

KPMG US
Cyber Consultant (contract)
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Cyber Consultant (contract) with a pay rate of $50-$60 USD hourly, requiring a Bachelor's degree in a related field and 0-3 years of cybersecurity experience. Key skills include SIEM tools, data analysis, and strong communication.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
Unknown
-
ποΈ - Date
January 14, 2026
π - Duration
Unknown
-
ποΈ - Location
Unknown
-
π - Contract
Unknown
-
π - Security
Unknown
-
π - Location detailed
Austin, TX
-
π§ - Skills detailed
#Monitoring #Cybersecurity #SQL (Structured Query Language) #MIS Systems (Management Information Systems) #Python #Data Analysis #Security #Scripting #Visualization #Microsoft Power BI #Tableau #BI (Business Intelligence) #Computer Science #IP (Internet Protocol)
Role description
Responsibilities
β’ Monitor security alerts, events, and incidents in real-time using Security Information and Event Management (SIEM) and other security tools.
β’ Perform initial triage of security alerts, assessing their severity, relevance, and urgency to determine the appropriate response.
β’ Investigate security incidents, identify potential root causes, perform remediation actions, and assist in developing mitigation strategies.
β’ Analyze network traffic, system logs, and other data sources to identify patterns and anomalies indicative of security threats.
β’ Review and report on the efficacy of security monitoring tools, ensuring their optimal performance and effectiveness.
β’ Create detailed incident reports and maintain accurate records of security incidents and their resolutions.
β’ Collaborate with cross-functional teams, including incident responders and system administrators, to contain and remediate security incidents.
β’ Stay informed of emerging cybersecurity threats, vulnerabilities, and industry best practices through threat intelligence sources and research.
β’ Assist in the development and implementation of security procedures, and best practices.
β’ Participate in ongoing security awareness and technical security training.
β’ Communicate effectively with clients and stakeholders, provide timely updates on incident status, and remediation progress.
β’ Assist in preparing reports on security incidents, trends, and operational metrics ensuring transparency and actionable insights.
β’ Follow playbooks and reference guides during case triage and incident investigations.
Qualifications
β’ Bachelorβs degree in computer science, Information Technology, Cybersecurity, Management Information Systems, or a related field.
β’ 0-3 years of prior work experience in a relevant field, with a strong interest in cybersecurity.
β’ Basic understanding of cybersecurity principles, technologies, and network defense concepts.
β’ Familiarity with IT Security frameworks (e.g., MITRE, Cyber Kill Chain) is a plus.
β’ Strong analytical and critical thinking skills with keen attention to detail.
β’ Excellent verbal and written communication skills, with the ability to articulate technical information clearly.
β’ Ability to work effectively in a global team environment and drive results in a matrixed organization.
β’ Keen sense of ownership and accountability, with an eagerness to learn.
β’ Ability to quickly learn security products, tools, and processes to maintain the teamβs proficiency.
β’ Act with integrity, professionalism, and personal responsibility to uphold KPMG's respectful and courteous work environment
Preferred Qualifications
β’ Experience with Security Information and Event Management (SIEM) tools (e.g., Microsoft Sentinel, IBM QRadar, LogRhythm).
β’ Basic knowledge of data analysis/visualization tools (e.g., Excel, Tableau, Power BI, SQL).
β’ Relevant certifications such as CompTIA Security+, CySA+, or equivalent.
β’ Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
β’ Experience reviewing logs, network data, and attack artifacts for incident investigations.
β’ Experience addressing Phishing incidents.
β’ Familiar with Python or any scripting language
Pay Rate Range
Min Pay Rate Max Pay Rate Currency Unit 50 60 USD hourly
Benefits Information
N/A
Responsibilities
β’ Monitor security alerts, events, and incidents in real-time using Security Information and Event Management (SIEM) and other security tools.
β’ Perform initial triage of security alerts, assessing their severity, relevance, and urgency to determine the appropriate response.
β’ Investigate security incidents, identify potential root causes, perform remediation actions, and assist in developing mitigation strategies.
β’ Analyze network traffic, system logs, and other data sources to identify patterns and anomalies indicative of security threats.
β’ Review and report on the efficacy of security monitoring tools, ensuring their optimal performance and effectiveness.
β’ Create detailed incident reports and maintain accurate records of security incidents and their resolutions.
β’ Collaborate with cross-functional teams, including incident responders and system administrators, to contain and remediate security incidents.
β’ Stay informed of emerging cybersecurity threats, vulnerabilities, and industry best practices through threat intelligence sources and research.
β’ Assist in the development and implementation of security procedures, and best practices.
β’ Participate in ongoing security awareness and technical security training.
β’ Communicate effectively with clients and stakeholders, provide timely updates on incident status, and remediation progress.
β’ Assist in preparing reports on security incidents, trends, and operational metrics ensuring transparency and actionable insights.
β’ Follow playbooks and reference guides during case triage and incident investigations.
Qualifications
β’ Bachelorβs degree in computer science, Information Technology, Cybersecurity, Management Information Systems, or a related field.
β’ 0-3 years of prior work experience in a relevant field, with a strong interest in cybersecurity.
β’ Basic understanding of cybersecurity principles, technologies, and network defense concepts.
β’ Familiarity with IT Security frameworks (e.g., MITRE, Cyber Kill Chain) is a plus.
β’ Strong analytical and critical thinking skills with keen attention to detail.
β’ Excellent verbal and written communication skills, with the ability to articulate technical information clearly.
β’ Ability to work effectively in a global team environment and drive results in a matrixed organization.
β’ Keen sense of ownership and accountability, with an eagerness to learn.
β’ Ability to quickly learn security products, tools, and processes to maintain the teamβs proficiency.
β’ Act with integrity, professionalism, and personal responsibility to uphold KPMG's respectful and courteous work environment
Preferred Qualifications
β’ Experience with Security Information and Event Management (SIEM) tools (e.g., Microsoft Sentinel, IBM QRadar, LogRhythm).
β’ Basic knowledge of data analysis/visualization tools (e.g., Excel, Tableau, Power BI, SQL).
β’ Relevant certifications such as CompTIA Security+, CySA+, or equivalent.
β’ Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
β’ Experience reviewing logs, network data, and attack artifacts for incident investigations.
β’ Experience addressing Phishing incidents.
β’ Familiar with Python or any scripting language
Pay Rate Range
Min Pay Rate Max Pay Rate Currency Unit 50 60 USD hourly
Benefits Information
N/A






