Deloitte Jobs

Job Information

Deloitte Cyber Threat and Vulnerability Management – Sr. Consultant in Detroit, Michigan

Are you passionate about solving cyber security challenges related to threats and vulnerabilities within information technology? Are you are interested in a role that offers the opportunity to lead client engagements in designing innovative solutions? If yes, then Deloitte s Cyber team could be the place for you! Join our team of Cyber professionals who collaborate with other Threat and Vulnerability Management (TVM) experts, IT professionals, and clients to support cyber security and risk consulting engagements.

Assist in the selection and tailoring of approaches, methods, and tools to support vulnerability management service offerings and client engagements. Construct and assess high-level and detailed vulnerability management programs translating business needs, compliance and/or regulatory requirements into cost effective and risk appropriate controls. Identify opportunities to improve VM program efficiencies, reduce the overall level of effort and costs involved in management risks related to application level and infrastructure level vulnerabilities. Obtain and utilize knowledge of client business processes, internal control risk management, IT controls, business and information technology management processes, and market trends on client engagements. Generate innovative ideas and participate in decision making with engagement management.

Work you ll do

The Threat and Vulnerability Management Sr. Consultant will be responsible for working with large organizations information, security, technology, and application teams to tailor a program to fit their needs and culture.

  • Support engagement work streams related but not limited to application security testing, infrastructure scanning, triaging reducing false positives, coordinating scanning and testing results, and performing vulnerability remediation actions

  • Provide technical experience with solutions used across the entire TVM lifecycle including asset management, scanning, threat intelligence, analysis, reporting, ticketing as well as the integration of those solutions

  • Support implementation and operations leading practices while taking ownership of project work streams and/or activities, tasks, and guiding team members

  • Perform analysis and diagnosis of client issues related to technology configuration and setup as well as procedural or process challenges

  • Contribute to deliverables and review work products for competency, quality and accuracy

  • Demonstrate an understanding of clients environment and overall project objectives

  • Exhibit superior organizational skills to organize, analyze, develop, and deliver detailed reports

The Team

Deloitte s Threat and Vulnerability Management team provides on-site Consulting and Managed services that help IT security teams better defend and enable today s dynamic business by refining and extending the technology, processes, and governance of the vulnerability management of our clients. Deloitte empowers customers to more efficiently respond to shifting threats, achieve regulatory compliance, prioritize protection of services that drive revenue and competitive advantage, and measure progress of the overall IT risk management program. Deloitte s TVM team consists of practitioners from across the country and in locations across the globe, serving clients in a variety of industries. The diversity in background, knowledge, and skills of our team allows Deloitte to efficiently deliver results to our clients no matter the challenges that they face.

Category: Information Technology

About Deloitte

As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.