Jobs for Veterans, Veteran Job Board | GiJobs.com

Post Jobs

Job Information

IBM Incident Response & Cyber Range Consultant in Boston, Massachusetts

Introduction

Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.

Your Role and Responsibilities

The IBM X-Force Incident Response & Intelligence Services (IRIS) team is looking for passionate Incident Response & Cyber Range Consultant to provide industry leading professional services in information security, incident response and proactive services for IBM & IBM clients. In this role you will provide consulting services in an exciting and growing security delivery organization within IBM across several security domains, analyze and resolve security incidents, manage active threats, leverage security intelligence, and work with clients to achieve an enhanced Cyber Security posture. You will also be responsible for delivering customized cyber range experiences to our clients at the IBM X-Force Command Center in Cambridge, MA and at remote sites.

You will have demonstrated skills in Incident Response, computer forensics, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices; ideally in large enterprise environments. You will also have experience designing and delivering customized cybersecurity response exercises (or tabletop exercises). Experience responding to breaches is a requirement of delivering customized response exercises. Excellent written and verbal communication skills required.

You will manage all aspects of a security engagement from inception to completion. The application of formal and structured methodologies to provide customers with a consistent level of quality that reflects the knowledge and experience of IBM is a must. You will develop and present accurate and timely deliverables to customers outlining appropriate technical solutions, next steps, and accurate conclusions. Finally, you must possess a strong ability to evaluate and improve the effectiveness of incident response and security policies & programs in use. Consultants are required to work within occasional 24x7 requirements, travel both domestic and international, with occasional travel up to 25%.

  • Develop and conduct technical and non-technical incident response exercises.

  • Pre-sales activities and scoping of requirements for conducting complex cyber securtiy exercises.

  • Manage several customer-facing engagements concurrently.

  • Coordinate projects that involve internal and external stakeholders.

  • Conduct on-site or remote client interviews and review of documentation such as incident response plans, policies, procedures, etc.

  • Develop realistic exercise scenarios applicable to client environments and project requirements. Scenarios may focus on both, technical simulation exercises or strategic response activities.

  • Support the implementation of exercise environments including Active Directory, Mail & DNS servers, FWs, IPS/IDS, SIEMs, EDRs, host systems, etc.

  • Configure security tools such as SIEMs and EDRs to accurately log realistic attack patterns in an environment.

  • Ensure high quality of exercise experiences with attention to detail.

Skills and Abilities

  • A close attention to detail and strong organizational skills.

  • Ability to work independently and on a team.

  • Ability to lead and successfully deliver projects on tight timelines. Proactively develop project delivery plans and milestones that meet project requirements.

  • Demonstrated presentation skills, able to articulate and present to a wide audience from technical to the board room.

  • Experience in IT security and enterprise incident response investigations.

  • Experienced in acquiring forensic images following chain of custody processes.

  • Hands-on experience with industry standard tools used in network and host based forensic investigations. Ability to use open-source tools and scripts for forensic investigations.

  • Strong background in performing forensic disk and memory analysis. Demonstrated understanding of analyzing Windows and Linux artifacts.

  • Hands-on experience in working with and configuration of SIEMs and EDRs.

  • Experience in implementing Active Directory infrastructures and using GPOs.

  • Familiarity with O365 environments and log management.

  • Understanding of network operations, firewalls, IPS/IDS management.

  • Ability to communicate technical findings & concepts to key stakeholders

  • Understanding of the cyber security threat landscape and ability to apply threat intelligence to incident response.

  • Strong knowledge of common cyber security related standards, frameworks and regulatory requirements.

  • Understanding of risk management and how it impacts organizational security posture.

Required Professional and Technical Expertise

From a technical expertise perspective, you will succeed in this job if you have 2-3+ years of experience in:

  • Experience working in a professional services or consulting role.

  • Experience performing forensic analysis and incident response activities.

  • Hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security.

  • Must have a thorough understanding of network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics & network security operations

  • Demonstrated experience of SOC and incident response operations.

Preferred Professional and Technical Expertise

  • Experience with red / blue / purple team exercises

  • Programming skills in Python

  • Working experience with virtualization environments and enterprise applications

  • CISSP, GCIH, GCFA, GCFE

About Business Unit

IBM is a leading provider of enterprise security solutions. Named by industry analysts as a leader in 12 security market segment categories, IBM Security is a multi-billion dollar business that is rapidly growing. In an industry focused on building walls, IBM Security is focused on creating an open, connected security ecosystem that leverages AI and cloud to help clients improve compliance, stop threats, and grow their business securely. Join our global team of IBM Security employees in protecting the world, and helping our clients thrive in the face of cyber uncertainty.

Your Life @ IBM

What matters to you when you’re looking for your next career challenge?

Maybe you want to get involved in work that really changes the world. What about somewhere with incredible and diverse career and development opportunities – where you can truly discover your passion? Are you looking for a culture of openness, collaboration and trust – where everyone has a voice? What about all of these? If so, then IBM could be your next career challenge. Join us, not to do something better, but to attempt things you never thought possible.

Impact. Inclusion. Infinite Experiences. Do your best work ever.

About IBM

IBM’s greatest invention is the IBMer. We believe that progress is made through progressive thinking, progressive leadership, progressive policy and progressive action. IBMers believe that the application of intelligence, reason and science can improve business, society and the human condition. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 IBMers serving clients in 170 countries.

Location Statement

For additional information about location requirements, please discuss with the recruiter following submission of your application.

Being You @ IBM

IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.

DirectEmployers