As a Business Sales & Delivery Executive, you will support IBM’s consistent growth by bringing to the table your business development, sales, account management, and delivery skills.
The ideal candidate will be responsible for managing a team of security professionals and ensuring the successful execution of managed security services for our clients. This role involves strategic planning, client engagement, and a thorough understanding of cybersecurity protocols and trends.
Picture yourself working with a highly motivated, highly successful team with a proven sales record in top technologies. If you’re ready to bring insights and experience in cloud security, we are ready to offer you a best-in-class career development.
This role is a leadership role engaged in the sales, planning and implementation of threat management solutions in our services portfolio and as such you will be self-motivated and driven to build new and maintain existing client relationships, have proven track record of meeting your sales and utilisation targets.
• Work with clients to establish a vision, gather requirements, and lead the development of winning solutions which meet client requirements, and maximize IBM’s strengths
• Lead and manage the Managed Security Services (MSS) team, ensuring high performance and adherence to service level agreements (SLAs).
• Work closely with colleagues to develop client presentations and Statement of Works (SOWs) based on internal processes for release
• Analyzing and defining a client’s threat management strategy based on the business strategy
• Drawing from primary and existing IBM research on evolving market trends
• Identifying issues, creating hypotheses, and executing analysis, to develop decision-ready recommendations for our clients
• Analyse and interpret test results to provide actionable recommendations for remediation, mitigation, and security enhancements.
• Communicate findings and insights to technical and non-technical stakeholders through detailed and concise reports, presentations, and discussions.
• Stay up to date with the latest cybersecurity trends to continuously improve testing methodologies and approaches.
• Provide leadership in use case design and implementation, runbook design and implementation, policy, process, technology assessment and build, governance, or organisational areas.
• Mentor and provide guidance to junior members of the team, fostering skill development and knowledge sharing.
- You understand and how to build use-cases because you know what you’re looking for. For example, you understand how ransomware and other malware, or threats technically works, which logs they write to, their IOCs, network flows, and behaviors; thus, you are adapt at building custom use-cases that hunt for early indicators. Additionally, you understand how to hunt for threats, the relationship it has with forensic investigations, and creating extracts that divulge targets and areas of interest. Also, you can design Threat Hunting programs which can be taught to other analysts, or even be automated using artificial intelligence. False positives are your sworn enemies.
- You must have experience writing your own queries and scripts that will allow you to search through logs, network flows, and other areas to correlate security events of interest. You are able to de-construct attacks and threats.
- Strong financial acumen and proven sales experience in Micorsoft, Palo Alto or related security technology solutions.
- At least 8-10 years’ related experience in design of enterprise security service solutions (advisory, systems integration, and/or managed security services);
- Should have depth of knowledge and experience in core security domains SOC Assessments, Use Cases, SOC Runbooks, SOC Processes, SOC Operations, SIEM, Threat Hunting, Threat Intelligence, IOC’s.
- Hands on experience with SIEM solutions such as Microsoft Sentinel highly desired
- Hand on SOAR: Resilient and others (SOAR workflow and playbook skill set)
- Knowledge of Palo Alto Cortex solution and XSIAM
- Knowledge and working experience with EDR, Attack Surface Management, Threat Intelligence tools
- Expert knowledge of Mitre Framework, NIST framework and Cyber Kill Chain Process.
- Scripting and custom parser knowledge required for integrations.
- An understanding of Threat Intelligence and Threat Hunting
- Proficient in incident response processes - detection, triage, incident analysis, remediation, and reporting.
- Understanding of compliance issues (ISO 27001, PCI, COBIT, GDPR, POPII, etc..) and market regulations
- knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
- Knowledge of malware operation and indicators
- Knowledge of threat landscape (threat actors, APT, cyber-crime, etc
- Knowledge of Windows and Linux
- Knowledge in penetration techniques. Extensive experience in documentation and reporting.
- Well-developed presentation skills.
- Strong communications skills both oral and written, and solid organisational skills.
- University degree in computer science, natural sciences or mathematics, engineering or an equivalent activity