Introduction
Information and Data are some of the most important organizational assets in
today 's businesses. As a Security Consultant, you will be a key advisor for
IBM's clients, analyzing business requirements to design and implement the
best security solutions for their needs. You will apply your technical skills
to find the balance between enabling and securing the client's organization
with the cognitive solutions that are making IBM the fastest growing
enterprise security business in the world.
Your Role and Responsibilities
in security operations, incident response and Security Operations Center
(SOC). Candidate must have extensive experience in various security control
areas such as SIEM, Next Gen Firewalls, IDS, IPSEC, SSLVPN, APT, WAF, EDR,
Next Generation EPP, NAC, Deception and Cloud based security technologies
across various infrastructure platforms. Ideally, extensive experience in
Windows infrastructures, as well as having a deep knowledge of networking
security, vulnerability management and attack methods. Must have proven hands
on experience in Blue team exercises with excellent communication and
leadership skills. Candidate should be an active participant in multiple
intelligence communities and be able to disseminate pertinent threat
information throughout the Security Operations and to the technical and
business stakeholders.
Key Responsibilities
* Lead and manage Security Operations function with a distributed team of at least 10 resources while being the focal points for the client/organization.
* Lead an insourced/outsources MSSP SOC in delivering a unified and seamless end to end service to the client/organization.
* Lead level 2 security analysts and EDR teams in threat management, triage and response.
* Lead the design and the implementation of SIEM use cases, reports and dashboards.
* Lead the integration of standard and non-standard logs in SIEM.
* Lead the Configuration & Management of UTMs/firewalls (Palo Alto experience preferred) and Endpoint security technologies (EPP,EDR), Network security technologies (NAC, SSL VPN, IPSEC), Deception technologies.
* Lead the configuration & Management of Cloud security technologies.
* Lead investigation, response and mitigation efforts when security incidents arise and perform.
* Creation of Management and Executive reports, dashboards, metrics for SOC and Security operations and presentation to Sr. Mgmt.
* Provide technical direction, mentorship and enablement to team members.
* Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives.
* Revise and develop processes to strengthen the current Security Operations and threat management Framework, Review policies and highlight the challenges in managing SLAs
* Co-ordination with stakeholders, build and maintain positive working relationships with them
Required Technical and Professional Expertise
* Degree in Computer Science/Engineering degree or equivalent with 7+ years of dedicated experience in Cyber security with at least 3 years in a similar role leading security operations.
* Working knowledge of systems communications from OSI Layer 1 to 7 and experience in identifying and implementation security control at each of the layers. In-depth working knowledge of TCP/IP, protocols and packet analysis.
* 4+ years of experience in Infrastructure, Endpoint and Network security tools configuration and management preferably with Palo Alto and Sophos UTMs, Symantec Endpoint Security, Carbon Black Response / Palo Alto Cortex Microsoft Security & Office 365 Security and IBM QRadar SIEM.
* Knowledge of log formats and ability to aggregate and parse log data for syslog, http logs, DB logs for security investigation purposes
* Advanced knowledge of threat areas and common attack vectors (malware, phishing, APT, technology attack etc.)
Preferred Technical and Professional Expertise
* CISSP certified
* Any 2 of the following: Offensive Security Certified Professional (OSCP), GIAC Certified Intrusion Analyst (GCIA), GIAC Continuous Monitoring (GMON), GIAC Defending Advanced Threats (GDAT), GIAC Certified Detection Analyst (GCDA)
* CCNA Routing, Switching and Security Certified
* Certified Ethical Hacker
* Scripting or Automation knowledge is desirable
About Business Unit
IBM 's Cloud and Cognitive software business is committed to bringing the
power of IBM's Cloud and Watson/AI technologies to life for our clients and
ecosystem partners around the world. IBM provides you with the most
comprehensive and consistent approach to development, security and operations
across hybrid environments--with complete software solutions for business and
IT operations, development, data science, security, and management. Our
experts and software capabilities help organizations develop applications once
and deploy them anywhere, integrate security across the breadth of their IT
estate, and automate operations with management visibility. With IBM, you also
have access to new skills and methods, governance and management approaches,
and a deep ecosystem of industry experts and partners.
