Cyber Triage And Forensic Junior Analyst
Job in
695001, Thiruvananthapuram, Kerala, India
Listed on 2026-03-06
Listing for:
EY
Full Time
position Listed on 2026-03-06
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, Security Manager, Network Security
Job Description & How to Apply Below
Junior Security Analyst
-Cyber Defense CTF (Cyber Triage and Forensics)
Today's world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets!
Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
The opportunity
Cyber Triage and Forensics (CTF) - The Cyber Defense Response Center is responsible for monitoring and detecting information security events that could adversely impact EY information assets and resources. Its mission is aligned with the both the incident response and attack life cycles
A qualified candidate will have the opportunity to work with highly talent Cyber security professional experts to learn and develop new skills. Candidate will be exposed to many technologies and security tools whilst working with EY as well as career growth opportunity. CTF also deliver training to analysts to upskill.
Your
Key Responsibilities
Perform front line accurate and precise real-time monitoring and analysis correlation of logs/alerts from a multitude of security devices with a focus on the determination of what was said as events constitute security incidents.
Collaborate to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations.
The CTF Junior Security Analyst must be competent to work at a technical level, be capable of identifying threats and vectors that cause security events and be able to follow defined procedures for mitigating said threats.
Essential Functions of the Job :
Respond to network and host based security events
Participate in detecting, investigating, and resolving security events
Identify and propose areas for improvement within the Cyber Defense Response Center
Provide documentation and project support
Serve as an escalation point for difficult problems and complex inquiries
Server as shift lead when necessary
Conduct detailed security event analysis from network traffic attributes and host-based attributes ( binary analysis, etc) to identify information security incidents
Provide feedback on security control capability gaps based off of security intrusion trends
Develop and maintain analytical procedures to improve security incident identification efficiency
Demonstrate ability to drive process improvements and identify gaps
Skills And Attributes For Success
Information Security Principles, Technologies, and Practices
Experience with multiple security event detection platforms
Fair understanding of Linux, TCP/IP, Network Security, encryption standards etc
Aware of Types of attacks (DOS, DDOS etc)
Understand basic IDS / IPS rules to identify and/or prevent malicious activity
Aware of security log analysis.
Idea about various penetration testing and application testing methodology and tools is a definite plus.
Comfortable navigating and troubleshooting Linux and Windows system issues
To qualify for the role you must have
Capability of working independently
Soft Skills - Excellent communication skills; written and verbal.
Good Presentation skills
Good Investigative, analytical and problem solving skills
Ability to work in a team, with little supervision and using own initiative
Experience:
Minimum of 1-2 years of experience in one or more of the following:
Working in a Security Monitoring/Security Operations Center environment (SOC)
Experience investigating security events, threats and/or vulnerabilities
Understanding of electronic investigation and log correlation Proficiency with the latest intrusion detection platforms; working knowledge of Linux and/or Windows systems administration (Including AD).
Scripting or programming (Shell scripting, Power Shell, C, C#, Java, etc)
Qualifications, certifications and
Education requirements:
Under Graduate/Post Graduate Degree in…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×