You will join IBM Security Services which is a division of IBM Consulting responsible for delivering security services to its large European customers alongside major digital transformation projects in the application and cloud domains.
In this role you’ll work in our IBM Client Innovation Center (CIC) where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. These centers offer our clients locally-based skills and technical expertise to drive innovation and adoption of new technology.
- Incident Coordination: Lead and orchestrate the end-to-end incident response process ensuring alignment with organizational policies and regulatory requirements.
- Handling Escalation Calls with Clients: Act as the primary point of contact during critical incidents managing client communications providing status updates and ensuring client concerns are addressed promptly and professionally.
- Threat Analysis: Collaborate with analysts to assess threat intelligence identify attack patterns and determine root causes of incidents.
- Communication & Reporting: Provide clear and concise updates to stakeholders during incidents and produce detailed post-incident reports with actionable recommendations.
- Continuous Improvement: Conduct post-incident reviews to identify gaps and drive improvements in incident response procedures and playbooks.
- Training & Awareness: Support the development of incident response training programs and contribute to cybersecurity awareness initiatives.
- Tool Integration: Work with engineering teams to integrate detection and response tools (e.g. SIEM EDR SOAR) for enhanced visibility and control.
- Compliance & Documentation: Ensure all incident activities are documented and compliant with internal standards and external regulations (e.g. GDPR ISO 27001).
Incident Response & Handling
- Deep understanding of incident response methodologies (e.g. NIST SANS).
- Experience with incident lifecycle: detection analysis containment eradication recovery and post-incident review ITIL
Threat Detection & Analysis
- Proficiency in using SIEM tools (e.g. QRadar Sentinel Splunk).
Analytical Thinking:
- Strong problem-solving skills to assess threats and determine root causes.
Communication:
- Ability to communicate technical findings to both technical and non-technical stakeholders.
- Skilled in writing incident reports and after-action reviews
Collaboration:
- Works effectively with cross-functional teams including SOC analysts threat hunters and IT operations.
Adaptability:
- Capable of responding to incidents under pressure and adjusting to evolving threats.
Prefered Certifications:
- Certified CompTIA Cybersecurity Analyst (CySA+)
- Certified Microsoft Security Operations Analyst SC200