Home

Threat Response Engineer L3

IBM Business Services
Taguig Fulltime 68
Introduction
Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client’s organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.

Your Role and Responsibilities

  • Provide incident investigation as per Security Incident Management Process/Guidelines
  • Drives containment strategy during data loss or breach events
  • Triage and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs)
  • Malware outbreak incident handling and remediation
  • Co−ordinate with IT, security operations and other teams for remediation and trigger forensics process as appropriate
  • Perform Root cause analysis (RCA) for the incidents and update the knowledge management
  • Works directly with data asset owners and business response plan owners during high severity incidents
  • Tuning of IDS, proxy policy, in−line malware tools based on threat feeds, trust and reputation data, incidents, or vulnerabilities and exploits of downstream systems
  • Provide tuning recommendations to administrators based on findings during investigations or threat information reviews


Required Technical and Professional Expertise

  • Strong Analytical and Problem-Solving Skills
  • Knowledge of network security zones, Firewall configurations, IDS policies Knowledge of systems communications from Layer 1 to 7
  • Experience with Systems Administration, Middleware, and Application Administration Experience with Network and Network Security tools administration
  • Knowledge of log formats and ability to aggregate and parse log data for syslog, http logs, DB logs for investigation purposes
  • In−depth experience with log search tools and SIEM tools such as Splunk, Arcsight, Mcafee usage of regular expressions and natural language queries
  • In−depth knowledge of packet capture and analysis
  • Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat)
  • Ability to make create a containment strategy and execute


Preferred Technical and Professional Expertise

  • Intrusion Detection In Depth − SEC503 (GCIA certification) or equivalent
  • Hacker Techniques, Exploits & Incident Handling − SEC504 (optional GCIH certification) or equivalent
  • GIAC Continuous Monitoring (optional GMON certification) or equivalent
  • Advanced digital forensics and Incident Response − FOR 508 (Optional GCFA certification) or equivalent
  • Computer Forensic Investigation such as Windows Forensic Analysis FOR408 − (Optional GCFE certification)
  • Perimeter Protection In Depth − SEC502 (optional GCFW certification) Advanced Security Essentials − SEC501 (optional GCED certification)
Hello! we are
Jobayan
A simple way to connect candidates and companies

How does Jobayan work?

Publish your resume

Add your experience, education and skills. Jobayan will automatically match you with jobs.

Search Through Job Openings

Click "Apply Now" on a job opening and your contact details will automatically get sent to them.

Wait for a Match

Here in Jobayan, theres no forever in job hunting! When a job opening matches, you will be notified right away!

Get Started Now!
I want to hire

Your Career Awaits.