Associate Director

December 26, 2022

Job Overview

  • Date Posted
    December 26, 2022
  • Location
  • Expiration date
    --

Job Description


What impact will you make?

Every day, your work will make an impact that matters, while you thrive in a dynamic culture of inclusion, collaboration and high performance. As the undisputed leader in professional services, Deloitte is where you’ll find unrivaled opportunities to succeed and realize your full potential
Deloitte is where you’ll find unrivaled opportunities to succeed and realize your full potential.

 

The Team

Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks.
Learn more about our Cyber Risk Practice.

 

Work you’ll do

As a part of our Risk Advisory team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. The Cyber Risk Services – Cyber Vigilance & Operations practice helps organizations in assessing and establishing their cyber security appetite via the Secure. Vigilant. Resilient. programs, and also in assisting in the ongoing management, maintenance, and adaptation of their programs, as the business and threat environments change. The Cyber Risk Services – CVO team delivers service to clients through following key areas of cyber security:
• Extensive experience in Pre-Sales, Security outsourcing, Marketing and Alliances
• Lead pursuit qualification, response and closing of opportunities.
• Architect solutions and respond to proposals for enterprise customers, meeting basic requirements and also identifying & proposing transformation solutions.
• Manage technical peers and validate solutions and effort estimates, cost models and work with risk processes for solution review and approval.
• Expertise in security and privacy controls and the risk management process focused on Cyber Threat Management services.
• Manage information security programs for the assigned client which consists of direct reports working on-site at the client location.
• Providing strategic risk guidance for clients, including the evaluation and recommendation of technical controls.
• Knowledge of advanced persistent threats, malware, emerging threats as well as experience in a large corporate environment.
• Understanding of attacks, attack vectors, kill chain methodology, and expertise in big data and complex queries across multiple platforms
• Strong understanding of malware analysis, threat taxonomy and threat indicators
• Ability to work with multiple security technologies, platforms including SIEMs, IDS /IPS, Firewalls, Web application firewalls, proxy etc.
• Expertise in one or more Cyber Threat Management domains such as: Assessment Services, Application Security, Vulnerability Management, Infrastructure Security, Threat Management, Cyber Operations/Fusion Managed Services, Incident Management and Data Protection solutions.

• Facilitate use of technology-based tools or methodologies to review, design and/or implement new products and services
• Create a learning environment through leadership
• Manage a team of infrastructure specialists to support internal and external devices and applications
• Strong understanding of industry standards and frameworks such as OWASP, CIS, NIST ISO/IEC 17799, etc.
• Expertise in security and privacy controls and risk management processes
• Hands-on expert on vulnerability assessment tools (such as: Nessus, nmap, Appscan, etc.) and Infrastructure Security solutions.
• Concentrates on capability building for self
• Explore/learn new Threat management technologies and supports leads and analysts
The key skills required are as follows:
• Excellent working knowledge of:
o Server platforms (UNIX, Windows etc)
o Networking technologies
o Security (Firewalls, IDS/IPS, proxy systems etc.)
o Storage devices
• Good understanding of Agile, Software and System Development Lifecycle
• Hands on with Regular Expression, PERL or Python
• Experience with code versioning and collaborative tools
• Excellent documentation and verbal skills
• Extensive experience in PHP development using modern OOP model
• Installing and configuring SIEM software for Enterprise solutions
• SIEM performance management (i.e. problem identification, resolving issues) at an Enterprise level.
• Architecting SIEM systems/components (i.e. architectural decision, component deployment) at an Enterprise level
• Good working knowledge of one or more of the following topics:
o Operating systems (UNIX, Linux, Windows)
o Networking
o Security technologies (SIEM, firewalls, IDS/IPS, HIPS, proxies, vulnerability scanners, AV, etc.)
o Penetration testing and ethical hacking
o Vulnerability assessment and management
• Industry certifications (CISSP, GIAC – GREM/GCIH/GCIA/GCFA) are a strong asset
• Basic expertise in scripting languages (Python, shell, etc.)
• Strong communication skills (written & verbal)
• Subject matter knowledge in Comp Science & Electronics
• Working knowledge of computer systems (operating systems, databases, applications etc.)
• Working knowledge of TCP/IP and networking concepts
• Basic technical documentation skills and understanding of SDLC processes

 

Qualifications

1. B.Tech / BE / M.Tech / MCA /MBA/MS
2. Preferred: Qradar, Splunk, ArcSight Certification, CEH, SANS
3. Desirable: OSCP, Security+, SSCP, CISSP, CISM