Deloitte Released Job Openings On 11/02/2023.Eligibility Criteria / Educational Qualification, Official Notification, Apply Online Form Link & Other Relevant Details for Deloitte s Recruitment 2023 are provided below. Interested and eligible candidates can submit application along with resume.
Deloitte Vacancy Details:
Deloitte Recruiting Any Graduate with 03+years experience for Incident Management position.Complete Details for the Incident Management as follows.
Important Details :
- Location :Thane
- No of Vacancies: Not Disclosed
- Details of Salary: ₹ 9,00,000 – 19,00,000 P.A.
- Opening date for online Application: 11/02/2023
- Mode of application :Online
- Time and Venue : 18th February
Related Jobs: Larsen & Toubro(L&T) Scheduled WALK-IN Drive On 17th & 18th Feb 2023
Job Description/Skills Required
1. Cyber Threat Management Analyst (L1) –
>Detect, Analyze, Investigate and report qualified security incidents to the Client as per the service levels mentioned above
- End to end Monitoring and ensure closer of the tickets in current ITSM Tool
- Proven skills and experience in log analysis, incident investigations
- Experience working across diverse teams to facilitate solutions
- Experience working with Security practitioners
- Willingness to working 24/7 environment in rotating shifts
>Escalation to client Management if the incidents are not closed by client as per the escalation metrics .
2. SOC Operations Analyst (L2)-
Analyze security events, incidents, and logs • Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation. • Support critical, sensitive incidents spanning multiple geographies • Day-to-day operational tasks related to the ongoing support of Cyber Operations. • Responsible for supporting the incident life cycle, and providing support during cyber incidents • Responsible for the assigned tickets/events to Cyber Security Team. • Responsible for analyzing potential threats from multiple sources. • Responsible for creating filters, reports, dashboards, and alerts in support of Cyber Operations. • Collaborate and support various internal technology teams and service providers on security related issues and provide guidance and recommendations as necessary. • Assist with real-time security incident handling and tracking tasks to support Incident Response Team.
The candidate must have hands on experience in security operations center (SOC) platform like IBM QRadar or Splunk.
3. SOC Lead -Team Leader SOC Projects/Operations (L3)-
– Job Overview As a SOC Lead responsible for advance and complex investigation of the security events on 24×7 basis by ensuring alignment to SLAs. Job Responsibilities: 40 % of Time Monitor and investigate cyber security events, direct incident response team while responding to more complex incidents, handle escalations from other members of the incident response team or SOC team, monitor SIEM and other tools for potential threats, intrusions, or compromises, analyze emails reported as phishing, investigate the functionality, origin, potential impact and contain threats including malware, phishing, and other intrusions, analyze malware in a sandbox environment to understand impact, review investigations performed by peers. Threat huntingIOC and hypothesis methods. 30% of Time Continuous improvement, fine tuning of SIEM rules, review investigations performed by other team members and recommend improvements, fine tune detection rules, lead and participate in incident retrospectives, develop reports on incident trends to share with other Cyber Security Teams, recommend, prioritize, and implement solutions for process improvement, recommend solutions to prevent threats observed by SOC, participate in projects to implement new technologies. Trend analysis and improvement of MTTR. 30% of Time Procedure Development, Refinement and Team Building, acquire apply, and share expert knowledge of the business, its products, and processes to incident response procedures, maintain understanding of the global threat landscape and share it with the rest of the team, develop incident investigation processes and playbooks, ensure processes are clearly communicated, understood, and followed, plan shift schedule, train and mentor other SOC members Desired Profile Cyber Security Incident Responder, SOC Analyst Security Analyst SIEM Analyst Education Minimum Degree Requirements: Bachelors Preferred Degree Requirements: Bachelors Experience Minimum years of related experience required: 5-8 years Preferred years of related experience: 8 years Preferred Required professional certifications: GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH), CompTIA Cybersecurity Analyst (CySA+), EC-Council Certified Incident Handler (ECIH)
Interested candidates please share your updated profile on shwedas@deloitte.com / mthakkar.ext@deloitte.com
Interested candidates please apply in the Careers portal of Deloitte – Req ID – 48980
Shweta Das
Talent Acquisition | Risk Advisory
Mumbai- IThink, Lodha Amara IThink Tower,
Kolshet Road,Sandoz Baug, Thane West, Maharashtra 400607
About Company: Deloitte Touche Tohmatsu Limited, commonly referred to as Deloitte, is an international professional services network headquartered in London, England.