Incident Responder, IoT and OT (Secret Clearance Required, Onsite)
Engineering and Product | Security Engineering
Arlington/Rosslyn, Virginia, United States
Share this job: Share:
Share Caution against fraudulent job offers. Learn more.
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Work You’ll Do
The Incident Responder will perform incident response activities related to Internet of Things (IoT) and Operational Technology (OT) devices, including but not limited to:
- Coordinating and managing end-to-end responses to security events and incidents identified by the SOC or reported to the SOC
- Performing initial malware analysis and triage support
- Operating incident analysis tools and systems; and
- Adhering to reporting requirements for all declared significant incidents.
The Team
Deloitte’s Government and Public Services (GPS) practice – our people, ideas, technology, and outcomes—are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.
The Project Delivery Talent Model is designed for professionals with specialized skills that align to a current client need. Team members focus on delivering services to clients, without additional expectations related to business development or promotion. Their employment is tied to their role on a project, and they are eligible for a benefits package that is competitive for project delivery-focused professionals.
Qualifications
Required:
- Bachelor’s degree required.
- Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
- Active Secret Clearance required.
- Ability to work onsite five days a week.
- A minimum of three years’ experience within the following:
- Prior experience with analyzing information technology security, IoT, and OT security events: discern legitimate security incidents, identify malicious codes and activities.
- Experience working with various Security Information Event Management (SIEM) and Endpoint Detection and Response (EDR) tools and must be proficient in the review of security event log analysis: experience or familiarity with IoT/OT systems a plus.
- Proficiency in utilizing various Packet Capture (PCAP) applications/engines and in the analysis of PCAP data.
- Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment
- Must possess excellent verbal and written communications skills as well as excellent organizational skills and strong attention to detail: ability produce clear and thorough security incident reports and briefings.
- Must possess a working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks: routing protocols, and common internet applications and standards.
Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
Deloitte is committed to providing reasonable accommodations for people with disabilities. If you require a reasonable accommodation to participate in the recruiting process, please direct your inquiries to the Global Call Center (GCC) at USTalentCICInbox@deloitte.com.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas, and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities.
Learn more.
Professional development
From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte Transactions and Business Analytics LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 324879
Job ID 324879
tpt.queue.add( function () { "use strict"; (function ($) { jQuery.get( "https://apply.deloitte.com/en_US/careers/RelatedJobs?3_149_3=637&3_370_3=112873319&3_200_3=95157&jobId=324879", function (data) { if (data.trim() == "" && jQuery(".article--relatedJobs").length) { jQuery(".article--relatedJobs").addClass("visibility--hidden"); } jQuery('#relatedJobs').append(data).removeClass('awaiting-content'); tpt.queue.next(); } ); }($ || avajQuery)); } );
Caution against fraudulent job offers!
We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.
We would like to clarify that:
- At Deloitte, ethics and integrity are fundamental and not negotiable.
- We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
- We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
- We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
- No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.
Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.
{ "@context": "http://schema.org", "@type": "JobPosting", "datePosted": "2025-06-09", "description": "\u003Cdiv\u003E\u003C\/div\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EWork You\u2019ll Do\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Incident Responder will perform incident response activities related to Internet of Things (IoT) and Operational Technology (OT) devices, including but not limited to:\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ECoordinating and managing end-to-end responses to security events and incidents identified by the SOC or reported to the SOC\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EPerforming initial malware analysis and triage support\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOperating incident analysis tools and systems; and \u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EAdhering to reporting requirements for all declared significant incidents.\u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Team\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EThe Project Delivery Talent Model is designed for professionals with specialized skills that align to a current client need. Team members focus on delivering services to clients, without additional expectations related to business development or promotion. Their employment is tied to their role on a project, and they are eligible for a benefits package that is competitive for project delivery-focused professionals.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EQualifications\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E \u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ERequired: \u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EBachelor\u2019s degree required.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EActive Secret Clearance required.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EAbility to work onsite five days a week. \u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EA minimum of three years\u2019 experience within the following:\u003C\/span\u003E\u003C\/li\u003E\u003Cul style=\"margin-top: 0in;\"\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EPrior experience with analyzing information technology security, IoT, and OT security events: discern legitimate security incidents, identify malicious codes and activities.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience working with various Security Information Event Management (SIEM) and Endpoint Detection and Response (EDR) tools and must be proficient in the review of security event log analysis: experience or familiarity with IoT\/OT systems a plus.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EProficiency in utilizing various Packet Capture (PCAP) applications\/engines and in the analysis of PCAP data.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment\u003C\/span\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess excellent verbal and written communications skills as well as excellent organizational skills and strong attention to detail: ability produce clear and thorough security incident reports and briefings.