Deloitte Fusion Threat Hunting Solution Delivery Analyst in Los Angeles, California
Are you interested in improving the cyber and organizational risk profiles of leading companies? Do you want to be involved in delivering Fusion Managed / Security Operations Center (SOC) Services including threat hunting? Are you excited about rapidly changing operational environments, learning what you need to get the job done, and producing accurate and timely results?
If yes, then Deloitte's Fusion Managed Services (FMS) team could be the place for you! Transparency, innovation, collaboration, sustainability: these are the hallmark issues shaping cyber initiatives today. Deloitte's FMS business is passionate about making an impact with lasting change. Delivering our industry leading services requires fresh thinking and a creative approach. We collaborate with teams from across our organization in order to bring the full breadth of Deloitte, its commercial and public sector expertise, to best support our clients. Our aspiration is to be the premier integrated services provider in helping to transform the cyber security services marketplace.
Our team is client focused and mission driven. As a Cyber Risk Fusion Threat Hunter in Deloitte's Fusion Managed Services, you'll work with our diverse teams of passionate professionals to help solve for some of today's toughest cybersecurity challenges to enable or clients to achieve business growth and manage risk.
Work you'll do
As a Fusion Threat Hunter, you will support the Security Operations Center (SOC) by researching relevant threat actors, attack vectors, and behaviors pertinent to client industries and to each client's network environment in particular.
Research trending campaigns, attack vectors, and search for these in client environments
Be tool agnostic - our Threat Hunting tools may differ from client to client, and we value concepts over tools. The ideal candidate must possess an acute ability to adapt to any tool
When needed, work with alerts from the SOC Analysts, to perform in depth analysis and triage threat activity based on host and network activity, traffic, and protocol analysis to identify infection vectors, the extent of the infection, and prepare high quality reports based on findings
Respond to client specific investigation requests around software/application vulnerabilities, zero days, and security incidents
Document all actions taken in a ticketing workflow management system
Adhere to internal operational security and other Deloitte policies
Hunt for new patterns, activities, and ever-changing tactics associated with advanced threat actors
Provide Security information and event management (SIEM) content development and testing support
When necessary, devise and document new techniques, automation, and procedures along with the service leadership
Foster a culture of collaboration and build team members' strengths
Collaborate with senior hunters for investigations
BA or BS in Computer Science or Information Management and relevant work experience
3+ years working in security information and/or technology engineering support experience
Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent
Extensive knowledge on network, endpoint, threat intelligence, as well as the functioning of specific applications or underlying IT infrastructure, and have experience with SIEM technologies, EDR solutions, forensics tools, malware analysis
Knowledge of Advanced Persistent Threats (APT) tactics, technics and procedures
Excellent spoken and written communication skills
Strong analytical and problem-solving skills
Experience in security technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, etc.
Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
Understanding of common network infrastructure devices such as routers and switches
Understanding of basic networking protocols such as TCP/IP, DNS, HTTP/S
Basic knowledge in system security architecture and security solutions
Travel up to 10-20% (While 10-20% of travel is a requirement of the role, due to COVID-19, non-essential travel has been suspended until further notice)
Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
Basic knowledge in programming languages such as Python, Java or Ruby
Works well both in a team environment and independently
Excellent interpersonal and organizational skills
Self-motivated to improve knowledge and skills
A strong desire to understand the what as well as the why and the how of security incidents
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.