LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

Journeyman Defensive Cyber Analyst | Yokosuka, Japan

at Deloitte

Back to all Cybersecurity jobs
Deloitte logo
Big Four

Journeyman Defensive Cyber Analyst | Yokosuka, Japan

at Deloitte

Mid LevelNo visa sponsorshipCybersecurity

Posted 5 days ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Japan

Join Deloitte's AI & Engineering team as a Journeyman Defensive Cyber Analyst based in Yokosuka, Japan. You will analyze technology devices across OT/ICS, on-premise and cloud networks, perform forensic and log analysis, and support SOC operations and threat hunting. You will develop analytics on SIEM platforms, assess STIGs, and help detect, investigate, and respond to network intrusions. The role requires onsite availability in Yokosuka, fluent Japanese, and an active security clearance.

Journeyman Defensive Cyber Analyst | Yokosuka, Japan

Engineering and Product | Delivery Management

Arlington/Rosslyn, Virginia, United States

Position Summary

Our Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients’ success. You’ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.

Work You’ll Do
The Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.

An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.

• Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
• Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
• Asses Security Technical Implementation Guides (STIGs) compliance and completion.
• Utilize asset mapping tools to verify connected inventory.
• Handle Information Assurance Vulnerability Management (IVAM) notifications.
• Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
• Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
• Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.

The Team
Deloitte’s Government and Public Services (GPS) practice – our people, ideas, technology and outcomes—is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
Our Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.

Qualifications

Required:
  • Active Secret Clearance
  • Bachelor’s degree in IT/Cybersecurity related field
  • 3+ years of experience in security operations
  • Demonstrated experience with analytical duties and performing host or network security analysis
  • Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system/application vulnerabilities
  • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
  • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
  • Ability to be onsite 100% of the time in Yokosuka, Japan
  • Fluent in Japanese
  • Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.

Preferred (Desired):
  • Active Top Secret Clearance
  • Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
  • Strong analytical and troubleshooting skills
  • Able to provide expert content development in Splunk Enterprise Security using tstats and data models
  • Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring

Information for applicants with a need for accommodation: [1] https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
Deloitte is committed to providing reasonable accommodations for people with disabilities. If you require a reasonable accommodation to participate in the recruiting process, please direct your inquiries to the Global Call Center (GCC) at USTalentCICInbox@deloitte.com.
Recruiting tips

From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits

At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture

Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas, and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. 
Our purpose

Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities.  Learn more.
Professional development

From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte Consulting LLP, a subsidiary of Deloitte LLP. Please see https://www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 323148
Job ID 323148
tpt.queue.add( function () { "use strict"; (function ($) { jQuery.get( "https://apply.deloitte.com/en_US/careers/RelatedJobs?3_149_3=637&3_370_3=112873319&3_200_3=95157&jobId=323148", function (data) { if (data.trim() == "" && jQuery(".article--relatedJobs").length) { jQuery(".article--relatedJobs").addClass("visibility--hidden"); } jQuery('#relatedJobs').append(data).removeClass('awaiting-content'); tpt.queue.next(); } ); }($ || avajQuery)); } );

Similar jobs

SCAM ALERT

Caution against fraudulent job offers!

We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.

We would like to clarify that:

  • At Deloitte, ethics and integrity are fundamental and not negotiable.
  • We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
  • We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
  • We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
  • No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.

Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.

{ "@context": "http://schema.org", "@type": "JobPosting", "datePosted": "2026-02-03", "description": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "employmentType": [""], "hiringOrganization" : { "@type": "Organization", "name": "Deloitte US", "sameAs": null }, "identifier": { "name": 323148, "value": 323148, "@type": "PropertyValue" }, "jobLocation" : { "@type": "Place", "address": { "streetAddress": "", "addressLocality": "", "addressRegion": null, "postalCode": "", "addressCountry": null, "@type": "PostalAddress" } }, "educationRequirements": "Bachelor's Degree", "experienceRequirements": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "industry": "", "occupationalCategory": "", "qualifications": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "responsibilities": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "skills": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "specialCommitments": "Yes", "validThrough" : "2026-04-30", "title" : "US E - GPS - Consulting- Journeyman Defense Cyber Analyst, Yokosuka, Japan - ACDC - PDM - Specialist - MM" }

© 2026. See Terms of Use for more information.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.

