Job Title: T&T-Cyber-D&R-Incident Response-Assistant Manager-Mumbai
The Team
Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Learn more about Cybersecurity
- Coordinate response efforts to cyber incidents caused by external threats that may involve nontraditional working hours.
- Serve as a liaison to different businesses and interface with fellow team members and colleagues on other security teams. Manage relationships with business partners, management, vendors, and external parties as needed.
- Drive integration with other corporate incident management programs to ensure consistency and alignment with peer support teams within IT.
- Help lead small to medium-sized projects as directed by leadership.
- Be a champion for process and documentation. Develop and document processes to ensure consistent and scalable response operations, and ensure continuous improvement to the company’s incident response plan.
- Develop and deliver metrics to leadership as requested.
- Create ready-to-go draft communications and ensure timely reports/updates to leadership during and after an event.
- Own and manage the team's internal action playbooks and knowledgebase.
- Must be willing to be on-call off hours in rotation with other team members.
- Resolution of security incidents by validating root cause and solutions.
- Analyze findings in investigative matters and develop fact-based reports.
- Ability to identify and articulate opportunities for improvement while helping drive lessons learned activities.
- Demonstrated integrity and judgment within a professional environment.
- Inquisitive approach to analysis and peer review.
- Application of emotional intelligence and calm under pressure.
- Ability to appropriately balance work/personal priorities.
- 5+ years’ experience in at least two of the following roles:
- Member of a Security Operations Center (SOC) with at least 2 years in an L3 or senior level role.
- Security Incident Response Analyst or supporting function (2 years minimum).
- eDiscovery or related role performing forensic functions.
- Deep understanding of security threats, vulnerabilities, and incident response.
- Understanding of electronic investigation, forensic tools, and methodologies, including log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification, and analysis.
- Familiarity with legalities surrounding electronic discovery and analysis.
- Understanding of regulatory stipulations regarding security incidents.
- Experience with SIEM technologies (e.g., Splunk, QRadar, Sentinel etc.).
- Deep understanding of both Windows and Unix/Linux based operating systems.
- Hold or be willing to pursue related professional certifications such as GCFE, GCFA, GCIH, CISA, CISM, CISSP, or CCIM.\
- Education: Bachelor’s or Master’s Degree in Computer Science, Information Systems, Engineering, a related field, or equivalent experience.