#167781
t clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Strategy, Defense and Response (SDR) focuses on helping federal clients design and implement transformational enterprise security programs with an emphasis on defending against, recovering from, and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for cyber defense and response, then the Cyber SDR offering at Deloitte is for you.
Work You'll Do:
Operate with appreciable latitude in developing methodology and presenting solutions to problems.
Contribute to deliverables and performance metrics where applicable.
Consult on IT and cyber architecture and technologies.
Assess assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat.
Adapt technologies to meet the mission architecture and threat.
Required Qualifications:
Bachelor's degree required or equivalent work experience.
Active TS/SCI Clearance is required
IAT Level III Certification required
10 + years' experience in host analysis (either Windows or NIX) and Cyber hunt operations.
Experience with CVA/H. Application of cyber threat intelligence.
10 + years' experience in operating system defense for Windows operating system; identify and mitigate operating system vulnerabilities and imbedded persistent threats with a focus on forensics, system engineering, and server administration capabilities; and detect and emulate operating system adversary TTPs.
10+ years' of experience in operating system defense for UNIX/LINUX-based operating system; identify and mitigate operating system vulnerabilities and imbedded persistent threats with a focus on host-based forensics and software engineering; and be able to detect and emulate operating system adversary TTPs.
Preferred Skills:
Certifications: IAT III, Unix/Linux and/or Windows Server Administration
cyber_daf_fy24
#LI-MC4