Job Title:  T&T I Cyber: D&R I Manager | Incident Response & Handling | Bengaluru

Job requisition ID ::  99683
Date:  Mar 24, 2026
Location:  Bengaluru
Designation:  Manager
Entity:  Deloitte Touche Tohmatsu India LLP

Job Description


Responsibilities

  • Manage client engagements, with a focus on incident response and investigation. Provide both subject matter expertise and project management experience to serve as the “point person” for client engagements
  • Assist with client incident scoping call and participate in the incident from kick-off through full containment and remediation.
  • Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and anomaly detection.
  • Recommend and document specific countermeasures and mitigating controls with post incident analysis findings
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences
  • Conduct Digital Forensic and Incident Response (DFIR) analysis, network log and network PCAP analysis, malware triage, and other investigation related activities in support of Incident Response investigations
  • Supervise Digital Forensics and Incident Response staff, and assisting with performance reviews and mentorship of cybersecurity professionals
  • Mature the Security Incident Response process to ensure it meets the needs of the Clients
  • Interact with Client’s CSIRT teams to cater continuous and/or ad-hoc client requests for Incident Response services

·      Possess the experience, credibility and integrity to perform as an expert witness.

·      Involve in business development activities and supporting pre-sales teams in Identify, market, and develop new business opportunities

  • Assist with research and distribute cyber threat intelligence developed from Incident Response activities
  • Research, develop and recommend infrastructure (hardware & software) needs for DFIR and evolve existing methodologies to enhance and improve our DFIR practice.

 

 

Skills required

  • 10-14 years Information Security experience with at least 5 year of Incident Response experience.
  • Solid understanding of MITRE ATT&CK, NIST cyber incident response framework and Cyber kill chain.
  • Understanding of Threat Hunting and threat Intelligence concepts and technologies
  • Experience of leveraging technical security solutions such as SIEM, IDS/IPS, EDR, vulnerability management or assessment, malware analysis, or forensics tools for incident triage and analysis.
  • Deep experience with most common OS (Windows, MacOS, Linux, Android, iOS) and their file systems (ext3.4, NTFS, HFS+, APFS, exFAT etc)
  • Proficiency with industry-standard forensic toolsets (i.e. EnCase, Axiom/IEF, Cellebrite/UFED, Nuix and FTK)
  • Experience of enterprise level cloud infrastructure such as AWS, MS Azure, G Suite, O365 etc..
  • Experience of malware analysis and understanding attack techniques.
  • CISSP, ECIH v2, GCFA, GCIH, EnCE or equivalent DFIR certification.
  • Ability to work in time-sensitive and complex situations with ease and professionalism, possess an efficient and versatile communication style
  • Good verbal and written communication skill, excellent interpersonal skills

 

Abilities:

  • Strong English verbal, written communication, report writing and presentations skills.
  • Ability to multitask and prioritize work effectively.
  • Responsive to challenging tasking.
  • Highly motivated self-starter giving attention to detail.
  • Strong analytical skills and efficient problem solving.
  • Capable to operate in a challenging and fast-paced environment.