Deloitte Job - 39465644 | CareerArc
  Search for More Jobs
Get alerts for jobs like this Get jobs like this tweeted to you
Company: Deloitte
Location: Hyderabad, Telangana, India
Career Level: Associate
Industries: Business Services, Consulting

Description


<div id =\"headerText\"> <div class=\"clearfix\"> <p><span>SCAM ALERT:</span> Caution against fraudulent job offers!</p> <a onclick=\"showPopup(this.id)\" id=\"india-content\" href=\"javascript:void(0)\">More Info<i class=\"icon icon-arrow-right\"></i></a> <div class=\"modal fade in hide\" emp-id=\"india-content\" role=\"dialog\"> <div class=\"modal-content-block\"> <div class=\"modal-dialog\"> <div class=\"close-popup\"> <button type=\"button\" class=\"close\" data-dismiss=\"modal\" onclick=\"showPopup(this.id);resetFunction(this);\" id=\"india-content\">×</button> </div> <div class=\"modal-content show\"> <div class=\"heading\"> <p class=\"inner-heading\">SCAM ALERT</p> <p class=\"sub-text\">Caution against fraudulent job offers!</p> <div class=\"seperator\"></div> </div> <div class=\"content-description\"> <p class=\"inner-content\">We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte India (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job' with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.</p> <p class=\"inner-content\"><b>We would like to clarify that:<ul><li>At Deloitte, ethics and integrity are fundamental and not negotiable.</li><li>We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.</li><li>We have not authorised any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.</li><li>We consider candidates on merit and that we provide an equal opportunity to eligible applicants.</li><li>No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.</li></ul></b></p><p class=\"inner-content\">Anyone who at any time has made or makes any payment to any party in exchange of promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration', ‘verification' or ‘security deposit') or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorised or fraudulent actions or engagements.</p><p class=\"inner-content\">We encourage jobseekers to exercise caution.</p> </div> </div> </div> </div> </div> </div><div class=\"scam-seperator\"></div><br></div><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><span style=\"color:black\">Application Security Solution Architect — Lead Solution Advisor/Senior Solution Advisor/Sr Consultant</span></span></span></span></h2><p style=\"margin-bottom:16px;font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><b>Deloitte's Cyber Risk Services</b> help our clients to be secure, vigilant, and resilient in the face of an ever-increasing array of cyber threats and vulnerabilities. Our Cyber Risk practice helps organizations with the management of information and technology risks by delivering end-to-end solutions using proven methodologies and tools in a consistent manner. Our services help organizations to address, in a timely manner, pervasive issues, such as identity theft, data security breaches, data leakage, cyber security, and system outages across organizations of various sizes and industries with the goal of enabling ongoing, secure, and reliable operations across the enterprise. </span></span></span></p><p style=\"margin-bottom:16px;font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Deloitte's Cyber Risk Services have been recognized as a leader by a number of independent analyst firms. <b>Kennedy Consulting Research & Advisory, a leading analyst firm, recently named Deloitte a global leader in cyber security consulting.</b> Source: Kennedy Consulting Research & Advisory; Cyber Security Consulting 2013; Kennedy Consulting Research & Advisory estimates © 2013 Kennedy Information, LLC. Reproduced under license. </span></span></span></p><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><span style=\"color:black\">Work you will do</span></span></span></span></h2><p class=\"Default\" style=\"font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"color:black\">As an Application Security Solution Architect in Deloitte's Cyber practice, you will be at the front lines with our clients supporting them with application development programs by designing, implementing, monitoring, and enforcing security through the DevSecOps process as they begin implementing infrastructure and services as code. You will take enterprises to the next level of cloud maturity as you enforce security standards and controls through build and release pipelines. You will also support on cloud security engagements during different phases of the lifecycle – assessment, design, implementation, and post-implementation reviews. </span></span></span></p><p style=\"margin-bottom:16px;font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\"><span style=\"color:black\">The incumbent will be a team player and is passionate about learning and applying their technical skills and experience to solve real-world problems.