Incident Response Analyst
Who we’re looking for
Are you passionate about investigating state sponsored attacks, data breaches, economic espionage and targeted intrusions?
Join the CIR-accredited IR team at PwC responsible for the development and delivery of incident response and threat hunting services provided by PwC across the globe, ranging from single-system analysis to major intrusions on some of the world’s largest corporate networks.
About the team
Our Cyber Threat Operations practice is PwC’s front-line technical services group, responsible for the development, management and execution of a portfolio of blue and red team services. We provide subscription and bespoke threat research services, short-term and managed endpoint and network hunting services, incident response and readiness services and adversary emulation.
The Cyber Security Incident Response Associate role will primarily consist of conducting incident response investigations on behalf of a wide variety of clients across every sector. Within the role you will have scope to be involved in all aspects of incident response activity, as well as to develop specialisms in particular areas.
You will be working within complex security environments and alongside Incident Response Managers to design, communicate and execute incident response, containment and remediation plans.
Duties & Responsibilities
● Plan, organise and devise approaches necessary to respond to incidents and obtain useful forensic information from the evidence collected;
● Prioritising and differentiating between potential intrusion activity and false alarms;
● Conduct incident and investigation post-mortem briefings, analysis, and reporting;
● Conduct forensic investigations including physical/logical disk, network packet capture, memory analysis or malware analysis;
● Provide technical guidance to investigations to correctly gather, analyse and present digital evidence to both business and legal audiences;
● Collate conclusions and recommendations and present forensics findings to stakeholders;
● Contribute to the development of policies, standards and guidelines for incident response;
● Correlate threat intelligence with active attacks and vulnerabilities within the enterprise;
● Monitor and analyse security events and identify trends, attacks, and potential threats;
● Research and test out new DFIR tooling and techniques;
● Creating and tracking security investigations to resolution; and,
● Facilitate the integration of threat and data feeds for the purposes of incident response.
Skills and Experience:
● Experience in forensic capture and investigation tools such as EnCase, X-Ways, SIFT or F-Response;
● Knowledge of Windows system internals and ability to identify common indicators of compromise from dead or live systems and live memory using tools such as the SysInternals suite, RegRipper, Volatility, or Mandiant Redline;
● Experience of gleaning and analysing security information from enterprise network and host based sensors, such as IDS/IPS systems, HIDS, SIEMs, AD controllers and firewalls;
● Expertise analysing raw network traffic captures or deployment and use of network forensics or monitoring devices such as FireEye, Solera, WireShark, SNORT or Netwitness;
● Consulting experience deploying and using enterprise EDR or investigative products such as Tanium, Carbon Black, Mandiant MIR, CrowdStrike Falcon or EnCase Cybersecurity;
● Knowledge of scripting languages such as Python, Perl or PowerShell and their use in forensic analysis and live incident response, or experience using other programming languages to develop software for host-centric, network-centric or log-centric security analysis;
● Development and curation of APT and targeted attack intrusion sets along with campaign research and tracking experience;
● The development and application of technical threat intelligence in the cyber-attack lifecycle, the management of multi-source threat intelligence fusion and production of technical intelligence reports; or,
● A solid grounding in Active Directory security in the context of intrusion containment and environment hardening.
We’re looking for someone with:
∙ An unrelenting passion for finding bad actors;
∙ A strong desire to learn and willingness to share knowledge;
∙ The ability to manage time, prioritise tasks and work under tight deadlines;
∙ The ability to work independently with little supervision, but integrate well into teams.
∙ The ability to suggest creative but practical solutions to complex technical problems; and,
∙ Exceptional analytical and technical aptitude.
The skills we look for in future employees
All our people need to demonstrate the skills and behaviours that support us in delivering our business strategy. This is important to the work we do for our business, and our clients. These skills and behaviours make up our global leadership framework, ‘The PwC Professional’ and are made up of five core attributes; whole leadership, technical capabilities, business acumen, global acumen and relationships.
Learn more here www.pwc.com/uk/careers/experienced/apply
We work in a changing world which offers great opportunities for people with diverse backgrounds and experiences. We seek to attract and employ the best people from the widest talent pool, as well as those who reflect the diverse nature of our society. And we aim to encourage a culture where people can be themselves and be valued for their strengths. Creating value through diversity is what makes us strong as a business and as an organisation with an increasingly agile workforce, we're open to flexible working arrangements where appropriate.
Learn more here www.pwc.com/uk/diversity