IBM i2 Analyst Notebook - Technical Sales Threat Intelligence Analyst in San Jose, California

Job Description

We live in a moment of remarkable change and opportunity. Threat intelligence continues to be at the front of Federal and corporate spending. The threat intelligence market is evolving and growing, incorporating analysis of internal and external data sources to aggressively seek threats in the commercial enterprise or Federal/State/Regional agency that have not yet been exposed to regular analysis.

These continually changing threats builds a significant opportunity as an i2 Technical Sales Threat Intelligence Analyst with the IBM i2 Security team. The Sales Threat Intelligence Analyst will

Job Responsibilities:

  • Define and execute a business and solution strategy based on a demonstrated understanding of the threat Intelligence market and customer needs.

  • Support sales opportunities through business proposals/business cases to related to Threat Intelligence products.

  • Define market requirements and detailed solution requirements which you work with the engineering team.

  • Develop positioning, value propositions benefit statements, solution and marketing messages for Threat Intelligence offerings for your market.

  • Work closely with a cross functional matrix team of marketing, sales, services, engineering, to ensure business and product strategy execution is tightly coordinated to support Threat Intelligence offerings in your market.

  • Understand other IBM solutions, such as, IBM Security, IBM Watson and IBM Information Management to use industry leading IBM capabilities to strengthen Threat Intelligence solutions.

  • Be the WW SME for all audiences (internal and external) around threat issues, threat solutions, threat industry trends, and competition.

  • Support sales opportunities by crafting and validating a threat intelligence security architecture to satisfy a client business use case.

Required Technical and Professional Expertise

Technical Requirements: (5+ years experience for all)

  • Able to work with large data sets, and transform them in ways that are better suited for analysis, and to extract meaningful information.

  • Experience with IBM i2 or the like analysis tools as an analyst (law enforcement, national security, commercial).

  • Ability to enable threat intelligence analysts to hunt for malicious behavior and to come up with ways to detect, deter and prevent attacks.

  • Able to do threat modeling and conduct threat investigations / have a investigative mind-set.

Preferred Tech and Prof Experience

Preferred Professional: (5+ years experience for all)

  • Ability to translate high level market requirements into detailed solution requirements which drive a development stream of work to deliver on a product roadmap that is meeting market and customer needs.

  • Data and analysis skills to drive pricing proposals and do customer trend analysis.

  • Ability to translate technical value into business value.

  • Familiarity with enterprise software systems and their deployment.

  • The successful candidate will have a demonstrated balance of business strategy and vision combined with attention to detail in execution.

  • Self-starter and confident to be the leader of your domain and ability to set and achieve realistic goals.

  • Comfortable in undefined environments where you set the direction and leading teams that are matrix and not in a direct reporting line.

  • Demonstrated presence and credibility in Cyber intelligence domain.

EO Statement

IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.