Who You Are
You're good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you're open and borderless – naturally inclusive in how you work with others.
Required Skills and Experience
- 8+ years of experience in a technical role in the areas of Security Operations, Threat Intelligence, Cyber Incident Response, or Penetration Testing / Red Team.
- Advanced knowledge of operating system internals and security mechanisms.
- Experience analyzing attacker techniques that leverage email and cloud-service tactics.
- Skilled working with extremely large data sets, using tools and scripting languages such as : Excel, SQL, Python, Splunk, and PowerBI.
Preferred Skills and Experience
Knowledge of operating system internals, OS security mitigations & understanding of Security challenges in Windows, Linux, Mac, Android & iOS platformsKnowledge of kill-chain model, ATT&CK framework, and modern penetration testing techniquesExcellent cross-group and interpersonal skills, with the ability to articulate business need for detection improvementsKnowledge of major cloud and productivity platforms as well as identity systems and related security concernsExperienced with curation of Threat IntelligenceExperienced with direct customer communication in a service delivery roleAbility to use data to 'tell a story'Experience with reverse engineering, digital forensics (DFIR) or incident response, or machine learning modelsExperience with system administration in a large enterprise environment including Windows and Linux servers and workstations, network administration, cloud administrationExperience with offensive security including tools such as Metasploit, exploit development, Open Source Intelligence Gathering (OSINT), and designing ways to breach enterprise networksAdditional advanced technical degrees or cyber security certifications such as CISSP, OSCP, CEH, or GIAC certificationsBeing You
Diversity is a whole lot more than what we look like or where we come from, it's how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we're not doing it single-handily : Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That's the Kyndryl Way.
Skills Required
Penetration Testing, Cyber Incident Management, Threat Intelligence