</span></span></span></span></p><ul><li style=\"list-style-type:none\"><ul style=\"list-style-type:circle\"><li><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Understand and possess deep knowledge of application security engineering principles, and helping client's development team and function to follow secure development practices which includes primarily monitoring and performing the security design review, architecture review, threat modeling, security testing, secure code review, secure build processes;</span></span></span></li><li><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Understand application and infrastructure security cloud technologies such as WAF, API gateways, RASP and vulnerability scanners to deploy and configure in the production environment. Also, should be able to integrate application security tools to the CI/CD pipeline. </span></span></span></li><li style=\"margin-bottom:16px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Understand application architecture controls & design based on security standards and regulations such as NIST, PCI-DSS, ISO etc.   </span></span></span></li><li style=\"margin-bottom:16px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Well versed with the application deployment and configuration baselines, and understanding of how the application environment operates in a secure environment and how exceptions are handled during operations;</span></span></span></li><li style=\"margin-bottom:16px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Understand security architecture concepts including topology, protocols, components, and principles to perform threat modeling;  </span></span></span></li><li style=\"margin-bottom:16px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Facilitate use of technology-based tools or methodologies to continuously improve the monitoring, management and reliability of the service; </span></span></span></li><li style=\"margin-bottom:16px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Perform manual and automated security assessment of the applications;</span></span></span></li><li style=\"margin-bottom:16px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Involved in triaging and defect tracking process with the development team and helping the team to fix issues at the code level based on the priority of the tickets;</span></span></span></li><li style=\"margin-bottom:16px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Be a liaison between the Application development and infrastructure team, and integrate the processes between infrastructure monitoring and operations processes with the secure development/testing and management processes; and</span></span></span></li><li style=\"margin-bottom:16px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:normal\">Identifying, researching and analyzing application security events which may include emerging and existing persistent threats to the client's environment; </span></span></span></li></ul></li></ul><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><span style=\"color:black\">The team</span></span></span></span></h2><p style=\"margin-bottom:16px;font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Deloitte's DevSecOps is a standardized process, to help clients with large development functions, and application dependencies for their day-to-day operations. The process enables the client to address key vulnerabilities and risks associated with their various application environment at different stages of their development lifecycle.  </span></span></span></p><p style=\"margin-bottom:16px;font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">At the core of our Application Security Managed Services Team professionals' monitors, collects and analyses security related issues on application environment (both at code level and infrastructure level), that may potentially become a threat to an organization. This detection of application threats/vulnerabilities is carried out using a unique blend of our application security testing and monitoring tools and intelligence data collected through our vast experience within the Advice and Implement business.</span></span></span></p><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><span style=\"color:black\">Required:</span></span></span></span></h2><ul><li class=\"MsoListBulletCxSpFirst\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Minimum of 7-9 years' experience in application security development, security testing, deployment and security management phases; </span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Deep interest in application specific vulnerabilities, code development and infrastructure knowledge;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Investigative and analytical problem-solving skills;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Experience in collecting, analyzing, and interpreting qualitative and quantitative data from defined application security services related sources (tools, monitoring techniques etc.)</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Knowledge and experience of OWASP Top 10, SANS Secure Programming, Security Engineering Principles;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Hands-on experience in developing application security architecture patterns and cloud security architecture patterns. </span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Experience in development implementation and of security patterns on application security layer tools such as Web Application Firewall (WAF), API gateway and reverse proxy.