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess a working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks: routing protocols, and common internet applications and standards. \u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EInformation for applicants with a need for accommodation: https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/span\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cbr\u003E", "employmentType": [""], "hiringOrganization" : { "@type": "Organization", "name": "Deloitte US", "sameAs": null }, "identifier": { "name": 324879, "value": 324879, "@type": "PropertyValue" }, "jobLocation" : { "@type": "Place", "address": { "streetAddress": "", "addressLocality": "", "addressRegion": null, "postalCode": "", "addressCountry": null, "@type": "PostalAddress" } }, "educationRequirements": "Bachelor's Degree", "experienceRequirements": "\u003Cdiv\u003E\u003C\/div\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EWork You\u2019ll Do\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Incident Responder will perform incident response activities related to Internet of Things (IoT) and Operational Technology (OT) devices, including but not limited to:\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ECoordinating and managing end-to-end responses to security events and incidents identified by the SOC or reported to the SOC\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EPerforming initial malware analysis and triage support\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOperating incident analysis tools and systems; and \u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EAdhering to reporting requirements for all declared significant incidents.\u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Team\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EThe Project Delivery Talent Model is designed for professionals with specialized skills that align to a current client need. Team members focus on delivering services to clients, without additional expectations related to business development or promotion. Their employment is tied to their role on a project, and they are eligible for a benefits package that is competitive for project delivery-focused professionals.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EQualifications\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E \u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ERequired: \u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EBachelor\u2019s degree required.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EActive Secret Clearance required.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EAbility to work onsite five days a week. \u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EA minimum of three years\u2019 experience within the following:\u003C\/span\u003E\u003C\/li\u003E\u003Cul style=\"margin-top: 0in;\"\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EPrior experience with analyzing information technology security, IoT, and OT security events: discern legitimate security incidents, identify malicious codes and activities.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience working with various Security Information Event Management (SIEM) and Endpoint Detection and Response (EDR) tools and must be proficient in the review of security event log analysis: experience or familiarity with IoT\/OT systems a plus.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EProficiency in utilizing various Packet Capture (PCAP) applications\/engines and in the analysis of PCAP data.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment\u003C\/span\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess excellent verbal and written communications skills as well as excellent organizational skills and strong attention to detail: ability produce clear and thorough security incident reports and briefings.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess a working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks: routing protocols, and common internet applications and standards. \u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EInformation for applicants with a need for accommodation: https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/span\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cbr\u003E", "industry": "", "occupationalCategory": "", "qualifications": "\u003Cdiv\u003E\u003C\/div\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EWork You\u2019ll Do\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Incident Responder will perform incident response activities related to Internet of Things (IoT) and Operational Technology (OT) devices, including but not limited to:\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ECoordinating and managing end-to-end responses to security events and incidents identified by the SOC or reported to the SOC\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EPerforming initial malware analysis and triage support\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOperating incident analysis tools and systems; and \u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EAdhering to reporting requirements for all declared significant incidents.\u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Team\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EThe Project Delivery Talent Model is designed for professionals with specialized skills that align to a current client need. Team members focus on delivering services to clients, without additional expectations related to business development or promotion. Their employment is tied to their role on a project, and they are eligible for a benefits package that is competitive for project delivery-focused professionals.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EQualifications\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E \u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ERequired: \u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EBachelor\u2019s degree required.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EActive Secret Clearance required.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EAbility to work onsite five days a week. \u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EA minimum of three years\u2019 experience within the following:\u003C\/span\u003E\u003C\/li\u003E\u003Cul style=\"margin-top: 0in;\"\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EPrior experience with analyzing information technology security, IoT, and OT security events: discern legitimate security incidents, identify malicious codes and activities.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience working with various Security Information Event Management (SIEM) and Endpoint Detection and Response (EDR) tools and must be proficient in the review of security event log analysis: experience or familiarity with IoT\/OT systems a plus.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EProficiency in utilizing various Packet Capture (PCAP) applications\/engines and in the analysis of PCAP data.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment\u003C\/span\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess excellent verbal and written communications skills as well as excellent organizational skills and strong attention to detail: ability produce clear and thorough security incident reports and briefings.