Job Requisition ID : 38641
- Great opportunity to work with decision makers at the world’s most innovative global consulting firm
- Flexible work arrangements – work in a way that suits you best!
- Learn from the best in the business
Deloitte Global is the engine of the Deloitte network. Our professionals reach across disciplines and borders to develop and lead global initiatives. We deliver strategic programs and services that unite our organization.
About the Team
Deloitte Technology works at the forefront of technology development and processes to support and protect Deloitte around the world. In this truly global environment, we operate not in "what is" but rather "what can be" to help Deloitte deliver and connect with its clients, its communities, and one another in ways not previously conceived
What will your typical day look like?
As a Threat Intelligence Analyst, you will be part of the Deloitte Global Cyber Threat Intelligence Team within Deloitte Technology. Your primary responsibility will be to drive and support the team’s information-sharing relationships on a day-to-day basis. Under the supervision of the team’s Liaison Manager, you will work directly with internal customers, other companies, industry associations, and small groups to exchange pertinent information, such as the tactics and indicators of compromise (IOCs) associated with threat actors, as well as best practices for cyber defense. You will then appropriately document the intelligence you have received, including written reports and briefings, while protecting source equities. A secondary responsibility for this position is performing cyber intelligence research and analysis on threat actors, malware tooling and campaigns, ransomware, and other threat and mitigation topics in cybersecurity. The ideal candidate for this position will be comfortable collaborating with and sometimes leading a group of internal and external peers. They will have experience (or willing to learn) managing the exchange of intelligence in professional associations, the military, a government agency, or for another private sector organization. Previous experience working with cyber threat intelligence and / or cybersecurity is preferred but not required; candidates lacking such experience should expect to complete training on these topics early in their Deloitte career to better share and manage cyber intelligence reports.
Enough about us, let’s talk about you.
You are someone who has experience with :
Required :
Bachelor’s degree in a cybersecurity, technology, intelligence studies, political-science, or international studies-related field of study or equivalent education-related experience2+ years of experience in information security or a cyber threat intelligence environment; or in a role that conducts research to fill intelligence requirements and write intelligence reportsWilling to learn how to work with professional associations, intelligence entities, law enforcement and government entities, to include meeting participation and verbal briefings to peers and group leadersExperience balancing the need to share with the protection of sources and methodsCommunicate with stakeholders with varying levels of technical proficiencyA self-starter with experience working independently and geographically separate from some team membersDesire to work in a highly complex and global organizationAbility to prepare and present research findings in both customer and public settingsAbility to recognize and deal appropriately with confidential and sensitive informationExperience in leading projects, tasks, and analytical or investigative processes with minimal oversight or direction; developing Standard Operating Procedure documents for new or existing processesPreferred :
Previous cyber threat intelligence or cybersecurity experienceExperience with formal aspects of threat intelligence (e.g., biases, ACH, etc.)Experience and knowledge researching and contextualizing cyber security and geopolitical landscapesWork you'll do The team Qualifications situationA relevant cybersecurity certification, including but not limited to CompTIA Security +, GIAC Global Essentials (GSEC), GIAC Certified Cyber Threat Intelligence (GCTI), Certified Ethical Hacker (CEH), or Certified Information Systems Security Professional (CISSP)Experience with open-source investigations techniques and familiarity with open-source tools such as VirusTotal, Hybrid Analysis, Domain Tools, etc. to assess indicatorsUnderstanding of networking topics like how basic IP communication works, TOR, proxies, VPNs, other communications obfuscation methods, and how the Internet is organized (technically and administratively)Understanding of written Mandarin Chinese, Japanese, or Russian