
Cybersecurity Incident Response and Forensics SME
Kyndryl
full-time
Posted on:
Location Type: Remote
Location: India
Visit company websiteExplore more
Tech Stack
About the role
- Lead and coordinate end-to-end incident response activities including detection, triage, containment, eradication, and recovery.
- Act as the primary escalation point for critical security incidents and breaches.
- Develop and maintain incident response runbooks, escalation protocols, and communication plans.
- Collaborate with legal, compliance, HR, and executive teams during major incidents.
- Conduct forensic investigations across endpoints, servers, cloud platforms, and mobile devices.
- Design and implement improvements to the incident response program including automation and orchestration.
- Evaluate and integrate new tools and technologies to enhance detection and response capabilities.
- Develop threat models and risk assessments to proactively identify vulnerabilities and threats.
- Partner with SOC analysts, threat hunters, vulnerability management, and IT operations teams.
- Provide technical guidance and mentorship to junior staff and cross-functional teams.
- Deliver detailed technical reports and executive-level summaries post-incident.
Requirements
- Incident Response Leadership
- Lead and coordinate end-to-end incident response activities, including detection, triage, containment, eradication, and recovery.
- Act as the primary escalation point for critical security incidents and breaches.
- Develop and maintain incident response runbooks, escalation protocols, and communication plans.
- Collaborate with legal, compliance, HR, and executive teams during major incidents.
- Digital Forensics & Threat Analysis
- Conduct forensic investigations across endpoints, servers, cloud platforms, and mobile devices.
- Strategy & Program Development
- Design and implement improvements to the incident response program, including automation and orchestration.
- Evaluate and integrate new tools and technologies to enhance detection and response capabilities.
- Develop threat models and risk assessments to proactively identify vulnerabilities and threats.
- Contribute to red/blue/purple team exercises and tabletop simulations.
- Collaboration & Communication
- Partner with SOC analysts, threat hunters, vulnerability management, and IT operations teams.
- Provide technical guidance and mentorship to junior staff and cross-functional teams.
- Deliver detailed technical reports and executive-level summaries post-incident.
- Represent the organization in external forums, industry groups, and regulatory engagements.
- Perform memory analysis, disk imaging, log correlation, and malware reverse engineering.
- Analyze attack vectors, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
- Maintain chain-of-custody and evidence handling procedures for legal and regulatory compliance.
Benefits
- Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey.
- Employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
- Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
incident responseforensic investigationsautomationorchestrationthreat modelingrisk assessmentsmemory analysisdisk imaginglog correlationmalware reverse engineering
Soft skills
leadershipcollaborationcommunicationmentorshiptechnical guidance