Associate Director
Job Overview
-
Date PostedDecember 26, 2022
-
Location
-
Expiration date--
Job Description
What impact will you make?
Every day, your work will make an impact that matters, while you thrive in a dynamic culture of inclusion, collaboration and high performance. As the undisputed leader in professional services, Deloitte is where youll find unrivaled opportunities to succeed and realize your full potential
Deloitte is where youll find unrivaled opportunities to succeed and realize your full potential.
The Team
Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilientnot only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks.
Learn more about our Cyber Risk Practice.
Work youll do
As a part of our Risk Advisory team, youll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. The Cyber Risk Services Cyber Vigilance & Operations practice helps organizations in assessing and establishing their cyber security appetite via the Secure. Vigilant. Resilient. programs, and also in assisting in the ongoing management, maintenance, and adaptation of their programs, as the business and threat environments change. The Cyber Risk Services CVO team delivers service to clients through following key areas of cyber security:
Extensive experience in Pre-Sales, Security outsourcing, Marketing and Alliances
Lead pursuit qualification, response and closing of opportunities.
Architect solutions and respond to proposals for enterprise customers, meeting basic requirements and also identifying & proposing transformation solutions.
Manage technical peers and validate solutions and effort estimates, cost models and work with risk processes for solution review and approval.
Expertise in security and privacy controls and the risk management process focused on Cyber Threat Management services.
Manage information security programs for the assigned client which consists of direct reports working on-site at the client location.
Providing strategic risk guidance for clients, including the evaluation and recommendation of technical controls.
Knowledge of advanced persistent threats, malware, emerging threats as well as experience in a large corporate environment.
Understanding of attacks, attack vectors, kill chain methodology, and expertise in big data and complex queries across multiple platforms
Strong understanding of malware analysis, threat taxonomy and threat indicators
Ability to work with multiple security technologies, platforms including SIEMs, IDS /IPS, Firewalls, Web application firewalls, proxy etc.
Expertise in one or more Cyber Threat Management domains such as: Assessment Services, Application Security, Vulnerability Management, Infrastructure Security, Threat Management, Cyber Operations/Fusion Managed Services, Incident Management and Data Protection solutions.
Facilitate use of technology-based tools or methodologies to review, design and/or implement new products and services
Create a learning environment through leadership
Manage a team of infrastructure specialists to support internal and external devices and applications
Strong understanding of industry standards and frameworks such as OWASP, CIS, NIST ISO/IEC 17799, etc.
Expertise in security and privacy controls and risk management processes
Hands-on expert on vulnerability assessment tools (such as: Nessus, nmap, Appscan, etc.) and Infrastructure Security solutions.
Concentrates on capability building for self
Explore/learn new Threat management technologies and supports leads and analysts
The key skills required are as follows:
Excellent working knowledge of:
o Server platforms (UNIX, Windows etc)
o Networking technologies
o Security (Firewalls, IDS/IPS, proxy systems etc.)
o Storage devices
Good understanding of Agile, Software and System Development Lifecycle
Hands on with Regular Expression, PERL or Python
Experience with code versioning and collaborative tools
Excellent documentation and verbal skills
Extensive experience in PHP development using modern OOP model
Installing and configuring SIEM software for Enterprise solutions
SIEM performance management (i.e. problem identification, resolving issues) at an Enterprise level.
Architecting SIEM systems/components (i.e. architectural decision, component deployment) at an Enterprise level
Good working knowledge of one or more of the following topics:
o Operating systems (UNIX, Linux, Windows)
o Networking
o Security technologies (SIEM, firewalls, IDS/IPS, HIPS, proxies, vulnerability scanners, AV, etc.)
o Penetration testing and ethical hacking
o Vulnerability assessment and management
Industry certifications (CISSP, GIAC GREM/GCIH/GCIA/GCFA) are a strong asset
Basic expertise in scripting languages (Python, shell, etc.)
Strong communication skills (written & verbal)
Subject matter knowledge in Comp Science & Electronics
Working knowledge of computer systems (operating systems, databases, applications etc.)
Working knowledge of TCP/IP and networking concepts
Basic technical documentation skills and understanding of SDLC processes
Qualifications
1. B.Tech / BE / M.Tech / MCA /MBA/MS
2. Preferred: Qradar, Splunk, ArcSight Certification, CEH, SANS
3. Desirable: OSCP, Security+, SSCP, CISSP, CISM