</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Hands-on experience on Cloud formation or Terraform scripting </span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Hands-on experience on implementation of cloud security controls</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Hands-on experience in running, installing and managing SAST, DAST and IAST solutions, such as Checkmarx, Fortify and Contrast in large enterprise</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Hands-on experience on at least one CI/CD tool set and building pipelines using Team city, Bamboo, Jenkins, Chef, Puppet, selenium, AWS and AZURE DevOps;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Hands on experience on container technology such as Kubernetes, Dockers, AKS, EKS. </span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Knowledge of cloud environments and deployment solutions such as server less computing;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Understanding of vulnerability management and penetration testing;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Must have experience in writing custom exploitation scripts and utilities;  </span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Possession of excellent oral and written communication skill;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Knowledge of one or more scripting languages for automation and complex searches;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Must have cloud security specialization in Security; and </span></span></span></li><li class=\"MsoListBulletCxSpLast\" style=\"margin-bottom:16px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Certification such as SANS GIAC, ISC2 CSSLP, OSCP etc. are preferred.  </span></span></span></li></ul><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><span style=\"color:black\">Preferred:</span></span></span></span></h2><ul><li class=\"MsoListBulletCxSpFirst\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Bachelor's in computer science or other technical fields;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Experience on Web application firewalls such as Kona are preferred </span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Experience with application monitoring, Managed Services business primarily on DevOps, Threat and Vulnerability Management for Application infrastructure, source code verification, link analysis, and threat modeling;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Solid and demonstrable comprehension of Information Security including OWASP/SANS, Security Test Case development (or mis-use case), OOAD notations, emerging threats, attacks, and vulnerability management</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Understanding of security essentials including; networking concepts, defense strategies, and current security technologies</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Ability to research and characterize security threats to include identification and classification of application related threat indicators; and </span></span></span></li></ul><p class=\"MsoListBulletCxSpLast\" style=\"text-indent:0in; margin-bottom:16px; margin-left:24px;font-family: Arial\"> </p><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><span style=\"color:black\">How you will grow</span></span></span></span></h2><p style=\"margin-bottom:16px;font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">At Deloitte, we have invested a great deal to create a rich environment in which our professionals can grow. We want all our people to develop in their own way, playing to their own strengths as they hone their leadership skills. And, as a part of our efforts, we provide our professionals with a variety of learning and networking opportunities—including exposure to leaders, sponsors, coaches, and challenging assignments—to help accelerate their careers along the way. No two people learn in exactly the same way. So, we provide a range of resources, including live classrooms, team‑based learning, and eLearning. Deloitte University (DU): The Leadership Center in India, our state-of-the-art, world-class learning center in the Hyderabad office, is an extension of the DU in Westlake, Texas, and represents a tangible symbol of our commitment to our people's growth and development. <a href=\"http://www2.deloitte.com/ui/en/pages/careers/articles/inclusion-leadership-development.html\" style=\"color:#00a3e0; text-decoration:underline\">Explore DU: The Leadership Center in India</a><span class=\"MsoHyperlink\" style=\"color:#00a3e0\"><span style=\"text-decoration:underline\">.</span></span></span></span></span></p><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><span style=\"color:black\">Benefits</span></span></span></span></h2><p style=\"margin-bottom:16px;font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. <a href=\"http://www2.deloitte.com/ui/en/pages/careers/articles/life-at-deloitte-benefits-and-rewards.html\" style=\"color:#00a3e0; text-decoration:underline\">Learn more about what working at Deloitte can mean for you.