Are you interested in improving the cyber and organizational risk profiles of leading companies? Do you like solving mysteries and enjoy the thrill of thwarting cyber-attacks? Do you want to be involved in delivering D&R Managed / Security Operations Center (SOC) Services including identifying unauthorized activities and intrusions in their networks in real time? Are you excited about rapidly changing operational environments, learning what you need to get the job done, and producing accurate and timely results?
If yes, then Deloitte's D&R Managed Services team could be the place for you! Transparency, innovation, collaboration, sustainability: these are the hallmark issues shaping cyber initiatives today. Deloitte's D&R business is passionate about making an impact with lasting change.
Delivering our industry leading services requires fresh thinking and a creative approach. We collaborate with teams from across our organization to bring the full breadth of Deloitte, including its commercial and public sector expertise, to best support our clients
Our team is client focused and mission driven. As a Level 2 Analyst in Deloitte's D&R Managed Services, you'll work with our diverse teams of passionate professionals to help solve some of today's toughest cybersecurity challenges to enable our clients to proactively identify, triage and respond to attackers.
Work you'll do
As a D&R Level 1 Analyst you will support the Security Operations Center (SOC) as the first line of defense to identify potential information security incidents.
Work with a team of cyber professionals to monitor client sources of potential security incidents, health alerts with monitored solutions and requests for information. This includes the monitoring of real-time channels or dashboards, periodic reports, email inboxes, helpdesk or other ticketing system, telephone calls, chat sessions
Follow client and incident-specific procedures to perform triage of potential security incidents to validate and determine needed mitigation
Escalate potential security incidents to client personnel, implements countermeasures in response to others, and recommend operational improvements
Keep accurate incident notes in case management system
Maintain awareness of the client's technology architecture, known weaknesses, the architecture of the security solutions used for monitoring, imminent and pervasive threats as identified by client threat intelligence, and recent security incidents
Ensure that all identified events are promptly validated and thoroughly investigated
Provide end-to-end event analysis, incident detection, and manage escalations using documented procedures
Maintain compliance with processes, runbooks, templates and procedures-based experience and best practices
Assist Cyber Hunting team with advanced investigations as needed
Provide malware analysis (executables, scripts, documents) to determine indicators of compromise, and create signatures for future detection of similar samples
Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying, and recommending new or updated tools, content, countermeasures, scripts, plug-ins, etc.
Adhere to internal operational security and other Deloitte policies
Perform light project work as assigned
Location: Deloitte D&R Services are provided from one of our world-class Security Operations Center locations:
Rosslyn, VA
Mechanicsburg, PA
Colorado Springs, CO
This position is non-remote, analysts are required to be physically present in one of our above SOC locations.
Qualifications:
Required:
Basic knowledge in system security architecture and security solutions
Understanding of basic networking protocols such as TCP/IP, DNS, HTTP
Understanding of common network infrastructure devices such as routers and switches
Able to work shifts on a rotating basis for 24/7 support of clients
Understanding of possible attack vectors such as network probing/ scanning, DDOS, malicious code activity, etc.
Travel up to 10% (While 10% of travel is a requirement of the role, due to COVID-19, non-essential travel has been suspended until further notice)
Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
Located within daily commute distance to one of Deloitte's D&R SOC locations
Preferred:
Certifications including Security+, GIAC Certified Incident Handler or GIAC Certified Intrusion Analyst
Technology-Specific training:
Splunk Core User
CrowdStrike Certified Falcon Responder
Amazon Web Services Certified Cloud Practitioner
Google Associate Cloud Engineer
Excellent interpersonal and organizational skills
Excellent oral and written communication skills
Strong analytical and problem-solving skills
Self-motivated to improve knowledge and skills
A strong desire to understand the what as well as the why and the how of security incidents
The team
Deloitte D&R team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive Secure.Vigilant.Resilient. TM cyber risk programs. Join the team developing the future state of cyber risk solutions.