Description:
The senior incident response manager role will be working in the Cyber Response Services (CRS) Team within our Risk Consulting practice, reporting directly into the head of cyber response. Cyber security is one of the areas which KPMG has identified for tremendous investment and growth. Our clients face a challenging cyber threat and look to us to help them understand and respond to that threat.
This is a hands-on and operational management role with opportunities to grow into service line leadership. He should have good hands-on experience in enterprise Network & Security. The successful candidate is expected to manage a broad range of cyber-security incidents as well as perform digital forensics (disk, volatile memory, network packets, logfiles) and help advance KPMG’s incident response processes and methodologies. In this role we are looking for a person who can demonstrate strong technical background, significant experience in Network & Security, incident response and digital forensics and is looking to grow into an incident response leadership role as part of a growing team.
Responsibilities:
- Manage and co-ordinate cyber security incidents for our clients, working closely with the head of cyber response.
- Digital forensics of relevant incident data (disk, volatile memory, network packets, log files).
- Maintaining a current view of the cyber threat and being able to advise clients on the threat landscape and attacks which may be relevant to them.
- Manage the development of KPMGs in house cyber-response tools.
- Assess client incident response capability maturity.
- Help stand-up or improve clients’ own incident response & Network Security capabilities.
- Project management of engagements to deliver high quality work in a timely manner, including:
- Scoping and costing of engagements
- Financial management of projects
- Engagement and risk management
- Production and review of deliverables to a high standard.
- Liaising with clients on delivery, implementation and project issues.
- Ability to generate well-structured responses to bids and requests for proposals.
- Requirements
- The successful candidate will demonstrate competency in computing and networks as well as in cyber-security either by having the relevant work experience, completed a degree or obtained industry relevant certification. Therefore, the qualifications below should be seen as means to demonstrate competency and not as a requirement. The desired skill and qualification is provided below:
- Excellent communication skills (both written and oral) and project management skills.
- Strong IT and network skills – knowledge of common enterprise technologies – Windows and
- Windows Active Directory, Linux, Cisco, etc.
- Working programming skill-set to be able to author and develop tools. Most in-house security tools in
- KPMG are written in Python, but we accept that a competent programmer will be able to transfer skillsets across languages.
- Technical proficiency in at least one of these areas: network security/traffic/log analysis; Linux and/or Mac/Unix operating system forensics; Linux/Unix disk forensics (ext2/3/4, HFS+, and/or APFS file systems), advanced memory forensics, static and dynamic malware analysis / reverse engineering, advanced mobile device forensics
- Advanced experience in industry computer forensic tools such as X-Ways, EnCase, FTK, Internet
- Evidence Finder (IEF) / AXIOM, TZWorks, and/or Cellebrite
- Advanced experience in preservation of digital evidence (including experience preserving cloud data and handling encryption such as BitLocker, FileVault, and/or LUKS)
- Experience with and understanding of enterprise Windows security controls
Requirements :
Qualifications and Education requirements
- Minimum qualifications required: B.E/B. Tech or Equivalent
- Excellent communication skills (both written and oral) and project management skills. Abilities: Good soft skills and team player
- (Preferred) General information security certificates such CISSP, CISM or CISA.
- (Preferred) Incident management certifications such as:
- CREST certified incident manager (CCIM).
- GIAC Certified Incident Handler (GCIH)
- (Preferred) Digital forensics certificates such as:
- CREST certified registered intrusion analyst (CRIA),
- CREST certified network intrusion analyst (CCNIA),
- CREST certified host intrusion analyst (CCHIA),
- CREST certified malware reverse engineer (CCMRE),
- GIAC Certified (Network) Forensic Analyst (GCFA, GNFA)
- Experience: 8 – 10 years