SOC Tier 2 Analyst - IBM - Wrocław, PL

Main Tasks And Responsibilities Will Include
  • Determine if the security alert should be classified as a security incident
  • Analysis method of attack or threat
  • Analysis of actor or object of the attack or threat
  • Analysis of known targets and purpose of the attack or threat
  • Impact analysis of the attack or threat both in terms of kill chain stage and risk magnitude
  • Incident handling support
  • Use case/rule tuning recommendations
  • Testing and maintenance of response procedures
  • Participate in lessons learned workshops
Additional Benefits
  • Training and certifications
  • Private medical package and insurance package
  • Multisport Card
  • Working on international projects in multicultural teams
  • Good to be an IBMer discounts
  • Cinema & trips for IBMers
  • Language classes
  • Summer camps for children
Required Technical and Professional Expertise
  • Experience with SOC Processes,
  • Experience with SIEM technology and tools (such as RSA, Arcsight, Splunk and QRadar), anti-Virus/Malware, anti-DDOS, WAF, FW Rules Management, forensic tools,
  • Excellent Knowledge and experience in IT Security Technologies,
  • Background in Vulnerability Management, Security Incident Management, Forensic Analysis,
  • Ability to translate security impacts to the wider business,
  • Willingness to work outside office hours as part of the CSIRT Team,
  • Ability to work in an international context and excellent communication skills,
  • Interpersonal skills with the ability to establish and working relationships in a project-based / client-serving model, and to work closely with people at different levels of an organization,
  • University degree in Information Technology or CompTia Security +, GCIH, GCIA, CEH, OSCP or equivalent certifications,
  • English is a mandatory language requirement
Next article Cyber Threat Intelligence Analyst - Singapore - GovTech Singapore