Position Summary

Cyber 

Deloitte Cyber understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful insights to help our clients navigate the ever-changing threat design, and technology as we partner with clients to transform finance. 

Position Summary 

Level: Solution Delivery Lead 

Work you’ll do: 

  • Works on projects with clearly defined guidelines as team member with responsibility for project delivery 
  • Works on the projects with clearly defined guidelines such as standard operating procedures 
  • Adheres to Service Level Agreements 
  • Works under general supervision with few direct instructions 
  • Performs development and customization work on larger security and data protection technology implementation projects 
  • Understands basic business and information technology management processes. 
  • Demonstrates knowledge of firm apposes methodologies, frameworks and tools (required) 
  • Participate in practice development initiatives 

The Team: 

Cyber Defense & Resilience teams empower clients to defend against advanced cyber threats by transforming security operations and leveraging technology, data analytics, and threat intelligence for continuous monitoring and rapid incident response. They help organizations manage dynamic attack surfaces and recover from disruptions through services like operational resilience, crisis and incident response, and security operations center transformation. Additionally, these teams validate and strengthen defenses using specialized offensive security services such as red and purple team exercises, breach and ransomware simulations, and phishing assessments. By emulating sophisticated adversary tactics across diverse environments, they proactively uncover vulnerabilities and response gaps, deliver actionable insights, enhance incident preparedness, and elevate the overall security posture of the organization. 

Qualifications 

Must Have Skills/Project Experience/Certifications: 

  • Strong communication skills (written & verbal) 
  • Understanding of basic business and information technology management processes 
  • 5-7 years of experience, knowledge and understanding of Dev-Sec-Ops Vulnerability Management, Threat Management, Penetration testing, Mobile Testing, Red Teaming, Phishing. 
  • Experience with tools related to the domains mentioned above 
  • Experienced in one or more of the above areas (as the career progresses) 
  • Deep knowledge of commonly used protocols such as TCP/IP, DNS 
  • Understanding of ITIL and ITSM 
  • Understanding of SANS TOP 25 Additional Skills 
  • Familiarity with industry standards and frameworks such as OWASP, CIS, NIST ISO/IEC 17799, etc. 
  • Assist clients with discovering vulnerabilities and rogue assets (such as shadow IT) in their networks as part of a team of engineers and analysts around the world who specialize in the tactics, tools and procedures used by cyber criminals. 
  • Configure and execute vulnerability scans enumerating vulnerabilities within the internal and external network. 
  • Analyze, enrich and prioritize specific activities designed to remediate discovered vulnerabilities such as patch deployment or configuration hardening. 
  • Assist in producing a comprehensive operating picture and cyber security situational awareness. 
  • Work with various vulnerability threat feeds (such as vendor bulletins), assessment tools, asset inventory tools as well as reporting tools and frameworks to match assets to identified vulnerabilities and produce reports. 
  • Respond to requests for ad-hoc reporting and research topics from management and analysts as required.  
  • Identify gaps in available asset information and engage with leadership on strategies to meet service-level requirements through affirmative handoff with remediation partners. 
  • Quickly understand and deliver on company and customer requirements Aid in and participate in daily, weekly, quarterly, and yearly production reporting for clients, partners, and internal teams Adhere to internal operational security and other 
  • Understanding of common network infrastructure devices such as routers and switches Understanding of basic networking protocols such as TCP/IP, DNS, HTTP Understanding of vulnerability classification using National Vulnerability Database nomenclature such as CVE/CVSS Basic knowledge in system security architecture and security solutions 
  • Mandatory Certification - CEH, Security+ 
  • Preferred Certification: OSCP, OSWP, CRTO, CREST Certified Web Application Tester, OSCE, CREST Certified Simulated Attack Specialist, CREST Certified Simulated Attack Specialist), AWS Security Specialist, CKE, Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc. 

Good to Have Skills/Project Experience/Certifications: 

  • Proven ability to emulate sophisticated adversary tactics, techniques, and procedures (TTPs) to identify and exploit weaknesses in organizational defenses. Familiarity with red teaming methodologies, offensive security tools, and frameworks such as MITRE ATT&CK. Experience with tools like Cobalt Strike, Metasploit, and Empire for command and control, exploitation, and lateral movement within environments. Proficiency in scripting languages like Python, PowerShell, or Bash for automation and custom tool creation. Knowledge of evasion techniques to bypass antivirus (AV), endpoint detection and response (EDR), and network monitoring tools. 
  • Strong understanding of privilege escalation, lateral movement, and persistence mechanisms in both Windows and Linux environments. 
  • Hands-on experience conducting phishing campaigns, social engineering attacks, and delivering payloads via HTML smuggling or other covert techniques. 
  • Ability to assess and manipulate Active Directory configurations, conduct password spraying, and exploit common misconfigurations. 
  • Strong knowledge of reverse engineering tools such as IDA Pro and Ghidra for analyzing malware or binaries. 
  • Excellent ability to create detailed post-engagement reports and recommendations for improving detection and response capabilities. 
  • Knowledge of operational security (OpSec) best practices to avoid detection during adversarial engagements. 
  • Ability to think creatively in developing offensive strategies and adapting to blue team defenses. 
  • Strong desire to continuously learn emerging attack vectors and defensive countermeasures. 
  • Outstanding communication skills, with the ability to explain offensive security techniques to both technical and non-technical stakeholders. 

Education: 

  • Bachelor’s degree or higher in Computer Science, or equivalent experience. 
Our purpose

Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. 
Our people and culture

Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas and perspectives, and bring more creativity and innovation to help solve our clients’ most complex challenges. This makes Deloitte one of the most rewarding places to work.
Professional development

At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse   learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India.
Benefits to help you thrive

At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you.
Recruiting tips

From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.

Requisition code: 300440