#1 Job Board for tech industry in Europe

  • Job offers
  • Incident Response Senior Analyst (GCO)
    Security

    Incident Response Senior Analyst (GCO)

    Kraków
    Type of work
    Full-time
    Experience
    Senior
    Employment Type
    Permanent
    Operating mode
    Hybrid

    Tech stack

      Cybersecurity

      advanced

      Security

      advanced

      English

      advanced

      Windows

      advanced

      Linux

      advanced

    Job description

    Some careers shine brighter than others.

    If you’re looking for a career that will help you stand out, join HSBC, and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further.


    Your career opportunity


    Global Cybersecurity Operations (GCO) provides a coordinated suite of “Network Defense" services responsible for detecting and responding to information and cybersecurity threats to HSBC assets across the globe and is under the management of the Head of Global Cybersecurity Operations. This includes dedicated functions for the Monitoring and Detection of threats within the global estate as well as Cybersecurity Incident Management and Response activities. These two principal functions are supported by additional internal GCO capabilities in; Cyber Intelligence and Threat Analysis, Security Sciences and Client Engagement and Support Services. Critical to the success of GCO is it close partnership with sister Cybersecurity teams, IT Infrastructure Delivery, and Global Business and Function clients. The overall GCO mission is placed under the purview of the Group Chief Information Security Officer (CISO).


    The Cybersecurity Incident Management and Response Team is charged with efficiently and effectively handling all information and cybersecurity incidents across the Group on a 24x7 basis. This mission is critical to the protection of HSBC customers, the HSBC brand, shareholder value as well as HSBC information and financial assets.


    The Incident Management and Response function is further organised into two primary missions:


    • Incident Management: The coordination and orchestration of technical response activities across the globe, the timely and effective communication of the aforementioned to Global Business and Function stakeholders, Senior Executive Leadership and regulatory bodies.


    • Incident Response: Conducting technical and forensic investigations into matters raised through alerts, intelligence, testing activities and end user reports that lead to a coordinated effort to effectively contain, mitigate and remediate active and potential attacks.


    What you’ll do


    • Perform the technical and forensic investigations into cyber security events across the globe, taking responsibility for the timely identification of cyber-threats and where possible, minimising further risk to HSBC’s information assets and services.
    • Carry out post-incident reviews, assessing the effectiveness of controls, detection and response capability and supporting the required improvements with the responsible owners.
    • Perform the forensic services for the collection, processing, preservation, analysis, and presentation of evidence in support of vulnerability mitigation and information security incident investigations.
    • Maintain a strong awareness of technology trends and industry best practice, to enable the provision of informed advice and guidance to HSBC Business functions and HSBC IT.
    • Collaboration with the wider GCO teams (and wider business/function teams where applicable) in the production and maintenance of efficient and effective incident response playbooks.
    • Support the Identification, development and implementation of new detections (Use cases).
    • Develop and defining detailed processes and procedures to manage the response to cyber security events.
    • Directly contribute to the continued technical enhancement of the security platforms.
    • Support the continued evolution of incident response and forensic capabilities and processes, including automation and orchestration.
    • Train and develop other members of the Incident Management and Response team as well as other members of the Global Cybersecurity Operations function.
    • Support a “self-critical" culture whereby identification of weaknesses in the bank’s control plane (people, process and technology) are brought to light in an effective manner and addressed.
    • Support a culture of individual self-improvement whereby staff are expected to maintain subject matter expertise within their area of focus and within the realm of cybersecurity more broadly.
    • Support engagement of Global Businesses and Functions everywhere HSBC does business that drives a global up-lift in cybersecurity awareness helping to “tell the story" of HSBC Cybersecurity efforts.
    • Production of Management Information related to the CSIRT mission that is appropriate to the target audience, supported by data and experienced analysis enabling informed decisions.


