×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Threat Detection - Defense Analyst

Job in Jacksonville, Duval County, Florida, 32290, USA
Listing for: Ernst & Young Oman
Full Time position
Listed on 2026-02-12
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, Data Security
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Cyber Threat Detection - Active Defense Analyst

At EY, we’re all in to shape your future with confidence.

We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.

EY Technology:

Technology has always been at the heart of what we do and deliver  need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients.

Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization.

EY Technology supports our technology needs through three business units:

Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster, and pursue those opportunities more rapidly.

Enterprise Workplace Technology (EWT) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience.

Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems.

The opportunity

The Active Defense team is responsible for four core areas:
Network Reconnaissance, Proactive Penetration Testing (Purple Team), Anomaly Analysis, and Trapping and Coercion. This function allows the Cyber Defense Team to fortify and mature the firm’s enterprise security.

In an Active Defense Analyst, we are looking for someone who has experience in Information Security and wants to take the next step in the adventure. In its purple team capacity, candidates will be expected to emulate attacker behaviors and devise strategies to disrupt the actions of an attacker, thus enhancing the abilities of defensive teams. In the threat hunting capacity, the analyst will identify security vulnerabilities through analysis of event data from SIEM and other relevant tools.

You will report findings to technical and non-technical audiences, and collaborate with other teams identify and remediate vulnerabilities. The position requires attention to detail and the ability to work, both as part of a team and independently.

Skills and attributes for success

Essential Functions of the job:

  • Perform research and analysis of attacker techniques and methodologies, and emulate those attacks in a collaborative and controlled environment

  • Identify security breaches through ‘Hunting’ operations within a SIEM, full packet capture, EDR, and other tools and treat intelligence

  • Identify patterns consistent with sophisticated attacker methodologies, and report on security concerns as they are escalated or identified.

  • Analyze artifacts collected during a security test or passive investigation.

  • Communicate with server owners, system custodians, and IT contacts to pursue security testing activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions

  • Create presentations in MS Word, PowerPoint, and/or Excel that support findings

  • Maintain, manage, improve and update security testing process and protocol documentation

  • Assist in analyzing findings, and develop fact based reports

  • Identify means to disrupt attacker actions, and enhance defender response capabilities.

To qualify for the role, you must have:

  • 6+ years of relevant experience in one or more of the following areas: threat intelligence, intrusion analysis, incident response, malware analysis, security and network operations, penetration tester, or similar roles.

  • Demonstrated understanding of the threat intelligence life cycle, network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics,…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary