Deloitte - Delhi, OH

posted 16 days ago

Full-time - Mid Level
Delhi, OH
Professional, Scientific, and Technical Services

About the position

As a AM in our Cyber Team, you'll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. This role requires a deep understanding of computer intrusion activities, incident response techniques, tools, and procedures. You will be expected to have knowledge of Windows, Active Directory, DNS & Linux operating systems, and good experience in SIEM monitoring (QRadar, Sentinel). Additionally, knowledge of SOAR technologies, working with playbooks (Cortex, Phantom, Demisto) is essential. You will also need to have working experience and knowledge of ITSM tools for incident management, and must be action-oriented with a proactive approach to solving issues. The role involves developing and documenting enhanced event analysis and incident response processes and procedures.

Responsibilities

  • Build and nurture positive working relationships with teams and clients.
  • Exceed client expectations in service delivery.
  • Deep understanding of computer intrusion activities and incident response techniques.
  • Monitor SIEM tools and respond to incidents.
  • Develop and document enhanced event analysis and incident response processes.
  • Conduct log quality reviews and analyze security logs.

Requirements

  • Overall experience of at least 4+ years in SIEM monitoring and Cyber security Incident response and Management.
  • Hands-on experience with security tools and devices, operating systems, and/or networking devices.
  • Proven skills and experience in log analysis and incident investigations.
  • Experience working across diverse teams to facilitate solutions.
  • Willingness to work in a 24/7 environment in rotating shifts.
  • Ability to work in time-sensitive and stressful situations.
  • Strong knowledge of Cyber kill chain and MITRE ATT&CK framework.
  • Experience with EDR tools for Incident response and threat hunting.

Nice-to-haves

  • Industry certifications related to Cybersecurity.
  • Experience in digital forensics (Windows, Mac OS, Linux/Unix).
  • Experience reviewing raw logs and performing advanced data correlation and analysis.
  • Experience of malware analysis and understanding attack techniques.

Benefits

  • Hybrid working model.
  • Opportunities for professional growth and development.
  • Supportive work environment focused on inclusion and diversity.
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service