What are the responsibilities and job description for the Incident Response Analyst position at Deloitte?
Job Description
Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS Cyber Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber minded culture and become stronger, faster, and more innovative. You will become part of a team that advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security. Our dynamic team offers opportunities to work with cutting-edge cyber security tools and grow both vertically and horizontally at an accelerated rate. Join our cyber team and elevate your career.
Work you'll do
The team
Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Strategy, Defense and Response (SDR) focuses on helping federal clients design and implement transformational enterprise security programs with an emphasis on defending against, recovering from, and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for cyber defense and response, then the Cyber SDR offering at Deloitte is for you.
Qualifications:
Required:
Work you'll do
- Provide Security Operations Center (SOC) engineering support and guidance to the teams and the client that improve the client's cybersecurity posture, to include the confidentiality, integrity, and availability of information systems by identifying, verifying, and understanding cyber events.
- Perform all design/engineering, configuration, implementation, and administrative activities associated with event collection tier solutions.
- Leverage automation software to efficiently manage and operate a large number of servers and devices remotely.
- Provide operations and maintenance (O&M) for hardware.
- Support the full engineering life cycle (concept to retirement) of the systems developed or maintained under this contract.
The team
Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Strategy, Defense and Response (SDR) focuses on helping federal clients design and implement transformational enterprise security programs with an emphasis on defending against, recovering from, and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for cyber defense and response, then the Cyber SDR offering at Deloitte is for you.
Qualifications:
Required:
- Minimum of a Bachelors Degree Required
- Ability to obtain & maintain the required security clearance
- Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
- Active Secret security clearance required
- At least three years of experience in working as a network security analyst in a security operations center and/or in handling, responding and managing computer security incidents
- Must have the ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities that are present within a computer system and/or enterprise network;
- Must possess excellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefings;
- Must possess excellent organizational and attention to details skills;
- Must possess a working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks. A conceptual understanding of Windows Active Directory is also required;
- Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, Internet Control Message Protocol (ICMP), Border Gateway Protocol (BGP), Multi-Protocol Label Switching (MPLS), etc.) and common internet applications and standards (e.g. Simple Mail Transfer Protocol (SMTP), DNS, DHCP, SQL, Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), etc.);
- Must have experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also required;
- Must have proficiency in utilizing various Packet Capture (PCAP) applications/engines and in the analysis of PCAP data;
- Must have experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment
Threat Incident Response Analyst
TekWissen LLC -
Bethesda, MD
Senior Incident Response Analyst
Isys Technologies -
Arlington, VA
Incident Response Analyst, Advisor
Peraton -
Arlington, VA