Cyber Endpoint Senior Consultant

Cyber | Cyber & Strategic Risk
Same job available in 10 locations

Atlanta, Georgia, United States

Boston, Massachusetts, United States

Chicago, Illinois, United States

Costa Mesa, California, United States

Dallas, Texas, United States

Jersey City, New Jersey, United States

Los Angeles, California, United States

New York, New York, United States

Philadelphia, Pennsylvania, United States

San Jose, California, United States

Position Summary

Cyber Endpoint Sr Consultant

Are you interested in improving the cyber and organizational risk profiles of leading companies? If your response is yes, consider joining Deloitte & Touche LLP's growing Cyber Risk practice. Our Endpoint security specialists assist our clients with the design and implementation of holistic and targeted solutions needed to meet and exceed the requirements of best practice, ethical operations, and regulation?

We collaborate with teams from across our organization in order to bring the full breadth of Deloitte, its commercial and public sector expertise, to best support our clients. Our aspiration is to be the premier integrated services provider in helping to transform the cyber security services marketplace. Our team is client focused and mission driven. As a Cyber Endpoint Security Sr Consultant, you will work with our diverse teams of passionate and expert professionals to help solve for some of today’s toughest cybersecurity and organizational challenges to enable or clients to enable business growth and continue to manage evolving risk.

Work you’ll do

As an Endpoint Security Sr Consultant in Deloitte’s Cyber Risk Services, you will be managing Endpoint Security systems and providing administrative, health and operational support, including supporting to architecture changes, tool deployments and advanced content development. You will be closely working with SOC, Threat Intelligence and other business, infrastructure and security streams as an advanced escalation point in identifying and addressing potential information security incidents. Your job responsibilities include:

  • Provide oversight (incl. metrics, risks and issues, escalation management)
  • Provide Architecture analysis, design, and support for Endpoint Security systems
  • Identify gaps and provide engineering solutions to new threats using implemented endpoint tools. Assess impact of medium or high-risk changes
  • Lead process compliance activities by identifying and driving initiatives that are relevant for the project delivery and help factor reusability and related benefits
  • Coordinate with business stakeholders to drive remediation activities
  • Oversee administration of one or more Endpoint Security solutions (example - Microsoft Defender ATP, Cylance, Symantec ATP, McAfee MVISION, Tanium, Carbon Black, CrowdStrike, etc.)
  • Prioritize incidents and service tickets, changes, ad-hoc requests
  • Perform and coordinate major and minor upgrades
  • Perform Endpoint Security architecture assessments and design reviews
  • Ensure endpoint security solutions and policies are on track to meet and respond to threats inside of the company's environment.
  • Write, configure, manage, and maintain rules and policies for Anti-Virus or Endpoint Security Products (GPO policies, HIPS, Detection Rule Set etc.)
  • Lead the development of capabilities that enable the creation of gap analysis and risk assessment with the use of the frameworks such as MITRE ATT&CK etc.
  • Assist clients with advanced security incident response action and works with business, security teams and vendors to respond to malware outbreak.
  • Perform incident triage and resolution in situations that are not necessarily predefined in procedures and actively support the engineering and forensics processes in the investigations
  • Design, implement and monitor health of Endpoint security solutions, including endpoint agent health, create related dashboards, real time metrics reporting etc.
  • Serve as escalation point of L1 and L2 analysts\engineers as applicable
  • Deliver Endpoint advisory support and education to other teams, technology management personnel or end users.
  • Help define, implement, and monitor key risk indicators and key performance indicators (KRIs/KPIs)
  • Review system security plans, network diagrams, and vulnerability and patching requirements
  • Create/maintain SOPs pertaining to day-to-day operations of endpoint security management and submit documentation through the Quality Review Management process
  • Contribute to Deloitte’s thought leadership in client organizations and external marketplace
  • Operate as a technical subject matter specialist
  • Understanding and leveraging various product capabilities across the gamut of Endpoint Security to best serve the needs
  • Identify and recommend operational improvements to the client, drawing on deep experience and industry specific knowledge of risks
  • Analyze complex issues to determine client impact and to suggest alternative solutions based on client needs and objectives
  • Manage and grow client relationships (Develop “Trusted Advisor” status)
  • Maintain a solid understanding of the client’s culture, environment (people, process, technology), goals, and security initiatives and communicate all to the engagement team
  • Responsible for on time delivery and quality of all in scope deliverables
  • Manage any in scope solution projects (integration/ implementations)
  • Manage appropriate engagement management reporting on a periodic basis
  • Manage communications with vendors, 3rd party service providers, Deloitte leadership, and client personnel
  • Responsible for compliance with all Deloitte firm engagement management requirements
  • Demonstrate ability to manage and motivate multiple project teams in multiple geo-locations



