Journeyman Defensive Cyber Analyst | Yokosuka, Japan
Engineering and Product | Delivery Management
Arlington/Rosslyn, Virginia, United States
Share this job: Share:
Share Caution against fraudulent job offers. Learn more.
Our Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients’ success. You’ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.
Work You’ll Do
The Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.
An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.
• Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
• Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
• Asses Security Technical Implementation Guides (STIGs) compliance and completion.
• Utilize asset mapping tools to verify connected inventory.
• Handle Information Assurance Vulnerability Management (IVAM) notifications.
• Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
• Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
• Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.
The Team
Deloitte’s Government and Public Services (GPS) practice – our people, ideas, technology and outcomes—is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
Our Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.
Qualifications
Required:
- Active Secret Clearance
- Bachelor’s degree in IT/Cybersecurity related field
- 3+ years of experience in security operations
- Demonstrated experience with analytical duties and performing host or network security analysis
- Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system/application vulnerabilities
- Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
- Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
- Ability to be onsite 100% of the time in Yokosuka, Japan
- Fluent in Japanese
- Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
Preferred (Desired):
- Active Top Secret Clearance
- Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
- Strong analytical and troubleshooting skills
- Able to provide expert content development in Splunk Enterprise Security using tstats and data models
- Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring
Information for applicants with a need for accommodation: [1] https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
Deloitte is committed to providing reasonable accommodations for people with disabilities. If you require a reasonable accommodation to participate in the recruiting process, please direct your inquiries to the Global Call Center (GCC) at USTalentCICInbox@deloitte.com.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas, and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities.
Learn more.
Professional development
From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte Consulting LLP, a subsidiary of Deloitte LLP. Please see https://www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 323148
Job ID 323148
tpt.queue.add( function () { "use strict"; (function ($) { jQuery.get( "https://apply.deloitte.com/en_US/careers/RelatedJobs?3_149_3=637&3_370_3=112873319&3_200_3=95157&jobId=323148", function (data) { if (data.trim() == "" && jQuery(".article--relatedJobs").length) { jQuery(".article--relatedJobs").addClass("visibility--hidden"); } jQuery('#relatedJobs').append(data).removeClass('awaiting-content'); tpt.queue.next(); } ); }($ || avajQuery)); } );
-
Honolulu, Hawaii, United States AI & Engineering
-
Incident Responder, IoT and OT (Secret Clearance Required, Onsite)
Arlington/Rosslyn, Virginia, United States Cyber
-
Sr Program Management Analyst
San Diego, California, United States AI & Engineering
-
Indianapolis, Indiana, United States Customer
-
San Francisco, California, United States Customer
Caution against fraudulent job offers!
We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.
We would like to clarify that:
- At Deloitte, ethics and integrity are fundamental and not negotiable.
- We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
- We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
- We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
- No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.
Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.
{ "@context": "http://schema.org", "@type": "JobPosting", "datePosted": "2026-02-03", "description": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "employmentType": [""], "hiringOrganization" : { "@type": "Organization", "name": "Deloitte US", "sameAs": null }, "identifier": { "name": 323148, "value": 323148, "@type": "PropertyValue" }, "jobLocation" : { "@type": "Place", "address": { "streetAddress": "", "addressLocality": "", "addressRegion": null, "postalCode": "", "addressCountry": null, "@type": "PostalAddress" } }, "educationRequirements": "Bachelor's Degree", "experienceRequirements": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "industry": "", "occupationalCategory": "", "qualifications": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "responsibilities": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "skills": "\u003Cdiv\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients\u2019 success. You\u2019ll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification\/triage.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EAn ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software\/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how\/where they can be leveraged to identify known-bad files\/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Asses Security Technical Implementation Guides (STIGs) compliance and completion.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Utilize asset mapping tools to verify connected inventory.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Handle Information Assurance Vulnerability Management (IVAM) notifications.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u2022 Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EDeloitte\u2019s Government and Public Services (GPS) practice \u2013 our people, ideas, technology and outcomes\u2014is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003ERequired:\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Secret Clearance\u003C\/li\u003E\u003Cli\u003EBachelor\u2019s degree in IT\/Cybersecurity related field\u003C\/li\u003E\u003Cli\u003E3+ years of experience in security operations\u003C\/li\u003E\u003Cli\u003EDemonstrated experience with analytical duties and performing host or network security analysis\u003C\/li\u003E\u003Cli\u003EProficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system\/application vulnerabilities\u003C\/li\u003E\u003Cli\u003EApplied knowledge of network topologies, protocols (e.g., TCP\/IP, ICMP, HTTP\/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.\u003C\/li\u003E\u003Cli\u003ECapable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.\u003C\/li\u003E\u003Cli\u003EAbility to be onsite 100% of the time in Yokosuka, Japan\u003C\/li\u003E\u003Cli\u003EFluent in Japanese\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EPreferred (Desired):\u003C\/strong\u003E\u003C\/div\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EActive Top Secret Clearance\u003C\/li\u003E\u003Cli\u003EKnowledge of Operational Technology (OT) or Industrial Control Systems (ICS)\u003C\/li\u003E\u003Cli\u003EStrong analytical and troubleshooting skills\u003C\/li\u003E\u003Cli\u003EAble to provide expert content development in Splunk Enterprise Security using tstats and data models\u003C\/li\u003E\u003Cli\u003EUnderstands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cbr data-mce-bogus=\"1\"\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: [1] https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\u003C\/div\u003E\u003C\/div\u003E", "specialCommitments": "Yes", "validThrough" : "2026-04-30", "title" : "US E - GPS - Consulting- Journeyman Defense Cyber Analyst, Yokosuka, Japan - ACDC - PDM - Specialist - MM" }