Exploitation Analyst (TS/SCI with Poly Required) at Deloitte
Baltimore, MD 21202, USA -
Full Time


Start Date

Immediate

Expiry Date

26 Oct, 25

Salary

0.0

Posted On

26 Jul, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Threat Intelligence, Comptia, Penetration Testing, Windows, Addition, Malware Analysis, Log Analysis, Information Assurance, Systems Engineering, Training, Completion, Network Engineering, Red Teaming, Network Traffic Analysis, Programming Languages, Bash

Industry

Information Technology/IT

Description

Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.

QUALIFICATIONS

Required:
Bachelors Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., Computer Science, Cyber Security, Software Engineering, Information Assurance, etc.)
TS/SCI/ with Polygraph Required
Minimum of 5 years of professional experience in cybersecurity, with at least 3 years focused on cyber exploitation analysis, threat intelligence, or incident response.
Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
Ability to travel up to 25% on average, based on the work you do and the clients and industries/sectors you serve
Must be onsite for this role
Demonstrated experience analyzing advanced persistent threats (APTs), malware, and exploitation techniques.
Hands-on experience with vulnerability assessment, penetration testing, or red teaming.
Proficiency in network traffic analysis, log analysis, and digital forensics.
Strong knowledge of operating systems (Windows, Linux, macOS) and common network protocols.
Experience with reverse engineering tools (e.g., IDA Pro, Ghidra) and malware analysis.
Familiarity with scripting or programming languages (e.g., Python, PowerShell, Bash).
Experience with security monitoring tools (e.g., SIEM, IDS/IPS, endpoint detection and response).

Preferred:

  • Certification in: Certified Ethical Hacker, Computer Hacking Forensic Investigator, CompTIA Cyber Security Analyst, CompTIA Cloud+, CompTIA Pentest+, GCHI-GIAC Certified Incident Handler, Cyber Security Incident Responder OR GIAC Response and Industrial Defense
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience).
  • Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.

CJ1

The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Information for applicants with a need for accommodation: [1] https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
References

Visible links

  • https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
Responsibilities

Seeking an Exploitation Analyst to support in intelligence functions, analytics, and cyber investigations and operations. Analysts will be assigned to a variety of core analytical tasks or projects. Exploitation Analysts have many of the same skills of DNEAs, but their primary mission is enabling computer network exploitation. In addition to maintaining DNEA-level understanding of adversary networks, exploitation analysts have to understand network defenses and vulnerabilities in relation to available exploitation capabilities in order to create exploitation plans and make operational adjustments as the plan is executed.

In this role you will:

  • Apply data and technical expertise to perform file signature analysis, real-time forensic analysis, and report intelligence-derived significant network events and intrusions
  • Conduct research and analysis at the operational or strategic level
  • Communicate your assessments in operational- or strategic-level analytic intelligence products and through oral briefings
  • Threat analysis includes assessments identifying and describing threat actors, activities, platforms, and targets-as well as how they interact-and providing an understanding of the presence, intent, and capabilities of the identified threats
Loading...