Job title: SOC Level 1/2
About
At Deloitte, we do not offer you just a job, but a career in the highly sought-after risk Management field. We are one of the business leaders in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Deloitte’s clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security.
By joining us, you will get to work with diverse teams of professionals who design, manage, and implement risk-centric solutions across a variety of domains. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter experts in those areas.
Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and RPA to solve Deloitte’s clients‘ most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions.
The Team
Cyber & Strategic Risk
We help organizations create a cyberminded culture, reimagine risk to uncover strategic opportunities, and become faster, more innovative, and more resilient in the face of ever-changing threats. As organizations are called upon to align their priorities and to drive core business objectives and reduce risk, our cyber and strategic risk management team helps clients focus on enterprise level risks through a wider lens.
Deloitte’s Detect & Respond (D&R) aims to combine sophisticated technologies and human intelligence to help the clients monitor, detect, investigate, and respond to known and unknown attacks. We help our clients to be secure, vigilant, and resilient in the face of an ever-increasing array of cyber threats and vulnerabilities. Detect and Respond team delivers service to clients through following key areas:
- Threat detection and response
- Attack surface management
- Threat Intelligence
- Threat Hunting
- Data Protection
Work you’ll do
- As a Fusion Level 1/2 Consultant you will support the Security Operations Center (SOC) as the first line of defense to identify potential information security incidents.
- Monitor client sources of potential security incidents, health alerts with monitored solutions and requests for information. This includes the monitoring of real-time channels or dashboards, periodic reports, email inboxes, helpdesk or other ticketing system, telephone calls, chat sessions.
- Follow client and incident-specific procedures to perform triage of potential security incidents to validate and determine needed mitigation.
- Escalate potential security incidents to client personnel, implements countermeasures in response to others, and recommend operational improvements.
- Keep accurate incident notes in case management system.
- Maintain awareness of the client’s technology architecture, known weaknesses, the architecture of the security solutions used for monitoring, imminent and pervasive threats as identified by client threat intelligence, and recent security incidents.
- Provide advanced analysis of the results of the monitoring solutions, asses escalated outputs and alerts from Level 1 Analysts.
- Perform web hunting for new patterns/activities.
- Advise on content development and testing.
- Provide advice and guidance on the response action plans for information risk events and incidents based on incident type and severity.
- Ensure that all identified events are promptly validated and thoroughly investigated.
- Provide end-to-end event analysis, incident detection, and manage escalations using documented procedures.
- Devise and document new procedures and runbooks/playbooks as directed.
- Assist the Shift Leads and fulfill Shift Lead responsibilities in their absence.
- Maintain monthly Service Level Agreements (SLAs).
- Maintain compliance with processes, runbooks, templates and procedures-based experience and best practices.
- Assist Cyber Hunting team with advanced investigations as needed.
- Provide malware analysis (executables, scripts, documents) to determine indicators of compromise, and create signatures for future detection of similar samples.
- Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying and recommending new or updated tools, content, countermeasures, scripts, plug-ins, etc.
- Perform peer reviews and consultations with Level 1 analysts regarding potential security incidents.
- Serve as a subject matter expert in at least one security-related area (e.g. specific malware solution, python programming, etc.)
- Actively seek self-improvement through continuous learning and pursuing advancement to a SOC Shift Lead.
- Provide shift status and metric reporting.
- Support weekly Operations calls.
- Adhere to internal operational security and other Deloitte policies.
- Perform light project work as assigned.
Required skills
- 2+ years working in a SOC and/or strong security technology operations experience.
- Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent.
- Able to work shifts on a rotating basis for 24/7 support of clients.
- Experience in security technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, etc.
- Knowledge of Advanced Persistent Threats (APT) tactics, technics and procedures.
- Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
- Understanding of common network infrastructure devices such as routers and switches.
- Understanding of basic networking protocols such as TCP/IP, DNS, HTTP.
- Basic knowledge in system security architecture and security solutions.
Preferred skills
- Excellent interpersonal and organizational skills.
- Excellent oral and written communication skills.
- Strong analytical and problem-solving skills.
- Self-motivated to improve knowledge and skills.
- A strong desire to understand the what as well as the why and the how of security incidents.
Qualification
• Bachelor’s degree is required. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology.