LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

DCO Engineer

at Deloitte

Back to all Cybersecurity jobs
Deloitte logo
Big Four

DCO Engineer

at Deloitte

Mid LevelNo visa sponsorshipCybersecurity

Posted 5 days ago

No clicks

Compensation
$88,600 – $147,600 USD

Currency: $ (USD)

City
Not specified
Country
United States

Deloitte’s DCO Engineer will serve as a Defensive Cyber Operations SME responsible for defending mission systems critical to national defense. The role entails leading teams on complex assignments, developing DCO methodologies, and advising on cyber defensive architectures and technologies to protect, detect, and respond to threats. The position requires active TS/SCI clearance and 5 years of cyber-defense experience.

DCO Engineer

Engineering and Product | Security Engineering

Colorado Springs, Colorado, United States

Position Summary

Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.

Recruiting for this role ends on February 27, 2026.

Work you’ll do
  • Require a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. 
  • Assignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. 
  • Leads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. 
  • Consults on IT and cyber defensive architecture and technologies. 
  • Assesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. 
  • Advises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. 
  • Researches cyber defense technologies for best fit based on mission, architecture and current threat. 
  • Leads the design, implementation, configuration and/or tuning of cyber defensive technology. 
  • Authors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.

The Team

Deloitte’s Government and Public Services (GPS) practice – our people, ideas, technology and outcomes—is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.

Our Enterprise Security offering embeds security in all aspects of digital transformation by securing a client’s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.

Qualifications

Required:

  • Bachelor’s degree.
  • Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
  • Active TS/SCI clearance.
  • 5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).
  • 5 years of professional technical experience
  • Experience years must come from at least 2 of the following areas:
    • Container or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) 
    • In-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)
    • Data storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)
    • Agile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)
    • Windows operating systems
    • Network infrastructure
    • Security applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)

The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.

You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.

Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html

Deloitte is committed to providing reasonable accommodations for people with disabilities. If you require a reasonable accommodation to participate in the recruiting process, please direct your inquiries to the Global Call Center (GCC) at USTalentCICInbox@deloitte.com.
Recruiting tips

From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits

At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture

Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas, and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. 
Our purpose

Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities.  Learn more.
Professional development

From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte Transactions and Business Analytics LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 324505
Job ID 324505
tpt.queue.add( function () { "use strict"; (function ($) { jQuery.get( "https://apply.deloitte.com/en_US/careers/RelatedJobs?3_149_3=637&3_370_3=112873319&3_200_3=95157&jobId=324505", function (data) { if (data.trim() == "" && jQuery(".article--relatedJobs").length) { jQuery(".article--relatedJobs").addClass("visibility--hidden"); } jQuery('#relatedJobs').append(data).removeClass('awaiting-content'); tpt.queue.next(); } ); }($ || avajQuery)); } );

Similar jobs

SCAM ALERT

Caution against fraudulent job offers!

We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.

We would like to clarify that:

  • At Deloitte, ethics and integrity are fundamental and not negotiable.
  • We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
  • We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
  • We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
  • No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.

Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.

{ "@context": "http://schema.org", "@type": "JobPosting", "datePosted": "2025-09-18", "description": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "employmentType": [""], "hiringOrganization" : { "@type": "Organization", "name": "Deloitte US", "sameAs": null }, "identifier": { "name": 324505, "value": 324505, "@type": "PropertyValue" }, "jobLocation" : { "@type": "Place", "address": { "streetAddress": "", "addressLocality": "", "addressRegion": null, "postalCode": "", "addressCountry": null, "@type": "PostalAddress" } }, "educationRequirements": "Bachelor's Degree", "experienceRequirements": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "industry": "", "occupationalCategory": "", "qualifications": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "responsibilities": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "skills": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "specialCommitments": "Yes", "validThrough" : "2026-02-27", "title" : "US E- GPS Consulting Services- DCO Engineer- Cyber \/ Enterprise Security- PDM Specialist- MySource #630214 (LL)" }

© 2026. See Terms of Use for more information.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.

DCO Engineer

at Deloitte

Back to all Cybersecurity jobs
Deloitte logo
Big Four

DCO Engineer

at Deloitte

Mid LevelNo visa sponsorshipCybersecurity

Posted 5 days ago

No clicks

Compensation
$88,600 – $147,600 USD

Currency: $ (USD)

City
Not specified
Country
United States

Deloitte’s DCO Engineer will serve as a Defensive Cyber Operations SME responsible for defending mission systems critical to national defense. The role entails leading teams on complex assignments, developing DCO methodologies, and advising on cyber defensive architectures and technologies to protect, detect, and respond to threats. The position requires active TS/SCI clearance and 5 years of cyber-defense experience.

DCO Engineer

Engineering and Product | Security Engineering

Colorado Springs, Colorado, United States

Position Summary

Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.

Recruiting for this role ends on February 27, 2026.

Work you’ll do
  • Require a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. 
  • Assignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. 
  • Leads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. 
  • Consults on IT and cyber defensive architecture and technologies. 
  • Assesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. 
  • Advises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. 
  • Researches cyber defense technologies for best fit based on mission, architecture and current threat. 
  • Leads the design, implementation, configuration and/or tuning of cyber defensive technology. 
  • Authors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.

