Job Search and Career Advice Platform

Enable job alerts via email!

Incident Response Consultant

Gulf Business Machines PND

Riyadh

On-site

SAR 70,000 - 90,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology solutions provider in Riyadh seeks a skilled Security Consultant to advise clients on cybersecurity programs and handle incidents. You will conduct forensic analysis, manage incident response teams, and collaborate on enterprise threat hunting. Candidates should possess strong skills in cybersecurity, incident response, and proficiency with EDR tools and forensics. This role offers a chance to shape client security postures and work in a collaborative environment.

Qualifications

  • Significant hands-on experience with incident response and computer forensics tools.
  • Experience in developing IT risk mitigation policies and procedures.
  • Proficient in leading incident response teams and managing tasks effectively.

Responsibilities

  • Respond to high-profile cybersecurity incidents for clients.
  • Advise clients on shaping their cybersecurity programs.
  • Conduct enterprise threat hunting and assist in incident response planning.

Skills

Incident Response
Cybersecurity Policy
Forensic Analysis
EDR tools proficiency
Threat Hunting
Effective Communication

Education

Bachelor's Degree

Tools

EnCase
FTK
X-Ways
Sleuthkit
Splunk
ELK
Job description
Introduction

Information and Data are some of the most important organizational assets in today's businesses. As a Security Consultant, you will be a key advisor for IBM's clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.

Your role and responsibilities

As a consultant for the IBM Security X-Force Incident Response (X-Force IR) team, you will be part of a team of consultants who are responding to high profile cybersecurity incidents within our clients' enterprise networks. You will work with our clients to prepare for and respond to cybersecurity incidents. You will serve as a trusted advisor to our clients, helping to shape their cybersecurity program. You will collaborate with internal IBM stakeholders to provide integrated solutions to our clients' most challenging problems.

In this role you will have demonstrated skills in various elements of Incident Response, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices, ideally in large enterprise environments. You will have proficiency with leading EDR tools as well as familiarity with forensic analysis tools and live response analysis. Familiarity with Windows and Linux enterprise environments and systems such as Active Directory, M365, FWs, IPS/IDS, SIEMs, etc. is required. Excellent written and verbal communication skills are required. When not responding to breaches, you will conduct enterprise threat hunting, help clients develop incident response plans, facilitate tabletop exercises as well as provide other strategic security services related to incident response.

Required education

None

Preferred education

Bachelor's Degree

Required technical and professional expertise
  • Significant hands‑on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security.
  • Experience with assessing and developing enterprise-wide policies and procedures for IT risk mitigation and incident response.
  • Experience leading incident response teams and managing tasks across all phases of an engagement.
  • Capable of working independently as well as providing leadership on internal projects and client engagements.
Forensic Analysis & Incident Response Skills
  • Ability to forensically analyze both Windows & Unix systems for evidence of compromise.
  • Proficiency with industry standard forensic tools such as EnCase, FTK, X-Ways, Sleuthkit.
  • Experience performing log analysis locally and via SIEM/log aggregation tool.
  • Experience hunting threat actors in large enterprise networks and cloud environments.
  • Experience with using and configuring Endpoint Detection & Response (EDR) tools.
  • Demonstrate an understanding of the behavior, security risks and controls of common network protocols.
  • Demonstrate an understanding of common applications used in Windows and Linux enterprise environment.
  • Familiarity with Active Directory, Exchange and Office365 applications and logs.
  • Familiarity with cloud computing platforms like IBM Cloud, AWS, GCP or Azure.
  • Proficient in writing cohesive reports for a technical and non-technical audience.
Strategic Assessment Expertise
  • Examine and analyze available client internal policies, processes, and procedures to determine patterns and gaps at both a strategic and tactical levels. Recommend appropriate course of action to support maturing the client's incident response program and cyber security posture.
  • A strong familiarity with various security frameworks and standards such as ISO 27001/2, PCI DSS, NIST800-53, 800-171, and applicable data privacy laws and regulations.
  • Demonstrated experience with planning, scoping, and delivering technical and/or executive level tabletop exercises, with a focus on either tactical or strategic incident response processes.
  • Ability to incorporate current trends and develop custom scenarios applicable to a client.
  • Low-level operating system knowledge, including automation and performing administrative tasks.
  • Scripting or programming experience, preferably in a language commonly used for DFIR such as Python or PowerShell.
  • Ability to work with data at scale such as using Splunk / ELK.
  • Expertise working with shell programs such as grep, sed and awk to process data quickly.
  • Working experience with virtualization and cloud technology platforms like IBM Cloud, AWS, GCP & Azure.
Preferred technical and professional experience
  • Diverse understanding of cyber security related vulnerabilities, common attack vectors, and mitigations.
  • Capable of developing strategic level incident response plans as well as tactical-focused playbooks.
  • Ability to manage tasks and coordinate work streams during incident response investigations.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.