Cybersecurity Response - Sydney, Australia - Kyndryl Australia Pty Ltd

Kyndryl Australia Pty Ltd
Kyndryl Australia Pty Ltd
Verified Company
Sydney, Australia

1 week ago

Olivia Brown

Posted by:

Olivia Brown

beBee Recruiter


Description

Why Kyndryl
Kyndryl was spun-off of IBM IT infrastructure services in 2021. Our global base of customers includes 75 of the Fortune 100 companies.

With 88,449 skilled professionals operating from over 100 countries, we are committed to the success of our customers, collaborating with them, and helping them to realise their ambitions.

We help our customers design, manage, and modernise the technology systems they depend on every day. Kyndryl is the 'hearts and lungs' because we support mission critical infrastructure.

Kyndryl has operations in 63 countries; 450 data centres around the world are under our management. We have the majority of mainframe capacity, generating and running 9 million automated actions per month for our customers.


Your Role and Responsibilities


The Kyndryl CSIRT is looking for a Cybersecurity Response (CSIRT) Analyst to join an advanced team that drives proactive identification of threats within the organization, provide rapid response, monitors user activity, network events, and signals from security tools to identify events that merit attention, prioritization, and investigation.

We are seeking a talented individual responsible for cybersecurity threat incidents including forensic investigations, and analysis in support of cyber incidents that are reported into the Incident Response team.

This role will require the ability to triage and conduct thorough examinations of all information technology systems across diverse cloud environments, the ability to determine containment and/or remediation activities that may be required as well as identify potential threats.

Reporting and collaborating with the different areas of business is required.


Responsibilities include:

  • At least 5 years of experience in IT Security Digital Forensics
  • At least 5 years of experience in Incident Response in a global corporate enterprise
  • Demonstrated computer forensic investigations experience.
  • Excellent technical writing and presentation skills.
  • Expertlevel knowledge of common attack vectors and penetration techniques.
  • Solid working knowledge of networking technology and tools, firewalls, proxies, IDS/IPS and encryption.
  • Demonstrated knowledge of forensic tools (Encase, FTK, Axiom Magnet, Black Bag, SIFT, Kali)
  • Experience with malware analysis (reverse engineering).
  • Experience managing large and smallscale cyber security incidents.
  • Demonstrated understanding of database structures and SQL.
  • Conduct examination of digital media (hard drives, network traffic, images, etc.).
  • Capture / analyze network traffic for indications of compromise.
  • Review logbased data, both in raw form and utilizing SIEM or aggregation tools.
  • Perform live network assessments using leading packet capture and analysis software tools.
  • Establish timelines and patterns of activity based on multiple data sources.
  • Identify, document and prepare reports on relevant findings.
  • Strong understanding of networking protocols
  • Experience with programming or scripting languages (Python, Ruby, Powershell)
  • Demonstrated system administration skills.

NOTE:
This is a remote work from home.


Required Technical and Professional Expertise

  • Extensive experience in IT Security and Digital Forensics
  • Strong experience managing incidents in a global corporate environment
  • Demonstrated computer forensic investigations experience.
  • Excellent technical writing and presentation skills.
  • Expertlevel knowledge of common attack vectors and penetration techniques.
  • Solid working knowledge of networking technology and tools, firewalls, proxies, IDS/IPS and encryption.
  • Demonstrated knowledge of forensic tools (Encase, FTK, Axiom Magnet, Black Bag, SIFT, Kali)
  • Experience with malware analysis (reverse engineering).
  • Experience managing large and smallscale cyber security incidents.
  • Demonstrated understanding of database structures and SQL.
  • Conduct examination of digital media (hard drives, network traffic, images, etc.).
  • Capture / analyze network traffic for indications of compromise.
  • Review logbased data, both in raw form and utilizing SIEM or aggregation tools.
  • Perform live network assessments using leading packet capture and analysis software tools.
  • Establish timelines and patterns of activity based on multiple data sources.
  • Identify, document and prepare reports on relevant findings.
  • Strong understanding of networking protocols
  • Experience with programming or scripting languages (Python, Ruby, Powershell)
  • Demonstrated system administration skills.

Preferred Technical and Professional Experience

Any two of the following:

  • ACE (Access Data Certified Examiner)
  • EnCe ( EnCase Certified Examiner)
  • AWS Security
  • GCFE (GIAC Certified Forensics Examiner)
  • GNFA (GIAC Network Forensics Analyst)
  • GCIA (GIAC Certified Intrusion Analyst)
  • GCIH (GIAC Certified Intrusion Handler)
  • GREM (GIAC Reverse Engineering Malware)
  • OSCP (Offensive Security Certified Professional)
**

More jobs from Kyndryl Australia Pty Ltd