Are you interested in improving the cyber and organizational risk profiles of leading companies?
If yes, then Deloitte’s Detect and Respond team could be the place for you! Transparency, innovation, collaboration, sustainability: these are the hallmark issues shaping cyber initiatives today. Deloitte’s D&R business is passionate about making an impact with lasting change. Delivering our industry leading services requires fresh thinking and a creative approach. We collaborate with teams from across our organization in order to bring the full breadth of Deloitte, its commercial and public sector expertise, to best support our clients. Our aspiration is to be the premier integrated services provider in helping to transform the cyber security services marketplace.
Our team is client focused and mission driven. As a Cyber Threat Intelligence Manager at Deloitte, you’ll work with our diverse teams of passionate professionals to help solve for some of today’s toughest cybersecurity challenges to enable or clients to achieve business growth and manage risk.
Work you’ll do
You will assist our clients with identifying unauthorized activities and intrusions in their networks in real time as part of a team of engineers and analysts around the world who specialize in the tactics, tools and procedures used by cyber criminals. This position is primarily focused on APT actors and their activities. We’re looking for an intel analyst with deep knowledge of Advanced Persistent Threat (APT) campaigns, TTPs and activities, and indicators of compromise.
APTs-Focused, works within an interdisciplinary team that develops advanced analytical frameworks, tools and research methodologies in order to identify emerging cyber threats
Collect information used to analyze the political, economic, social, and behavioral aspects of malicious cyber activity
Contribute to cyber threat intelligence products for our clients
Research and monitor underground forums, chat channels, and, social media, the identification and analysis of security incidents using open source and internal sources to assess severity and identify responsible parties, including hacktivist groups and actors
Assist in producing a comprehensive operating picture and cyber security situational awareness
Work with various intelligence collection and reporting tools and frameworks to produce reports
Collect, process, catalog, and document information using an ALL-SOURCE approach and various technical and human means on cyber-security topics as required based on defined intelligence requirements
Respond to requests for ad-hoc reporting and research topics from management and analysts as required
Identify gaps in available intelligence information and engage with leadership on strategies to meet intelligence requirements through Intelligence collection processes
Quickly understand and deliver on company and customer requirements
Deal professionally with potentially offensive, profane, and obscene materials encountered during the course of investigations and research
Aid in and participate in daily, weekly, quarterly, and yearly production reporting for clients, partners, and internal teams
Adhere to internal operational security and other Deloitte policies
Qualifications
Required:
Bachelor’s degree or higher in Threat Intelligence, Information Security, Information Technology, Computer Science, Math, or any other related area
5+ years of experience working in cyber intelligence, information security, incident response, red team operations, reverse engineering, or other technical cyber security roles
Extensive knowledge of Advanced Persistent Threats (APT) tactics, technics and procedures
Understanding of possible attack activities such as network probing/scanning, DDOS, malicious code activity, etc.
Understanding of basic networking protocols such as TCP/IP, DNS, HTTP
Outstanding written and oral communication skills and the ability to prioritize work
Good understanding of global geopolitical dynamics and the ability to apply that knowledge to an information security context
Proven ability to understand and explain the behaviors of different types of complex organizations, from APT groups to clients
Proven ability to translate complex information sets into specific recommendations that can be actioned by customers to enhance their security posture
Familiarity with cyber threats, defenses, motivations and techniques
Experience with intelligence analysis tools, methods and the intelligence lifecycle
Experience distilling raw information into actionable and finished intelligence
Ability to write analytical information products
Ability to construct and analyze social network graphs
Limited immigration sponsorship may be available
Travel up to 30% (While 30% of travel is a requirement of the role, due to COVID-19, non-essential travel has been suspended until further notice)
Preferred:
Outstanding written and oral communication skills and the ability to prioritize work
Knowledge of foreign languages is a plus (Russian, Farsi, Arabic, Mandarin, Korean)
Strong understanding of threat analysis and enterprise level, mitigation strategies
Working knowledge of how malicious code operates and how technical vulnerabilities are exploited
Knowledge of operating systems and networking technologies in general
Knowledge of databases, query design, and how to analyze data thus obtained
Knowledge of toolsets such as Confluence, Jira
Excellent interpersonal and organizational skills
Excellent oral and written communication skills
Strong analytical and problem-solving skills
Self-motivated to improve knowledge and skills
A strong desire to understand the what as well as the why and the how of security incidents
Apply Now
To help us track our recruitment effort, please indicate your email/cover letter where (vacanciesinukraine.com) you saw this job posting.