Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

IBM X-Force Incident Response Deputy APAC Lead 
Thailand, Bangkok, Bangkok 
596736725

29.08.2024

Your Role and Responsibilities

You will also have demonstrated skills in various elements of Incident Response, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices. This might include proficiency with leading EDR tools, familiarity with forensic analysis tools such as X-Ways or EnCase, or forensic triage expertise using Velociraptor or UAC. Furthermore, familiarity with Windows and Linux operating systems and enterprise technology such as Active Directory / LDAP / Entra ID, on-premises and cloud-based email, and network devices such as firewalls, proxies, IPS/IDS, SIEMs, etc. is preferred.

As an experienced consultant, you’ll understand that the nature of the work sometimes involves late nights, early starts, weekends, or travel at short notice. In return, XFIR provides time off in lieu, weekend on-call allowance and the ability to manage your own time wherever possible. We don’t offer opaque bonus schemes but can offer a base salary designed attract the best people for the job.

In this role you must have at least 5 years of technical and professional experience in the following:

  • Experience and subject matter expertise in one or more of the following specialties: incident response, systems administration, disaster recovery, business continuity, computer forensics and/or network security.
  • Experience managing technical security projects either as a consultant or internal security practitioner.
  • A thorough understanding of network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics & network security operations.
  • Significant hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security.
  • Experience with assessing and developing enterprise-wide policies and procedures for IT risk mitigation and incident response.
  • Experience in Windows, Mac, and Unix operating systems.


Required Technical and Professional Expertise
Concepts and Communication

  • Demonstrated ability to work with and advise senior and executive level clients regarding strategic and tactical processes of Incident Response, staying professional and communicating clearly under pressure.
  • Advanced understanding of information security governance concepts, including ability to gauge maturity level of an organisation’s incident response program by against best practices as well as by applying practical knowledge of attacker methodologies, attack lifecycle, Cyber Kill Chain, etc.
  • Ability to communicate technical findings & concepts to key stakeholders.

Operational Technology

  • Experience working with-in Operational Technology environments that have a safety-first focus.
  • Demonstrate an understanding of the key differences between IT versus OT environments and be able to articulate best practices on how to secure each.
  • Understanding of OT Security industry best practices and guidelines such as NIST 800-82, ISA/IEC 62443, and PERA.
  • Familiarity with regional laws and regulations regarding critical infrastructure and OT Security.
  • Experience with OT-focused security tooling such as Nozomi Networks, Claroty, Tenable.OT, Armis, or Dragos.
  • Able to analyse common industrial network protocols (Modbus, Profinet, EtherNet/IP, etc).
  • Familiarity with common ICS vendors (Honeywell, Schneider Electric, Yokogawa etc.) and their products, network architectures, and equipment.
Digital Forensics & Incident Response
  • Ability to forensically analyse both Windows & Unix systems for evidence of compromise.
  • Proficiency with commercial and open source forensic tools such as EnCase, X-Ways, and Sleuthkit.
  • Skills and experience with cloud DFIR.
  • Proficient in writing cohesive reports for a technical and non-technical audience.
  • Experience hunting threat actors in large enterprise networks and cloud environments.
  • Experience with using and configuring Endpoint Detection & Response (EDR) tools.


Preferred Technical and Professional Expertise
Network Forensics

  • Experience performing log analysis locally and via SIEM/log aggregation tool.
  • Analyse and/or decipher packet captures from network protocol analysers (Wireshark, TCPdump, etc).
  • Demonstrate an understanding of the behaviour, security risks and controls of common network protocols.
  • Demonstrate an understanding of common applications used in Windows and Linux enterprise environment. Familiarity with Active Directory, Exchange and Office365 applications and logs.
  • Familarity with the tools and techniques required to analyse & reverse diverse protocols and data traversing a network environment.

Remediation services

  • Experience acting as a ‘trusted advisor’ throughout the IR process.
  • Advise clients on best practice whilst providing a sounding board during risk-based decisions.
  • Track record of success in an incident management role using project management.
  • Ability to lead teams comprised of customer staff and staff from competing service providers.

Proactive services

  • Examine and analyse available client internal policies, processes, and procedures to determine patterns and gaps at both a strategic and tactical levels. Recommend appropriate course of action to support maturing the client’s incident response program and cyber security posture.
  • A strong familiarity with various security frameworks and standards and applicable data privacy laws and regulations.
  • Demonstrated experience with planning, scoping, and delivering technical and/or executive level tabletop exercises, with a focus on either tactical or strategic incident response processes. Ability to incorporate current trends and develop custom scenarios applicable to a client.
  • Diverse understanding of cyber security related vulnerabilities, common attack vectors, and mitigations.
  • Capable of developing strategic level incident response plans as well as tactical-focused playbooks.
  • Proven experience managing tasks and coordinating work streams during incident response.

DevSecOps

  • Low-level operating system knowledge, including automation and performing administrative tasks.
  • Scripting or programming experience, preferably in a language commonly used for DFIR such as Python or PowerShell.
  • Ability to work with data at scale such as using Splunk / ELK.
  • Expertise working with shell programs such as grep, sed and awk to process data quickly.
  • Working experience with virtualisation and cloud technology platforms like IBM Cloud, AWS, GCP, & Azure.

OT Security

  • One or more security certifications
    • OT IDS tool such as Nozomi Networks, Claroty, Tenable.OT, Armis, or Dragos.
    • SANS GIAC or ISA99/IEC-62443 Cybersecurity
  • Experience in designing / engineering control systems