Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

IBM Security Consultant Intelligence & Operations 
India, Karnataka, Bengaluru 
30495454

18.12.2024

In this role, you’ll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world.​ Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology.


Your Role and Responsibilities

  • The ability to be a team player
  • The ability and skill to train other people in procedural and technical topics
  • Strong communication and collaboration skills


Required Technical and Professional Expertise

  • Minimum 7 years’ experience in Information Security & Reviewing security products and technologies (ex: Breach & Attack simulation, EDR, SIEM, Zero Trust) & conducting POC on themImplemented Clean Code principles, Junits
  • Should be able to design end to end use-cases for building solution in any of these products, & converting the use-cases into architecture
  • Reviewing network architecture and determining if good practices are being followed (e.g., the “zones & conduits” concept, proper network segmentation, use of Industrial DMZ, etc.); and providing recommendations to comply with applicable cybersecurity framework.


Preferred Technical and Professional Expertise

  • Develop and design POC use-cases, implement the products and demo to showcase initial working impressions. Work with multiple teams to show case new technologies that were taken up as part of new initiatives and deliver a working POC and demo
  • Good experience in any two-sub domain of Infrastructure Security Architecture and Solution Design
  • Experience in cloud technologies (e.g., AWS, Azure) and strategies for securing cloud infrastructure and applications.Certifications such as ESA, CASP, CISSP, SANS Defensible Security Architecture, etc. are added advantage