Your role and responsibilities
Essential Duties and Responsibilities
- Assist in establishing Global Security Monitoring discipline to support enterprise
- Analyze and respond to security threats from Firewall (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Endpoint Detection and Response (EDR) and other security threat data sources.
- Respond in a timely manner (within documented SLA).
- Document actions in cases to effectively communicate information to internal stakeholders as well has for historical retrieval.
- Adhere to policies, procedures, and security practices
- Resolve problems independently and understand escalation procedures.
- Conduct Security Monitoring activities to provide Security in Depth visibility into potential known and unknown threats that may pose risk to the IBM environment.
- Participate in security incidents and act as the technical Subject Matter Expert during significant security incidents.
- Utilize analytics to identify potential threats to the environment.
- Detect, respond, mitigate, and report on cyber threats/incidents that may impact the environment.
- Collaborate with technical leads: Engineering, Operations, Service Desk, Applications and BISOs on matters related to security monitoring across global footprint.
- Collaborate and serve as liaison to Managed and/or Unmanaged Security Service providers.
- Conduct Operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host-based forensics as applicable.
- Act as an internal information security consultant to the business and technology units, advising on risks, threats and control practices related to Rapid Response.
- Assist in development and knowledge sharing within the team.
- Assist in security console tuning
- Assist in security event oversight to ensure the team is delivering a quality product
- Identify and share threat intelligence that impacts IBM and their customers or products
- Perform threat hunts that target adversary TTPs