Deloitte is hiring for Analyst trainee | Apply Now

Disclaimer

Welcome to vthetecheejobs.com! We gather job listings from various sources, including job websites and company portals, to bring you the best opportunities tailored to your interests. While we strive to ensure accuracy, please verify job details independently before taking any action. It's important to note that vthetecheejobs.com does not endorse any specific employers or job listings showcased on our platform, nor are we involved in the hiring process. We want you to know that we have no affiliations or partnerships with the companies listed. Your use of our website is at your own discretion, and we're here to support you in your job search journey!

Role :Analyst trainee

Location :Hyderabad

Job Description

Deloitte offers you a career in the highly sought-after sector of cyber risk management, not just a job. In the market for cyber risk, we are among the industry leaders. Our goal is to create a more secure, reliable, and wealthy world. Mostly located outside of India, Deloitte's clients are sizable, intricate businesses that are always innovating and changing to create better goods and services. They face a number of dangers along the way, and the work we perform to assist them in addressing these risks is becoming more and more crucial to their success as well as the health of the public safety and economic sectors.

Joining our team will allow you to collaborate with a range of skilled teams that develop, oversee, and execute risk-centric solutions in a number of different fields. You will become subject matter experts in those areas and be exposed to the risk-centric difficulties that organizations in a variety of industry sectors face today.

Responsibilities

  • Analyzing our clients' IT controls and procedures in security and risk management operations will improve operational performance.
  • supporting a range of real-time applications pertaining to security and data privacy measures.
  • Manage software vulnerabilities and maintain highly available and secure mission-critical systems by implementing ITIL-aligned procedures and approaches.
  • putting in place procedures for keeping an eye on "smart" gadgets linked to business networks.
  • As part of SOC, conduct ongoing security analytics and monitoring.
  • As part of operations, manage incident response assistance, diagnose, solve, and clarify complicated technological issues for clients.
  • combining technological solutions with business goals, including creating system requirements, designing, prototyping, testing, training, establishing support protocols, and putting them into practice.
  • helping forensic accountants identify and quantify fraud or other infractions.
  • using predictive modeling capabilities to evaluate and find trends in massive data sets by querying and mining.
  • Evaluate the efficacy of the clients' controls to guarantee a high level of dependability in their external financial reporting, adherence to legal requirements, and protection of their mission-critical assets.

Education Qualifications

  • B.E./B.Tech in computer science, software engineering, information technology, cyber security, and/or other related circuital branches; or
  • M.E./M.Tech in software engineering, computer science, information technology, or cyber security; or
  • MCA
  • 60% equivalent cumulative grade point average (CGPA) without any outstanding debt or arrears

Skills

  • Strong interpersonal and communication abilities (verbal, written, and presenting) are necessary to interact with people on a global, online platform.
  • should exhibit a greater sense of responsibility, meticulousness, and procedural compliance.
  • should be customer-centric and concentrate on finding the most effective solution to the problems that the customer has raised.
  • moderate ability to analyze and solve problems in order to pinpoint areas that need ongoing development.
  • Proficiency in computer programming, including relational databases, networking concepts, SQL, Java, Python, C, C++, and programming foundations.
  • strong proficiency in PowerPoint, Word, and Excel.
  • A solid understanding of the risk and cybersecurity domains would be advantageous.
  • incredibly nimble and inquisitive.
  • A propensity for resolving difficult and complex issues would be advantageous.

Get instant updates on latest jobs!

Join our instagram and telegram channels.

To join our Instagram and Telegram channels click on instagram and telegram icons

Instagram

Join Now

Telegram

Join Now

How to Apply

  1. Review Job Details: Read through all the job details on this page to understand the requirements and responsibilities.
  2. Click the Apply Link: Scroll down and click the “Apply Link” button to be redirected to the official website.
  3. Fill Out the Application: On the official website, fill out the application form with the provided information.
  4. Double-Check Your Information: Before submitting your application, review all the details you’ve provided to ensure accuracy and completeness.
  5. Submit Your Application: Once you’re satisfied with your application, submit it through the official website as instructed.