Skip to main content Skip to footer

Cyber Incident Response Specialist

Sydney Job No. r00158015 Full-time

Job Description

Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. Visit us at www.accenture.com

Act as the first responder for cyber-security incidents identified through different channels, Human Resources, Employee Relations, Corporate Investigations, ASOC, Infrastructure CIRT, and client escalations.

Investigate cases such as, but not limited to:
•    Acceptable Use Policy / Code of Business Ethics Violation
•    Malware
•    Fraud, Intellectual Property Theft, Industrial Espionage
•    Cyber Attack / Hacking / APT / Security Breaches
•    Mobile Devices


Execute documented processes within all activities of the CIRT playbook and security incident response lifecycle. Escalate security events, depending on determined crisis levels, to management in accordance with the incident response plan


Collect, preserve and process volatile information and evidences needed to conduct highly-confidential forensic investigations. Investigation of digital evidences may include: 
•    Storage media (i.e. hard drives, optical and flash media)
•    Electronic data (i.e. electronic files, pictures, web data, technology device logs)
•    Mobile devices (i.e. mobile phones, tablets)
•    Volatile media (i.e. workstation memory)


Ensures forensic investigation and incident response procedures comply with standard operating procedures, processes, policies, guidelines, and forensics best practices. 

Examine and analyze security events or incidents, and investigate significant issues, related to technology infrastructure. Employ technical, investigative and analytical skills to solve a wide range of complex issues or problems. 

Coordinate and resolve, or provide recommendations as necessary, containment and remediation steps, until security incident closure.

Produce detailed written reports outlining the circumstances around the incident, present forensic evidences to a non-technical audience and provide further input as expert opinion. Present and communicate investigation results and relevant findings, for administrative or legal purpose, to internal stakeholders, senior management, auditors or clients, and testify in court as an expert witness, as necessary.

Participate in the improvement and development of forensic methodologies, process/procedure manuals and documentation.
Periodically make recommendations that aid in the successful completion of highly complex and technical projects within a process, control or functional area.

Complete varied complex and non-standard tasks in an assigned area of responsibility.

Provide eDiscovery and litigation support to identify, preserve, collect, process, review and produce electronically stored information (ESI) for litigation purposes.

Mentor and provide guidance to incident response staff on security best practices, processes, procedures and countermeasures.

Qualifications

Minimum qualifications:


Expert understanding of the following topics: 
•    Significant hands on experience on Computer security incident response and digital forensics, which includes:
o    Forensic evidence handling and Chain of Custody
o    Malware Triage and Reverse Engineering (i.e. OllyDbg, IDA Pro, LordPE, PEiD,

Process Monitor, Process Explorer, Wireshark, tcpdump, Autoruns, REMnux)
o    Mobile device forensics and tools (i.e. Cellebrite, Paraben) 
o    Memory forensics and tools (i.e. HB Gary)
•    Computer / Network forensics tools (i.e. Encase, SIFT, IEF, HB Gary, FireEye,

Mandiant/Fire Eye, Nuix) 
•    Workstation and Server Operating systems (Windows, Linux or OS X, iOS/Android)
•    IT Security
•    Legal/regulatory aspects of digital forensics and incident response pro

cesses and methodologies

Advanced understanding of the following topics: 
•    Network protocols, TCP/IP fundamentals
•    Network based services and client/server applications
•    Enterprise systems and infrastructure
•    Network architecture and security infrastructure (i.e. intrusion detection systems, data loss prevention, antivirus, etc.)
•    System log analysis
•    eDiscovery methodologies (i.e. Nuix)
•    Perimeter security controls

Knowledge of the following topics:
•    Risk assessment procedures
•    ISO 27001 / ITIL and COBIT frameworks
•    Experience and background in the following is a plus:
o    Programming and scripting
o    Vulnerability and penetration testing
o    Application and virtualization security
o    current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
•    Up to date with current cyber threat landscape and trends
Other Required Skills:
•    Above average problem solving skills
•    Strong technical background and attention to detail
•    Excellent written and communication skills
o    Ability to document and explain technical details clearly and concisely
•    Strong sense of ethics & values, ability to handle confidential situations with discretion
•    Ability to maintain objectivity, professional appearance and demeanor during a crisis and in high stress situations to both technical and executive audience
•    Strong leadership and interpersonal skills. Must be able to work collaboratively physical locations
•    Ability to multi-task and prioritize assigned workload
•    Willing to work on call, overtime, rotating shifts, work during weekends and holidays, as necessary.

Education/Experience:
•    4 year college degree in computer science or related field is preferred
•    Industry certification in multiple operating systems and/or network technologies
•    Minimum 5 years’ experience in an information security discipline
•    One or more computer forensics and information security certifications is desired :
o    Guidance Software Encase Certified Examiner (EnCE)
o    EC Council Computer Hacking Forensic Investigator (CHFI)
o    EC Council Certified Ethical Hacker (CEH)
o    SANS GIAC Certified Incident Handler (GCIH)
o    SANS GIAC Certified Forensic Examiner (GCFA)
o    ISC2 Certified Information Systems Security Professional (CISSP)
o    ISACA Certified Information Systems Auditor (CISA)
o    ISACA Certified Information Systems Manager (CISM)
o    Comptia Security +
 

Life at Accenture

Work Environment

Be your best every day in a work environment that helps drive innovation in everything you do.

Training and Development

Take time away to learn and learn all the time in our regional learning hubs, connected classrooms, online courses and learning boards.

Learn More About Accenture

Our Expertise

See how we embrace the power of change to create value and shared success for our clients, people, shareholders, partners and communities.

Meet Our People

From entry-level to leadership, across all business and industry segments, get to know our people harnessing technology to make a difference, every day.

Stay Connected

Join Our Team

Search open positions that match your skills and interest. We look for passionate, curious, creative and solution-driven team players.

Keep Up to Date

Stay ahead with careers tips, insider perspectives, and industry-leading insights you can put to use today–all from the people who work here.

Job Alert Emails

Personalize your subscription to receive job alerts, latest news and insider tips tailored to your preferences. See what exciting and rewarding opportunities await.