</a> </span></span></span></p><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><span style=\"color:black\">Deloitte's culture</span></span></span></span></h2><p style=\"margin-bottom:16px;font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Our positive and supportive culture encourages our people to do their best work every day. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them to be healthy, centered, confident, and aware. We offer well-being programs and are continuously looking for new ways to maintain a culture that is inclusive, invites authenticity, leverages our diversity, and where our people excel and lead healthy, happy lives. <a href=\"http://www2.deloitte.com/ui/en/pages/careers/articles/life-at-deloitte-benefits-and-rewards.html\" style=\"color:#00a3e0; text-decoration:underline\">Learn more about Life at Deloitte.</a></span></span></span></p><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\"><span style=\"color:black\">Corporate citizenship</span></span></span></span></h2><p style=\"margin-bottom:16px;font-family: Arial\"><span style=\"font-size:9px;\"><span style=\"font-family:Verdana,Geneva,sans-serif;\"><span style=\"line-height:12pt\">Deloitte is led by a purpose: to make an impact that matters. This purpose defines who we are and extends to relationships with our clients, our people, and our communities. We believe that business has the power to inspire and transform. We focus on education, giving, skill-based volunteerism, and leadership to help drive positive social impact in our communities. <a href=\"http://www2.deloitte.com/ui/en/pages/careers/articles/deloitte-community-involvement.html\" style=\"color:#00a3e0; text-decoration:underline\">Learn more about Deloitte's impact on the world.</a></span></span></span></p><p style=\"margin-bottom:16px;font-family: Arial\"> </p><br><div id =\"skillText\"><div><div><h2 style=\"margin-bottom:8px\"><span style=\"font-size:9px\"><span style=\"font-family:Verdana,Geneva,sans-serif\"><span style=\"line-height:12pt\"><span style=\"color:black\">Preferred:</span></span></span></span></h2><ul><li class=\"MsoListBulletCxSpFirst\"><span style=\"font-size:9px\"><span style=\"font-family:Verdana,Geneva,sans-serif\"><span style=\"line-height:12pt\">Bachelor's in computer science or other technical fields;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px\"><span style=\"font-family:Verdana,Geneva,sans-serif\"><span style=\"line-height:12pt\">Experience on Web application firewalls such as Kona are preferred </span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px\"><span style=\"font-family:Verdana,Geneva,sans-serif\"><span style=\"line-height:12pt\">Experience with application monitoring, Managed Services business primarily on DevOps, Threat and Vulnerability Management for Application infrastructure, source code verification, link analysis, and threat modeling;</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px\"><span style=\"font-family:Verdana,Geneva,sans-serif\"><span style=\"line-height:12pt\">Solid and demonstrable comprehension of Information Security including OWASP/SANS, Security Test Case development (or mis-use case), OOAD notations, emerging threats, attacks, and vulnerability management</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px\"><span style=\"font-family:Verdana,Geneva,sans-serif\"><span style=\"line-height:12pt\">Understanding of security essentials including; networking concepts, defense strategies, and current security technologies</span></span></span></li><li class=\"MsoListBulletCxSpMiddle\"><span style=\"font-size:9px\"><span style=\"font-family:Verdana,Geneva,sans-serif\"><span style=\"line-height:12pt\">Ability to research and characterize security threats to include identification and classification of application related threat indicators; and </span></span></span></li></ul></div></div></div><br><div id =\"boilerText\"> <p>\"Deloitte\\” is the brand under which tens of thousands of dedicated professionals in independent firms throughout the world collaborate to provide audit, consulting, financial advisory, risk management and tax services to selected clients. These firms are members of Deloitte Touche Tohmatsu Limited DTTL, a UK private company limited by guarantee. Each member firm provides services in a particular geographic area and is subject to the laws and professional regulations of the particular country or countries in which it operates. DTTL does not itself provide services to clients. DTTL and each DTTL member firm are separate and distinct legal entities, which cannot obligate each other. DTTL and each DTTL member firm are liable only for their own acts or omissions and not those of each other. Each DTTL member firm is structured differently in accordance with national laws, regulations, customary practice, and other factors, and may secure the provision of professional services in its territory through subsidiaries, affiliates and/or other entities. </p><p>In the United States, Deloitte LLP is the member firm of DTTL. Like DTTL, Deloitte LLP does not provide services to clients. Instead, services are primarily provided by the subsidiaries of Deloitte LLP, including:</p><ul><li>Deloitte & Touche LLP</li><li>Deloitte Consulting LLP</li><li>Deloitte Financial Advisory Services LLP</li><li>Deloitte Tax LLP</li></ul><br></div><br><div id =\"reqId\"> Requisition code: E22HYDLSAPB-AppSec</div><br>


 Apply on company website