SOC Level 2/3 Analyst

IBM

IBM

Galileo

Kraków

At IBM, work is more than a job – it’s a calling: To build. To design.  To code. To consult. To think along with clients and sell. To make  markets. To invent. To collaborate. Not just to do something better, but  to attempt things you’ve never thought possible. Are you ready to lead  in this new era of technology and solve some of the world’s most  challenging problems? If so, lets talk.
SOC Level 2/3 AnalystNumer ref.: 135262
We are looking for a SOC Tier 2/3 Analyst to support our Security  Services team. As a SOC Tier 2/3 Analyst you will be responsible for  incident triage through supporting security controls. Analysts will use  SIEM technology to investigate alerts that are escalated from Tier 1,  the client, or from intelligence sources, providing technical expertise  and executing incident response steps upon confirmation of an actual  security incident. Furthermore, the SOC Tier 2/3 Analyst may be required  to both monitor and utilize third party toolsets to assist with the  identification of security threats, apply various techniques to identify  and track cyber threats and analyze various data sources related to  security events. The IBM Tier 2/3 Analyst will communicate with the  security team, architects, managers and clients on a regular basis  through various methods to ensure operational awareness.
Main tasks and responsibilities will include:
  • Determine context of assigned incidents, through Incident Triage and establish its nature
  • Investigation on provided Security Controls
  • Cooperation with technical teams managing the infrastructure
  • Support on the low-level procedure & incident matrix documentation
  • Provide support on the execution of Service Requests on demand of other teams or the customer
  • Provide technical expertise & support during CSIRT or security escalations
  • Perform incident response during CSIRT escalations
  • Propose tuning of detection rules
Requirements:
  • Experience with SOC Processes
  • Experience with SIEM technology and tools (such as RSA, Arcsight,  Splunk and QRadar), anti-Virus/Malware, anti-DDOS, WAF, FW Rules  Management, forensic tools
  • Excellent Knowledge and experience in IT Security Technologies
  • Background in Vulnerability Management, Security Incident Management, Forensic Analysis
  • Ability to translate security impacts to the wider business
  • Willingness to work outside office hours as part of the CSIRT Team
  • Ability to work in an international context and excellent communication skills
  • Interpersonal skills with the ability to establish and working  relationships in a project-based / client-serving model, and to work  closely with people at different levels of an organization
  • English in speaking and writing at good level
Preferred Technical and Professional Expertise
  • 3+ years of experience operating in a Security Operations Center Analyst or similar role
  • GCIH, GCIA, CEH, OSCP or equivalent certifications
  • Bachelor’s or Master’s degree in Cybersecurity or equivalent
  • English is a mandatory language requirement
Your Life @ IBM:

Are you craving to learn  more? Prepared to solve some of the world’s most unique challenges? And  ready to shape the future for millions of people? If so, then it’s time  to join us, express your individuality, unleash your curiosity and  discover new possibilities.
Every IBMer, and potential ones like  yourself, has a voice, carves their own path, and uses their expertise  to help co-create and add to our story. Together, we have the power to  make meaningful change – to alter the fabric of our clients, of society  and IBM itself, to create a truly positive impact and make the world  work better for everyone.
It’s time to define your career.

Ogłoszenie archiwalne