Job Description
As a Level 2 Consultant in the MDR Response Team at KPMG, your primary role will involve executing operational tasks meticulously based on documented processes. You will monitor SIEM tools for security events, escalate or resolve incidents, maintain group email addresses, and update relevant documentation. Additionally, you will assist in incident workflows and collaborate with external teams for incident resolution.
Key Responsibilities:
- Validate alerts to eliminate false positives and enrich them with additional context from internal and external sources.
- Perform triage of service requests and escalate alerts to Level 2 Analysts for further investigation and resolution.
- Assist in containing threats, conducting incident remediation, and participating in Threat Hunting activities.
- Document event analysis, write comprehensive incident reports, and enhance security-related operational processes.
- Use security tools for historical analysis, maintain shift logs, and update the knowledgebase tool.
- Conduct research on events of interest within the IT Security scope and monitor and analyze various security systems for threat identification.
- Troubleshoot security monitoring devices and handle high-severity incidents as per the operations playbook.
Qualifications Required:
- 5+ years of technical experience in Information Security.
- Bachelors degree in information security, Computer Science, Engineering, Technology, or related fields.
- Good communication skills and the ability to lead client calls.
- Knowledge of security best practices, network security fundamentals, and various security tools.
- Strong problem-solving skills, analytical abilities, and a keen interest in the cyber threat landscape.
- Hands-on experience in tools like Microsoft Sentinel, EDR tools, Incident Response processes, and log analysis.
- Familiarity with TCP/IP protocol, OSI Seven Layer Model, and network security devices.
- Ability to work under pressure, manage time effectively, and deliver results within tight deadlines.
- Experience with ticketing tools like ServiceNow, Jira, and certifications like Security+, C|EH, CISSP, or equivalent would be advantageous. As a Level 2 Consultant in the MDR Response Team at KPMG, your primary role will involve executing operational tasks meticulously based on documented processes. You will monitor SIEM tools for security events, escalate or resolve incidents, maintain group email addresses, and update relevant documentation. Additionally, you will assist in incident workflows and collaborate with external teams for incident resolution.
Key Responsibilities:
- Validate alerts to eliminate false positives and enrich them with additional context from internal and external sources.
- Perform triage of service requests and escalate alerts to Level 2 Analysts for further investigation and resolution.
- Assist in containing threats, conducting incident remediation, and participating in Threat Hunting activities.
- Document event analysis, write comprehensive incident reports, and enhance security-related operational processes.
- Use security tools for historical analysis, maintain shift logs, and update the knowledgebase tool.
- Conduct research on events of interest within the IT Security scope and monitor and analyze various security systems for threat identification.
- Troubleshoot security monitoring devices and handle high-severity incidents as per the operations playbook.
Qualifications Required:
- 5+ years of technical experience in Information Security.
- Bachelors degree in information security, Computer Science, Engineering, Technology, or related fields.
- Good communication skills and the ability to lead client calls.
- Knowledge of security best practices, network security fundamentals, and various security tools.
- Strong problem-solving skills, analytical abilities, and a keen interest in the cyber threat landscape.
- Hands-on experience in tools like Microsoft Sentinel, EDR tools, Incident Response processes, and log analysis.
- Familiarity with TCP/IP protocol, OSI Seven Layer Model, and network security devices.
- Ability to work under pressure, manage time effectively, and deliver results within tight deadlines.
- Experience with ticketing tools like ServiceNow, Jira, and certifications like Security+, C|EH, CISSP, or equivalent would be advantageous.
Want AI-powered job matching?
Upload your resume and get every job scored, your resume tailored, and hiring manager emails found - automatically.
Get Started Free