Start Date
Immediate
Expiry Date
26 Oct, 25
Salary
0.0
Posted On
26 Jul, 25
Experience
3 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Threat Intelligence, Comptia, Penetration Testing, Windows, Addition, Malware Analysis, Log Analysis, Information Assurance, Systems Engineering, Training, Completion, Network Engineering, Red Teaming, Network Traffic Analysis, Programming Languages, Bash
Industry
Information Technology/IT
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
QUALIFICATIONS
Required:
Bachelors Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., Computer Science, Cyber Security, Software Engineering, Information Assurance, etc.)
TS/SCI/ with Polygraph Required
Minimum of 5 years of professional experience in cybersecurity, with at least 3 years focused on cyber exploitation analysis, threat intelligence, or incident response.
Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
Ability to travel up to 25% on average, based on the work you do and the clients and industries/sectors you serve
Must be onsite for this role
Demonstrated experience analyzing advanced persistent threats (APTs), malware, and exploitation techniques.
Hands-on experience with vulnerability assessment, penetration testing, or red teaming.
Proficiency in network traffic analysis, log analysis, and digital forensics.
Strong knowledge of operating systems (Windows, Linux, macOS) and common network protocols.
Experience with reverse engineering tools (e.g., IDA Pro, Ghidra) and malware analysis.
Familiarity with scripting or programming languages (e.g., Python, PowerShell, Bash).
Experience with security monitoring tools (e.g., SIEM, IDS/IPS, endpoint detection and response).
Preferred:
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Information for applicants with a need for accommodation: [1] https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
References
Visible links
Seeking an Exploitation Analyst to support in intelligence functions, analytics, and cyber investigations and operations. Analysts will be assigned to a variety of core analytical tasks or projects. Exploitation Analysts have many of the same skills of DNEAs, but their primary mission is enabling computer network exploitation. In addition to maintaining DNEA-level understanding of adversary networks, exploitation analysts have to understand network defenses and vulnerabilities in relation to available exploitation capabilities in order to create exploitation plans and make operational adjustments as the plan is executed.
In this role you will: