Responsibilities:
The Security Consultant responsibilities include, but not limited to:
Perform mo
nitoring and analysis of event activities, identify data exfiltration violations, build & docu
ment standard procedures and policies, investigate issues & docu
ment findings and assist with the implementation of security controls and risk security awareness effortsTakes an active part in the gathering of threat intel, provide analysis of internal & external security intelligence feeds, triage analysis and respo
nse to security threats and escalate as needed to the next level as per Security Incident Management Process for severe intelligence findingsHunting ba
sed on indicators of compromise (IOCs) or suspicious anomalous activity ba
sed on data a
lerts or data outputs from various toolsets and submit change and/or security co
ntrol to apply customized rules to prevent attacks and SOC rules to count the number of attacks preventedPublish Actio
nable Intelligence a
lerts to L2 and L3 analysts for defined use cases (e.g. compromised credentials, Indicators of Compromise associated with active malicious campaigns) and Situatio
nalAwareness a
lerts to L2, L3 and SIEM Admin/Integration Engineer for use cases (e.g. New security threats under co
nsideration that could impact the business)Process security incident communications and track incidents with various technical teams until it reaches resolution, docu
ment resolution & lessons learned and work with other technical teams on integration, deployment & enhancement projects and any other BAU tasks
General Qualifications:
2 to 4 years of experience for Level 1, 4 to 6 years for Level 2 and 6 to 9 years of experience for Level 3Strong analytical and problem-solving skills and has the ability to create a co
ntainment strategy and executeHave hands-on experience on network security zone administration, configurations, IDS policiesKnowledge of systems communications from Layer 1 to 7, packet capture and analysis or;Have hands-on experience on Windows & Linux Server Administration, Systems Administration, Middleware, and Application Administration, log formats & analysis, forensicsAbility to aggregate and parse log data for syslog, http logs, DB logs for investigation purposes
Technical Qualifications:
Experience in 24x7 CyberSecurity Ops or SOC within a large scale and complex enviro
nment is highly desired or;In−depth experience with log search tools and SIEM tools such as Splunk, Arcsight, Mcafee usage of regular ex
pressions and natural language queries or;Experience with Security Assessment tools (NMAP, Nessus, me
tasploit, Netcat) or;Background on vulnerability analysis, management, remediation and compliance or;Information security, risk, audit and regulatory compliance co
nsultingTechnical certification is a big plus, Security+, CySa+, CEH, ECSA, GIAC, CISSP
Are you up for a challenge? Are you looking for your next career journey? Join us and become part of a diverse and global team of thinkers and doers. Work with exceptional, insightful, imaginative people who nurtures creativity and individuality.About IBM PhilippinesIBM’s greatest invention is the IBMer. We believe that progress is made through progressive thinking, progressive leadership, progressive policy and progressive action. IBMers believe that the application of intelligence, reason and science can improve business, society and the human condition. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 IBMers serving clients in 170 countries.Our organization is comprised of the following subsidiaries:IBM Philippines, Inc. - Leading supplier of information technology hardware, software & services in the country.IBM Solutions Delivery, Inc. - Provides IT expertise, delivering world-class technology services and business solutions.IBM Business Services, Inc. - Foremost provider of Business Transformation Outsourcing for HR, Finance & Accounting and Supply Chain Management services.