IBM

CyberSecurity Incident Orchestrator

Posted: 3 hours ago

Job Description

IntroductionYou will join IBM Security Services which is a division of IBM Consulting, responsible for delivering security services to its large European customers, alongside major digital transformation projects in the application and cloud domains.In this role, you’ll work in our IBM Client Innovation Center (CIC), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. These centers offer our clients locally-based skills and technical expertise to drive innovation and adoption of new technology.Your Role And ResponsibilitiesAs a Cybersecurity Incident Orchestrator, you will play a pivotal role in managing and coordinating the response to cybersecurity incidents across the organization. You will work closely with SOC analysts, threat hunters, and IT teams to ensure timely detection, containment, and resolution of security threats. Your responsibilities will include:Incident Coordination: Lead and orchestrate the end-to-end incident response process, ensuring alignment with organizational policies and regulatory requirements.Handling Escalation Calls with Clients: Act as the primary point of contact during critical incidents, managing client communications, providing status updates, and ensuring client concerns are addressed promptly and professionally.Threat Analysis: Collaborate with analysts to assess threat intelligence, identify attack patterns, and determine root causes of incidents.Communication & Reporting: Provide clear and concise updates to stakeholders during incidents, and produce detailed post-incident reports with actionable recommendations.Continuous Improvement: Conduct post-incident reviews to identify gaps and drive improvements in incident response procedures and playbooks.Training & Awareness: Support the development of incident response training programs and contribute to cybersecurity awareness initiatives.Tool Integration: Work with engineering teams to integrate detection and response tools (e.g., SIEM, EDR, SOAR) for enhanced visibility and control.Compliance & Documentation: Ensure all incident activities are documented and compliant with internal standards and external regulations (e.g., GDPR, ISO 27001).Preferred EducationBachelor's DegreeRequired Technical And Professional ExpertiseIncident Response & HandlingDeep understanding of incident response methodologies (e.g., NIST, SANS).Experience with incident lifecycle: detection, analysis, containment, eradication, recovery, and post-incident review, ITILThreat Detection & AnalysisProficiency in using SIEM tools (e.g., QRadar, Sentinel, Splunk).Analytical ThinkingStrong problem-solving skills to assess threats and determine root causes.CommunicationAbility to communicate technical findings to both technical and non-technical stakeholders.Skilled in writing incident reports and after-action reviewsCollaborationWorks effectively with cross-functional teams including SOC analysts, threat hunters, and IT operations.AdaptabilityCapable of responding to incidents under pressure and adjusting to evolving threats.Prefered CertificationsPreferred technical and professional experienceCertified CompTIA Cybersecurity Analyst (CySA+) Certified Microsoft Security Operations Analyst SC200

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In