Immediate Openings for Cyber-D&R- Threat Hunting-Gurgaon/Bengaluru/Hyderabad
Job details
Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Job Description The role requires providing expertise and leadership for Incident Response capabilities including good understanding of cyber incident forensics. It requires providing both subject matter expertise and project management experience to serve as the “point person” of client engagement in domain. The candidate shall pertain efficient incident response and remediation skills to minimise the impact of cyber risks. The individual will oversee and support security monitoring operations team and assist them during security incidents and ensure incidents are managed and responded effectively including and reporting to stakeholders. This role primarily consists of leading team of the Incident responders, Incident managers and stakeholders (including client, vendors, etc.) and to conduct thorough response activities on behalf of a wide variety of clients across sectors. Candidate is required to work in complex security environments and alongside SOC team to design, communicate and execute incident response, containment, and remediation plans. Candidate is required to have hands-on experience of incident management and investigation tools and shall be comfortable leading teams on challenging engagements, communicating with clients, providing hands-on assistance with incident response activities, and creating and presenting high-quality deliverables. Roles & Responsibilities
- Manage client engagements, with a focus on incident response and investigation. Provide both subject matter expertise and project management experience to serve as the “point person” for client engagements
- Assist with client incident scoping call and participate in the incident from kick-off through full containment and remediation.
- Security Analytics - Efficiently distil actionable information from large data sets for reporting, hunting, and anomaly detection.
- Recommend and document specific countermeasures and mitigating controls with post incident analysis findings
- Develop comprehensive and accurate reports and presentations for both technical and executive audiences
- Conduct Digital Forensic and Incident Response (DFIR) analysis, network log and network PCAP analysis, malware triage, and other investigation related activities in support of Incident Response investigations
- Supervise Digital Forensics and Incident Response staff, and assisting with performance reviews and mentorship of cybersecurity professionals
- Mature the Security Incident Response process to ensure it meets the needs of the Clients
- Interact with Client’s CSIRT teams to cater continuous and/or ad-hoc client requests for Incident Response services
- Possess the experience, credibility and integrity to perform as an expert witness.
- Involve in business development activities and supporting pre-sales teams in Identify, market, and develop new business opportunities
- Assist with research and distribute cyber threat intelligence developed from Incident Response activities
- Research, develop and recommend infrastructure (hardware & software) needs for DFIR and evolve existing methodologies to enhance and improve our DFIR practice.
- 10-14 years Information Security experience with at least 5 year of Incident Response experience.
- Solid understanding of MITRE ATT&CK, NIST cyber incident response framework and Cyber kill chain.
- Understanding of Threat Hunting and threat Intelligence concepts and technologies
- Experience of leveraging technical security solutions such as SIEM, IDS/IPS, EDR, vulnerability management or assessment, malware analysis, or forensics tools for incident triage and analysis.
- Deep experience with most common OS (Windows, MacOS, Linux, Android, iOS) and their file systems (ext3.4, NTFS, HFS+, APFS, exFAT etc)
- Proficiency with industry-standard forensic toolsets (i.e., EnCase, Axiom/IEF, Cellebrite/UFED, Nuix and FTK)
- Experience of enterprise level cloud infrastructure such as AWS, MS Azure, G Suite, O365 etc...
- Experience of malware analysis and understanding attack techniques.
- Ability to work in time-sensitive and complex situations with ease and professionalism, possess an efficient and versatile communication style
- Strong English verbal, written communication, report writing and presentations skills.
- Ability to multitask and prioritize work effectively.
- Responsive to challenging tasking.
- Highly motivated self-starter giving attention to detail.
- Strong analytical skills and efficient problem solving.
- Capable to operate in a challenging and fast-paced environment.
Apply safely
To stay safe in your job search, information on common scams and to get free expert advice, we recommend that you visit SAFERjobs, a non-profit, joint industry and law enforcement organization working to combat job scams.