Job Title:  T&T | Cyber: D&R | Consultant | Cyber Threat Hunting | Mumbai

Job requisition ID ::  100197
Date:  May 1, 2026
Location:  Mumbai
Designation:  Consultant
Entity:  Deloitte Touche Tohmatsu India LLP

T&T | Cyber: D&R | Consultant | Cyber Threat Hunting | Mumbai
Job requisition ID : 100197 
Location: Mumbai
Entity: Deloitte Touche Tohmatsu India LLP 

The team

 

Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks: Learn more about Cyber | Deloitte

 

 

Your work profile

 

  • Perform log monitoring, analysis, and correlation using Splunk and EDR to detect and investigate security events and threats. 
  • Conduct incident triage, root cause analysis, and escalate high-priority incidents to L2 and Incident Response teams. 
  • Support incident investigation, containment, mitigation, recovery, and collaborate with SOC teams for effective incident handling. 
  • Assist with security reporting, compliance audits, metric tracking, and continuous improvement through threat research. 

 

Key Skills Required

 

  • Education: - Any Graduate or B.E / B. Tech (Tier 1/2) in Computer Science, Information Technology or related fields 
  • Perform proactive threat hunting across enterprise environments using SIEM, EDR, and network security tools. 
  • Investigate suspicious patterns, anomalies, and Indicators of Compromise (IOCs) across endpoints, networks, and cloud environments. 
  • Develop hypotheses based on MITRE ATT&CK Framework tactics, techniques, and procedures (TTPs). 
  • Analyze logs from security tools such as IBM QRadar, Splunk, Microsoft Defender for Endpoint, and other security platforms. 
  • Perform deep-dive investigations on suspicious activities and coordinate with SOC and Incident Response teams. 
  • Create and tune detection rules, use cases, and threat hunting queries. 
  • Leverage threat intelligence feeds and integrate them into hunting activities