Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

IBM Security Consultant - Strategy & Risk 
Argentina, Autonomous City of Buenos Aires, Buenos Aires 
717871723

08.05.2024

Your Role and Responsibilities

Manage the life cycle of the client’s digital identities, in accordance with the current definition of roles and profiles, where collaborators have the minimum and necessary permissions to carry out their functions, guaranteeing the security of the different environments.

  • Execute the Access Management processes and procedures, guaranteeing the life cycle of the entity’s collaborators.
  • Maintain a record of users defined for each role / profile (Identity Manager).
  • Analyze and resolve ABM requirements of users, roles and functions.
  • Develop and implement automations/integrations that reduce operational tasks within the team (Scripts, Integrations, RPA).
  • Improve Logical Access Management processes and procedures, through the identification of improvements, making proposals that generate value and operational efficiency.
  • Comply with the audit requirements assigned to you and regularize the observations arising from the reports of the different control entities.
  • Execute the periodic access recertification process, which allows revalidation of current definitions in terms of access to applications.
  • Ensure that the area’s supporting documentation is updated.
  • Provide advice to different areas on identity management and connectivity.
  • Carry out approvals of new applications or platforms to be acquired by the organization.

Infrastructure Security consulting and managed services (FW management, Endpoint, WAF, Microsegmentation and network security, CSPM, etc.)
ISO 27001 and 27002 standards, as well as the administration
Management and development of the cybersecurity regulatory framework.
Experience in IT audits, risk control and assessment, asset classification, logical access control and cybersecurity awareness.
Knowledge of NIST Cybersecurity framework
Knowledge of OWASP
Project documentation
Knowledge of vulnerability management and risk detection
Knowledge and experience in Cloud environments (Azure, AWS)
Knowledge of security administration of Linux and Windows platforms
Security concepts in Networking, databases, operating systems, VPN’s