IBM Jobs

Job Information

IBM Incident Response & Proactive Services Consultant in Quezon City, Philippines

Introduction

Information and Data are some of the most important organizational assets in today's businesses. As a Security Consultant, you will be a key advisor for IBM's clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.

Your Role and Responsibilities

The IBM X-Force Incident Response & Intelligence Services (IRIS) team is looking for passionate Incident Response & Proactive Services Consultants to provide industry leading professional services in information security, incident response and proactive services for IBM & IBM clients. The candidate will provide consulting services in an exciting and growing security delivery organization within IBM across several security domains, analyze and resolve security incidents, manage active threats, leverage security intelligence, and work with clients to achieve an enhanced Cyber Security posture.

The ideal candidate will have demonstrated skills in Incident Response, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices; ideally in large enterprise environments. The candidate will have proficiency with leading EDR tools such as MIR/HX, Falcon Host, or Carbon Black as well as familiarity with forensic analysis tools such as Encase Forensic or X-Ways and live response analysis. Excellent written and verbal communication skills required.

The consultant will manage all aspects of a security engagement from inception to completion. The application of formal and structured methodologies to provide customers with a consistent level of quality that reflects the knowledge and experience of IBM is a must. The candidate will develop and present accurate and timely deliverables to customers outlining appropriate technical solutions, next steps, and accurate conclusions. Finally, the candidate must possess a strong ability to evaluate and improve the effectiveness of incident response and security policies & programs in use. Consultants are required to work within occasional 24x7 requirements, travel both domestic and international, with travel up to 60%.

Network Forensics Skills:

  • Threat Intelligence Skills:Understanding of threat landscape and security intelligence in both the government and commercial space.

  • Familiarity with threat research, threat modelling, and information security threat assessments.

In addition to the above the required experience is:

  • At least 3 years in a high level of hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security.

  • At least 3 years of experience in Windows and Unix operating systems.

  • Must have a thorough understanding of network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics & network security operations.Analyse and/or reverse-engineer the behaviour of malware using both static and dynamic tools and techniques.

  • Demonstrate and provide subject matter expertise in the detection, analysis, capabilities and mitigation of malware as well as trends in malware development.

  • Proficiency in Windows, Linux, OSX OS Internals and API's.

  • Complete familiarity with high, medium and low programming languages (Perl/Python, C/C++ and Assembly).

  • Fluent in disassembly / debuggers such as IDA Pro, OllyDbg, WinDbg, etc.

  • Able to construct and step through binary analysis with industry standard reversing tools (REMnux, PE Explorer, Malcode, etc).

  • Packer identification and entropy analysis skills.

  • Proficient in writing a cohesive narrative around code disassembly and malware capabilities for a technical and non-technical audience.

phgts

Required Technical and Professional Expertise

  • At least 3 years of experience in technical and consulting skills with subject matter expertise in one or more of the following specialties: incident response, computer forensics and network security.

  • At least 3 years in a high level of hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security.

  • At least 3 years of experience in Windows and Unix operating systems.

  • Must have a thorough understanding of network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics & network security operations.

Preferred Technical and Professional Expertise

  • Analyse and/or reverse-engineer the behaviour of malware using both static and dynamic tools and techniques.

  • Demonstrate and provide subject matter expertise in the detection, analysis, capabilities and mitigation of malware as well as trends in malware development.

  • Proficiency in Windows, Linux, OSX OS Internals and API's.

  • Complete familiarity with high, medium and low programming languages (Perl/Python, C/C++ and Assembly).

  • Fluent in disassembly / debuggers such as IDA Pro, OllyDbg, WinDbg, etc.

  • Able to construct and step through binary analysis with industry standard reversing tools (REMnux, PE Explorer, Malcode, etc).

  • Packer identification and entropy analysis skills.

  • Proficient in writing a cohesive narrative around code disassembly and malware capabilities for a technical and non-technical audience.

About Business UnitIBM's Cloud and Cognitive software business is committed to bringing the power of IBM's Cloud and Watson/AI technologies to life for our clients and ecosystem partners around the world. IBM provides you with the most comprehensive and consistent approach to development, security and operations across hybrid environments-with complete software solutions for business and IT operations, development, data science, security, and management. Our experts and software capabilities help organizations develop applications once and deploy them anywhere, integrate security across the breadth of their IT estate, and automate operations with management visibility. With IBM, you also have access to new skills and methods, governance and management approaches, and a deep ecosystem of industry experts and partners.

Your Life @ IBMWhat matters to you when you're looking for your next career challenge?

Maybe you want to get involved in work that really changes the world? What about somewhere with incredible and diverse career and development opportunities - where you can truly discover your passion? Are you looking for a culture of openness, collaboration and trust - where everyone has a voice? What about all of these? If so, then IBM could be your next career challenge. Join us, not to do something better, but to attempt things you never thought possible.

Impact. Inclusion. Infinite Experiences. Do your best work ever.

About IBMIBM's greatest invention is the IBMer. We believe that progress is made through progressive thinking, progressive leadership, progressive policy and progressive action. IBMers believe that the application of intelligence, reason and science can improve business, society and the human condition. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 IBMers serving clients in 170 countries.

Location StatementFor additional information about location requirements, please discuss with the recruiter following submission of your application.

Being You @ IBMIBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.

DirectEmployers