CASY-MSCCN Jobs

CASY-MSCCN Logo

Job Information

IBM Threat Monitoring/Threat Intelligence Analyst in Rome, Italy

Introduction

At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, lets talk.

Your Role and Responsibilities

The Threat Monitoring/Threat Intelligence Analyst will deal with critical incidents and carry out vulnerability assesments and penetration testing to assess the resilience of the organisation and to isolate areas of weakness that needs attention. You will review alerts, threat intelligence and security data, identify threats that have entered the network and security gaps and vulnerability currently known. In this role, you will respond to events according to documented procedures and industry best practices. You should be experienced in the areas of networking, client/server technologies, and analyzing log files with the ability to identify false positive and true positive events. You must have experience in Linux and Windows operating system, you may also be required to follow the incident response plan and assist SOC Response Analysts when necessary. You must display enthusiasm and interest in Information Security.

Part of the SOC team that runs 24x7, on a rotating shift schedule

  • First point of escalation for the Tier 1

  • Provide investigation of security incidents

  • Conduct secondary triage and analysis on escalated events and initial remediation for escalated incidents

  • Profile and trend events in the environment to determine if an incident needs to be created

  • Provide communication and escalation throughout the incident per the security incident response guidelines

  • Communicate directly with data asset owners and business response plan owners during high severity incidents

  • Hunt for suspicious anomalous activity based on data alerts or data outputs from various toolsets

  • Perform analysis of log files

  • Take an active part in the containment of incidents, even after they are escalated

  • Escalate issues when necessary

  • Assist continuous improvement of processes and work with other teams to improve alerts and rules in the incident monitoring systems

Required Technical and Professional Expertise

  • Experience with analysis and inspection of log information, packets, and other security tool information output from a variety of sources

  • Exposure to network devices, Microsoft Windows systems, UNIX systems, and other security assessment tools (NMAP, Nessus, Metasploit, Netcat, etc.)

  • Knowledge of log formats for syslog, http logs, DB logs and how to gather forensics for traceability back to event

  • Experience with log management or security information management tools

  • Familiarity with network security zones, basic reverse engineering principles, and understanding of malware rootkits, proxies, TCP/UDP packets, DNS, SMTP, and HTTP

Preferred Technical and Professional Expertise

  • Preferred is experience with Splunk Enterprise Security solution

Nice to have:

  • Experience with log search tools such as Splunk, usage of regular expressions and natural language queries

  • Knowledge of common security frameworks (ISO 27001, COBIT, NIST)

  • Previous experience in the financial industry

About Business UnitIBM's Cloud and Cognitive software business is committed to bringing the power of IBM's Cloud and Watson/AI technologies to life for our clients and ecosystem partners around the world. IBM provides you with the most comprehensive and consistent approach to development, security and operations across hybrid environments-with complete software solutions for business and IT operations, development, data science, security, and management. Our experts and software capabilities help organizations develop applications once and deploy them anywhere, integrate security across the breadth of their IT estate, and automate operations with management visibility. With IBM, you also have access to new skills and methods, governance and management approaches, and a deep ecosystem of industry experts and partners.

Your Life @ IBMWhat matters to you when you're looking for your next career challenge?

Maybe you want to get involved in work that really changes the world? What about somewhere with incredible and diverse career and development opportunities - where you can truly discover your passion? Are you looking for a culture of openness, collaboration and trust - where everyone has a voice? What about all of these? If so, then IBM could be your next career challenge. Join us, not to do something better, but to attempt things you never thought possible.

Impact. Inclusion. Infinite Experiences. Do your best work ever.

About IBMIBM's greatest invention is the IBMer. We believe that progress is made through progressive thinking, progressive leadership, progressive policy and progressive action. IBMers believe that the application of intelligence, reason and science can improve business, society and the human condition. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 IBMers serving clients in 170 countries.

Location StatementFor additional information about location requirements, please discuss with the recruiter following submission of your application.

Being You @ IBMIBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.

DirectEmployers