Application close date
05/16/2026
Title
Cybersecurity Event Monitoring and Incident Response Consultant
ToR AI Generator Link
Use the AI TOR Generator to draft a new TOR or enhance your current version with clearer structure and language.
1. Project Background
Asian Infrastructure Investment Bank (AIIB) is a multilateral development bank with a mission to improve the social and economic outcomes in Asia. As the bank is growing and many business applications go-live, more and more cybersecurity monitoring and defense systems have been deployed to safeguard bankâs business applications and operations. Alerts and signals generated from monitoring systems or reported by end users, need to be triaged and further analyzed to confirm if they are actual threats and attacks to the Bank. Therefore, in addition to AIIBâs own resources, it will be greatly beneficial to involve external professionals to support and execute real time monitoring, triage, and incident investigation. It is a daily operation type of work and may involve work outside regular working hours.
2. Objectives of the Assignment
The qualified Cyber Security Event Monitoring and Incident Response Consultant will focus primarily on daily real time monitoring and analysis of cybersecurity alerts/signals from multiple sources, be the first point of contact for Cybersecurity incident and responsible for incident investigation and response activities including conduct forensic analysis (Tier 3 Analyst). The consultant will play a crucial role in strengthening the Bank's cybersecurity posture and ensuring the protection of digital workplace and business applications.
3. Scope of Services
1. Cybersecurity Operations: - Perform daily real time monitoring review and analysis of cybersecurity alerts/signals from multiple sources.- Triage security incidents including social engineering attacks, malware, hacking, unauthorized access, data breach, business email compromise etc.- Ensure incident documentation and handling is completed accurately within the case management system.- Refine current use cases implemented on the security stack to reduce/minimize false positives.- Create and maintain corresponding cybersecurity incident handling books- Support the improvement of related cybersecurity operations technologies 2. Digital Forensics and Incident Response:- Act as a first point of contact for cybersecurity incidents escalated by the Managed Security Services vendor and take responsibility end-to-end for incident investigation and response activities - Conduct forensic analysis to determine cause and extent of breach (where applicable)- Work together with various IT and business stakeholders to restore business operations with minimal impact efficiently. - Recommend remediation/recovery plans- Prepare timely, detailed and accurate incident report update3. Reporting:- Participating in the development, editing and reviewing various IT Security reports such as weekly and monthly security reports, business supporting reports, regular cybersecurity reports, threat alerts etc. - Provide post-incident reports for management and stakeholders encompassing easy to understand details on risk and impact, containment, remediation and threat actors etc.4. Other agreed cybersecurity related assignment- Performs other duties and responsibilities as assigned or required.
3. Scope of Services (Continued)
(No Value)
4. Consultancy Output / Deliverables
- Daily hands-on cybersecurity operation service delivery- Cybersecurity monitoring daily records, weekly and monthly reports- Cybersecurity incident reports and forensics reports where applicable- Up-to-date SIEM use cases- Up-to-date Cybersecurity incident handling books- Project delivered with all the required project management documentation.- Other agreed cybersecurity related deliverables.
4. Consultancy Output / Deliverables (Continued)
(No Value)
5. Implementation Arrangement
Perform related duties as assigned
5. Implementation Arrangement (Continued)
(No Value)
6. Support to the Consultant by the Bank
Laptop, Network
7. Knowledge Transfer and Training
n/a
Qualification Requirement
- Proven domain expertise in cyber defense with intensive hands-on experience.- Knowledge of security protection for digital workspace, hybrid cloud and business applications such Microsoft 365, Azure, AWS etc.- Knowledge of security and monitoring products such as firewall, EDR, IDS/IPS, Sandbox, Anti-Malware, SIEM, DLP, etc.- Familiar with popular operating systems such as Windows, Linux, macOS, etc.- Bachelorâs degree or higher in Computer Science, Information Technology, Computer Programming, Information Security, etc. Equivalent combination of education and experience is acceptable.- Familiar with programming or scripting languages such as Python, Power Shell, Unix Shell, SQL etc. is a plus. - At least three (3) yearsâ experience in cyber security operations, digital forensics and incident response and/or cyber security engineering.