MEA IRIS Associate Partner

  • Company:
  • Location:
  • Salary:
    negotiable / month
  • Job type:
    IT Software : Software Products & Services
  • Posted:
    1 week ago
  • Category:
    Software Services | IT-Software

MEA IRIS Associate Partner – Saudi Arabia 118785BR Job Description Consultant [Analyst, Senior Analyst], [All Global Roles], Incident Response & Proactive Services, IBM X-Force IRIS The IBM X-Force Incident Response & Intelligence Services (IRIS) team is looking for passionate Incident Response & Proactive Services Consultants to provide industry leading professional services in information security, incident response and proactive services for IBM & IBM clients. The candidate will provide consulting services in an exciting and growing security delivery organization within IBM across several security domains, analyze and resolve security incidents, manage active threats, leverage security intelligence, and work with clients to achieve an enhanced Cyber Security posture. The ideal candidate will have demonstrated skills in Incident Response, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices; ideally in large enterprise environments. The candidate will have proficiency with leading EDR tools such as MIR/HX, Falcon Host, or Carbon Black as well as familiarity with forensic analysis tools such as Encase Forensic or X-Ways and live response analysis. Excellent written and verbal communication skills required. The consultant will manage all aspects of a security engagement from inception to completion. The application of formal and structured methodologies to provide customers with a consistent level of quality that reflects the knowledge and experience of IBM is a must. The candidate will develop and present accurate and timely deliverables to customers outlining appropriate technical solutions, next steps, and accurate conclusions. Finally, the candidate must possess a strong ability to evaluate and improve the effectiveness of incident response and security policies & programs in use. Consultants are required to work within occasional 24×7 requirements, travel both domestic and international, with travel up to 60 PERCENT 25. Required Professional and Technical Expertise At least 3 years experienceinstrong technical and consulting skills with subject matter expertise in one or more of the following specialties incident response, computer forensics and network security At least 3 years experienceina high level of hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security At least 3 years experienceinWindows and Unix operating systems At least 3 years experienceinin a thorough understanding of network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics & network security operations Preferred Professional and Technical Expertise Bachelor’s Degree in Technology, Computer Science, Engineering or equivalent Certified in CISSP, ENCE, CCE, GCFA, GCIA, GCIH, CHFI, QSA or equivalent Malware analysis and reverse engineering skills Analyze and/or reverse-engineer the behavior of malware using both static and dynamic tools and techniques. Demonstrate and provide subject matter expertise in the detection, analysis, capabilities and mitigation of malware as well as trends in malware development. Proficiency in Windows, Linux, OSX OS Internals and API’s. Complete familiarity with high, medium and low programming languages (Perl/Python, C/C , Assembly). Fluent in disassembly / debuggers such as IDA Pro, OllyDbg, WinDbg, etc. Able to construct and step through binary analysis with industry standard reversing tools (REMnux, PE Explorer, Malcode, etc). Packer identification and entropy analysis skills. Proficient in writing a cohesive narrative around code disassembly and malware capabilities for a technical and non-technical audience Network forensics Analyze and/or decipher packet captures from network protocol analyzers (Wireshark, TCPdump, etc) Demonstrate an understanding of the behavior, security risks and controls of common network protocols. Possess understanding of techniques and practices used to encode and encrypt common network traffic and common attacks on these controls. Ability to utilize NetFlow data to identify the sources of network attacks. Familiarity with the tools and techniques required to analyze & reverse diverse protocols and data traversing a network environment. Demonstrate an understanding of the architecture, deployment, benefits and weaknesses of network security proxies, common log formats and flow of data in a wired or wireless network environment. Proficient in writing a cohesive narrative around packet analysis for a technical and non-technical audience. Threat Intelligence Understanding of threat landscape and security intelligence in both the government and commercial space Familiarity with threat research, threat modeling, and information security threat assessments *Required Education None *Preferred Education Bachelor’s Degree CountrySaudi Arabia State / Province MULTIPLE City / Township / VillageMULTIPLE CITIES IBM Business Group Security Primary job categoryConsultant Role ( Job Role ) Security Consultant Employment TypeFull-Time Contract type Regular New Collar RoleNo Required Technical and Professional Expertise At least 3 years experienceinstrong technical and consulting skills with subject matter expertise in one or more of the following specialties incident response, computer forensics and network security At least 3 years experienceina high level of hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security At least 3 years experienceinWindows and Unix operating systems At least 3 years experienceinin a thorough understanding of network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics & network security operations Preferred Technical and Professional Experience Bachelor’s Degree in Technology, Computer Science, Engineering or equivalent Certified in CISSP, ENCE, CCE, GCFA, GCIA, GCIH, CHFI, QSA or equivalent Malware analysis and reverse engineering skills Analyze and/or reverse-engineer the behavior of malware using both static and dynamic tools and techniques. Demonstrate and provide subject matter expertise in the detection, analysis, capabilities and mitigation of malware as well as trends in malware development. Proficiency in Windows, Linux, OSX OS Internals and API’s. Complete familiarity with high, medium and low programming languages (Perl/Python, C/C , Assembly). Fluent in disassembly / debuggers such as IDA Pro, OllyDbg, WinDbg, etc. Able to construct and step through binary analysis with industry standard reversing tools (REMnux, PE Explorer, Malcode, etc). Eligibility Requirements NA Required EducationBachelor’s Degree Preferred Education Bachelor’s Degree Position TypeProfessional Travel Required Up to 25 PERCENT 25 or 2 days a week (home on weekends- based on project requirements) Is this role a commissionable/sales incentive based position?No EO Statement IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status. ERBPYes