical Services

About the position

The KPMG Advisory practice is currently our fastest growing practice, driven by tremendous client demand that we do not anticipate slowing down. In this ever-changing market environment, our professionals must be adaptable and thrive in a collaborative, team-driven culture. At KPMG, our people are our number one priority. We offer a wealth of learning and career development opportunities, a world-class training facility, and leading market tools to ensure our people continue to grow both professionally and personally. If you are looking for a firm with a strong team connection where you can be your whole self, have an impact, advance your skills, deepen your experiences, and have the flexibility and access to constantly find new areas of inspiration and expand your capabilities, then consider a career in Advisory. As a Specialist in our Advisory Practice, you will be responsible for utilizing available security tools for historical analysis purposes as necessary for detected events, such as conducting historical searches using SIEM tools. You will maintain operational shift logs with relevant activity from your shift and document investigation results, ensuring that relevant details are passed to Level 2 or MDR Analysts for final event analysis. Additionally, you will update and reference the knowledgebase tool (e.g., Confluence) as necessary for changes to processes and procedures, as well as the ingestion of daily intelligence reports and previous shift logs. Your role will also involve performing triage of service requests from customers and internal teams, managing the Incident Ticketing queue for the IT Security group, and continuously monitoring SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including the SIEM alert queue and security email inbox.

Responsibilities

  • Use available security tools for historical analysis purposes as necessary for detected events, such as historical searches using SIEM tools.
  • Maintain operational shift logs with relevant activity from the Analyst's shift.
  • Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis.
  • Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures and ingestion of daily intelligence reports and previous shift logs.
  • Perform triage of service requests from customers and internal teams.
  • Manage the Incident Ticketing queue for the IT Security group.
  • Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises.

Requirements

  • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field.
  • Minimum of 12 months of prior MDR/SOC/Incident response experience.
  • Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required.
  • Ability to work nights, weekends, and/or holidays in the event of an incident response emergency.
  • Flexibility to adapt to different types of engagement, working hours, work environments, and locations.

Benefits

  • Disability insurance
  • Health insurance
  • Dental insurance
  • 401(k)
  • Vision insurance
  • Life insurance
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service