This role will perform security monitoring, investigations and perform analysis of events to thwart internal and external threats to the environment. Additionally, will collaborate on an ongoing basis with the Cyber Security Rapid Response Incident Response Team and Managed Security Service providers to support detection, triage, incident analysis, containment, remediation and reporting of events/incidents while coordinating, balancing business priorities, emerging and actual threats and best practices to ensure the confidentiality, integrity and availability of information assets.
Essential Duties and Responsibilities
· Assist in establishing Global Security Monitoring discipline to support enterprise
· Analyze and respond to security threats from Firewall (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Endpoint Detection and Response (EDR) and other security threat data sources.
· Respond in a timely manner (within documented SLA).
· Document actions in cases to effectively communicate information to internal stakeholders as well has for historical retrieval.
· Adhere to policies, procedures, and security practices
· Resolve problems independently and understand escalation procedures.
· Conduct Security Monitoring activities to provide Security in Depth visibility into potential known and unknown threats that may pose risk to the IBM environment.
· Participate in security incidents and act as the technical Subject Matter Expert during significant security incidents.
· Utilize analytics to identify potential threats to the environment.
· Detect, respond, mitigate, and report on cyber threats/incidents that may impact the environment.
· Collaborate with technical leads: Engineering, Operations, Service Desk, Applications and BISOs on matters related to security monitoring across global footprint.
· Collaborate and serve as liaison to Managed and/or Unmanaged Security Service providers.
· Conduct Operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host-based forensics as applicable.
· Act as an internal information security consultant to the business and technology units, advising on risks, threats and control practices related to Rapid Response.
· Assist in development and knowledge sharing within the team.
· Assist in security console tuning
· Assist in security event oversight to ensure the team is delivering a quality product
· Identify and share threat intelligence that impacts IBM and their customers or products
· Perform threat hunts that target adversary TTPs
· Critical thinking and problem-solving skills
· Passion for information security and data security
· Strong written/verbal communication skills
· Strong interpersonal and organization skills
· Knowledge in an industry recognized Security Response Framework
- Minimum 1+ years of experience working within a SOC, Threat Hunt, or Threat Intel team
- Relevant industry recognized certifications (CISSP, CISM, GCIH, ECEH, Sec+, etc.)
- Strong understanding of networking protocols.
- Experience in fast-paced response.
- Experience with programming or scripting languages.
- Experience with Q-Rader SIEM tool is a plus.
- Experience with EDR platforms, such as Crowdstrike Falcon and Microsoft Defender ATP.
- Experience with cloud computing platforms, e.g. IBM Cloud, Amazon Web Services, Azure.
- Experience with host virtualization platforms, e.g. VMware, Hyper-V.
- Experience with application container technologies, e.g. Docker.
- System administration skills for Windows and Linux.