In this role, you’ll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology.
Your Role and Responsibilities
As an entry level Security Consultant, you’ll unleash your exceptional technical prowess to gather and analyze business and technical requirements, skillfully crafting and implementing resilient Enterprise-wide Access Management processes and procedures.
As an esteemed member of our collaborative advisory team, your pivotal contribution will be crucial in establishing comprehensive security measures, ensuring the safeguarding of our clients’ invaluable intellectual property and assets. Your responsibilities may encompass:
- Work as a team member with client personnel and other IBM teams to identify functional requirements and subsequently working with or in some instances leading others in the identification, justification and design of the client’s solution.
- Participate in a wide range of design activities, from requirements analysis through systems, application and/or process design specification and implementation.
- Gain knowledge across multiple platforms, processes or architectures
Required Technical and Professional Expertise
- Knowledge of network security zones, Firewall configurations, IDS policies
- Knowledge of systems communications from Layer 1 to 7
- Experience with Systems Administration, Middleware, and Application Administration
- Experience with Network and Network Security tools administration
- Knowledge of log formats and ability to aggregate and parse log data for syslog, http logs, DB logs for investigation purposes.
- In-depth experience with log search tools such as HP Arcsight, Splunk, usage of regular expressions and natural language queries
- Ability to make create a containment strategy and execute.
Preferred Technical and Professional Expertise
- Intrusion Detection in Depth – SEC503 (GCIA certification) or equivalent
- Hacker Techniques, Exploits & Incident Handling – SEC504 (optional GCIH certification) or equivalent.
- GIAC Continuous Monitoring (optional GMON certification) or equivalent
- Advanced digital forensics and Incident Response – FOR 508 (Optional GCFA certification) or equivalent
Recommended
- Computer Forensic Investigation such as Windows Forensic Analysis FOR408 – (Optional GCFE certification)
- Perimeter Protection in Depth – SEC502 (optional GCFW certification)
- Advanced Security Essentials – SEC501 (optional GCED certification)