Job was saved successfully.
Job was removed from Saved Jobs.

Job Details


Deloitte

Cyber Threat Intelligence Manager (45706)

Branch Manager

Manager

Yearly

No

Costa Mesa, California, United States

Cyber Risk Threat Intelligence Manager

Are you interested in improving the cyber and organizational risk profiles of leading companies?

If yes, then Deloitte's Detect and Respond team could be the place for you! Transparency, innovation, collaboration, sustainability: these are the hallmark issues shaping cyber initiatives today. Deloitte's D&R business is passionate about making an impact with lasting change. Delivering our industry leading services requires fresh thinking and a creative approach. We collaborate with teams from across our organization in order to bring the full breadth of Deloitte, its commercial and public sector expertise, to best support our clients. Our aspiration is to be the premier integrated services provider in helping to transform the cyber security services marketplace.

Our team is client focused and mission driven. As a Cyber Threat Intelligence Manager at Deloitte, you'll work with our diverse teams of passionate professionals to help solve for some of today's toughest cybersecurity challenges to enable or clients to achieve business growth and manage risk.

Work you'll do

You will assist our clients with identifying unauthorized activities and intrusions in their networks in real time as part of a team of engineers and analysts around the world who specialize in the tactics, tools and procedures used by cyber criminals. This position is primarily focused on APT actors and their activities. We're looking for an intel analyst with deep knowledge of Advanced Persistent Threat (APT) campaigns, TTPs and activities, and indicators of compromise.

  • APTs-Focused, works within an interdisciplinary team that develops advanced analytical frameworks, tools and research methodologies in order to identify emerging cyber threats
  • Collect information used to analyze the political, economic, social, and behavioral aspects of malicious cyber activity
  • Contribute to cyber threat intelligence products for our clients
  • Research and monitor underground forums, chat channels, and, social media, the identification and analysis of security incidents using open source and internal sources to assess severity and identify responsible parties, including hacktivist groups and actors
  • Assist in producing a comprehensive operating picture and cyber security situational awareness
  • Work with various intelligence collection and reporting tools and frameworks to produce reports
  • Collect, process, catalog, and document information using an ALL-SOURCE approach and various technical and human means on cyber-security topics as required based on defined intelligence requirements
  • Respond to requests for ad-hoc reporting and research topics from management and analysts as required
  • Identify gaps in available intelligence information and engage with leadership on strategies to meet intelligence requirements through Intelligence collection processes
  • Quickly understand and deliver on company and customer requirements
  • Deal professionally with potentially offensive, profane, and obscene materials encountered during the course of investigations and research
  • Aid in and participate in daily, weekly, quarterly, and yearly production reporting for clients, partners, and internal teams
  • Adhere to internal operational security and other Deloitte policies

Qualifications

Required:
  • Bachelor's degree or higher in Threat Intelligence, Information Security, Information Technology, Computer Science, Math, or any other related area
  • 5+ years of experience working in cyber intelligence, information security, incident response, red team operations, reverse engineering, or other technical cyber security roles
  • Extensive knowledge of Advanced Persistent Threats (APT) tactics, technics and procedures
  • Understanding of possible attack activities such as network probing/scanning, DDOS, malicious code activity, etc.
  • Understanding of basic networking protocols such as TCP/IP, DNS, HTTP
  • Outstanding written and oral communication skills and the ability to prioritize work
  • Good understanding of global geopolitical dynamics and the ability to apply that knowledge to an information security context
  • Proven ability to understand and explain the behaviors of different types of complex organizations, from APT groups to clients
  • Proven ability to translate complex information sets into specific recommendations that can be actioned by customers to enhance their security posture
  • Familiarity with cyber threats, defenses, motivations and techniques
  • Experience with intelligence analysis tools, methods and the intelligence lifecycle
  • Experience distilling raw information into actionable and finished intelligence
  • Ability to write analytical information products
  • Ability to construct and analyze social network graphs
  • Limited immigration sponsorship may be available
  • Travel up to 30% (While 30% of travel is a requirement of the role, due to COVID-19, non-essential travel has been suspended until further notice)

Preferred:
  • Outstanding written and oral communication skills and the ability to prioritize work
  • Knowledge of foreign languages is a plus (Russian, Farsi, Arabic, Mandarin, Korean)
  • Strong understanding of threat analysis and enterprise level, mitigation strategies
  • Working knowledge of how malicious code operates and how technical vulnerabilities are exploited
  • Knowledge of operating systems and networking technologies in general
  • Knowledge of databases, query design, and how to analyze data thus obtained
  • Knowledge of toolsets such as Confluence, Jira
  • Excellent interpersonal and organizational skills
  • Excellent oral and written communication skills
  • Strong analytical and problem-solving skills
  • Self-motivated to improve knowledge and skills
  • A strong desire to understand the what as well as the why and the how of security incidents