Your Life @ IBM
Are you craving to learn more? Prepared to solve some of the world's most
unique challenges? And ready to shape the future for millions of people? If
so, then it's time to join us, express your individuality, unleash your
curiosity and discover new possibilities.
Every IBMer, and potential ones like yourself, has a voice, carves their own
path, and uses their expertise to help co-create and add to our story.
Together, we have the power to make meaningful change - to alter the fabric
of our clients, of society and IBM itself, to create a truly positive impact
and make the world work better for everyone.
It's time to define your career.
About IBM
IBM 's greatest invention is the IBMer. We believe that through the
application of intelligence, reason and science, we can improve business,
society and the human condition, bringing the power of an open hybrid cloud
and AI strategy to life for our clients and partners around the world.
Restlessly reinventing since 1911, we are not only one of the largest
corporate organizations in the world, we're also one of the biggest technology
and consulting employers, with many of the Fortune 50 companies relying on the
IBM Cloud to run their business.
At IBM, we pride ourselves on being an early adopter of artificial
intelligence, quantum computing and blockchain. Now it's time for you to join
us on our journey to being a responsible technology innovator and a force for
good in the world.
Location Statement
For additional information about location requirements, please discuss with
the recruiter following submission of your application.
Being You @ IBM
IBM is committed to creating a diverse environment and is proud to be an equal
opportunity employer. All qualified applicants will receive consideration for
employment without regard to race, color, religion, gender, gender identity or
expression, sexual orientation, national origin, genetics, pregnancy,
disability, age, veteran status, or other characteristics. IBM is also
committed to compliance with all fair employment practices regarding
citizenship and immigration status.
**Security Operations Coordinator** * 00096033 ** Security Operations Co-ordinator** **Competitive Salary** **Location: Riyadh /Taif / Tabuk, Saudi Arabia** **JOB PURPOSE** BAE Systems is the UK Government's nominated Prime Contractor under the Government-to-Government arrangements that are in…
**Security Operations Coordinator** * 00106567 ** Security Operations Co-ordinator** **Competitive Salary** **Location: Saudi Arabia (Mixed locations)** **JOB PURPOSE** BAE Systems is the UK Government 's nominated Prime Contractor (PC) under the Government-to-Government arrangements that are …
Reference Code: 95334 # **Security Operations Specialist** Richemont Riyadh, 01, SA Fixed Term Richemont owns some of the world's leading luxury goods Maisons, with particular strengths in jewellery, fine watches and premium accessories. Each Maison represents a proud tradition of style, quality …
Make a difference every day The Job Opportunity Serco will be delivering consultancy services with regards to the management of our client’s maintenance service providers and Operational Strategy (including Facilities Management, Digital Transformation and Asset Management) & Capital Project…
**1\. JOB DETAILS:** **Position Title:** **Manager: Cyber Security Operations** **Broad Band:** **M12: Management** **Reports to:** **Director: Cyber Security** **Department & Function: ****Ma 'aden Cyber Security ** **Talent Pipeline Layer:** **Managing Others (MO)** **2\. OVERALL JOB PURPOSE…
**Date Posted:** 2022-06-13-07:00 **Country:** United Arab Emirates **Location:** UTS Carrier, Palladium building, 2nd floor, Al Quoz, Dubai, UAE * Coordinates, prioritizes and resolves issues encountered by a more experienced team. * Optimizes the usage of manpower, standard time, equipment …
About the Role To provide operational and strategic support to a group of identified schools and/or entities, working closely with leadership to deliver operational excellence through effective relationships with key stakeholders. The post holder will be responsible for managing all operational …
Job Description Sutherland is seeking an Associate Manager of IT Operations to help maintain the operational standards from the ground up. This will include documentation, creation of policy’s & procedures, Audits, Disaster Recovery, Audits and more. We are a group of driven and hard-working i…
Lead the operations team to service delivery excellence by standardizing and scaling payment operaitons, service desk, service management, and technology platform operations into an integrated operations team applying ITIL best practices as well as payment business operations best practices from cl…
Our technology team builds the platforms, systems, and payment infrastructure our merchants use to process millions of transactions daily. This team is building technology solutions to simplify MENA payments regionally and globally for businesses of all sizes. **As a Tapster You Will:** * …