Job Title:  T&T | Cyber : D&R | SIEM | Analyst | Mumbai

Job requisition ID ::  98485
Date:  Mar 28, 2026
Location:  Mumbai - I-Think
Designation:  Analyst
Entity:  Deloitte Touche Tohmatsu India LLP

T&T | Cyber : D&R | SIEM | Analyst | Mumbai
Job requisition ID : 98485 
Location: Mumbai - I-Think
Entity: Deloitte Touche Tohmatsu India LLP 

 

The team 

 

Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at    how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks.  Learn more about Cybersecurity  

 

Your work profile 

As an Incident Coordinator in our Cyber Defense and Resilience team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations.

We are looking for an experienced professional to coordinate security incident response to cybersecurity events or incidents stemming from suspected threats. The ideal candidate will have strong incident management techniques, a solid comprehension of incident response plans, and the ability to work well with others. Strong verbal and written communication skills, a sense of diplomacy, and decision-making skills are essential to handle the fast-paced world of incident management.

 

Key Skills required:

 

  • 6months+ years of experience. 24*7*365 monitoring of security alerts and events generated by SIEM and other in scope security solutions (both on-prem and SaaS solution)
  • Triage potential security incidents and assigned severity based on the defined criteria
  • Perform preliminary analysis to validate whether an alert represents a true security incident
  • Investigate basic indicators of compromise (IOCs) and determine the scope and impact of the incident
  • Escalate confirmed incidents to SOC L2 analysts with all relevant information
  • Accurately document all findings, actions taken, and evidence collected during the triage process
  • Maintain detailed logs of incident activities for further analysis and reporting
  • Follow established incident response playbooks and standard operating procedures
  • Execute predefined use cases and scripts to gather additional information about alerts
  • Monitor the health and performance of security monitoring tools and systems
  • Report any issues or anomalies with the security tools to ensure continuous monitoring
  • Participate in training and development programs to enhance cybersecurity skills.
  • Education: Bachelor’s degree in information security, Computer Science, or a related field.