This job is no longer available. Continue your job search here.
Cyber Incident Response Specialist
Sydney
Job No. r00158015
Full-time
Job Description
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. Visit us at www.accenture.com
Act as the first responder for cyber-security incidents identified through different channels, Human Resources, Employee Relations, Corporate Investigations, ASOC, Infrastructure CIRT, and client escalations.
Investigate cases such as, but not limited to:
• Acceptable Use Policy / Code of Business Ethics Violation
• Malware
• Fraud, Intellectual Property Theft, Industrial Espionage
• Cyber Attack / Hacking / APT / Security Breaches
• Mobile Devices
Execute documented processes within all activities of the CIRT playbook and security incident response lifecycle. Escalate security events, depending on determined crisis levels, to management in accordance with the incident response plan
Collect, preserve and process volatile information and evidences needed to conduct highly-confidential forensic investigations. Investigation of digital evidences may include:
• Storage media (i.e. hard drives, optical and flash media)
• Electronic data (i.e. electronic files, pictures, web data, technology device logs)
• Mobile devices (i.e. mobile phones, tablets)
• Volatile media (i.e. workstation memory)
Ensures forensic investigation and incident response procedures comply with standard operating procedures, processes, policies, guidelines, and forensics best practices.
Examine and analyze security events or incidents, and investigate significant issues, related to technology infrastructure. Employ technical, investigative and analytical skills to solve a wide range of complex issues or problems.
Coordinate and resolve, or provide recommendations as necessary, containment and remediation steps, until security incident closure.
Produce detailed written reports outlining the circumstances around the incident, present forensic evidences to a non-technical audience and provide further input as expert opinion. Present and communicate investigation results and relevant findings, for administrative or legal purpose, to internal stakeholders, senior management, auditors or clients, and testify in court as an expert witness, as necessary.
Participate in the improvement and development of forensic methodologies, process/procedure manuals and documentation.
Periodically make recommendations that aid in the successful completion of highly complex and technical projects within a process, control or functional area.
Complete varied complex and non-standard tasks in an assigned area of responsibility.
Provide eDiscovery and litigation support to identify, preserve, collect, process, review and produce electronically stored information (ESI) for litigation purposes.
Mentor and provide guidance to incident response staff on security best practices, processes, procedures and countermeasures.
Qualifications
Minimum qualifications:
Expert understanding of the following topics:
• Significant hands on experience on Computer security incident response and digital forensics, which includes:
o Forensic evidence handling and Chain of Custody
o Malware Triage and Reverse Engineering (i.e. OllyDbg, IDA Pro, LordPE, PEiD,
Process Monitor, Process Explorer, Wireshark, tcpdump, Autoruns, REMnux)
o Mobile device forensics and tools (i.e. Cellebrite, Paraben)
o Memory forensics and tools (i.e. HB Gary)
• Computer / Network forensics tools (i.e. Encase, SIFT, IEF, HB Gary, FireEye,
Mandiant/Fire Eye, Nuix)
• Workstation and Server Operating systems (Windows, Linux or OS X, iOS/Android)
• IT Security
• Legal/regulatory aspects of digital forensics and incident response pro
cesses and methodologies
Advanced understanding of the following topics:
• Network protocols, TCP/IP fundamentals
• Network based services and client/server applications
• Enterprise systems and infrastructure
• Network architecture and security infrastructure (i.e. intrusion detection systems, data loss prevention, antivirus, etc.)
• System log analysis
• eDiscovery methodologies (i.e. Nuix)
• Perimeter security controls
Knowledge of the following topics:
• Risk assessment procedures
• ISO 27001 / ITIL and COBIT frameworks
• Experience and background in the following is a plus:
o Programming and scripting
o Vulnerability and penetration testing
o Application and virtualization security
o current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
• Up to date with current cyber threat landscape and trends
Other Required Skills:
• Above average problem solving skills
• Strong technical background and attention to detail
• Excellent written and communication skills
o Ability to document and explain technical details clearly and concisely
• Strong sense of ethics & values, ability to handle confidential situations with discretion
• Ability to maintain objectivity, professional appearance and demeanor during a crisis and in high stress situations to both technical and executive audience
• Strong leadership and interpersonal skills. Must be able to work collaboratively physical locations
• Ability to multi-task and prioritize assigned workload
• Willing to work on call, overtime, rotating shifts, work during weekends and holidays, as necessary.
Education/Experience:
• 4 year college degree in computer science or related field is preferred
• Industry certification in multiple operating systems and/or network technologies
• Minimum 5 years’ experience in an information security discipline
• One or more computer forensics and information security certifications is desired :
o Guidance Software Encase Certified Examiner (EnCE)
o EC Council Computer Hacking Forensic Investigator (CHFI)
o EC Council Certified Ethical Hacker (CEH)
o SANS GIAC Certified Incident Handler (GCIH)
o SANS GIAC Certified Forensic Examiner (GCFA)
o ISC2 Certified Information Systems Security Professional (CISSP)
o ISACA Certified Information Systems Auditor (CISA)
o ISACA Certified Information Systems Manager (CISM)
o Comptia Security +