Are you an experienced, passionate pioneer in supply chain who wants a daily collaborative environment, think-tank feel and share new ideas with your colleagues - without the extensive demands of travel? If so, consider an opportunity with Deloitte under our Project Delivery Talent Model. Project Delivery Model (PDM) is a talent model that is tailored specifically for long-term, onsite client service delivery. PDM practitioners are local to project locations, minimizing extensive travel, and provides you with a full career path within the firm.
The Role
This role will monitor and audit information systems for anomaly detection of users in support of Insider Risk programs, leveraging system data to analyze findings, create incident reports, and build case packages to facilitate customer decision making.
The Team
Our Supply Chain Networks team helps clients transform their value chains into competitive weapons. We drive efficiency, improve flexibility, and increase responsiveness through proactive insights and decision-making. We advise, implement, and operate transformational solutions that bring world-class supply network and operational capabilities to our clients. We provide operational know-how, digital technologies, advanced analytics, and industry-specific hybrid solutions to deliver unprecedented client value. Additionally, we improve operations, product, and material flow across the breadth of the value chain and create greater supply network synergy and value through M&A events.
Qualifications
Required:
- Must have 5 years of relevant experience.
- Bachelor’s degree
- Active TS/SCI Clearance
- Must be legally authorized to work in the United States without the need for employer sponsorship, nowor at any time in the future.
- Ability to travel up to 25% on average, based on the work you do and the clients and industries/sectors you serve.
Preferred:
- Experience with maintenance, monitoring, auditing, and analysis for information systems from threats and the identification of unauthorized intrusions.
- Experience addressing issues and assisting personnel to preclude system failures or disruptions, identify vulnerabilities, exploitation, data infiltration, and data compromise.
- Experience with Microsoft and Linux based Operating Systems in addition to a full command of MS Office applications.
- Experience analyzing findings, build packages, and create incident reports.
- Experience supporting development and/or improvement of program CONOPS and Policies/Plans/SOPs.
- Experience utilizing Computer Forensics and Investigations practices to analyze findings, build report packages, and create incident reports along with remedial action and present these reports proficiently in oral communication and investigative writing within a case file.
- Experience supporting development of RMF documentation, artifacts and evidence as needed.
#LI-WG1 |