£665 Per day
Inside
Remote
England
Summary: The Threat Management Consultant role involves establishing operational interlocks with the CSMS and managing security incident responses for IBM as a supplier for PPB. The position requires the development of incident response playbooks and the design and implementation of SIOC processes to enhance the UK SOC monitoring service. This role is remote and requires SC clearance eligibility. The position is available for a duration of 6 months and is umbrella company only.
Key Responsibilities:
- Establish an operational interlock with the CSMS and own security incident response and recovery on behalf of IBM as the supplier for PPB. Raise awareness to the CSMS ASAP on 24/7 basis.
- Advise on the sending of appropriate log event data to the CSMS.
- Develop incident response playbooks.
- Design and implement SIOC processes to supplement the UK SOC monitoring service.
- Ongoing tuning of Qradar.
- Threat Intelligence.
- Threat Hunting.
- Implement vulnerability scanning using Tenable in AWS.
- Design and Implement UK SOC monitoring service.
Key Skills:
- Experience with CSMS and security incident response.
- Knowledge of log event data management.
- Ability to develop incident response playbooks.
- Experience with Qradar tuning.
- Familiarity with Threat Intelligence and Threat Hunting.
- Experience with vulnerability scanning tools like Tenable in AWS.
- Capability to design and implement SOC monitoring services.
Salary (Rate): £665.00 per day
City: undetermined
Country: England
Working Arrangements: remote
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Threat Management Consultant
Remote working
6 months
UMBRELLA ONLY
Eligible for SC or Active SC - will be able to start before the clearance checks are complete
Essential Skills for the role
- Establish an operational interlock with the CSMS and own security incident response and recovery on behalf of IBM as the supplier for PPB. Raise awareness to the CSMS ASAP on 24/7 basis.
- Advise on the sending of appropriate log event data to the CSMS
- Develop incident response playbooks
Design and implement SIOC processes to supplement the UK SOC monitoring service:
- Ongoing tuning of Qradar
- Threat Intelligence
- Threat Hunting
- Implement vulnerability scanning using Tenable in AWS
- Design and Implement UK SOC monitoring service
