Technical Incident Responder (Cyber incident Response)
Role: Technical Incident Responder (Cyber incident Response)
Location: UK remote
Start: ASAP
Duration: 6 months (inside IR35)
Overall purpose the role
Our CIR specialists are called to answer client needs regarding proactive incident response advisory services, reactive incident response, post-breach assessments, managed threat hunting as well as implementing response automation technologies.
Role and Responsibilities
As a Technical Incident Responder you will be focused on CIR and you will typically have responsibility for:
Your creative mindset will enable you to solve clients' issues whilst thinking around corners;
· You will bring innate ability to lead teams, inspire colleagues and act as a trusted business adviser;
· You will deliver cyber-related engagements with our clients, working seamlessly and collaboratively with colleagues and clients;
· You will contribute to the development of our teams by training and coaching;
· You'll be contributing to the creation of new Cyber related services and the development of existing services;
· You'll be keen to increase the eminence of the Deloitte Cyber practice and engage with some high profile clients;
Skills And Professional Experience
· Proven experience in Incident Response supervising technical and non-technical team members and managing incidents, either in-house or as a consultant;
· Experience in network forensics with an emphasis on detecting malicious activity using network traffic;
· Experience working with security intelligence, data analytics, security incident response, and forensic investigation teams;
· Experience in forensic and memory analysis with an emphasis on detecting malicious activity using host-based artefacts on Windows and/or Unix/Linux operating systems;
· Investigative and incident response experience within cloud environments e.g., AWS, GCP and Azure;
· Tool agnostic ability to conduct preliminary malware analysis;
· Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques;
· Excellent verbal and written communication skills and the ability to tailor communications to people from a wide range of backgrounds and seniorities;
· Excellent interpersonal skills and experience of developing strong relationships, either as a consultant or within an organisation;
Location: UK remote
Start: ASAP
Duration: 6 months (inside IR35)
Overall purpose the role
Our CIR specialists are called to answer client needs regarding proactive incident response advisory services, reactive incident response, post-breach assessments, managed threat hunting as well as implementing response automation technologies.
Role and Responsibilities
As a Technical Incident Responder you will be focused on CIR and you will typically have responsibility for:
Your creative mindset will enable you to solve clients' issues whilst thinking around corners;
· You will bring innate ability to lead teams, inspire colleagues and act as a trusted business adviser;
· You will deliver cyber-related engagements with our clients, working seamlessly and collaboratively with colleagues and clients;
· You will contribute to the development of our teams by training and coaching;
· You'll be contributing to the creation of new Cyber related services and the development of existing services;
· You'll be keen to increase the eminence of the Deloitte Cyber practice and engage with some high profile clients;
Skills And Professional Experience
· Proven experience in Incident Response supervising technical and non-technical team members and managing incidents, either in-house or as a consultant;
· Experience in network forensics with an emphasis on detecting malicious activity using network traffic;
· Experience working with security intelligence, data analytics, security incident response, and forensic investigation teams;
· Experience in forensic and memory analysis with an emphasis on detecting malicious activity using host-based artefacts on Windows and/or Unix/Linux operating systems;
· Investigative and incident response experience within cloud environments e.g., AWS, GCP and Azure;
· Tool agnostic ability to conduct preliminary malware analysis;
· Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques;
· Excellent verbal and written communication skills and the ability to tailor communications to people from a wide range of backgrounds and seniorities;
· Excellent interpersonal skills and experience of developing strong relationships, either as a consultant or within an organisation;