T&T:Cyber:D&R:SIEM:Consultant-Mumbai
Mumbai, IN
Deloitte
Insights zu unseren Diensleistungen im Bereich Audit, Consulting, Financial Advisory, Risk Adivisory und Tax sowie unseren zahlreichen Industrien.Your potential, unleashed.
India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond.
At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters.
The team
Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks
Your work profile
As Consultant in our Cyber Team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: -
The SIEM Monitoring Senior Analyst plays a critical role in the cybersecurity team by utilizing Security Information and Event Management (SIEM) tools to monitor, analyze, and respond to security incidents. The individual will be responsible for continuously reviewing security data, identifying potential threats, conducting investigations, and escalating incidents as necessary. This position requires a keen eye for detail, strong analytical skills, and a solid understanding of security operations.
Location and way of working
- Base location: Mumbai
- Professional is required to work from Client office.
Your role as a Consultant
We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society.
- Minimum of 6-10 years’ experience managing large Security Operation Centers projects.
- Responsible for adherence of SLA for all tickets and deliverables in the project
- Advise and tracks remediation of issues found during an incident or vulnerability that is required to conclude a security investigation.
- Responsible for the validation and analysis of investigations within Security Operations Center (SOC) done by L1/L2 analysts.
- Good understanding of SOC concepts and log review from various sources such as Firewalls, IPS/IDS, WAF, Windows Servers, Active Directory and Custom Applications.
- Responsible for completing the documentation of the investigation; determine the validity and priority of the activity and Carry out Level 3 triage of incoming issues and escalate to L4 as and when needed.
- Creation of SOPs and run books for SOC Operations and review it periodically.
- Provide communication and escalation support to L1/L2 throughout the incident per the SOC guidelines.
- Ensure that all security events and incidents (internal / external) are logged into ServiceNow and regularly updated and closed within the set SLAs.
- Strong technical understanding of network fundamentals and common Internet protocols, specifically DNS, HTTP, HTTPS / TLS, and SMTP
- Knowledgeable in the fundamentals of firewall, IDS/IPS, EPP/EDR, FIM, WAF, VPN, and other security protective/detective controls.
- Knowledge of email security threats and security controls, including experience analyzing email headers Experience analyzing network traffic using tools such as Wireshark, to investigate either security issues or complex operational issues.
- Familiarity with core concepts of security incident response, e.g., the typical phases of response, vulnerabilities vs threats vs actors, Indicators of Compromise (IoCs), etc.
- Must be able to map security incidents with MITRE ATT&CK framework or the cyber kill chain process.
- Providing valuable suggestion for creation of threat-based use cases will be an added advantage.
- Would be playing the role of a shift lead for L1/L2 teams in SOC environment.
- Continuously monitor security events and alerts using SIEM platforms (e.g., XSIAM, IBM QRadar, ArcSight, or others) to detect suspicious or anomalous activities across the organization’s IT infrastructure.
- Identify potential security incidents, investigate their severity, and perform first-level triage and analysis. Respond to incidents as per defined protocols, escalating issues to appropriate internal teams or external vendors when necessary.
- Review, filter, and analyze logs from a variety of sources (e.g., firewalls, intrusion detection systems, network devices, servers, applications) to uncover indicators of compromise or abnormal behavior.
- Manage and escalate high-priority or high-severity incidents to senior security personnel or incident response teams for further investigation and remediation.
- Use threat intelligence feeds and contextual information to improve the detection capabilities within the SIEM platform, ensuring that it remains effective against emerging threats.
- Conduct in-depth analysis of security incidents to identify root causes, contributing factors, and weaknesses in security defenses. Collaborate with relevant teams to implement corrective actions and prevent recurrence.
- Maintain accurate records of security events, incidents, actions taken, and outcomes in accordance with organizational policies. Create incident reports for management and compliance purposes.
- Work closely with system administrators, network engineers, and other IT teams to ensure security configurations are optimized and logs are appropriately generated and captured.
- Participate in the continuous improvement of the SIEM system and monitoring processes, including tuning detection rules, improving alerting mechanisms, and refining workflows for incident response.
How you’ll grow
Connect for impact
Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report.
Empower to lead
You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership.
Inclusion for all
At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters.
Drive your career
At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte.
Everyone’s welcome… entrust your happiness to us
Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you.
Interview tips
We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals.
*Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices.
At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution.
In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory ArcSight Compliance Cyber Kill Chain DNS EDR Firewalls IDS Incident response Intrusion detection IPS IT infrastructure MITRE ATT&CK Monitoring QRadar SIEM SLAs SMTP SOC Strategy Threat intelligence TLS VPN Vulnerabilities Windows
Perks/benefits: Career development Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.