Resume and JobRESUME AND JOB
IBM logo

X-Force Incident Response Consultant

IBM

Engineering Jobs

X-Force Incident Response Consultant

full-timePosted: Dec 11, 2025

Job Description

X-Force Incident Response Consultant

📋 Job Overview

As an X-Force Incident Response Consultant at IBM, you will support clients with cybersecurity incident response, including forensic investigations, log analysis, and malware analysis. You will work both independently and with global teams to provide comprehensive incident response services, including pre-incident training and regular information sharing. This role requires strong communication skills and the ability to work in a Japanese-speaking environment.

📍 Location: Tokyo, JP (Remote/Hybrid)

💼 Career Level: Professional

🎯 Key Responsibilities

  • Support cybersecurity incident response in client environments, collaborating with global members as needed
  • Conduct on-site or online evidence collection
  • Perform technical investigations such as forensic analysis, log analysis, and malware specimen analysis
  • Provide advice on response prioritization, external disclosure, and other aspects to facilitate incident response
  • Hold progress meetings and final reporting sessions, creating reports with investigation conclusions and recommended measures
  • Provide pre-incident support through regular information sharing, relationship building with clients, and training such as tabletop exercises and technical hands-on sessions
  • Support proposal activities by introducing services and case studies to clients

✅ Required Qualifications

  • Experience in security incident response duties (triage, evidence collection, forensics, log analysis, malware analysis, report creation) for at least 2 years
  • IT and information security related work experience for at least 6 years
  • Communication and coordination skills with clients and related departments
  • English writing and reading communication skills (email, Slack) at a reference level of TOEIC L&R 700 or above, CEFR B1 or above

⭐ Preferred Qualifications

  • Experience in providing information security training (tabletop exercises, hands-on exercises, etc.)
  • Experience in building, operating, or incident response in cloud environments (AWS, Azure, GCP, etc.)
  • Experience in building, operating, or incident response in OT/ICS
  • CSIRT work experience in a business company
  • Technical support work experience
  • Analyst work experience in a SOC (Security Operation Center)
  • Threat intelligence related work experience
  • Experience leading an incident response team
  • Possession of certifications such as CISSP, GCIH, GCFA, GCFE, GREM, OSCP
  • Basic communication skills in languages other than Japanese and English (e.g., Chinese, Portuguese)

🛠️ Required Skills

  • Forensic analysis
  • Log analysis
  • Malware analysis
  • Evidence collection
  • Incident response
  • Communication skills
  • Coordination skills
  • English writing and reading
  • Japanese language proficiency

🎁 Benefits & Perks

  • Opportunity to work with a cybersecurity expert team with over 20 years of experience
  • Collaboration and interaction with other X-Force teams such as X-Force Red and X-Force Threat Intelligence
  • Support for a wide range of industries including manufacturing, finance, insurance, public sector, education, retail, and information communication
  • Ability to respond to incidents at overseas locations
  • Active support for training, certification, and conference participation
  • Remote work with the option for on-site visits as needed

Locations

  • Tokyo, JP, India (Remote)

Salary

Estimated Salary Rangemedium confidence

2,500,000 - 4,200,000 INR / yearly

Source: ai estimated

* This is an estimated range based on market data and may vary based on experience and qualifications.

Skills Required

  • Forensic analysisintermediate
  • Log analysisintermediate
  • Malware analysisintermediate
  • Evidence collectionintermediate
  • Incident responseintermediate
  • Communication skillsintermediate
  • Coordination skillsintermediate
  • English writing and readingintermediate
  • Japanese language proficiencyintermediate

Required Qualifications

  • Experience in security incident response duties (triage, evidence collection, forensics, log analysis, malware analysis, report creation) for at least 2 years (experience)
  • IT and information security related work experience for at least 6 years (experience)
  • Communication and coordination skills with clients and related departments (experience)
  • English writing and reading communication skills (email, Slack) at a reference level of TOEIC L&R 700 or above, CEFR B1 or above (experience)

Preferred Qualifications

  • Experience in providing information security training (tabletop exercises, hands-on exercises, etc.) (experience)
  • Experience in building, operating, or incident response in cloud environments (AWS, Azure, GCP, etc.) (experience)
  • Experience in building, operating, or incident response in OT/ICS (experience)
  • CSIRT work experience in a business company (experience)
  • Technical support work experience (experience)
  • Analyst work experience in a SOC (Security Operation Center) (experience)
  • Threat intelligence related work experience (experience)
  • Experience leading an incident response team (experience)
  • Possession of certifications such as CISSP, GCIH, GCFA, GCFE, GREM, OSCP (experience)
  • Basic communication skills in languages other than Japanese and English (e.g., Chinese, Portuguese) (experience)

