Warwick, GBR
16 hours ago
IBM X-Force - Senior Incident Response Consultant
**Introduction** Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analysing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client’s organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world. **Your role and responsibilities** As a Security Tactical Threat Analyst for the IBM Security X-Force Incident Response (X-Force IR) team, you will be responsible for the growth and delivery of X-Force IR services. You will lead a team of consultants who are responding to high profile cybersecurity incidents within our clients’ enterprise networks. You will work with our clients to proactively prevent and detect future cybersecurity incidents. You will serve as a trusted advisor to our clients, helping to shape their cybersecurity program. You will collaborate with internal IBM stakeholders to provide integrated solutions to our clients’ most challenging problems. In this role you will have demonstrated skills in various elements of Incident Response, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices; ideally in large enterprise environments. You will have proficiency with leading EDR tools as well as familiarity with forensic analysis tools such as X-Ways, EnCase Forensic or FTK and live response analysis. Furthermore, familiarity with Windows and Linux enterprise environments and systems such as Active Directory, M365, FWs, IPS/IDS, SIEMs, etc. is required. Excellent written and verbal communication skills are required. When not responding to breaches, you will conduct enterprise threat hunting, help clients develop incident response plans, facilitate tabletop and purple team exercises as well as provide other strategic security services related to incident response. **Required technical and professional expertise** Significant hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security. • 2 years Experience with assessing and developing enterprise-wide policies and procedures for IT risk mitigation and incident response. • Experience leading incident response teams and managing tasks across all phases of an engagement. • Experience managing a team of consultants with skills similar to those described below. • Capable of working independently as well as providing leadership on internal projects and client engagements. Forensic Analysis & Incident Response Skills: • Ability to forensically analyze both Windows & Unix systems for evidence of compromise. • Proficiency with industry standard forensic tools such as EnCase, FTK, X-Ways, Sleuthkit. • Experience performing log analysis locally and via SIEM/log aggregation tool. • Experience hunting threat actors in large enterprise networks and cloud environments. • Experience with using and configuring Endpoint Detection & Response (EDR) tools. • Demonstrate an understanding of the behaviour, security risks and controls of common network protocols. • Demonstrate an understanding of common applications used in Windows and Linux enterprise environment. Familiarity with Active Directory, Exchange and Office365 applications and logs. • Familiarity with the tools and techniques required to analyse & reverse diverse protocols and data traversing a network environment. • Familiarity with cloud computing platforms like IBM Cloud, AWS, GCP or Azure • Proficient in writing cohesive reports for a technical and non-technical audience. Strategic Assessment Expertise: • Examine and analyze available client internal policies, processes, and procedures to determine patterns and gaps at both a strategic and tactical levels. Recommend appropriate course of action to support maturing the client’s incident response program and cyber security posture. • A strong familiarity with various security frameworks and standards such as ISO 27001/2, PCI DSS, NIST800-53, 800-171, and applicable data privacy laws and regulations. • Demonstrated experience with planning, scoping, and delivering technical and/or executive level tabletop exercises, with a focus on either tactical or strategic incident response processes. • Ability to incorporate current trends and develop custom scenarios applicable to a client. • Low-level operating system knowledge, including automation and performing administrative tasks. • Scripting or programming experience, preferably in a language commonly used for DFIR such as Python or PowerShell. • Ability to work with data at scale such as using Splunk / ELK. • Expertise working with shell programs such as grep, sed and awk to process data quickly. • Working experience with virtualisation and cloud technology platforms like IBM Cloud, AWS, GCP & Azure. **Preferred technical and professional experience** • Diverse understanding of cyber security related vulnerabilities, common attack vectors, and mitigations. • Capable of developing strategic level incident response plans as well as tactical-focused playbooks. • Ability to manage tasks and coordinate work streams during incident response investigations. IBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
Confirmar seu email: Enviar Email
Todos os Empregos de IBM