SOC Tier 2 Analyst - IBM - Wrocław, PL
Main Tasks And Responsibilities Will Include
- Determine if the security alert should be classified as a security incident
- Analysis method of attack or threat
- Analysis of actor or object of the attack or threat
- Analysis of known targets and purpose of the attack or threat
- Impact analysis of the attack or threat both in terms of kill chain stage and risk magnitude
- Incident handling support
- Use case/rule tuning recommendations
- Testing and maintenance of response procedures
- Participate in lessons learned workshops
- Training and certifications
- Private medical package and insurance package
- Multisport Card
- Working on international projects in multicultural teams
- Good to be an IBMer discounts
- Cinema & trips for IBMers
- Language classes
- Summer camps for children
- Experience with SOC Processes,
- Experience with SIEM technology and tools (such as RSA, Arcsight, Splunk and QRadar), anti-Virus/Malware, anti-DDOS, WAF, FW Rules Management, forensic tools,
- Excellent Knowledge and experience in IT Security Technologies,
- Background in Vulnerability Management, Security Incident Management, Forensic Analysis,
- Ability to translate security impacts to the wider business,
- Willingness to work outside office hours as part of the CSIRT Team,
- Ability to work in an international context and excellent communication skills,
- Interpersonal skills with the ability to establish and working relationships in a project-based / client-serving model, and to work closely with people at different levels of an organization,
- University degree in Information Technology or CompTia Security +, GCIH, GCIA, CEH, OSCP or equivalent certifications,
- English is a mandatory language requirement