Senior Threat Response Analyst (L3)

IBM


Date: 2 weeks ago
City: Taguig
Contract type: Full time
Introduction

In this role, you'll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology.

Your Role And Responsibilities

As a Senior Threat Response Analyst you will be responsible for conducting advanced incident investigations, responding to critical security threats, and driving containment and remediation efforts. The ideal candidate has hands-on experience with multiple security technologies, including SIEM, IDS, APT, and WAF, forensic analysis, and is adept at handling sophisticated cyber threats such as botnets and advanced persistent threats (APTs).

Your Role And Responsibilities

Incident Response and Digital Forensic

  • Provide incident investigation as per Security Incident Management Process / Guidelines.
  • Drive containment strategy during incidents escalated by the triage team.
  • Investigate and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs).
  • For critical incidents, be part of CSIRT activities and execute the incident handling process.
  • Coordinate with IT, security operations, and other teams for remediation and trigger forensic processes as appropriate.
  • Perform Root Cause Analysis (RCA) for security incidents and update knowledge management.
  • Work directly with data asset owners and business response plan owners during high-severity incidents.

Client Management

  • Engage with clients during debrief meetings to address questions, gather feedback, and align on security objectives.
  • Provide tuning recommendations for IDS, proxy policies, and in-line malware tools based on threat feeds, trust and reputation data, incidents, or vulnerabilities and exploits of downstream systems.
  • Provide tuning recommendations to administrators based on findings from investigations or threat information reviews.
  • Prepare and deliver comprehensive weekly and monthly Threat Incident debrief reports for clients, including insights on security trends, incidents, system performance, and recommendations.

Required Technical And Professional Expertise

Security Domain Experience:

  • More than five years of experience in SOC, Incident Response, or Threat Hunting roles.
  • Hands-on experience with SIEM platforms such as IBM QRadar, Splunk, ArcSight, Microsoft Sentinel, or LogRhythm.
  • Strong knowledge of network security, log analysis, malware analysis, and forensic investigation techniques.
  • Knowledge of Digital Forensics, including disk imaging, memory forensics, log analysis, and evidence handling best practices.
  • Familiarity with cyber threat intelligence frameworks like MITRE ATT&CK, NIST, and CIS.
  • Expertise in network and endpoint security monitoring tools (IDS, firewalls, EDR, proxy, email security solutions).
  • Proficiency in log analysis, regular expressions (regex), and scripting languages like Python or PowerShell.
  • Ability to create custom threat detection rules, SIEM dashboards, and correlation policies.
  • Knowledge of packet capture and traffic analysis tools (Wireshark, Zeek, TCPDump).
  • Familiarity with incident response methodologies and forensic investigation procedures.

Soft Skills

  • Strong analytical and problem-solving abilities with keen attention to detail.
  • Excellent communication and collaboration skills, with the ability to interact effectively with stakeholders at all levels.
  • Capable of managing multiple priorities in a fast-paced, dynamic environment.

Preferred Certifications

Preferred technical and professional experience

  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Forensic Analyst (GCFA) or GIAC Certified Forensic Examiner (GCFE) (Preferred for Digital Forensics)
  • Certified Ethical Hacker (CEH)
  • Certified SOC Analyst (CSA)
  • Security+ / CISSP / CISM
  • SIEM-Specific Certifications (IBM QRadar, Splunk, etc.)

How to apply

To apply for this job you need to authorize on our website. If you don't have an account yet, please register.

Post a resume

Similar jobs

IA PH Hiring (All Roles)

EY, Taguig
1 day ago
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working...

Logistics Coordinator - Manila

Talentek by Hubtek, Taguig
3 days ago
Talentek by Hubtek is a company that believes in young talent and seeks to support the development of its employees on a personal and professional level through learning experiences and growth opportunities. We support companies through our Talent, Technology, and Training services.We have been impacting the world since 2018 and we want to keep pushing ourselves to become the brightest...

Building Engineer

Daiichi Properties, Inc., Taguig
3 days ago
Full-time PositionBGC, TaguigAt least 3 years of work experience in Building or Property ManagementThe Building Engineer administers maintenance and repair services of our properties and facilities. Ensures efficient operation and maintenance of mechanical, electrical and plumbing equipment and systems. Responsible but not limited to maintaining a clean and safe working environment, performing rounds, conducting routine assessments, and ensure implementation of...