Job Title:  RA-Cyber-D&R-SOC_Thane CEC

Job requisition ID ::  52047
Date:  May 25, 2023
Location:  Mumbai - I-Think
Designation:  Consultant


What impact will you make?


Every day, your work will make an impact that matters, while you thrive in a dynamic culture of inclusion, collaboration and high performance. As the undisputed leader in professional services, Deloitte is where you’ll find unrivaled opportunities to succeed and realize your full potential


The Team


Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks.


Work you’ll do


Job Description


The role requires providing expertise and leadership for Incident Response capabilities including good understanding of cyber incident forensics. It requires providing both subject matter expertise and project management experience to serve as the “point person” of client engagement in domain.


The candidate shall pertain efficient incident response and remediation skills to minimise the impact of cyber risks. The individual will oversee and support security monitoring operations team and assist them during security incidents and ensure incidents are managed and responded effectively including and reporting to stakeholders. This role primarily consists of leading team of the Incident responders, Incident managers and stakeholders (including client, vendors, etc.) and to conduct thorough response activities on behalf of a wide variety of clients across sectors.


Candidate is required to work in complex security environments in SOC team to design, communicate and execute incident response, containment and remediation plans. Candidate is required to have hands-on experience of incident management and investigation tools and shall be comfortable leading teams on challenging engagements, communicating with clients, providing hands-on assistance with incident response activities, and creating and presenting high-quality deliverables.


Roles ::


  • CTM (Cyber Threat Management)
  • Incident Response
  • Malware Analysis
  • EDR Admin ( Endpoint Detection Response)
  • Python Developer
  • Security Analytics
  • Threat Hunter
  • SOC Lead


Responsibilities/ KRA’s ::


CTM -:

  • Good Experience in SOC monitoring though Splunk SIEM
  • Knowledge of SOAR technologies, working with playbooks (Cortex, Phantom, Demisto)
  • Working experience and knowledge of ITSM tools for incident management.



Incident Response -:

  • Track, monitor incident actions while applying intelligence, situational awareness to prioritise incident actions based on risk
  • Responsible for Incident and Breach communications, assessments, and reports and customer facing, to include leadership and executive management for the purpose of enabling Senior Management to make decisions in a crisis.
  • Experience on EDR tools for Incident response and threat hunting (Crowdstrike, Cortex XDR, MS Defender, Sentinel One)


Malware Analysis -:

  • Documenting malware threats
  • Identifying procedures and techniques to avoid malware threats
  • Classifying malware by threats and commonalities
  • Keeping updated on the latest malware threats
  • Keeping an organization’s software updated to defend against the latest malware threats


EDR Admin -:

  • Lead and oversee deployment, operation, and maintenance of the global EDR platform
  • Provide support response to other security teams in respect to the EDR platform
  • Identify adjustments and modifications for configuration
  • Identify new opportunities for tools to incorporate into the EDR platform
  • Splunk experience is mandatory


Threat Hunter -:


  • Person having experience with Forensics & Incident Response will also be considered.
  • Knowledge on SIEM tools like Splunk and Sentinel Knowledge on EDR tools like Defender ATP, CrowdStrike and Carbon Black Tools like Sysmon, PowerShell, Proxy, E-mail Security Cyber Network Operations/Penetration Test Methodologies and tools like Metasploit, Kali Linux, Cobalt Strike, Atomic red team etc.
  • Certifications like GCFA, GNFA, GCIH, OSCP, GPEN are desirable


SOC Lead -:


  •  Familiarity and experience in implementation of or two SIEM products (QRadar, SA, Splunk, Arcsight etc).
  •  Install / configure / build / finetune the SIEM tools to setup an effective information security support / operations.
  •  Establish KPI, review & manage security logs and provide reports based on KPI and metrics.
  •  Ability to develop solution architecture design and implementation for security projects


Skills required


  • 5-14 years Information Security experience with at least 5 year of Incident Response experience.
  • Understanding of Incident Response standards including investigation management experience.
  • Security Incident Process knowledge to help and guide SOC analysts and Engineers
  • Strong understanding of the IR process and familiarity with known IR standards. Strong knowledge of host and network forensic tools and techniques.
  • Understanding of Threat Hunting and threat Intelligence concepts and technologies
  • Experience of leveraging technical security solutions such as SIEM, IDS/IPS, EDR, vulnerability management or assessment, malware analysis, or forensics tools for incident triage and analysis
  • Experience with host-based forensic analysis and techniques including tools like Encase, FTK, Nuix etc.
  • Experience of host-based forensic analysis and techniques
  • Experience of malware analysis and understanding attack techniques.
  • Experience of network analysis
  • Experience with Web Proxy, MDM, DLP, and NAC a plus
  • Industry certifications such as ECIH v2, CHFI, GCIH or GCIA along with experience will be a bonus. Experience in lieu of certification will be taken into consideration
  • Ability to work in time-sensitive and complex situations with ease and professionalism, possess an efficient and versatile communication style
  • Good verbal and written communication skill, excellent interpersonal skills


  • Strong English verbal, written communication, report writing and presentations skills.
  • Ability to multitask and prioritize work effectively.
  • Responsive to challenging tasking.
  • Highly motivated self-starter giving attention to detail.
  • Strong analytical skills and efficient problem solving.
  • Capable to operate in a challenging and fast-paced environment.



Your role as a leader


At Deloitte India, we believe in the importance of leadership at all levels. We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society and make an impact that matters.


In addition to living our purpose, across our organization:


  • Builds own understanding of our purpose and values; explores opportunities for impact
  • Demonstrates strong commitment to personal learning and development; acts as a brand ambassador to help attract top talent
  • Understands expectations and demonstrates personal accountability for keeping performance on track
  • Actively focuses on developing effective communication and relationship-building skills
  • Understands how their daily work contributes to the priorities of the team and the business