Responsibilities

  • Support cybersecurity incident response in client environments, collaborating with global members as needed
  • Conduct on-site or online evidence collection
  • Perform technical investigations such as forensic analysis, log analysis, and malware specimen analysis
  • Provide advice on response prioritization, external disclosure, and other aspects to facilitate incident response
  • Hold progress meetings and final reporting sessions, creating reports with investigation conclusions and recommended measures
  • Provide pre-incident support through regular information sharing, relationship building with clients, and training such as tabletop exercises and technical hands-on sessions
  • Support proposal activities by introducing services and case studies to clients

Benefits

  • general: Opportunity to work with a cybersecurity expert team with over 20 years of experience
  • general: Collaboration and interaction with other X-Force teams such as X-Force Red and X-Force Threat Intelligence
  • general: Support for a wide range of industries including manufacturing, finance, insurance, public sector, education, retail, and information communication
  • general: Ability to respond to incidents at overseas locations
  • general: Active support for training, certification, and conference participation
  • general: Remote work with the option for on-site visits as needed

Target Your Resume for "X-Force Incident Response Consultant" , IBM

Get personalized recommendations to optimize your resume specifically for X-Force Incident Response Consultant. Takes only 15 seconds!

AI-powered keyword optimization
Skills matching & gap analysis
Experience alignment suggestions

Check Your ATS Score for "X-Force Incident Response Consultant" , IBM

Find out how well your resume matches this job's requirements. Get comprehensive analysis including ATS compatibility, keyword matching, skill gaps, and personalized recommendations.

ATS compatibility check
Keyword optimization analysis
Skill matching & gap identification
Format & readability score

Tags & Categories

ConsultingConsulting

Answer 10 quick questions to check your fit for X-Force Incident Response Consultant @ IBM.

Quiz Challenge
10 Questions
~2 Minutes
Instant Score

Related Books and Jobs

No related jobs found at the moment.

IBM logo

X-Force Incident Response Consultant

IBM

Engineering Jobs

X-Force Incident Response Consultant

full-timePosted: Dec 11, 2025

Job Description

X-Force Incident Response Consultant

📋 Job Overview

As an X-Force Incident Response Consultant at IBM, you will support clients with cybersecurity incident response, including forensic investigations, log analysis, and malware analysis. You will work both independently and with global teams to provide comprehensive incident response services, including pre-incident training and regular information sharing. This role requires strong communication skills and the ability to work in a Japanese-speaking environment.

📍 Location: Tokyo, JP (Remote/Hybrid)

💼 Career Level: Professional

🎯 Key Responsibilities

  • Support cybersecurity incident response in client environments, collaborating with global members as needed
  • Conduct on-site or online evidence collection
  • Perform technical investigations such as forensic analysis, log analysis, and malware specimen analysis
  • Provide advice on response prioritization, external disclosure, and other aspects to facilitate incident response
  • Hold progress meetings and final reporting sessions, creating reports with investigation conclusions and recommended measures
  • Provide pre-incident support through regular information sharing, relationship building with clients, and training such as tabletop exercises and technical hands-on sessions
  • Support proposal activities by introducing services and case studies to clients

✅ Required Qualifications

  • Experience in security incident response duties (triage, evidence collection, forensics, log analysis, malware analysis, report creation) for at least 2 years
  • IT and information security related work experience for at least 6 years
  • Communication and coordination skills with clients and related departments
  • English writing and reading communication skills (email, Slack) at a reference level of TOEIC L&R 700 or above, CEFR B1 or above

⭐ Preferred Qualifications

  • Experience in providing information security training (tabletop exercises, hands-on exercises, etc.)
  • Experience in building, operating, or incident response in cloud environments (AWS, Azure, GCP, etc.)
  • Experience in building, operating, or incident response in OT/ICS
  • CSIRT work experience in a business company
  • Technical support work experience
  • Analyst work experience in a SOC (Security Operation Center)
  • Threat intelligence related work experience
  • Experience leading an incident response team
  • Possession of certifications such as CISSP, GCIH, GCFA, GCFE, GREM, OSCP
  • Basic communication skills in languages other than Japanese and English (e.g., Chinese, Portuguese)

