Kyndryl

Cybersecurity Incident Response and Forensics SME

Kyndryl

full-time

Posted on:

Location Type: Remote

Location: India

Visit company website

Explore more

AI Apply
Apply

Tech Stack

About the role

  • Lead and coordinate end-to-end incident response activities including detection, triage, containment, eradication, and recovery.
  • Act as the primary escalation point for critical security incidents and breaches.
  • Develop and maintain incident response runbooks, escalation protocols, and communication plans.
  • Collaborate with legal, compliance, HR, and executive teams during major incidents.
  • Conduct forensic investigations across endpoints, servers, cloud platforms, and mobile devices.
  • Design and implement improvements to the incident response program including automation and orchestration.
  • Evaluate and integrate new tools and technologies to enhance detection and response capabilities.
  • Develop threat models and risk assessments to proactively identify vulnerabilities and threats.
  • Partner with SOC analysts, threat hunters, vulnerability management, and IT operations teams.
  • Provide technical guidance and mentorship to junior staff and cross-functional teams.
  • Deliver detailed technical reports and executive-level summaries post-incident.

Requirements

  • Incident Response Leadership
  • Lead and coordinate end-to-end incident response activities, including detection, triage, containment, eradication, and recovery.
  • Act as the primary escalation point for critical security incidents and breaches.
  • Develop and maintain incident response runbooks, escalation protocols, and communication plans.
  • Collaborate with legal, compliance, HR, and executive teams during major incidents.
  • Digital Forensics & Threat Analysis
  • Conduct forensic investigations across endpoints, servers, cloud platforms, and mobile devices.
  • Strategy & Program Development
  • Design and implement improvements to the incident response program, including automation and orchestration.
  • Evaluate and integrate new tools and technologies to enhance detection and response capabilities.
  • Develop threat models and risk assessments to proactively identify vulnerabilities and threats.
  • Contribute to red/blue/purple team exercises and tabletop simulations.
  • Collaboration & Communication
  • Partner with SOC analysts, threat hunters, vulnerability management, and IT operations teams.
  • Provide technical guidance and mentorship to junior staff and cross-functional teams.
  • Deliver detailed technical reports and executive-level summaries post-incident.
  • Represent the organization in external forums, industry groups, and regulatory engagements.
  • Perform memory analysis, disk imaging, log correlation, and malware reverse engineering.
  • Analyze attack vectors, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
  • Maintain chain-of-custody and evidence handling procedures for legal and regulatory compliance.
Benefits
  • Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey.
  • Employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
  • Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations.

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
incident responseforensic investigationsautomationorchestrationthreat modelingrisk assessmentsmemory analysisdisk imaginglog correlationmalware reverse engineering
Soft skills
leadershipcollaborationcommunicationmentorshiptechnical guidance