X-Force Incident Response APAC OT Lead
Bangkok, TH
IBM
For more than a century, IBM has been a global technology innovator, leading advances in AI, automation and hybrid cloud solutions that help businesses grow.The X-Force Incident Response team (XFIR) helps IBM customers globally with their Digital Forensics and Incident Response needs, whether that’s before, during, or after an incident. Proactive projects include running tabletop exercises or helping to improve IR documentation, whereas reactive engagements might involve expert level forensic analysis to quantify Intellectual Property theft, or leading IR activities on one of the biggest data breaches in the world.
Your Role and Responsibilities
Many of the existing members of the team are DFIR all-rounders that are as comfortable chewing through log files at the command line during threat hunting as presenting an executive summary of an incident to board members. The successful candidate for this role will also bring a specialisation in DFIR within OT/ICS/SCADA environments, and will have a background in supporting these environments, either internally or as a consultant. Cases will include everything from false alarms to nation state attacks against critical infrastructure. Efficient and methodical collaboration is key in projects of this scale, as is excellent written and spoken English.
You will also have demonstrated skills in various elements of Incident Response, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices. This might include proficiency with leading EDR tools, familiarity with forensic analysis tools such as X-Ways or EnCase, or forensic triage expertise using Velociraptor or UAC. Furthermore, familiarity with Windows and Linux operating systems and enterprise technology such as Active Directory / LDAP / Entra ID, on-premises and cloud-based email, and network devices such as firewalls, proxies, IPS/IDS, SIEMs, etc. is preferred.
As part of the OT Security-focused responsibilities, you will support several OT Security proactive services such as cybersecurity gap assessments, consulting with clients on OT Security Resiliency roadmap development, and keeping yourself, colleagues, and clients apprised of technical practices, standards, and threat trends impacting ICS cybersecurity.
As an experienced consultant, you’ll understand that the nature of the work sometimes involves late nights, early starts, weekends, or travel at short notice. In return, XFIR provides time off in lieu, weekend on-call allowance and the ability to manage your own time wherever possible. We don’t offer opaque bonus schemes but can offer a base salary designed attract the best people for the job.
The selected candidate will be assigned as the X-Force Incident Response lead OT lead for the APAC region.
Required Technical and Professional Expertise
In this role you must have at least 5 years of technical and professional experience in the following:
- Experience in technical and consulting skills with subject matter expertise in one or more of the following specialties: incident response, systems administration, disaster recovery, business continuity, computer forensics and/or network security.
- Prior experience with IT/OT cybersecurity management systems, risk assessments, risk mitigation. Applying reference architectures and frameworks to industrial automation environment and securing industrial automation projects.
- Experience managing technical security projects either as a consultant or internal security practitioner.
- A thorough understanding of network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics & network security operations.
- Significant hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security.
- Experience with assessing and developing enterprise-wide policies and procedures for IT risk mitigation and incident response.
- Experience in Windows, Mac, and Unix operating systems.
Concepts and Communication
- Demonstrated ability to work with and advise senior and executive level clients regarding strategic and tactical processes of Incident Response, staying professional and communicating clearly under pressure.
- Advanced understanding of information security governance concepts, including ability to gauge maturity level of an organisation’s incident response program by against best practices as well as by applying practical knowledge of attacker methodologies, attack lifecycle, Cyber Kill Chain, etc.
- Ability to communicate technical findings & concepts to key stakeholders.
Operational Technology
- Experience working with-in Operational Technology environments that have a safety-first focus.
- Demonstrate an understanding of the key differences between IT versus OT environments and be able to articulate best practices on how to secure each.
- Understanding of OT Security industry best practices and guidelines such as NIST 800-82, ISA/IEC 62443, and PERA.
- Familiarity with regional laws and regulations regarding critical infrastructure and OT Security.
- Experience with OT-focused security tooling such as Nozomi Networks, Claroty, Tenable.OT, Armis, or Dragos.
- Able to analyse common industrial network protocols (Modbus, Profinet, EtherNet/IP, etc).
- Familiarity with common ICS vendors (Honeywell, Schneider Electric, Yokogawa etc.) and their products, network architectures, and equipment.
Preferred Technical and Professional Expertise
Digital Forensics & Incident Response
- Ability to forensically analyse both Windows & Unix systems for evidence of compromise.
- Proficiency with commercial and open source forensic tools such as EnCase, X-Ways, and Sleuthkit.
- Skills and experience with cloud DFIR.
- Proficient in writing cohesive reports for a technical and non-technical audience.
- Experience hunting threat actors in large enterprise networks and cloud environments.
- Experience with using and configuring Endpoint Detection & Response (EDR) tools.
Network Forensics
- Experience performing log analysis locally and via SIEM/log aggregation tool.
- Analyse and/or decipher packet captures from network protocol analysers (Wireshark, TCPdump, etc).
- Demonstrate an understanding of the behaviour, security risks and controls of common network protocols.
- Demonstrate an understanding of common applications used in Windows and Linux enterprise environment. Familiarity with Active Directory, Exchange and Office365 applications and logs.
Remediation services
- Experience acting as a ‘trusted advisor’ throughout the IR process.
- Advise clients on best practice whilst providing a sounding board during risk-based decisions.
- Track record of success in an incident management role using project management.
- Ability to lead teams comprised of customer staff and staff from competing service providers.
Proactive services
- Examine and analyse available client internal policies, processes, and procedures to determine patterns and gaps at both a strategic and tactical levels. Recommend appropriate course of action to support maturing the client’s incident response program and cyber security posture.
- A strong familiarity with various security frameworks and standards and applicable data privacy laws and regulations.
- Demonstrated experience with planning, scoping, and delivering technical and/or executive level tabletop exercises, with a focus on either tactical or strategic incident response processes. Ability to incorporate current trends and develop custom scenarios applicable to a client.
- Diverse understanding of cyber security related vulnerabilities, common attack vectors, and mitigations.
- Capable of developing strategic level incident response plans as well as tactical-focused playbooks.
- Low-level operating system knowledge, including automation and performing administrative tasks.
- Scripting or programming experience, preferably in a language commonly used for DFIR such as Python or PowerShell.
- Ability to work with data at scale such as using Splunk / ELK.
- Expertise working with shell programs such as grep, sed and awk to process data quickly.
- Working experience with virtualisation and cloud technology platforms like IBM Cloud, AWS, GCP, & Azure.
OT Security
- One or more security certifications
- OT IDS tool such as Nozomi Networks, Claroty, Tenable.OT, Armis, or Dragos.
- SANS GIAC or ISA99/IEC-62443 Cybersecurity
- Experience in designing / engineering control systems
Key Job Details
Role:X-Force Incident Response APAC OT Lead Location:Bangkok, TH Category:Consulting Employment Type:Full-Time Travel Required:Up to 20% or 1 day a week Contract Type:Regular Company:(0411) IBM Thailand Company Limited Req ID:726431BR
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Application security Automation AWS Azure Cloud Cyber Kill Chain DevSecOps DFIR EDR ELK EnCase Ethernet Firewalls Forensics GCP GIAC Governance ICS IDS IEC 62443 Incident response Industrial IPS LDAP Linux Log analysis Log files Modbus Network security NIST Open Source PowerShell Privacy PROFINET Python Risk assessment SANS SCADA Scripting Security assessment SIEM Splunk UNIX Vulnerabilities Windows
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.