Senior Consultant, Cyber Detect & Respond, Italy

at  Deloitte

Roma, Lazio, Italy -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate10 Jul, 2024Not Specified11 Apr, 20241 year(s) or aboveAvailability,Security Operations,Firewall,Cyber Security,Ips,Ethical Hacking,Soar,Adoption,Siem,System Administration,Technology Solutions,Leadership Skills,Security Management,Design,Red Teaming,Threat Intelligence,Router,It,Incident ResponseNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

DELOITTE RISK ADVISORY - CYBER DETECT & RESPOND – SENIOR (+ 1 YEAR OF EXPERIENCE) - HYBRID-WORK

Are you ready to #makeanimpactthatmatters in our Cyber Detect & Respond?

Every day we strive to offer advisory services related to the detection and countering of Cyber threats that affect customers (Threat Detection and Response). It is a technology offering that addresses 360° the issues related to Cyber defence and attack simulation and intrusion testing (Penetration Test and Red Teaming. How do we do this? We work on these 2 main macro-categories of projects:

  • Security management of customer infrastructure/data: monitoring, analysis, threat hunting, response to security incidents
  • Incident Response: intervention in case of security issues with definition of a Remediation plan

Our strength?! We are able to support our clients by establishing a solid and lasting relationship, becoming their Strategic Advisor on cyber issues.

#WINNINGREQUIREMENTS

  • 2-6 anni years of experience preferably in Consulting companies
  • Strong skills in Cyber Security: Ethical Hacking, Incident Response e Forensic, SOC/CERT- Cyber Threat Hunting, Cyber Threat Intelligence (CTI)
  • Good knowledge in the following areas:
  • Cyber Security: preferably in SIEM, SOAR, UEBA, EDR e di Cyber Defence
  • Vulnerability Assessement: Application vulnerabilities, network and system vulnerabilities
  • System Administration: Microsoft Active Directory, router, Firewall, switch, balancers, waf, ips
  • Degree in technical/scientific subjects
  • Availability to travel in Italy and abroad
  • Fluent knowledge of the English language

As a Senior Consultant you will have the opportunity to share your experience and knowledge with younger colleagues, starting to develop leadership skills, and identifying the best solution for the client, dealing with:

  • SOC/CERT and Cyber Threat Hunting: analysis, design and review of processes and technology solutions supporting security operations and incident management, security event management and monitoring, cyber threat hunting
  • Cyber Threat Intelligence (CTI): definition of CTI processes and capabilities, adoption of the main supporting tools (e.g. TIP, MISP), monitoring of threats and identification of the most appropriate mitigation and response strategies
  • Ethical Hacking: Penetration Test on applications (Mobile/WEB/Legacy/ etc.), Penetration Test on infrastructures (IP/SCADA/IOT/ etc.), Identification and analysis of application vulnerabilities, Identification and analysis of network and system vulnerabilities
  • Incident Response and Forensic: forensic analysis of the host component, forensic analysis of the network component, reverse engineering, extrapolation of IOCs and creation of the corresponding threat model, Application of the created threat model to identify new compromises, Provide guidelines to support the remediation phas

Responsibilities:

As a Senior Consultant you will have the opportunity to share your experience and knowledge with younger colleagues, starting to develop leadership skills, and identifying the best solution for the client, dealing with:

  • SOC/CERT and Cyber Threat Hunting: analysis, design and review of processes and technology solutions supporting security operations and incident management, security event management and monitoring, cyber threat hunting
  • Cyber Threat Intelligence (CTI): definition of CTI processes and capabilities, adoption of the main supporting tools (e.g. TIP, MISP), monitoring of threats and identification of the most appropriate mitigation and response strategies
  • Ethical Hacking: Penetration Test on applications (Mobile/WEB/Legacy/ etc.), Penetration Test on infrastructures (IP/SCADA/IOT/ etc.), Identification and analysis of application vulnerabilities, Identification and analysis of network and system vulnerabilities
  • Incident Response and Forensic: forensic analysis of the host component, forensic analysis of the network component, reverse engineering, extrapolation of IOCs and creation of the corresponding threat model, Application of the created threat model to identify new compromises, Provide guidelines to support the remediation phase

Thanks to the Learning office, you will be able to attend courses and training activities that will allow you to broaden and deepen your knowledge and obtain product certifications
Talent colleagues, on the other hand, will take care of your career progression in a structured way, with defined KPI and targets, which, if achieved, will guarantee a review of grades and economics


REQUIREMENT SUMMARY

Min:1.0Max:6.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Proficient

1

Roma, Lazio, Italy