In this role you will join IBM Consulting via our world class Associate Program for university hires. As an Associate at IBM Consulting you will have the opportunity to work with a diverse range of clients worldwide. Our clients' technical and business needs are constantly evolving. We're hiring inspired, talented individuals, who believe no problem is too big to solve.
We focus on your professional development through ongoing learning, mentorship, development of technical skills, and continuous personal growth, all grounded in a culture of coaching and career advancement. If you see yourself as someone who never stops learning and who wants to unleash your potential, the IBM Consulting Associates Program is for you.
About X-Force:
Now, let’s talk about why we are here: X-Force! The team is comprised of hackers, responders, researchers, and analysts, many of whom are world-renowned security thought leaders. We are looking for Associate Threat Intelligence Consultants to join our Threat Intelligence team.
Threat Intelligence focuses on understanding attacker's tactics, which is crucial for protecting people, data and infrastructure. We review dynamic analysis artifacts and execute malware in a virtual environment to assist incident responders, cyber threat analysts, and reverse engineers in extracting indicators of compromise.
As an Associate Threat Intelligence Consultant, you’ll collect, process, analyze, and share cyber threat/warning assessments, following established processes, ensuring the organization remains informed and prepared for potential cyber threats.
Our clients' technical and business needs are constantly evolving. We’re hiring inspired, talented individuals eager to apply their knowledge and perspective to challenging work that evolves industries and our world. We prioritize ongoing learning, development of technical skills, and continuous personal growth, all grounded in a culture of coaching and apprenticeship.
Threat Intelligence focuses on understanding attacker's tactics, which is crucial for protecting people, data and infrastructure. We review dynamic analysis artifacts and execute malware in a virtual environment to assist incident responders, cyber threat analysts, and reverse engineers in extracting indicators of compromise.
As an Associate Threat Intelligence Consultant, you’ll collect, process, analyze, and share cyber threat/warning assessments, following established processes, ensuring the organization remains informed and prepared for potential cyber threats.
- Demonstrated leadership and adaptability, with willingness to readily and voluntarily take ownership of highly challenging tasks and problems, even beyond initial scope of responsibility
- Thorough and analytical, with capability to apply logic to solve problems
- Ability to handle multiple tasks concurrently and meet deadlines, while maintaining focus despite conflicting demands
- Initiative to actively seek new knowledge and improve skills
- Effective interpersonal skills with ability to collaborate and work effectively with individuals and teams, strengthening relationships to achieve win-win solutions
- Ability to communicate complex situations clearly and simply by listening actively and conveying difficult messages in a positive manner
- A passion for innovative ideas, coupled with the ability to understand and assimilate different points of view
- Scripting skills (Python, Bash, PowerShell), including developing reusable or purpose-built tools
- Proficient programing skills in one or more of the following: Java, .Net, Python, or Ruby
- Experience in reverse engineering and using disassemblers or debuggers
- Familiarity with operating system internals (Windows or Linux)
- Knowledge of computer networking protocols
- Demonstrated application of forensic analysis, memory analysis, and/or malware analysis
- Knowledge or experience in one or more of the following Security Domains: Incident Response, Digital Forensics, Tabletop Exercises, Threat Hunting, Cloud Platforms
- History of published research, blog posts, or a history of presenting at local or regional security conferences
- Knowledge or experience with artificial intelligence tools in the cybersecurity domain