Cyber
Deloitte Cyber understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful insights to help our clients navigate the ever-changing threat landscape. Through powerful insights and managed services that simplify complexity, we enable businesses to operate with resilience, grow with confidence, and proactively manage to secure achievements.
Position Summary
Level: Solution Advisor
Work you’ll do:
As a Consultant, you are responsible for performing following activities as a Devsecops professional:
- Understand and be compliant with the Service Level Agreements defined for the DevSecOps services;
- Understand and deep knowledge of application security engineering principles, and helping client’s development team and function to follow secure development practices which includes primarily monitoring and performing the security design review, architecture review, threat modeling, security testing, secure code review, secure build processes;
- Well versed with the application deployment and configuration baselines, and understanding of how the application environment operates in a secure environment and how exceptions are handled during operations;
- Facilitate use of technology-based tools or methodologies to continuously improve the monitoring, management and reliability of the service;
- Perform manual and automated security assessment of the applications;
- Involved in triaging and defect tracking process with the development team and helping the team to fix issues at the code level based on the priority of the tickets;
- Be a liaison between the Application development and infrastructure team, and integrate the processes between infrastructure monitoring and operations processes with the secure development/testing and management processes;
- Identifying, researching and analyzing application security events which may include emerging and existing persistent threats to the client's environment; and
- Performing active monitoring and tracking of application related threat actors and tactics, techniques and procedures (TTPs), that could likely cause an impact to client organization
The Team:
Enterprise Security teams embed cybersecurity across all facets of digital transformation by securing a client’s technical infrastructure, while enabling innovation and agility. Their services span security architecture, secure development, cloud cyber capabilities, application and emerging technology security, and secure-by-design initiatives. DevSecOps further integrates automated security into the software development lifecycle, embedding testing and remediation within CI/CD pipelines for agile, risk-aware deployment. Through Deloitte’s DevSecOps framework, teams drive operational efficiency and secure design principles, ensuring robust protection in cloud and application environments.
Qualifications
Must Have Skills/Project Experience/Certifications:
- Minimum of 3-5 years’ experience in application security development, security testing, deployment and security
- management phases;
- Deep interest in application specific vulnerabilities, code development and infrastructure knowledge;
- Investigative and analytical problem-solving skills;
- Experience in collecting, analyzing, and interpreting qualitative and quantitative data from defined application security services related sources (tools, monitoring techniques etc.)
- Knowledge and experience of OWASP Top 10, SANS Secure Programming, Security Engineering Principles;
- Hands-on experience in performing code review of dot Net, Java and Swift and objective C code;
- Hands-on experience in running, installing and managing SAST, DAST , SCA and IAST solutions, such as Checkmarx, Fortify and Contrast in large enterprise
- Understanding of leading vulnerability scoring standards, such as CVSS, and ability to translate vulnerability severity as security risk;
- Hands-on experience on at least one CI/CD tool set and building pipelines using Team city, Bamboo, Jenkins, Chef, Puppet, selenium, AWS and AZURE DevOps;
- Hands on experience on container technology such as Kubernetes, Dockers, AKS, EKS.
- Knowledge of cloud environments and deployment solutions such as server less computing;
- Hands on experience in penetration testing of mobile, desktop and web applications;
- Must have experience in writing custom exploitation scripts and utilities;
- Possession of excellent oral and written communication skill;
- Knowledge of one or more scripting languages for automation and complex searches;
- Must have cloud security specialization in Security; and
- Certification such as EC-Council CEH (Certified Ethical Hacker), DevSecOps Professional (CDP) , ISC2 Certified Cloud Security Professional (CCSP), Certified API Security Professional (CASP) , CTMP (Certified Threat Modeling Professional) etc. are preferred.
Good to Have Skills/Project Experience/Certifications:
- Experience in cloud service providers such as AWS, GCP, Azure, Oracle are preferred
- Experience in implementing and managing security measures within Kubernetes environments, designing and enforcing advanced security protocols for API infrastructure, managing and optimizing our containerized applications using Docker, automating and managing our infrastructure as code using Terraform, automating IT processes and configurations using Ansible, and identifying and mitigating potential security threats through comprehensive threat modeling practices.
- Solid and demonstrable comprehension of Information Security including OWASP/SANS, Security Test Case development (or mis-use case).
- Understanding of security essentials including; networking concepts, defense strategies, and current security technologies
- Experience with securing IaC templates (e.g., Terraform, CloudFormation) and integrating IaC scanning tools into pipelines to detect misconfigurations and vulnerabilities early in the provisioning process
- Familiarity with container security best practices, including image scanning, runtime protection, and orchestration security (e.g., Docker, Kubernetes)
- Ability to conduct threat modeling exercises to identify and mitigate potential risks in application and infrastructure design.
- Ability to research and characterize security threats to include identification and classification of application related threat indicators
- Hands-on experience with industry-standard DevOps tools for automation, configuration management, and orchestration (e.g., Jenkins, GitLab CI/CD, Bamboo, CircleCI, Ansible, Terraform, Chef, Puppet)
- Proficiency in scripting languages (e.g., Python, Bash, PowerShell) for automation and pipeline customization.
- Practical knowledge of cloud-native CI/CD services and deployment automation (e.g., AWS CodePipeline, Azure DevOps, Google Cloud Build).
- Ability to design and manage cloud-based deployment pipelines, leveraging Infrastructure as Code (IaC) tools (e.g., AWS CloudFormation, Azure Resource Manager, Google Deployment Manager)
- Experience tuning security tools and pipelines to reduce noise and improve actionable findings.
- Ability to collaborate with development and security teams to investigate, triage, and resolve false positives efficiently.
Education:
- Bachelor's degree or higher in Computer Science, or equivalent experience.