Job added in hotlist
Applied job
Contract job
Recruiter job
Employer job
Expanded search
Apply online not available
Similar Jobs
TSS Solutions and Data Analytics Manager
General Dynamics Information Technology
Mount Clemens, MI
Apply Now >
PersMod Senior Configuration Management Specialist
General Dynamics Information Technology
Mount Clemens, MI
Apply Now >
Communications Technician 4, Network Maintenance
Detroit, MI
Apply Now >
System Validation Engineer Job
General Motors LLC
Warren, MI
Apply Now >
System Feature Validation Engineer Job
General Motors LLC
Warren, MI
Apply Now >

Job Details

Cyber Threat Hunter Remote

Company name
Deloitte Development, LLC

Detroit, MI, United States

Employment Type


Posted on
Sep 13, 2021

Valid Through
Dec 27, 2021

Apply for this job



Job Information


Cyber Threat Hunter Remote




Are you interested in improving the cyber and organizational risk profiles of leading companies? Do you want to be involved in delivering Detect and Respond Managed / Security Operations Center (SOC) Services including threat hunting? Are you excited about rapidly changing operational environments, learning what you need to get the job done, and producing accurate and timely results?

If yes, then Deloitte's Detect and Respond Fusion Managed Services team could be the place for you! Transparency, innovation, collaboration, sustainability: these are the hallmark issues shaping cyber initiatives today. Deloitte's FMS business is passionate about making an impact with lasting change. Delivering our industry leading services requires fresh thinking and a creative approach. We collaborate with teams from across our organization in order to bring the full breadth of Deloitte, its commercial and public sector expertise, to best support our clients. Our aspiration is to be the premier integrated services provider in helping to transform the cyber security services marketplace.

Our team is client focused and mission driven. As a Cyber Risk Detect and Respond Threat Hunter in Deloitte's Detect and Respond Managed Services, you'll work with our diverse teams of passionate professionals to help solve for some of today's toughest cybersecurity challenges to enable or clients to achieve business growth and manage risk.

Work you'll do

As a Detect and Respond Threat Hunter, you will support the Security Operations Center (SOC) by researching relevant threat actors, attack vectors, and behaviors pertinent to client industries and to each client's network environment in particular.

Research trending campaigns, attack vectors, and search for these in client environments

Be tool agnostic - our Threat Hunting tools may differ from client to client, and we value concepts over tools. The ideal candidate must possess an acute ability to adapt to any tool

When needed, work with alerts from the SOC Analysts, to perform in depth analysis and triage threat activity based on host and network activity, traffic, and protocol analysis to identify infection vectors, the extent of the infection, and prepare high quality reports based on findings

Respond to client specific investigation requests around software/application vulnerabilities, zero days, and security incidents

Document all actions taken in a ticketing workflow management system

Adhere to internal operational security and other Deloitte policies

Hunt for new patterns, activities, and ever-changing tactics associated with advanced threat actors

Provide Security information and event management (SIEM) content development and testing support

When necessary, devise and document new techniques, automation, and procedures along with the service leadership

Foster a culture of collaboration and build team members' strengths

Collaborate with senior hunters for investigations



BA or BS in Computer Science or Information Management and relevant work experience

1 years working in security information and/or technology engineering support experience

Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent

Extensive knowledge on network, endpoint, threat intelligence, as well as the functioning of specific applications or underlying IT infrastructure, and have experience with SIEM technologies, EDR solutions, forensics tools, malware analysis

Knowledge of Advanced Persistent Threats (APT) tactics, technics and procedures

Excellent spoken and written communication skills

Strong analytical and problem-solving skills

Experience in security technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, etc.

Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.

Understanding of common network infrastructure devices such as routers and switches

Understanding of basic networking protocols such as TCP/IP, DNS, HTTP/S

Basic knowledge in system security architecture and security solutions

Limited immigration sponsorship may be available

Travel up to 20% (While 20% of travel is a requirement of the role, due to COVID-19, non-essential travel has been suspended until further notice)


Basic knowledge in programming languages such as Python, Java or Ruby

Works well both in a team environment and independently

Excellent interpersonal and organizational skills

Self-motivated to improve knowledge and skills

A strong desire to understand the what as well as the why and the how of security incidents

The team

Deloitte Advisory's Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive Secure.Vigilant.Resilient. TM cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory's Cyber Risk Services practice.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.

Company info

Deloitte Development, LLC
Website :

Similar Jobs:
Job Description Become part of the rapidly evolving auto industry through the implementation of advanced manufacturing systems at General Motors. Responsibilities: • Lead or support activities to identify product and ...
Type of Requisition: Regular Clearance Level Must Be Able to Obtain: None Public Trust/Other Required: MBI (T2) Job Family: Software Development Job Description: Sr. Software Developer GDIT is hiring a Sr. Software Devel...
Sr. Software Developer / DevSecOps - REMOTE
Location : Mount Clemens, MI
Type of Requisition: Regular Clearance Level Must Be Able to Obtain: None Public Trust/Other Required: MBI (T2) Job Family: Software Development Job Description: Sr. Software Developer GDIT is hiring a Sr. Software Devel...
EmploymentCrossing was helpful in getting me a job. Interview calls started flowing in from day one and I got my dream offer soon after.
Jeremy E - Greenville, NC
  • All we do is research jobs.
  • Our team of researchers, programmers, and analysts find you jobs from over 1,000 career pages and other sources
  • Our members get more interviews and jobs than people who use "public job boards"
Shoot for the moon. Even if you miss it, you will land among the stars.
EmploymentCrossing - #1 Job Aggregation and Private Job-Opening Research Service — The Most Quality Jobs Anywhere
EmploymentCrossing is the first job consolidation service in the employment industry to seek to include every job that exists in the world.
Copyright © 2021 EmploymentCrossing - All rights reserved. 169 192