Journeyman Defensive Cyber Analyst | Yokosuka, Japan

at Deloitte

Back to all Cybersecurity jobs
Deloitte logo
Big Four

Journeyman Defensive Cyber Analyst | Yokosuka, Japan

at Deloitte

Mid LevelNo visa sponsorshipCybersecurity

Posted 5 days ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Japan

Join Deloitte's AI & Engineering team as a Journeyman Defensive Cyber Analyst based in Yokosuka, Japan. You will analyze technology devices across OT/ICS, on-premise and cloud networks, perform forensic and log analysis, and support SOC operations and threat hunting. You will develop analytics on SIEM platforms, assess STIGs, and help detect, investigate, and respond to network intrusions. The role requires onsite availability in Yokosuka, fluent Japanese, and an active security clearance.

Journeyman Defensive Cyber Analyst | Yokosuka, Japan

Engineering and Product | Delivery Management

Arlington/Rosslyn, Virginia, United States

Position Summary

Our Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients’ success. You’ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.

Work You’ll Do
The Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.

An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.

• Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
• Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
• Asses Security Technical Implementation Guides (STIGs) compliance and completion.
• Utilize asset mapping tools to verify connected inventory.
• Handle Information Assurance Vulnerability Management (IVAM) notifications.
• Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
• Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
• Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.

The Team
Deloitte’s Government and Public Services (GPS) practice – our people, ideas, technology and outcomes—is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
Our Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.

Qualifications

Required:
  • Active Secret Clearance
  • Bachelor’s degree in IT/Cybersecurity related field
  • 3+ years of experience in security operations
  • Demonstrated experience with analytical duties and performing host or network security analysis
  • Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system/application vulnerabilities
  • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
  • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
  • Ability to be onsite 100% of the time in Yokosuka, Japan
  • Fluent in Japanese
  • Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.

Preferred (Desired):
  • Active Top Secret Clearance
  • Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
  • Strong analytical and troubleshooting skills
  • Able to provide expert content development in Splunk Enterprise Security using tstats and data models
  • Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring

Information for applicants with a need for accommodation: [1] https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
Deloitte is committed to providing reasonable accommodations for people with disabilities. If you require a reasonable accommodation to participate in the recruiting process, please direct your inquiries to the Global Call Center (GCC) at USTalentCICInbox@deloitte.com.
Recruiting tips

From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits

At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture

Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas, and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. 
Our purpose

Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities.  Learn more.
Professional development

From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte Consulting LLP, a subsidiary of Deloitte LLP. Please see https://www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 323148
Job ID 323148
tpt.queue.add( function () { "use strict"; (function ($) { jQuery.get( "https://apply.deloitte.com/en_US/careers/RelatedJobs?3_149_3=637&3_370_3=112873319&3_200_3=95157&jobId=323148", function (data) { if (data.trim() == "" && jQuery(".article--relatedJobs").length) { jQuery(".article--relatedJobs").addClass("visibility--hidden"); } jQuery('#relatedJobs').append(data).removeClass('awaiting-content'); tpt.queue.next(); } ); }($ || avajQuery)); } );

Similar jobs

SCAM ALERT

Caution against fraudulent job offers!

We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.

We would like to clarify that:

  • At Deloitte, ethics and integrity are fundamental and not negotiable.
  • We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
  • We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
  • We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
  • No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.

Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.

{ "@context": "http://schema.org", "@type": "JobPosting", "datePosted": "2026-02-03", "description": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "employmentType": [""], "hiringOrganization" : { "@type": "Organization", "name": "Deloitte US", "sameAs": null }, "identifier": { "name": 323148, "value": 323148, "@type": "PropertyValue" }, "jobLocation" : { "@type": "Place", "address": { "streetAddress": "", "addressLocality": "", "addressRegion": null, "postalCode": "", "addressCountry": null, "@type": "PostalAddress" } }, "educationRequirements": "Bachelor's Degree", "experienceRequirements": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "industry": "", "occupationalCategory": "", "qualifications": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "responsibilities": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "skills": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "specialCommitments": "Yes", "validThrough" : "2026-04-30", "title" : "US E - GPS - Consulting- Journeyman Defense Cyber Analyst, Yokosuka, Japan - ACDC - PDM - Specialist - MM" }

© 2026. See Terms of Use for more information.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.