Introduction
A career in IBM Consulting is built on long-term client relationships and close collaboration worldwide. You'll work with leading companies across industries, helping them shape their hybrid cloud and AI journeys. With support from our strategic partners, robust IBM technology, and Red Hat, you'll have the tools to drive meaningful change and accelerate client impact. At IBM Consulting, curiosity fuels success. You'll be encouraged to challenge the norm, explore new ideas, and create innovative solutions that deliver real results. Our culture of growth and empathy focuses on your long-term career development while valuing your unique skills and experiences.
Your Role And Responsibilities
As a Technical Support Representative: Security Analyst, you play a critical role in safeguarding client systems and ensuring the security posture of client environments. Your primary responsibility is to provide Threat Management L1 monitoring services, receiving, documenting, and reviewing incident-related information. Your primary responsibilities will include:
- Analyze Security Alerts: Swiftly analyze and escalate client risk and operational disruptions to respective stakeholders in a timely manner, utilizing an array of tools and established procedures to take appropriate actions for escalating security threats, anomalies, and breaches.
- Provide Incident Response: Perform initial analysis and troubleshooting of security alerts, anomalies, and technical issues, prioritizing incidents based on varying levels of complexity, and effectively communicate and collaborate with clients and internal stakeholders.
- Enhance Knowledge-Based Systems: Contribute to the enhancement of knowledge-based systems to bolster the efficacy of security operations, providing technical guidance and assistance to clients and personnel within multi-vendor, multi-protocol environments.
- Foster Client Self-Sufficiency: Create and disseminate knowledge assets and digital resources to cultivate client self-sufficiency, working closely with development, services, and field teams to ensure the relevance and effectiveness of technical solutions provided for incident resolution.
- Elevate Operational Efficiency: Contribute to initiatives to elevate operational efficiency and client satisfaction within the SOC monitoring team.
Preferred Education
Master's Degree
Required Technical And Professional Expertise
- Exposure to Threat Management: Familiarity with L1 monitoring services via SIEM, EDR, MDR, or SOC mailbox, including receiving, documenting, and reviewing incident-related information.
- Experience with Security Tools: Hands-on experience with an array of tools and established procedures to take appropriate actions for escalating security threats, anomalies, and breaches.
- Proficiency in Core Operational Processes: Demonstrated experience and proficiency in core operational processes related to security operations, including awareness of evolving cybersecurity threats and industry trends.
- Technical Troubleshooting: Experience with initial analysis and troubleshooting of security alerts, anomalies, and technical issues, prioritizing incidents based on varying levels of complexity.
- Multi-Vendor Environment: Exposure to providing technical guidance and assistance within multi-vendor, multi-protocol environments, ensuring the integrity and resilience of critical systems and networks.
Preferred Technical And Professional Experience
- Proficiency in Industry Trends: Awareness of evolving cybersecurity threats and industry trends, staying up-to-date with the latest security threats and technologies.
- Familiarity with Negotiation Techniques: Exposure to negotiation techniques to achieve consensus and alignment among stakeholders, facilitating effective communication and exchange of information.
- Knowledge of Emerging Threats: Experience working with emerging threats and technologies, recommending enhancements to technical procedures to address security incidents and vulnerabilities.