“The future workforce is an equal one – we are setting the goal to achieve a gender balanced workforce by 2025. Find out more here.” https://www.accenture.com/my-en/about/inclusion-diversity/gender-equality.
Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services—all powered by the world’s largest network of Advanced Technology and Intelligent Operations centres. Our 506,000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. We embrace the power of change to create value and shared success for our clients, people, shareholders, partners and communities. Visit us at www.accenture.com.
Join Accenture and help transform leading organizations and communities around the world. The sheer scale of our capabilities and client engagements and the way we collaborate, operate and deliver value provides an unparalleled opportunity to grow and advance. Choose Accenture, and make delivering innovative work part of your extraordinary career.
Security Services: Security, privacy, and operational resilience are critical issues facing both public and private organizations today. Security services help organizations in their management of information and technology risks by delivering end-to-end solutions, using proven methodologies and tools in a consistent manner. Our services help organizations address evolving and pervasive issues such as identity theft, data security breaches, data leakage, cyber intelligence & security, and system outages across organizations of various sizes and industries, with the goal of enabling ongoing, secure, and reliable operations across the enterprise.
As the Cyberdefence Consultant/Manager, you will be a member of the Security team to help drive success in the Cyberdefence domain. responsibilities will include:
Lead security operations investigations in support of 24/7 operations and project support activities.
Review of cyber threat warnings, bulletins, alerts, and incident reporting documentation and databases produced by Governments, Threat Intelligence Communities such as FS-ISAC, Threat Information Portals such as iSight (FireEye) and a variety of open source publications and formats.
Provides threat intelligence analysis in accordance with established threat intelligence requirements.
Conducts research on emerging security threats; provides correlation and trending of cyber incident activity.
Maintains knowledge of adversary activities, including intrusion tactics, attack techniques and operational procedures.
Maintains Situational Awareness and reports on advanced threats, including Advanced Persistent Threat (APT).
Coordinates with management, stakeholders and team members to deliver timely and actionable intelligence; provides written reports and threat briefings.
Partners with Assessments Teams and prepares cyber threat assessments of internal programs and new acquisitions based on threat analysis.
Performs threat hunt operations using known adversary tactics, techniques and procedures as well as indicators of attack in order to detect adversaries with persistent access to the enterprise.
Maintains close coordination with Vulnerability Management Team regarding emerging threats.
Performs metrics analysis and associated reporting.
Strong knowledge of the Cyber Kill Chain, MITRE ATT&CK, or other relevant cybersecurity defense and intelligence frameworks.
In-depth knowledge of current security threats, techniques, and landscape, as well as a dedicated and self-driven desire to research current information security landscape.
Experience with commercial and open source Threat Intelligence Platforms (TIPs).
Familiarity with YARA, OpenIOC, and STIX frameworks is preferred but not required.
Experience with writing scripts using Python or other scripting languages.
Robust interpersonal skills for interfacing with all levels of internal colleagues and external clients across a wide variety of businesses.
Exceptional organizational, attention to detail, and research skills.
Manage the process of gathering analysis and accessing the current and future threat landscape.
Identify and manage risks and issues as a subject matter expert for daily operational support and project.
Manage the day-to-day activities of threat and vulnerabilities management, identify risk tolerances, recommend treatment plans and communicate information about residual risk.
Researching and understanding Cybersecurity threats, threat actors, trends in adversary activities, attack vectors and Tactics, Techniques and Procedures (TTPs).
Using threat modeling and attack frameworks to develop advanced detection mechanisms for a variety of security tools and technologies to identify, detect and respond to malicious activity.
Identifying actionable intelligence for Threat Hunting by distilling and prioritizing information from a variety of open and closed source Threat Intelligence feeds.
Levering intelligence derived from Threat Hunting to improve overall Security Operations, tool visibility, threat awareness, detection and response.
Driving continuous improvement of the security integration playbook.
Perform other duties and responsibilities necessary.
The candidate should be able to perform the following:
IDS monitoring and analysis
Network traffic and log analysis
Prioritization and differentiation between potential intrusion attempts
Determination of false alarms, APT detection, and malware analysis/forensics
Create/track investigation case files
Conduct threat scenarios in order to gather and understand TTPs and develop remediation plans for clients
Conduct hypothesis-driven threat hunting via network logs using knowledge of network protocols (DNS, HTTP/S, SSL, SSH, FTP, SMTP, POP3, and IMAP)
Document and maintain SOP's, playbooks, and how-to's for Security Operations Center
Take an innovative and adaptive approach to the job
Take initiative to learn areas of technology and use tools creatively
Minimum 5 years of relevant work experience for Consultant and 7 years for Manager roles
A Bachelor’s degree in a relevant area of study with a preference for Computer Science or Information Systems
Good understanding of infrastructure security, cybersecurity as well as threat and vulnerability management
Good working knowledge some of the following
Database security (TDE, masking etc)
Infrastructure security technologies (DLP, IDS/IPS, WAF, proxies, 2FA)
Cybersecurity technologies (SIEM, APT, TVM)
Identity & Access Management design and implementation (Oracle, CA, IBM) and Privileged Identity Management
Trend Micro, Symantec, CA, IBM, McAfee, F5, RSA, SafeNet, Tenable, Palo Alto, Fortinet, Cisco
Enterprise Security Architecture (SABSA etc)
PKI & encryption technologies
Knowledge of networking and security (TCP, SSL, authentication, Linux PAM, OpenSSL, Apache, RPM)
Experience with different Kill-chain Method (Dimond Model or Military model / Computer security model)
Experience in mentoring or coaching members of a team.
Qualifications within the IT Security field desirable though not essential. SANS Certified Intrusion Analyst (GCIA), Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM)
Excellent written and oral communication skills including both technical and business writing, documentation and presentation skills.
Strong time management skills; self-directed, with the ability to thrive in a fast-paced and dynamic environment
Strong analytical and problem-solving skills
Ability to work both independently and part of a culturally diverse team
Ability to present ideas and results to technical and non-technical audiences
Previous consulting firm experience is an asset
You will also have opportunities to hone your functional skills and expertise in an area of specialization. We offer a variety of formal and informal training programs at every level to help you acquire and build specialized skills faster. Learning takes place both on the job and through formal training conducted online, in the classroom, or in collaboration with teammates. The sheer variety of work we do, and the experience it offers, provide an unbeatable platform from which to build a career.
Accenture is an equal opportunities employer and welcomes applications from all sections of society and does not discriminate on grounds of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, gender identity, or any other basis as protected by applicable law.
Equal Employment Opportunity Statement
All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process.
Accenture is committed to providing veteran employment opportunities to our service men and women.
Please read Accenture’s Recruiting and Hiring Statement for more information on how we process your data during the Recruiting and Hiring process.
Life at Accenture
Work where you're inspired to explore your passions and where your talents are nurtured and cultivated. Innovate with leading-edge technologies on some of the coolest projects you can imagine.
Learn more about Accenture
Our more than 700,000 people in more than 120 countries, combine unmatched experience and specialized skills across more than 40 industries. We embrace the power of change to create value and shared success for our clients, people, shareholders, partners and communities.