Job Title:  T&T | Cyber : D&R | Cyber Threat Hunting | Assistant Manager | Mumbai

Job requisition ID ::  92169
Date:  May 4, 2026
Location:  Mumbai - I-Think
Designation:  Assistant Manager
Entity:  Deloitte Touche Tohmatsu India LLP

T&T | Cyber : D&R | SOC, SIEM | Assistant Manager | Mumbai
Job requisition ID : 92169 
Location: Mumbai - I-Think
Entity: Deloitte Touche Tohmatsu India LLP 

The team

Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks: Learn more about Cyber | Deloitte

 

 

Your work profile

  • Conduct proactive threat hunting using logs, network traffic, and endpoint data.
  • Develop and test hypotheses based on emerging threat intelligence.
  • Analyse indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) aligned with MITRE ATT&CK framework.
  • Correlate data across multiple sources (SIEM, EDR, firewall, network, and cloud logs) to identify suspicious behaviour.
  • Create detection logic and custom rules to enhance threat visibility in SIEM tools (e.g., QRadar, Splunk, Sentinel).
  • Work with SOC and IR teams to respond to and contain threats identified through hunting.
  • Document hunt findings, develop playbooks, and suggest detection improvements.
  • Stay current on cyber threat trends, APT campaigns, and new attack methodologies.

 

 

Key Skills Required: 

 

  • 2–5 years of experience in threat hunting, SOC analysis, incident response, or threat intelligence.
  • Strong knowledge of network protocols, malware behaviour, and Windows/Linux internals.
  • Hands-on experience with SIEM tools (QRadar, Splunk, or Sentinel) and EDR platforms (CrowdStrike, Carbon Black, Defender).
  • Familiarity with MITRE ATT&CK, Cyber Kill Chain, and IOC analysis.
  • Strong analytical skills with ability to interpret large data sets and identify anomalies.
  • Scripting experience (Python, PowerShell, or Bash) for automation or data enrichment preferred.
  • Exposure to cloud security (AWS, Azure, GCP) is a plus
  •  Education: - Any Graduate B.E / B.Tech (Tier 1/2) in Computer Science, Information Technology or related fields