SOAR Automation Developer Senior Consultant

Cyber | Cyber & Strategic Risk
Same job available in 11 locations

Boston, Massachusetts, United States

Chicago, Illinois, United States

Costa Mesa, California, United States

Dallas, Texas, United States

Detroit, Michigan, United States

Jersey City, New Jersey, United States

Los Angeles, California, United States

New York, New York, United States

Parsippany, New Jersey, United States

Philadelphia, Pennsylvania, United States

San Jose, California, United States

Position Summary

Job Description: CYBER D&R SOAR Automation Developer: Senior

Are you interested in improving the cyber and organizational risk profiles of leading companies? Do you want to be involved in delivering Managed Security Operations Center (SOC) Services including identifying unauthorized activities and intrusions in their networks in real time? Are you excited about rapidly changing operational environments, learning what you need to get the job done, and producing accurate and timely results?

If yes, then Deloitte’s Cyber Detect and Respond (CYBER D&R) team could be the place for you! Transparency, innovation, collaboration, sustainability: these are the hallmark issues shaping cyber initiatives today. Deloitte’s CYBER D&R business is passionate about making an impact with lasting change. Delivering our industry leading services requires fresh thinking and a creative approach. We collaborate with teams from across our organization in order to bring the full breadth of Deloitte, its commercial and public sector expertise, to best support our clients. Our aspiration is to be the premier integrated services provider in helping to transform the cyber security services marketplace.

Our team is client focused and mission driven. As a Cyber Risk Automation Developer in Deloitte's Managed Detect and Respond, you’ll work with our diverse teams of passionate professionals to help solve for some of today’s toughest cybersecurity challenges to enable or clients to achieve business growth and manage risk.

Work you’ll do

As an Automation Developer, you will be part of the CYBER D&R Automation team. You should possess an understanding of Indicators of Compromise, characterization and forensic engineering of compromised systems, operations security, compliance, mitigation, and analysis through tools that detect advanced threats.

  • Develop automation playbooks using modern SOAR Platforms (for example, ServiceNow SOAR, Phantom, Swimlane) to support Security Operations
  • Design and Develop Integration solutions to other security appliances such as Exabeam, Chronical, Crowdstrike, Splunk ES by leveraging SOAR Platform
  • Test, customize and master APIs for off-the-shelf and common security and IT tools
  • Manage any in scope solution projects (integration/ implementations)
  • Manage communications with vendors, 3rd party service providers, Deloitte leadership, and client personnel when required
  • Analyze complex issues to determine client impact and to suggest alternative solutions based on client needs and objectives
  • Contribute to team and organizational improvements in process and infrastructure
  • Design, implement, and maintain efficient and reusable Python code
  • Review, debug, and resolve technical issues throughout all stages of SDLC
  • Integrate SOAR platform with other security tools and APIs to execute automated workflows
  • Assist with process development and process improvement for Security Operations to include creation/modification of SOPs, Playbooks, and Work instructions
  • Measure effectiveness of process improvement and automation efforts via metrics and KPIs
  • Expert in creating, modifying, tuning IDS signatures/SIEM Correlation Searches/yara rules and/or other detection signatures
  • Familiarity with disk based forensic methodologies, Windows, and Linux forensic artifacts
  • Experience with Endpoint Detection and Response (EDR) tools such as Carbon Black, Tanium, Crowdstrike, etc.
  • Able to create, modify, update, and maintain Python and PowerShell scripts that enhance endpoint detection capabilities
  • In-depth knowledge of attacker tactics, techniques, and procedures

Qualifications

Required:

  • Bachelor of Science with a concentration in computer science, information systems, information security, or engineering disciplines or equivalent work experience
  • Minimum 3 years of experience with Splunk operations and maintenance including 2 or more years of Splunk Phantom Engineering
  • Understanding of the full software development life cycle: Analysis, Design, Coding, Testing and promotion into Production.
  • Understanding how modern software architectures works (client-server, Web technology, micro-services)
  • Understanding of basic SOAR technologies (Security Orchestration and Automation Response) systems
  • Understanding of common network infrastructure devices such as routers and switches
  • Understanding of basic networking protocols such as TCP/IP, DNS, HTTP
  • Basic knowledge of cloud infrastructure and operations, system security architecture, and security solutions
  • Strong programming experience solving technical challenges
  • Database technologies proficiency: SQL, NoSQL, or PostgreSQL
  • Understand multi-process architecture
  • Professional experience with Code Repositories and Version Control “GitHub Preferred”
  • Working knowledge of SOAP/REST APIs, JSON, HTML/CSS, JavaScript, XML
  • Experience as a SOC Analyst and/or Incident Responder
  • Authored SOC SOPs, playbooks, work instructions and/or other process documents
  • Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)
  • Self-starter with the ability to independently prioritize and complete multiple tasks with little to no supervision
  • Knowledge of Cloud Services such as AWS, Azure, Office365
  • Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell
  • Knowledge in security technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, etc.
  • Knowledge of Advanced Persistent Threats (APT) tactics, techniques and procedures
  • Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc
  • Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future 

Preferred:

  • 5+ years working in security information and/or technology engineering support experience
  • Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH) or equivalent
  • Experience with security operations technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, Advanced Persistent Threats (APT)
  • Strong understanding of threat analysis and enterprise level mitigation strategies and frameworks like “MITRE”
  • Working knowledge of cyber threats, defenses, motivations, and techniques
  • Excellent interpersonal and organizational skills
  • Excellent oral and written communication skills
  • Strong analytical and problem-solving skills
  • Self-motivated to improve knowledge and skills
  • A strong desire to understand the root cause of security incidents along with identification of threat vectors
  • Experience with Apache Nifi and secure Nifi registry
  • Knowledge of web application frameworks: Flask, Django etc. for dashboard/ widget development

#LI-DP3

Our people and culture

Our diverse, equitable, and inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our client most complex challenges. This makes Deloitte one of the most rewarding places to work. Learn more about our inclusive culture.

Professional development

From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.


As used in this posting, "Deloitte Advisory" means Deloitte & Touche LLP, which provides audit and enterprise risk services; Deloitte Financial Advisory Services LLP, which provides forensic, dispute, and other consulting services; and its affiliate, Deloitte Transactions and Business Analytics LLP, which provides a wide range of advisory and analytics services. Deloitte Transactions and Business Analytics LLP is not a certified public accounting firm. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. These entities are separate subsidiaries of Deloitte LLP.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.

Requisition code: 89934

SCAM ALERT

Caution against fraudulent job offers!

We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.

We would like to clarify that:

  • At Deloitte, ethics and integrity are fundamental and not negotiable.
  • We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
  • We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
  • We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
  • No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.

Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.