Job Title: Assistant Manager | Incident Response & Handling | Delhi | Cyber Defense & Resilience
Your potential, unleashed.
India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting-edge leaders and organizations shaping the future of the region, and indeed, the world beyond.
At Deloitte, bring your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters.
The team
Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks.
Your work profile
As an Incident Coordinator in our Cyber Defense and Resilience team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations.
We are looking for an experienced professional to coordinate security incident response to cybersecurity events or incidents stemming from suspected threats. The ideal candidate will have strong incident management techniques, a solid comprehension of incident response plans, and the ability to work well with others. Strong verbal and written communication skills, a sense of diplomacy, and decision-making skills are essential to handle the fast-paced world of incident management.
Key Responsibilities:
- Coordinate response efforts to cyber incidents caused by external threats that may involve nontraditional working hours.
- Serve as a liaison to different businesses and interface with fellow team members and colleagues on other security teams. Manage relationships with business partners, management, vendors, and external parties as needed.
- Drive integration with other corporate incident management programs to ensure consistency and alignment with peer support teams within IT.
- Help lead small to medium-sized projects as directed by leadership.
- Be a champion for process and documentation. Develop and document processes to ensure consistent and scalable response operations, and ensure continuous improvement to the company’s incident response plan.
- Develop and deliver metrics to leadership as requested.
- Create ready-to-go draft communications and ensure timely reports/updates to leadership during and after an event.
- Own and manage the team's internal action playbooks and knowledgebase.
- Must be willing to be on-call off hours in rotation with other team members.
Skills and Attributes for Success:
- Resolution of security incidents by validating root cause and solutions.
- Analyze findings in investigative matters and develop fact-based reports.
- Ability to identify and articulate opportunities for improvement while helping drive lessons learned activities.
- Demonstrated integrity and judgment within a professional environment.
- Inquisitive approach to analysis and peer review.
- Application of emotional intelligence and calm under pressure.
- Ability to appropriately balance work/personal priorities.
To qualify for the role, you must have:
Education:
- Bachelor’s or Master’s Degree in Computer Science, Information Systems, Engineering, a related field, or equivalent experience.
Experience:
- 5+ years’ experience in at least two of the following roles:
- Member of a Security Operations Center (SOC) with at least 2 years in an L3 or senior level role.
- Security Incident Response Analyst or supporting function (2 years minimum).
- eDiscovery or related role performing forensic functions.
- Deep understanding of security threats, vulnerabilities, and incident response.
- Understanding of electronic investigation, forensic tools, and methodologies, including log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification, and analysis.
- Familiarity with legalities surrounding electronic discovery and analysis.
- Understanding of regulatory stipulations regarding security incidents.
- Experience with SIEM technologies (e.g., Splunk, QRadar, Sentinel etc.).
- Deep understanding of both Windows and Unix/Linux based operating systems.
Ideally, you’ll also:
- Hold or be willing to pursue related professional certifications such as GCFE, GCFA, GCIH, CISA, CISM, CISSP, or CCIM.
What We Look For:
- Demonstrated integrity in a professional environment.
- Ability to work independently.
- Have a global mindset for working with different cultures and backgrounds.
- Knowledgeable in business industry standard security incident response process, procedures, and lifecycle.
- Excellent organizational skills and strong attention to detail.
- Excellent teaming skills.
- Excellent social, communication, and writing skills.
- Excellent customer service skills required.