Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS Cyber Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber minded culture and become stronger, faster, and more innovative. You will become part of a team that advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security. Our dynamic team offers opportunities to work with cutting-edge cyber security tools and grow both vertically and horizontally at an accelerated rate. Join our cyber team and elevate your career.
Work you'll do
As the Security Operations Center (SOC)/ SIR Manager, you will play critical in leading end-end management and operations of a SOC implemented to support a state-wide integrated eligibility system. You will be responsible leading a team of SOC Engineers for designing, implementing and operating a SOC. Additionally, you are expected to have experience security incident process, managing SIEM, leading and managing a team of SOC and Incident Response (IR) teams.
Responsibilities:
Highly motivated, self-driven, technical Manager, who will lead a 24x7 team of talented security professionals performing continuous event and incident monitoring and response
Lead the Identification patterns/outliers within large data sets that match threat actor TTPs, post compromise behavior, and otherwise unusual activity
Lead, conduct, support and coordinate investigation, threat hunt, incident response, and other SOC activities with peers operating in other regional SOCs
Provide expert analysis, investigative support of large scale and complex security incidents, and in many cases identify incidents for which a technical detection may not be available
Provide supervision and oversight for a team of SOC analysts
Provide guidance, mentorship, and management of all SOC analysts
Oversees the response, investigation, and resolution of security incidents
Define implementation of strategic SOC and security monitoring initiatives
Manage daily, weekly and event-based reporting for trending, planning, and situational awareness
Develop and improve processes for incident detection, triage, and the execution of countermeasures
Produce and review aggregated SOC performance metrics
Serve as liaison with other projects stakeholders to ensure security issues are fully addressed
Manage and increase the effectiveness and efficiency of SOC operations
The team
Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Strategy, Defense and Response (SDR) focuses on helping federal clients design and implement transformational enterprise security programs with an emphasis on defending against, recovering from, and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for cyber defense and response, then the Cyber SDR offering at Deloitte is for you.
This role is located in Sacramento, CA.
Qualifications
Required:
Must have a minimum of 5+ years of experience in the following:
Continuous Event Monitoring: experience triaging and responding to high-volume cybersecurity events
Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists
Security technologies, architecture, and best practices will be critical to the success of this role
Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise
Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware
Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations
Effectively leading technical information security professionals and SOC analyst
Combined experience in the Information Security / Cybersecurity domain with a focus on conducting Threat Hunting and/or experience conducting Cyber Incident Response
Conducting malware analysis, DFIR, CTI or Threat Hunting investigations
Proactive Security Risk Mitigation
5 years' experience in integrating, deploying, and configuring security tools
Bachelor's degree
Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
Preferred:
SANS/GIAC - GCIH, GREM, GCED, GCDA certifications
Familiarity with offensive/defensive strategies
Communication Skills with Internal customer
A deep understanding of industry frameworks and standards (ie, MITRE ATTA&CK)
Ability to navigate and work effectively across complex, geographically dispersed teams
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $110,000 to $184,000
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.