🛠️ Required Skills

  • Forensic analysis
  • Log analysis
  • Malware analysis
  • Evidence collection
  • Incident response
  • Communication skills
  • Coordination skills
  • English writing and reading
  • Japanese language proficiency

🎁 Benefits & Perks

  • Opportunity to work with a cybersecurity expert team with over 20 years of experience
  • Collaboration and interaction with other X-Force teams such as X-Force Red and X-Force Threat Intelligence
  • Support for a wide range of industries including manufacturing, finance, insurance, public sector, education, retail, and information communication
  • Ability to respond to incidents at overseas locations
  • Active support for training, certification, and conference participation
  • Remote work with the option for on-site visits as needed

Locations

  • Tokyo, JP, India (Remote)

Salary

Estimated Salary Rangemedium confidence

2,500,000 - 4,200,000 INR / yearly

Source: ai estimated

* This is an estimated range based on market data and may vary based on experience and qualifications.

Skills Required

  • Forensic analysisintermediate
  • Log analysisintermediate
  • Malware analysisintermediate
  • Evidence collectionintermediate
  • Incident responseintermediate
  • Communication skillsintermediate
  • Coordination skillsintermediate
  • English writing and readingintermediate
  • Japanese language proficiencyintermediate

Required Qualifications

  • Experience in security incident response duties (triage, evidence collection, forensics, log analysis, malware analysis, report creation) for at least 2 years (experience)
  • IT and information security related work experience for at least 6 years (experience)
  • Communication and coordination skills with clients and related departments (experience)
  • English writing and reading communication skills (email, Slack) at a reference level of TOEIC L&R 700 or above, CEFR B1 or above (experience)

Preferred Qualifications

  • Experience in providing information security training (tabletop exercises, hands-on exercises, etc.) (experience)
  • Experience in building, operating, or incident response in cloud environments (AWS, Azure, GCP, etc.) (experience)
  • Experience in building, operating, or incident response in OT/ICS (experience)
  • CSIRT work experience in a business company (experience)
  • Technical support work experience (experience)
  • Analyst work experience in a SOC (Security Operation Center) (experience)
  • Threat intelligence related work experience (experience)
  • Experience leading an incident response team (experience)
  • Possession of certifications such as CISSP, GCIH, GCFA, GCFE, GREM, OSCP (experience)
  • Basic communication skills in languages other than Japanese and English (e.g., Chinese, Portuguese) (experience)

Responsibilities

  • Support cybersecurity incident response in client environments, collaborating with global members as needed
  • Conduct on-site or online evidence collection
  • Perform technical investigations such as forensic analysis, log analysis, and malware specimen analysis
  • Provide advice on response prioritization, external disclosure, and other aspects to facilitate incident response
  • Hold progress meetings and final reporting sessions, creating reports with investigation conclusions and recommended measures
  • Provide pre-incident support through regular information sharing, relationship building with clients, and training such as tabletop exercises and technical hands-on sessions
  • Support proposal activities by introducing services and case studies to clients

Benefits

  • general: Opportunity to work with a cybersecurity expert team with over 20 years of experience
  • general: Collaboration and interaction with other X-Force teams such as X-Force Red and X-Force Threat Intelligence
  • general: Support for a wide range of industries including manufacturing, finance, insurance, public sector, education, retail, and information communication
  • general: Ability to respond to incidents at overseas locations
  • general: Active support for training, certification, and conference participation
  • general: Remote work with the option for on-site visits as needed

Target Your Resume for "X-Force Incident Response Consultant" , IBM

Get personalized recommendations to optimize your resume specifically for X-Force Incident Response Consultant. Takes only 15 seconds!

AI-powered keyword optimization
Skills matching & gap analysis
Experience alignment suggestions

Check Your ATS Score for "X-Force Incident Response Consultant" , IBM

Find out how well your resume matches this job's requirements. Get comprehensive analysis including ATS compatibility, keyword matching, skill gaps, and personalized recommendations.

ATS compatibility check
Keyword optimization analysis
Skill matching & gap identification
Format & readability score

Tags & Categories

ConsultingConsulting

Answer 10 quick questions to check your fit for X-Force Incident Response Consultant @ IBM.

Quiz Challenge
10 Questions
~2 Minutes
Instant Score

Related Books and Jobs

No related jobs found at the moment.