  • Bachelor’s degree is required. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology
  • Understanding of the entire ecosystem of Endpoint Security including well-rounded understanding of the information security domains and their inter-relations across that ecosystem
  • Candidate should have overall 5 years’ experience with multiple Endpoint Security platforms
  • Experience with Endpoint Security technologies like Microsoft Defender ATP, Cylance, Symantec, McAfee, Tanium, Carbon Black, CrowdStrike, etc.
  • Experience in Anti-Virus (AV) Security Operations – Manage policies and definitions, investigate possible malware infection and detect threats, perform manual malware/virus eradication, perform containment/exclusion activities based on SOPs:
  • Experience with configuration and deployment of endpoint protection platforms (Advanced Threat Protection, Admin Rights, EDR, Web Protection) – including rulesets tuning and updates as needed
  • Experience in other security technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Sandboxing, network- and host- based firewalls, Encryption, Threat Intelligence, Penetration Testing, etc. is a plus.
  • Proficient understanding of relevant security technologies, such as malware management, network forensics, flow analysis, IDS/IPS, etc.
  • Knowledge of Advanced Persistent Threats (APT) tactics, technics, and procedures
  • Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
  • Understanding of basic networking protocols such as TCP/IP, DNS, HTTP
  • Experience in working with International Standards, NIST Special Publications and Cyber Security Frameworks like PCI DSS, ISO 27001, SOC2
  • Demonstrated ability to identify and address internal and external client needs, including:
    • Demonstrated problem solving and critical thinking skills
    • Working collaboratively with clients to design and implement process and technology solutions
    • Able to build solid, trust - based relationships with stakeholders
    • Excellent interpersonal/communication, presentation, and writing skills
    • Demonstrating strong domain expertise and thought leadership to clients in the cyber security space
  • Ability to travel 40%, on average, based on the work you do and the clients and industries/sectors you serve
  • Limited immigration sponsorship may be available


  • Endpoint Security tool certifications such as Microsoft Defender ATP, Cylance Security Professional (CSP), McAfee Product Specialist, Symantec Certified Specialist
  • Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent
  • Excellent interpersonal and organizational skills
  • Excellent oral and written communication skills
  • Strong analytical and problem-solving skills
  • A strong desire to understand the what as well as the why and the how of security incidents
  • Experience with financial forecast and profitability tracking, risks, or issues

Our people and culture

Our diverse, equitable, and inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our client most complex challenges. This makes Deloitte one of the most rewarding places to work. Learn more about our inclusive culture.

Professional development

From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.

As used in this posting, "Deloitte Advisory" means Deloitte & Touche LLP, which provides audit and enterprise risk services; Deloitte Financial Advisory Services LLP, which provides forensic, dispute, and other consulting services; and its affiliate, Deloitte Transactions and Business Analytics LLP, which provides a wide range of advisory and analytics services. Deloitte Transactions and Business Analytics LLP is not a certified public accounting firm. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. These entities are separate subsidiaries of Deloitte LLP.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.

Requisition code: 117235


Caution against fraudulent job offers!

We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.

We would like to clarify that:

  • At Deloitte, ethics and integrity are fundamental and not negotiable.
  • We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
  • We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
  • We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
  • No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.

Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.