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess a working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks: routing protocols, and common internet applications and standards. \u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EInformation for applicants with a need for accommodation: https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/span\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cbr\u003E", "responsibilities": "\u003Cdiv\u003E\u003C\/div\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EWork You\u2019ll Do\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Incident Responder will perform incident response activities related to Internet of Things (IoT) and Operational Technology (OT) devices, including but not limited to:\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ECoordinating and managing end-to-end responses to security events and incidents identified by the SOC or reported to the SOC\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EPerforming initial malware analysis and triage support\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOperating incident analysis tools and systems; and \u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EAdhering to reporting requirements for all declared significant incidents.\u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Team\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EThe Project Delivery Talent Model is designed for professionals with specialized skills that align to a current client need. Team members focus on delivering services to clients, without additional expectations related to business development or promotion. Their employment is tied to their role on a project, and they are eligible for a benefits package that is competitive for project delivery-focused professionals.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EQualifications\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E \u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ERequired: \u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EBachelor\u2019s degree required.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EActive Secret Clearance required.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EAbility to work onsite five days a week. \u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EA minimum of three years\u2019 experience within the following:\u003C\/span\u003E\u003C\/li\u003E\u003Cul style=\"margin-top: 0in;\"\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EPrior experience with analyzing information technology security, IoT, and OT security events: discern legitimate security incidents, identify malicious codes and activities.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience working with various Security Information Event Management (SIEM) and Endpoint Detection and Response (EDR) tools and must be proficient in the review of security event log analysis: experience or familiarity with IoT\/OT systems a plus.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EProficiency in utilizing various Packet Capture (PCAP) applications\/engines and in the analysis of PCAP data.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment\u003C\/span\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess excellent verbal and written communications skills as well as excellent organizational skills and strong attention to detail: ability produce clear and thorough security incident reports and briefings.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess a working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks: routing protocols, and common internet applications and standards. \u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EInformation for applicants with a need for accommodation: https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/span\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cbr\u003E", "skills": "\u003Cdiv\u003E\u003C\/div\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EWork You\u2019ll Do\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Incident Responder will perform incident response activities related to Internet of Things (IoT) and Operational Technology (OT) devices, including but not limited to:\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ECoordinating and managing end-to-end responses to security events and incidents identified by the SOC or reported to the SOC\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EPerforming initial malware analysis and triage support\u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOperating incident analysis tools and systems; and \u003C\/span\u003E\u003C\/li\u003E \u003Cli class=\"MsoListParagraph\" style=\"margin-left: 0in;\"\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EAdhering to reporting requirements for all declared significant incidents.\u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EThe Team\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EOur Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EThe Project Delivery Talent Model is designed for professionals with specialized skills that align to a current client need. Team members focus on delivering services to clients, without additional expectations related to business development or promotion. Their employment is tied to their role on a project, and they are eligible for a benefits package that is competitive for project delivery-focused professionals.\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EQualifications\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E \u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003ERequired: \u003C\/span\u003E\u003C\/strong\u003E\u003Cspan style=\"font-size: 11pt;\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cul style=\"margin-top: 0in;\"\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EBachelor\u2019s degree required.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EActive Secret Clearance required.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EAbility to work onsite five days a week. \u003C\/span\u003E\u003C\/li\u003E \u003Cli\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EA minimum of three years\u2019 experience within the following:\u003C\/span\u003E\u003C\/li\u003E\u003Cul style=\"margin-top: 0in;\"\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EPrior experience with analyzing information technology security, IoT, and OT security events: discern legitimate security incidents, identify malicious codes and activities.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience working with various Security Information Event Management (SIEM) and Endpoint Detection and Response (EDR) tools and must be proficient in the review of security event log analysis: experience or familiarity with IoT\/OT systems a plus.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EProficiency in utilizing various Packet Capture (PCAP) applications\/engines and in the analysis of PCAP data.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EExperience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment\u003C\/span\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess excellent verbal and written communications skills as well as excellent organizational skills and strong attention to detail: ability produce clear and thorough security incident reports and briefings.\u003C\/span\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan style=\"font-size: 14.6667px;\"\u003EMust possess a working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks: routing protocols, and common internet applications and standards. \u003C\/span\u003E\u003C\/li\u003E \u003C\/ul\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp style=\"margin-left: 0.25in;\"\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cspan style=\"font-size: 11pt;\"\u003EInformation for applicants with a need for accommodation: https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/span\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cbr\u003E", "specialCommitments": "Yes", "validThrough" : "2026-03-13", "title" : "US E- GPS Consulting Services- Incident Responder- Cyber\/ Defense & Resilience- PDM Specialist- 538463 (LL)" }