    What you need to have to succeed in this role


    • 5+ years of experience in incident response and/or computer forensics.
    • Formal education and advanced degree in Information Security, Cyber-security, Computer Science or similar.
    • Extensive experience within an enterprise scale organisation; including hands-on experience of complex data centre environments, preferably in the finance or similarly regulated sector.
    • Industry recognised certifications including, but not limited to; CEH, CRISC, GSEC, GCIA, and/or CISSP.
    • Industry recognised cyber security related certifications, reflecting forensics competence and associated tooling. You should have at least one core forensics certification and/or one associated tooling certification from the list below or similar industry recognised accreditation/experience:
    • Core forensics certifications (GCFA, GNFA, GASF, GCFE, CCE, GCIH, CFSR, CHFI)
    • Tooling certification (EnCE, CBE, ACE, CCPA)
    • Excellent knowledge and demonstrated experience of common cybersecurity technologies such as; IDS / IPS / HIPS, Advanced Anti-malware prevention and analysis, Firewalls, Proxies, MSS, etc.
    • Excellent knowledge of common network protocols such as TCP, UDP, DNS, DHCP, IPSEC, HTTP, etc. and network protocol analysis suits.
    • Excellent knowledge of common enterprise technology infrastructure, platforms and tooling, including; Windows, Linux, infrastructure management and networking hardware.
    • Excellent knowledge and demonstrated experience in common cybersecurity incident response and forensic investigation tools such as: EnCase, FTK, Sleuthkit, Kali Linux, IDA Pro, DEFT, SANS SIFT, etc.
    • Very good knowledge and demonstrated experience in analysis and dissection of advanced attacker tactics, techniques and procedures in order to inform adjustments to the control plane.
    • Very good knowledge and demonstrated experience of common log management suites, Security Information and Event Management (SIEM) tools, use of “Big Data” and Cloud-based solution for the collection and real-time analysis of security information. 
    • Good knowledge of common mobile platforms, such as Blackberry, iOS, Android and Windows.
    • Good knowledge of scripting, programming and/or development of bespoke tooling or solutions to solve unique problems.
    • Some knowledge and technical experience of 3rd party cloud computing platforms such as AWS, Azure and Google.
    • An understanding of business needs and commitment to delivering high-quality, prompt and efficient service to the business.
    • An understanding of organisational mission, values and goals and consistent application of this knowledge.
    • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one.
    • An ability to perform independent analysis of complex problems and distill relevant findings and root causes.
    • An ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily-understood, authoritative and actionable manner.
    • A team-focused mentality with the proven ability to work effectively with diverse stakeholders.
    • Self-motivated and possessing of a high sense of urgency and personal integrity.
    • Highest ethical standards and values.
    • Good understanding of HSBC cyber security principles, global financial services business models, regional compliance regulations and applicable laws.
    • Good understanding and knowledge of common industry cyber security frameworks, standards and methodologies, including; OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines, CIS and NIST standards.
    • Proven ability and experience of working in a high-pressure, fast paced environment where bold, time critical decision making is essential.
    • Proven experience in identifying and responding to advanced attacker methodologies both within the corporate environment as well as external attack infrastructures, ideally with offensive experience and / or deception environment development (tripwire systems, honeypots, honey-token/accounts, etc.) using open source, vendor purchased and bespoke/in-house developed solutions.
    • Proven experience in crisis management, crisis response frameworks and communications. Ability to produce complex reports containing technical information, communicating this clearly to a non-technical audience.
    • Experience producing forensic analysis reports, detailing findings of the analysis and clearly documenting processes and techniques employed. 
    • Ability to speak, read and write in English.


    What we offer


    • Competitive salary
    • Annual performance-based bonus
    • Additional bonuses for recognition awards
    • Multisport card
    • Private medical care
    • Life insurance
    • One-time reimbursement of home office set-up (up to 800 PLN).


    • Corporate parties & events
    • CSR initiatives
    • Nursery and kindergarten discounts
    • Language classes
    • Financial support with trainings and education
    • Social fund
    • Flexible working hours 
    • Free parking


    If your CV meets our criteria, you should expect the following steps in the recruitment process:


    • Online behavioural test
    • Telephone screen
    • Zoom interview with the hiring manager



    We are looking to hire as soon as possible so don’t wait and apply now!

    You'll achieve more when you join HSBC.


    Check similar offers

    OT Security Engineer

    New
    emagine Polska
    8K - 13.3K USD
    Warszawa
    , Fully remote
    Fully remote
    OT Endpoint solutions
    Firewall technologies
    OT network security

    Cloud Security Architect

    New
    Alior Bank SA
    Undisclosed Salary
    Warszawa
    Google Cloud Platform
    Entra ID
    Microsoft Azure

    Security Engineer

    New
    Experis Manpower Group
    7.44K - 8.26K USD
    Warszawa
    , Fully remote
    Fully remote
    English
    Security standards
    security assessment tools

    Senior IT Security Consultant

    New
    Jit Team
    4.67K - 6.71K USD
    Kraków
    , Fully remote
    Fully remote
    IT Security

    Application Security Analyst

    New
    ER Group
    4K - 5K USD
    Belgrad
    Security
    IT Security