We are:
Accenture Federal Services, providing a tailored strategy to address the many cybersecurity challenges faced by customers in today’s ever-changing business and industry landscape. Our team delivers a wholistic approach to cybersecurity assessment, monitoring, investigation, and response. Whether we’re defending against identified threat actors, detecting and responding to the unknown, or running an entire security operations center, we build cyber resilience so our clients can grow with confidence in their security.
You are:
A Cyber Security professional and enthusiast, who is seeking opportunities to evolve his/her craft by understanding latest cyber threats and help clients identify intrusion in their respective environments. In order to effectively do this, you leverage cutting edge Security Information and Event Management (SIEM) data analytics, as well as network/endpoint detection and response technologies for investigating any malicious activity in customer’s on-prem and cloud environments.
The work:
- Perform monitoring and security incident triage through the review of SIEM events, network traffic data collection, and endpoint activity logs.
- Identify and collect data associated with initial security investigation findings through Splunk and Splunk SOAR platforms.
- Document and track investigations to resolution, along with potential escalation to incident responders for advanced analysis.
- Candidates must be open to working a rotating. shift schedule which includes night shift work.
Here’s What You Need:
- 1yr experience at SOC or Security experience
- BA or BS degree in a STEM field
- Training and certifications related to the position can be substituted in lieu of a degree, Relevant work Experience
- DoD 8570 Level II certifications such as Security+
Bonus Points if you have:
- Familiarity with Major SIEMs (Splunk, Elastic, Sentinel, ETC)
- Prior use of the SOAR platform to triage and escalate alerts to customer
- Knowledge of Windows forensic artifact
- Experience utilizing Microsoft Defender to create a timeline of alert events
- Relevant SANS Certifications to Cyber Defense
- Official Splunk certifications and or training
- Knowledge of AWS Security concepts and alerting
As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of California, Colorado, Hawaii, New York, Washington, and the District of Columbia. The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. We accept applications on an on-going basis and there is no fixed deadline to apply.
Los Angeles County Information Only
If you live in or expect to work from Los Angeles County if hired for this position, please review below for important additional information.
Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed in the job posting, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, meet client expectations, standards, and accompanying requirements, and safeguard business operations and company reputation. Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, Los Angeles Fair Chance Initiative for Hiring Ordinance, and San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
Requesting An Accommodation