Threat Management Consultant

Threat Management Consultant

Posted 3 days ago by Experis IT

£665 Per day
Inside
Remote
England, UK

Summary: The Threat Management Consultant role involves establishing operational interlocks with the CSMS and managing security incident responses for IBM as a supplier. The position requires the development of incident response playbooks and the implementation of SIOC processes to enhance the UK SOC monitoring service. This is a remote position for a duration of 6 months, requiring SC clearance eligibility. The role is classified as umbrella only.

Key Responsibilities:

  • Establish an operational interlock with the CSMS and own security incident response and recovery on behalf of IBM as the supplier for PPB.
  • Raise awareness to the CSMS ASAP on a 24/7 basis.
  • Advise on the sending of appropriate log event data to the CSMS.
  • Develop incident response playbooks.
  • Ongoing tuning of Qradar.
  • Threat Intelligence.
  • Threat Hunting.
  • Implement vulnerability scanning using Tenable in AWS.
  • Design and Implement UK SOC monitoring service.

Key Skills:

  • Experience with CSMS and security incident response.
  • Knowledge of Qradar tuning and threat intelligence.
  • Proficiency in vulnerability scanning tools, specifically Tenable.
  • Ability to develop incident response playbooks.
  • Experience in threat hunting methodologies.
  • Strong communication skills for 24/7 incident awareness.

Salary (Rate): £665.00 per day

City: undetermined

Country: UK

Working Arrangements: remote

IR35 Status: inside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Threat Management Consultant

Remote working

6 months

UMBRELLA ONLY

Eligible for SC or Active SC - will be able to start before the clearance checks are complete

Essential Skills for the role

  • Establish an operational interlock with the CSMS and own security incident response and recovery on behalf of IBM as the supplier for PPB.
  • Raise awareness to the CSMS ASAP on 24/7 basis.
  • Advise on the sending of appropriate log event data to the CSMS
  • Develop incident response playbooks

Design and implement SIOC processes to supplement the UK SOC monitoring service:

  • Ongoing tuning of Qradar
  • Threat Intelligence
  • Threat Hunting
  • Implement vulnerability scanning using Tenable in AWS
  • Design and Implement UK SOC monitoring service