Job Title: Assistant Manager | Security Information and Event Management (SIEM) | Delhi | Cyber Defense & Resil
Your potential, unleashed.
India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond.
At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters.
The team
Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks
Your work profile
As Assistant Manager in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: -
Role Overview
The Microsoft Sentinel L2 Analyst is responsible for advanced threat detection, incident investigation, and response across client environments. This role acts as a key escalation point from L1 analysts, handling complex security incidents and ensuring effective containment, eradication, and recovery. The analyst will leverage Microsoft Sentinel and integrated security tools to perform deep investigations, improve detection logic, and enhance SOC capabilities. The role requires strong incident response expertise, log analysis skills, and the ability to operate in dynamic and high-pressure environments.
Key Responsibilities:
· Investigate and respond to escalated security incidents from L1 analysts.
· Perform in-depth analysis of alerts and events using Microsoft Sentinel and other security platforms.
· Execute incident response activities including containment, eradication, and recovery.
· Correlate data from multiple sources: Firewalls, IDS/IPS, EDR, Azure AD, endpoints, and cloud environments.
· Conduct root cause analysis and identify attack vectors and impacted assets.
· Develop and fine-tune detection rules, analytics, and hunting queries in Microsoft Sentinel.
· Utilize KQL (Kusto Query Language) to perform advanced threat hunting and log analysis.
· Work with SOAR capabilities to automate response actions and improve efficiency.
· Create and maintain incident response playbooks, SOPs, and runbooks.
· Provide detailed incident reports and technical briefings to stakeholders.
· Assist L1 analysts in triage and provide mentorship and guidance.
· Monitor and ensure health and integrity of log ingestion pipelines.
· Participate in threat hunting and proactive detection initiatives.
· Collaborate with cross-functional teams (IT, Cloud, Security Engineering).
Required Skills & Expertise
· Experience: 4+ years in SOC operations, incident response, or cybersecurity monitoring.
· SIEM Expertise: Strong hands-on experience with Microsoft Sentinel and other SIEM tools.
· Incident Response: Solid understanding of incident response lifecycle and handling real-world incidents.
· Threat Frameworks: Working knowledge of MITRE ATT&CK and cyber kill chain concepts.
· Log Analysis: Ability to analyze and correlate logs across network, endpoint, and cloud sources.
· KQL: Proficiency in writing complex queries for investigation and threat hunting.
· EDR Tools: Hands-on experience with tools like Microsoft Defender, CrowdStrike, SentinelOne, etc.
· Operating Systems: Strong knowledge of Windows, Active Directory, and basic Linux systems.
· Networking: Good understanding of network protocols (TCP/IP, DNS, HTTP/S, VPN).
· Cloud Security: Experience with Azure security monitoring and cloud-native threats.
· SOAR Exposure: Familiarity with automation tools and playbook execution.
· Communication: Ability to create detailed reports and communicate with technical and non-technical stakeholders.
Preferred Skills
· Experience with malware analysis and basic forensic investigation.
· Knowledge of Azure Defender, M365 Defender, and identity-based threats.
· Scripting knowledge (PowerShell, Python) for automation.
· Experience working in MSSP or enterprise SOC environments.
· Exposure to threat intelligence platforms and IOC-based investigations.
Education & Certifications
- Bachelor’s degree in computer science, Cyber Security, or related field.
- Preferred certifications:
- Microsoft SC-200
- CompTIA Security+ CompTIA CySA+
- GIAC (GCIH preferred) or equivalent certifications
How you’ll grow
Connect for impact
Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report.
Empower to lead
You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership.
Inclusion for all
At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters.
Drive your career
At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte.
Everyone’s welcome… entrust your happiness to us
Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you.
Interview tips
We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals.
*Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices.
At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants, and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution.
In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_