Introduction
A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe.You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat.Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience
Your Role And Responsibilities
- Perform investigations and response to security alerts.
- Gather evidence and put together a picture of the case.
- Determine how security incident occurred.
- Building capabilities that close information gaps.
- Defend customer security threats.
- Make plans for adversary eviction and incident response.
- Evaluate security risks.
- Create technical documentation.
- Using defence tool to conduct analysis.
- Collaborate with teams that are customer focused.
- Provide suggestion to tune false positive alerts.
Preferred Education
Master's Degree
Required Technical And Professional Expertise
- 1 to 2+ years of IT experience in security with at least 1 Years in Security Operation centre with SIEM.
- Good to have hands on experience with managing SIEM solutions on public/private clouds like Amazon AWS, Microsoft Azure, etc.
- Proven Experience on any of the Security information and event management (SIEM) tools like (Qradar, Splunk, McAfee ESM etc.)
- Experience is SOAR tools such as Qradar Resilient, PaloAlto XSOAR
- Identify quick defence techniques till permanent resolution.
- Recognize successful intrusions and compromises through review and analysis of relevant event detail information.
- Launch and track investigations to resolution. Recognize attacks based on their signatures, differentiates false positives from true intrusion attempts.
- Actively investigates the latest security vulnerabilities, advisories, and incidents.
- Identify the gaps in security environment & suggest the gap closure.
- Drive & Support Change Management.
Preferred Technical And Professional Experience
- Certifications: CEH or ECIH or CompTIA security analyst.
- Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work.
- Intuitive individual with an ability to manage change and proven time management.
- Proven interpersonal skills while contributing to team effort by accomplishing related results as needed.
- Up-to-date technical knowledge by attending educational workshops, reviewing publications.
- Any entrant or Professional skill on shell scripting, AIX, Linux or Python.