Deloitte

location-iconDeloitte

Exploitation Analyst

location-iconWestminster, MD, 21158

jobtype-iconPart Time, Full Time

estimated-salary-icon$63,651 per year

dateposted-iconPosted 9 days ago

Apply Now

location-iconActively Hiring

About the Role

Deloitte's GPS Cyber Practice is seeking an Exploitation Analyst to support intelligence functions, cyber investigations, and operations. This role is critical in assisting organizations to establish a cyber-minded culture and become stronger, faster, and more innovative by applying cutting-edge cybersecurity tools and strategies. You will work with a dynamic team, engaging in core analytical tasks, and enhancing operational and strategic cybersecurity measures. This is an excellent opportunity to elevate your cyber career while making a direct impact on national security.

What You'll Do

As an Exploitation Analyst, your key responsibilities will include:

  • File signature analysis and real-time forensic analysis to detect and respond to network intrusions.
  • Conducting research and analysis at the operational and strategic levels.
  • Reporting on intelligence-derived network events, intrusions, and significant threats.
  • Threat analysis, including assessing threat actors, platforms, and activities, as well as the intent and capabilities of adversaries.
  • Applying technical expertise to create exploitation plans, identify vulnerabilities, and implement adjustments to network operations.
  • Communicating your findings and assessments through intelligence products and oral briefings to senior stakeholders.

The Team

The GPS Cyber Practice works with federal, state, and local government clients, as well as public higher education institutions. The Cyber Strategy, Defense, and Response (SDR) team focuses on designing and implementing enterprise security programs, defending against cyberattacks, and helping clients recover and mitigate risks. Deloitte’s cyber strategy empowers organizations to move forward, transforming cybersecurity into an enabler for innovation rather than just a defense mechanism.

Qualifications

Required:

  • Bachelor’s degree + 8 years of experience, or Master’s degree + 6 years, or PhD + 4 years of experience in cybersecurity or related fields.
  • Active TS/SCI with Polygraph security clearance.
  • Hands-on experience with file signature analysis, real-time forensic analysis, and network event reporting.
  • Experience conducting research and analysis at both operational and strategic levels.
  • Threat analysis skills, including understanding adversaries' activities, platforms, and tactics.
  • Excellent communication skills for delivering intelligence products and oral briefings.
  • Ability to work on-site and travel up to 25% as required.
  • Must be legally authorized to work in the United States without employer sponsorship, now or in the future.

Preferred:

  • Relevant certifications such as Certified Ethical Hacker, CompTIA Cyber Security Analyst, or GIAC Certified Incident Handler.
  • Military training in cybersecurity, such as the JCAC (Joint Cyber Analysis Course), can count towards the experience requirement.
  • Experience in computer forensics, network security, or related technical fields.

Compensation

The disclosed compensation range for this role is $113,000 to $188,000, based on factors like experience, training, and business needs. You may also be eligible for a discretionary annual incentive program, which depends on individual and organizational performance.

Accommodations

Deloitte is committed to providing accessible opportunities for all applicants. If you need accommodation during the application process, please visit: Join Deloitte Assistance for Disabled Applicants.

What other people searched near you


Digital network Exploitation Analyst job description

Exploitation Analyst salary

Exploitation Analyst training

Energy trading analyst job description

Exploitation Analyst job description

Environmental data analyst jobs

Trade analyst job description

Roles and responsibilities of bi analyst

Searches you may like


Hiring Deloitte jobs near me

Job opportunities in Westminster, Maryland

Seasonal jobs near me

Remote jobs near me

Deloitte jobs in Westminster, Maryland


Related Jobs

Intelligence Analyst

SAIC

location-iconRockville, MD

dateposted-iconPosted 9 days ago

Intelligence Analyst

SAIC

location-iconWestminster, MD

dateposted-iconPosted 9 days ago

Intelligence Analyst

SAIC

location-iconBrunswick, MD

dateposted-iconPosted 9 days ago

Intelligence Analyst

SAIC

location-iconTaneytown, MD

dateposted-iconPosted 9 days ago

Intelligence Analyst

SAIC

location-iconLa Plata, MD

dateposted-iconPosted 9 days ago

Intelligence Analyst

SAIC

location-iconCapitol Heights, MD

dateposted-iconPosted 9 days ago


FAQ's

Find the answers for the most frequently asked questions below

Are you looking for job openings with Deloitte near Westminster, MD, US? You'll find plenty of opportunities in nearby cities, including Aberdeen, MD, Annapolis, MD, Baltimore, MD, Bladensburg, MD, Bowie, MD, Brentwood, MD, Capitol Heights, MD, Chesapeake Beach, MD, College Park, MD, Easton, MD, Elkton, MD, Kensington, MD, Manchester, MD, Mt Airy, MD, Perryville, MD, Poolesville, MD, Sykesville, MD, Bel Air, MD, Centreville, MD, District Heights, MD. These locations offer remote jobs, part-time jobs, and full-time positions with Deloitte. Check out current job listings in these cities to discover more employment opportunities and local jobs hiring now in your area.

If you're searching for companies hiring now in Westminster, MD, US, several top employers are offering a variety of job opportunities. These include CACI, Amazon, U.S. Department of Defense, SAIC, Angi, Allied Universal, OneMain Financial and more. Whether you're looking for entry-level positions, work-from-home jobs, or immediate hire roles, you'll find plenty of local job listings in Westminster, MD, US.

Environmental exploitation, in the context of an Exploitation Analyst's job, typically refers to the unauthorized or uncontrolled use of resources, systems, or vulnerabilities in the environment (such as computer networks, software, or hardware) for malicious purposes or to gain unauthorized access. This term is often used in cybersecurity to describe activities that could potentially harm the system's security or privacy.