6 days ago

Cyber Threat Intelligence & Incident Response Analyst

IBM

On Site
Full Time
$145,000
Antwerp, Flemish Region, Belgium

Job Overview

Job TitleCyber Threat Intelligence & Incident Response Analyst
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary$145,000
LocationAntwerp, Flemish Region, Belgium

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

Introduction

A career in IBM Consulting is built on long-term client relationships and close collaboration worldwide. You’ll work with leading companies across industries, helping them shape their hybrid cloud and AI journeys. With support from our strategic partners, robust IBM technology, and Red Hat, you’ll have the tools to drive meaningful change and accelerate client impact. At IBM Consulting, curiosity fuels success. You’ll be encouraged to challenge the norm, explore new ideas, and create innovative solutions that deliver real results. Our culture of growth and empathy focuses on your long-term career development while valuing your unique skills and experiences.

Your Role And Responsibilities

As a Cyber Threat Intelligence & Incident Response Analyst, you play a vital role in safeguarding an organization's digital infrastructure by identifying, analyzing, and mitigating cyber threats. This position involves using a variety of cybersecurity tools to monitor, prioritize, investigate, and respond to security incidents. Your primary responsibilities will include:

  • Conduct Event Investigations: Investigate security incidents using SIEM, SOAR, EDR, and XDR platforms to identify and analyze potential threats.
  • Apply Industry Frameworks: Utilize industry frameworks like MITRE ATT&CK and the Cyber Kill Chain to understand and counter adversary tactics effectively.
  • Manage Incident Reports: Prioritize and manage incident reports, providing actionable recommendations and responses to strengthen the client's security posture.
  • Analyze Network and Endpoint Events: Interpret security tools and logs from Windows, MAC, and Linux systems to identify potential security threats.
  • Engage in Vulnerability Management: Participate in vulnerability management and cyber threat intelligence activities to identify and anticipate potential threats.
  • Provide Actionable Recommendations: Deliver recommendations and responses to clients to enhance their security posture and mitigate potential threats.

Preferred Education

Master's Degree

Required Technical And Professional Expertise

  • Exposure to Cybersecurity Tools: Experience with a variety of cybersecurity tools, including SIEM, SOAR, EDR, and XDR platforms, to monitor, prioritize, investigate, and respond to security incidents.
  • Industry Frameworks Application: Experience with industry frameworks like MITRE ATT&CK and the Cyber Kill Chain to understand and counter adversary tactics effectively.
  • Network and Endpoint Analysis: Experience with interpreting security tools and logs from Windows, MAC, and Linux systems to identify potential security threats.
  • Vulnerability Management: Experience with vulnerability management and cyber threat intelligence activities to identify and anticipate potential threats.
  • Security Incident Response: Experience with conducting event investigations, managing incident reports, and providing actionable recommendations and responses to strengthen security posture.

Preferred Technical And Professional Experience

  • Deep Understanding of Network Fundamentals: Experience with network protocols, devices, and architectures is beneficial for identifying potential security threats and analyzing network events.
  • Familiarity with Cloud Security: Exposure to cloud security platforms and technologies can enhance the ability to monitor, prioritize, investigate, and respond to security incidents in cloud-based environments.
  • Knowledge of Scripting Languages: Familiarity with scripting languages such as Python, PowerShell, or Bash can aid in automating tasks, analyzing data, and creating custom tools for threat detection and response.
  • Experience with Tenable One Exposure Management Platform, Tenable Cloud native application protection platform (CNAPP) or Tenable Vulnerability Management.
  • Experience in large, complex or regulated environments (e.g. government, defence, critical infrastructure).
  • NATO security clearance is a a plus (but no hard requirement)

Key skills/competency

  • SIEM
  • SOAR
  • EDR
  • XDR
  • MITRE ATT&CK
  • Cyber Kill Chain
  • Vulnerability Management
  • Incident Response
  • Threat Detection
  • Network Analysis

Tags:

Cyber Threat Intelligence & Incident Response Analyst
incident response
threat detection
vulnerability management
security analysis
cyber intelligence
digital forensics
security operations
risk mitigation
client recommendations
SIEM
SOAR
EDR
XDR
MITRE ATT&CK
Cyber Kill Chain
Windows security
Mac security
Linux security
Python
PowerShell
Bash

Share Job:

How to Get Hired at IBM

  • Research IBM's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
  • Tailor your resume: Highlight experience with SIEM, SOAR, EDR, XDR, and incident response frameworks.
  • Showcase incident response skills: Prepare to discuss past experiences investigating and mitigating security incidents.
  • Demonstrate framework expertise: Be ready to explain your application of MITRE ATT&CK and Cyber Kill Chain.
  • Network strategically: Connect with current IBM Consulting cybersecurity professionals on LinkedIn for insights.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background