Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS Cyber Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber minded culture and become stronger, faster, and more innovative. You will become part of a team that advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security. Our dynamic team offers opportunities to work with cutting-edge cyber security tools and grow both vertically and horizontally at an accelerated rate. Join our cyber team and elevate your career.
Work you'll do
Be responsible for the implementation of all security solutions.
Work with Cyber Security (CS) stakeholders across the internal and external environment, continuously improving our security processes.
Help the SOC Manager generate the technical and operational requirements for the SOC, interface with the stakeholders, assist in building out the documentation for the standing up of the SOC, and provide guidance for tooling capabilities.
Work with multiple stakeholders to gain requirements for monitoring events in a SOC, escalation procedures, building playbooks, rules of engagements, and setting severity based on stakeholder requirements and building a SOC.
Actively monitor multiple data points and SIEM to identify potential security issues for remediation, triage activities, and escalation to team lead and continued work with relevant case managers.
Respond to security incidents and escalations by collecting and analyzing data, while gathering digital evidence to ensure incidents are handled within the scope of the playbooks and standard operating procedures and overseeing workflow to create these items.
Create and provide updates to the standard operating procedures, playbooks, and other similar documentation for continuous improvement of security operations and efficiencies.
Lead and generate templates and requirements for work to stand up the SOC and workflows to operate within the SOC.
Create and maintain metric reporting (KPI's/KRI) for senior management reporting.
Actively review closed cases, open cases, and threat intelligence to make recommendations for preventative controls to reduce threats to an environment.
Handle multiple competing priorities in a fast-paced and high-pressure environment.
This position is located in Huntsville, AL. and will sit onsite.
The team
Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Strategy, Defense and Response (SDR) focuses on helping federal clients design and implement transformational enterprise security programs with an emphasis on defending against, recovering from, and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for cyber defense and response, then the Cyber SDR offering at Deloitte is for you.
Qualifications
Required:
Bachelor's degree and 6+ years of experience in SOC operations and SOC tools
Active Secret Security clearance required
Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
Must have 8570 requirements required for the position category or specialty and level (i.e. CEH, CFR, CCNA Cyber Ops, CCNA-Security, CySA+, GCIA, GCIH, GICSP, Cloud+, SCYBER, PenTest+)
Advanced knowledge in incident response, vulnerability management, analytics, reconnaissance, security intelligence, automation/scripting experience or know how to troubleshoot existing scripts with little guidance
Understanding of Information Technology vs Operational Technology security challenges
Interest or working knowledge of Operational Technology/Industrial Control System (OT/ICS), malware and attack techniques.
2+ years' experience with workflow management, analytic capabilities, Security Information Event Management (SIEM), SOC disciplines, and vulnerability tools (Splunk, ServiceNow, VirusTotal, RiskIQ)
Ability to recognize potential, successful, and unsuccessful attempts to exfiltrate data/intrusion attempts and compromises through reviews of available logging and relevant event detail and summary information
Knowledge of current and emerging technologies and processes used within a SOC to improve efficiency and effectiveness.
Proficiency with case management and ticketing systems
Preferred:
Prior professional services or federal consulting experience
Advanced knowledge of network traffic monitoring for security events to perform triage analysis and identify security incidents while knowing when to escalate based on escalation criteria
Experience in mentorship, training, and guiding junior members of a SOC team
#LI-JW3
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.