Job Title:  T&T | Cyber: D&R | Assistant Manager | Incident Response & Handling | Bengaluru

Job requisition ID ::  98531
Date:  Mar 13, 2026
Location:  Bengaluru
Designation:  Assistant Manager
Entity:  Deloitte Touche Tohmatsu India LLP

Job description

Assistant Manager | Incident Response & Handling | Bengaluru | Cyber Defense & Resilience

Job Description

 

Summary

The role requires efficient incident response and digital forensics skills to minimise the impact of cyber risks. The individual will oversee Security monitoring, Security tools Operations, Security incidents, ensure incidents are managed effectively and reported to stakeholders. This role primarily consists of first responder activities and to conducting thorough response activities on behalf of a wide variety of clients across every sector. Candidate required to work in complex security environments and alongside SOC team to design, communicate and execute incident response, containment and remediation plans. Support incident response team analysts and incident management teams. Analyse tools, processes, and procedures for responding to cyber intrusions and come up with new methods for detecting cyber adversaries.

 

Designation / Role • Role: Incident Responder / L2

 

Responsibilities • Participate in incident response (IR) efforts; detect, identify, respond, contain and remediate all information security incidents. • Rapidly and accurately determine the source of a security incident and moving quickly to identify and apply containment, mitigation, and remediation steps. • Contribute to the execution of Cyber Security operations, incident response, and investigations spanning across all functions of the Corporate Security organization. • Track, monitor incident actions while applying intelligence, situational awareness to prioritise incident actions based on risk • Responsible for Incident and Breach communications, assessments, and reports and customer facing, to include leadership and executive management for the purpose of enabling Senior Management to make decisions in a crisis • Develop and document processes to ensure consistent and scalable response operations • Deliver tabletop IR assessments and real-life IR simulations at a technical and executive level. • Conduct in-depth root cause analysis on complex malware and user/system behaviour event • Gather and analyse forensic evidence for cyber security incidents and investigations. • Develop and document enhanced event analysis and incident response processes and procedures. • Provide dashboard and data related to Incidents/Offenses for governance reports. • Escalates to L3 if investigations uncover unusual or atypical situations. • Closure of incidents on ITSM tool with accurate resolution comments to determine true positive and false positive classification. • Monitoring unhealthy log source/data source and escalate to engineering team to fix them. • Rapidly and accurately determine the source of a security incident and moving quickly to identify and apply containment, mitigation, and remediation steps.

 

Skills required

• 4-6 years’ experience in Information Security. • Ability to work in time-sensitive and stressful situations with ease and professionalism, possess an efficient and versatile communication style • Evidence handling • Data acquisition (Disk, Memory, Mobile, Cloud, Enterprise Wide) • Digital forensics (Windows, Mac OS, Linux/Unix)

• Thorough understanding of Cyber kill chain and MITRE ATT&CK framework. • Experience with one or more of SIEM tools such as QRadar, ArcSight, Splunk, Azure Sentinel, McAfee ESM, LogRhythm is required

• Experience on EDR tools for Incident response and threat hunting (Crowdstrike, Cortex XDR, MS Defender, Sentinel One)

• Strong knowledge and experience with commonly used forensic toolsets, including EnCase, FTK. • Experience reviewing raw logs and performing advanced data correlation and analysis (i.e. firewall, network flow, IPS, endpoint protection, web application, host OS, database, AAA, etc…) • Experience of network & host-based forensic analysis and techniques • Experience of malware analysis and understanding attack techniques. • Industry certifications such as ECIH v2, CHFI, GCIH or GCIA along with experience will be a bonus. Experience in lieu of certification will be taken into consideration. • Deep understanding of computer intrusion activities, incident response techniques, tools, and procedures • Knowledge of Windows, Active Directory, DNS & Linux operating systems, • Knowledge of SOAR technologies, working with playbooks (Cortex, Chronicle, Resilient) • Working experience and knowledge of ITSM tools for incident management. • Must be action oriented and have a proactive approach to solving issues. • Knowledge of security logs, log quality review.

 

Abilities:

• Strong English verbal, written communication, report writing and presentations skills. • Ability to multitask and prioritize work effectively. • Responsive to challenging tasking. • Highly motivated self-starter giving attention to detail. • Strong analytical skills and efficient problem solving. • Capable to operate in a challenging and fast paced environment.