At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, lets talk.
We are looking for an experienced Endpoint Security Specialist with strong expertise in Palo Alto Cortex XDR to join our security operations team. The ideal candidate will be responsible for monitoring, investigating, and responding to endpoint and network-based threats, as well as maintaining and optimizing our XDR deployment.
Key Responsibilities:
Monitor and analyze security alerts and events through Palo Alto Cortex XDR.
Investigate and respond to threats such as malware, phishing attempts, lateral movement, and privilege escalation.
Perform advanced threat detection through endpoint behavior analytics, process monitoring, and threat intelligence.
Create, fine-tune, and manage custom detection rules, alert profiles, and automated response actions within Cortex XDR.
Lead incident triage, containment, and remediation processes, collaborating with internal stakeholders and external vendors as needed.
Maintain and continuously improve Cortex XDR configurations, security policies, and system integrations.
Conduct in-depth root cause analysis of security incidents and produce detailed incident reports.
Stay updated on the latest cyber threats, vulnerabilities, and attack vectors to enhance detection and response strategies.
- 3–6 years of hands-on experience in Endpoint Security, specifically with EDR and XDR platforms.
- Strong expertise in Palo Alto Cortex XDR, including:
- Rule creation and alert tuning
- Investigation workflows and playbooks
- Policy management and system tuning
- Solid understanding of endpoint, network, and user behavior telemetry.
- Proven experience in detecting and responding to various threat vectors such as malware, phishing, lateral movement, and privilege escalation.
- Experience with threat intelligence correlation and process behavior analysis.
- Strong analytical, problem-solving, and communication skills.
- Ability to work independently and collaboratively in a fast-paced environment.
NA