More jobs:
Job Description & How to Apply Below
Who We Are
At Kyndryl, we run and reimagine the mission-critical technology systems that drive advantage for the world's leading businesses. We are at the heart of progress; with proven expertise and a continuous flow of AI-powered insight, enabling smarter decisions, faster innovation, and a lasting competitive edge. For our people-Kyndryls-that means doing purposeful work that powers human progress. Join us and experience a flexible, supportive environment where your well-being is prioritized and your potential can thrive.
The Role
Are you passionate about protecting companies from cyber threats? Do you want to be part of a team that safeguards the digital assets of cutting-edge organizations? Look no further - Kyndryl is seeking a Cybersecurity Specialist to join our team of talented Technical Specialists.
As a Cybersecurity Specialist, you will be at the forefront of protecting Kyndryl's customers' computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. You will use a variety of tools and techniques to defend against a wide range of cyber threats, such as malware, ransomware, phishing attacks, and data breaches.
But that's not all - at Kyndryl, you will also have the opportunity to implement new cybersecurity systems and policies to ensure the protection of our customers' data and assets. You will monitor and review potential threats from various cybersecurity systems and conduct proof-of-concepts (POCs) with new cyber security software to evaluate its effectiveness and potential integration into the organization's systems.
Not only will you be responsible for ensuring the security of Kyndryl's customers' network and systems, but you will also enrich the organization's knowledge towards potential cyber threats and best practices. You will provide automation scripts for threat hunting in customer environments using lessons learned from Cyber-attacks.
You will also have the opportunity to conduct penetration testing and threat and vulnerability assessments of applications, operating systems, and networks, responding to cybersecurity breaches and identifying intrusions. You will research and evaluate cybersecurity threats and perform root cause analysis, all while assisting in the creation and implementation of security solutions.
Additionally, you will have the opportunity to work in the area of security innovation, creating and experimenting with "outside the box" ideas that could change the trajectory of cyber security.
This is a unique opportunity to work with cutting-edge technology, be part of a dynamic team, and make a significant impact in the world of cybersecurity. If you're up for the challenge, apply now to join Kyndryl's cybersecurity team!
Your Future at Kyndryl
Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won't find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here.
Who You Are
You're good at what you do and possess the required experience to prove it. However, equally as important - you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused - someone who prioritizes customer success in their work. And finally, you're open and borderless - naturally inclusive in how you work with others.
Required
Skills and Experience:
Need 3 to 6 years experience.
The SOC L2 Analyst cum Shift Incident Manager plays a dual role: as a senior technical expert, handling complex security incidents and as the shift lead responsible for managing SOC operations during their assigned shift. This role is critical in ensuring 24x7 incident response, operational continuity, and escalation governance.
Investigate and resolve escalated security incidents from L1 and L2 analysts.
Perform deep-dive forensic analysis, triage, and root cause analysis (RCA) for critical and high-severity incidents
Monitor the health and performance of SIEM infrastructure and security sensors.
Tune and manage SIEM rules, correlation logic, and detection use cases.
Coordinate with OEM vendors for platform issues or advanced threat resolution
Act as the Incident Manager for the shift, overseeing all incident response activities and ensuring SLA adherence
Lead shift handover meetings and maintain continuity across shifts.
Assign tasks to L1/L2 analysts and ensure proper documentation in ITSM tools (e.g., Service Now)
Escalate unresolved or critical issues to the SOC Manager or CDC Head as needed
Maintain shift logs, incident metrics, and RCA documentation.
Conduct training sessions and contribute to skill…
Position Requirements
5+ Years
work experience
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×