#161138
clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Strategy, Defense and Response (SDR) focuses on helping federal clients design and implement transformational enterprise security programs with an emphasis on defending against, recovering from, and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for cyber defense and response, then the Cyber SDR offering at Deloitte is for you.
Work you'll do
Employ your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
Profile targets and activities, ensure target continuity, and pioneer procedures to gather additional evidence
Work within a team to collaborate with military, government, and contractor personnel to foster shared understanding of intelligence needs, mission relevance, and areas of expertise
Categorize intelligence gaps to modify current collection or allow new collection to close the gaps
Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events
Provide context, documentation and dissemination of findingsincluding any new tradecraft that you developwith teammates, stakeholders, and intelligence consumers
Apply your knowledge and understanding of IC needs and missions
Qualifications
Required:
Active TS/SCI with Polygraph security clearance required
A combination of years of experience and education that meets the following:
Bachelor's degree + 5 years of experience
Master's degree + 3 years of experience
PhD + 2 years of experience
Relevant experience must be in computer or information systems design/development/analysis, and experience within the following other skilled areas: engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
Experience with aspects of Intelligence Analysis (e.g., target development, social network analysis, metadata analysis, knowledge of customer tool sets and databases).
In some cases, foreign language proficiency may also be used to satisfy experience requirements.
Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
Travel up to 20%
Preferred: