The Cyber Security Incident Response Team (CSIRT) Member conducts essential cyber security incident handling activities for Covestro. This is accomplished by conducting event and incident analysis, and coordinating incident containment and remediation actions. In addition, the CISRT team member is instrumental in cyber threat and vulnerability analysis and response coordination. The jobholder will be responsible for interfacing with the Covestro Security Operations Center to receive alerts and determine appropriate action. Further, the CSIRT members shape detection criteria and consult on SOC operational guidelines. This role includes cybersecurity incident response across the Covestro enterprise. The jobholder has the authority to initiate the IT Security Incident Management Process, and to brief all levels of executive management on security topics and to execute emergency responses during cybersecurity breaches.
Major tasks and responsibilities
Serve as a technical resource for cyber security incident handling
Provide qualified guidance on and coordinate execution of identification, analysis, response and monitoring of cyber threat and vulnerabilities
Monitor and consult on technical vulnerability remediation
Incident Management and Monitoring
Manage Security incidents.
Assist in developing concepts for efficient and effective security response activities.
Be a trusted point of contact and expertise for incidents, and manage all the incident response activities including escalation to upper management..
Provide qualified guidance on SOC alerting conditions and necessary data sources
Note: this role requires some on-call duty, with expected weekend responsibilities (once per 9 weeks)
Analyze and interpret results of vulnerability management activities using standard frameworks (CVSS)
Research and investigate new and emerging vulnerabilities, to include 0Day events
Identify and resolve false positive findings in assessment results
Assess compensating controls and validate their effectiveness
Partner with stakeholders to streamline, standardize and document vulnerability remediation procedures
Monitor vulnerability remediation activities
Integrate information from disparate sources and create tactical intelligence that is relevant to protecting the business.
Research and investigate new and emerging cyber threats and vulnerabilities through participation in external security communities.
Manage relationships with global stakeholders to identify business needs and design appropriate security controls.
Analyze and interpret threat information using standard frameworks (Cyber Kill Chain, MITRE ATT&CK framework)
Other Areas of Effort
Support the achievement of the Global IT Strategy
Additional Job Description
Master’s degree in information assurance (or related field) with minimum 4 years’ experience in incident handling or B.S in Information security (or related field) with minimum of 6 years’ experience in incident handling
Experience with identifying, analyzing, and communicating cyber threat and vulnerability information
Experience applying threat and vulnerability analyses models, including the LM Cyber Kill Chain, the Diamond Model of Intrusion Analysis, the MITRE ATT&CK Framework and the Common Vulnerability Scoring System (CVSS)
Understanding of ITIL/ service management concepts
Expertise of security concepts and best practices related to incident management, threat and vulnerability management
Exemplary verbal and written communication skills (English business fluent spoken and written)
Demonstrated ability to think strategically and perform detailed, complex analysis and data interpretation
Effective interpersonal skills, out-of-the-box thinking and ability to interface with all levels of staff
Ability to work under pressure and deal with ambiguous situations
Ability to travel globally
Experience in a global corporation
Experience with incident response across a multi-provider cloud environment
SANS Certified Incident Handler, CERT-Certified Computer Security Incident Handler certification or equivalent
Familiarity with Splunk and the CrowdStrike Falcon platform