The Team

Deloitte’s Government and Public Services (GPS) practice – our people, ideas, technology and outcomes—is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.

Our Enterprise Security offering embeds security in all aspects of digital transformation by securing a client’s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.

Qualifications

Required:

  • Bachelor’s degree.
  • Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
  • Active TS/SCI clearance.
  • 5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).
  • 5 years of professional technical experience
  • Experience years must come from at least 2 of the following areas:
    • Container or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) 
    • In-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)
    • Data storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)
    • Agile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)
    • Windows operating systems
    • Network infrastructure
    • Security applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)

The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.

You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.

Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html

Deloitte is committed to providing reasonable accommodations for people with disabilities. If you require a reasonable accommodation to participate in the recruiting process, please direct your inquiries to the Global Call Center (GCC) at USTalentCICInbox@deloitte.com.
Recruiting tips

From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits

At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture

Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas, and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. 
Our purpose

Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities.  Learn more.
Professional development

From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte Transactions and Business Analytics LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 324505
Job ID 324505
tpt.queue.add( function () { "use strict"; (function ($) { jQuery.get( "https://apply.deloitte.com/en_US/careers/RelatedJobs?3_149_3=637&3_370_3=112873319&3_200_3=95157&jobId=324505", function (data) { if (data.trim() == "" && jQuery(".article--relatedJobs").length) { jQuery(".article--relatedJobs").addClass("visibility--hidden"); } jQuery('#relatedJobs').append(data).removeClass('awaiting-content'); tpt.queue.next(); } ); }($ || avajQuery)); } );

Similar jobs

SCAM ALERT

Caution against fraudulent job offers!

We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.

We would like to clarify that:

  • At Deloitte, ethics and integrity are fundamental and not negotiable.
  • We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
  • We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
  • We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
  • No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.

Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.

{ "@context": "http://schema.org", "@type": "JobPosting", "datePosted": "2025-09-18", "description": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "employmentType": [""], "hiringOrganization" : { "@type": "Organization", "name": "Deloitte US", "sameAs": null }, "identifier": { "name": 324505, "value": 324505, "@type": "PropertyValue" }, "jobLocation" : { "@type": "Place", "address": { "streetAddress": "", "addressLocality": "", "addressRegion": null, "postalCode": "", "addressCountry": null, "@type": "PostalAddress" } }, "educationRequirements": "Bachelor's Degree", "experienceRequirements": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "industry": "", "occupationalCategory": "", "qualifications": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "responsibilities": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "skills": "\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cdiv\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv\u003ERecruiting for this role ends on February 27, 2026.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr\u003E\u003Cstrong\u003EWork you\u2019ll do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003ERequire a Defensive Cyber Operations (DCO) SME with a desire to actively defend the mission systems critical to our national defense. As an engineer the candidate will lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. \u003C\/li\u003E\u003Cli\u003EAssignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. \u003C\/li\u003E\u003Cli\u003ELeads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. \u003C\/li\u003E\u003Cli\u003EConsults on IT and cyber defensive architecture and technologies. \u003C\/li\u003E\u003Cli\u003EAssesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. \u003C\/li\u003E\u003Cli\u003EAdvises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. \u003C\/li\u003E\u003Cli\u003EResearches cyber defense technologies for best fit based on mission, architecture and current threat. \u003C\/li\u003E\u003Cli\u003ELeads the design, implementation, configuration and\/or tuning of cyber defensive technology. \u003C\/li\u003E\u003Cli\u003EAuthors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/p\u003E\u003Cp\u003EOur Enterprise Security offering embeds security in all aspects of digital transformation by securing a client\u2019s technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003Cbr\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ERequired:\u003C\/p\u003E\u003Cdiv\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u2019s degree.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EActive TS\/SCI clearance.\u003C\/li\u003E\u003Cli\u003E5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).\u003C\/li\u003E\u003Cli\u003E5 years of professional technical experience\u003C\/li\u003E\u003Cli\u003EExperience years must come from at least 2 of the following areas:\u003C\/li\u003E\u003Cul\u003E\u003Cli\u003EContainer or virtual environments (e.g. Docker, Kubernetes, VMware, AWS) \u003C\/li\u003E\u003Cli\u003EIn-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)\u003C\/li\u003E\u003Cli\u003EData storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.) -Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)\u003C\/li\u003E\u003Cli\u003EAgile frameworks for software development, -Linux operating systems (Red Hat, Kali, etc.)\u003C\/li\u003E\u003Cli\u003EWindows operating systems\u003C\/li\u003E\u003Cli\u003ENetwork infrastructure\u003C\/li\u003E\u003Cli\u003ESecurity applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/ul\u003E\u003Cp\u003EThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $88,600 to $147,600.\u003C\/p\u003E\u003Cp\u003EYou may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.\u003C\/p\u003E\u003C\/div\u003E\u003Cp\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cstyle\u003E \u003C\/style\u003E", "specialCommitments": "Yes", "validThrough" : "2026-02-27", "title" : "US E- GPS Consulting Services- DCO Engineer- Cyber \/ Enterprise Security- PDM Specialist- MySource #630214 (LL)" }

© 2026. See Terms of Use for more information.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.