The Role
The senior incident response manager role will be working in the Cyber Response Services (CRS) Team within our Risk Consulting practice, reporting directly into the head of cyber response.
Cyber security is one of the areas which KPMG has identified for tremendous investment and growth. Our clients face a challenging cyber threat and look to us to help them understand and respond to that threat.
This is a hands-on and operational management role with opportunities to grow into service line leadership. The successful candidate is expected to manage a broad range of cyber-security incidents as well as perform digital forensics (disk, volatile memory, network packets, logfiles) and help advance KPMG’s incident response processes and methodologies.
In this role we are looking for a person who can demonstrate strong technical background, significant experience in incident response and digital forensics and is looking to grow into an incident response leadership role as part of a growing team.
You will be expected to lead a number of incident response case managers and practitioners, as well as have the opportunity to work with, and learn from, the service leadership as part of your continuous development.
When not responding to incidents, you may be helping our clients to build their in-house incident response capabilities, which could include : building and developing cyber-response tools, authoring and adapting runbooks / playbooks, assessing the incident response maturity, assisting in table-top cyber-scenario exercises.
When not engaged in client work, you will be helping to develop our own delivery capability, including operational efficiency, standard operating procedures, team learning and development, tooling and platforms, lab development and orchestration.
Candidates should have a proven track record of incident management, with a strong competency in digital forensics. KPMG will provide training and coaching to help you continually improve both your management and technical skills.
Strong technical competency and experience of managing a range of complex cyber incidents; from ransomware to advanced network intrusions is a pre-requisite.
Our clients expect that cyber-incidents will be tackled with urgency, therefore, there is an expectation that you will be flexible in terms of working hours.
In addition, you should be prepared to travel on short notice for periods up to 2 or 3 weeks at a time.
Above all, KPMG is looking for someone who is passionate about helping our clients with their cyber security challenges, often at a time of critical need.
In return, we are committed to helping you to enjoy the role and develop your skills and career within the KPMG with the objective of progressing into a senior leadership role.
Responsibilities
The Person
scoping and triage, containment, evidence preservation and extraction, eradication, recovery, forensic analysis and investigation.
Qualifications and Skills
The successful candidate will demonstrate competency in computing and networks as well as in cyber-security either by having the relevant work experience, completed a degree or obtained industry relevant certification.
Therefore the qualifications below should be seen as means to demonstrate competency and not as a requirement. The desired skill and qualification is provided below :
Linux / Unix disk forensics (ext2 / 3 / 4, HFS+, and / or APFS file systems), advanced memory forensics, static and dynamic malware analysis / reverse engineering, advanced mobile device forensics
Preferred) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects.
Preferred) General information security certificates such CISSP, CISM or CISA.
Preferred) Incident management certifications such as : CREST certified incident manager (CCIM).GIAC Certified Incident Handler (GCIH)
Preferred) Digital forensics certificates such as : CREST certified registered intrusion analyst (CRIA),CREST certified network intrusion analyst (CCNIA),CREST certified host intrusion analyst (CCHIA),CREST certified malware reverse engineer (CCMRE),GIAC Certified (Network) Forensic Analyst (GCFA, GNFA)
Preferred) A current government security clearance (SC / DV) or willingness to acquire such a clearance will be seen as an advantage.