Security Consultant

  • Consulting
  • Entry Level

Security Consultant

  • Consulting
  • Entry Level

Introduction
Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client’s organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.

Your Role and Responsibilities
The Security Consultant role is key part of the SOC.

  • Responsible for conducting incident response operations according to documented procedures and industry best practices.
  • Able to interact with executive levels throughout the company.
  • Must have extensive experience in multiple security areas such as SIEM, EDR, XDR, ASM, IDS, APT, and WAF.
  • Will be required to participate in multiple intelligence communities and be able to disseminate pertinent informationthroughout the SOC.
  • Ideal candidates should have extensive experience in Linux and Windows operating systems, deep knowledge of networking and attack methods such as SQLi and pivoting.
  • Enthusiasm and interest in Information Security must be displayed.

APIWD24

Required Technical and Professional Expertise

  • Knowledge of network security zones, Firewall configurations, IDS policies
  • Knowledge of systems communications from Layer 1 to 7
  • Experience with Systems Administration, Middleware, and Application Administration
  • Experience with Network and Network Security tools administration
  • Knowledge of log formats and ability to aggregate and parse log data for syslog, http logs, DB logs for investigation purposes.
  • In-depth experience with log search tools such as HP Arcsight, Splunk, usage of regular expressions and natural language queries
  • Ability to make create a containment strategy and execute.


Preferred Technical and Professional Expertise

  • Intrusion Detection in Depth – SEC503 (GCIA certification) or equivalent
  • Hacker Techniques, Exploits & Incident Handling – SEC504 (optional GCIH certification) or
  • equivalent.
  • GIAC Continuous Monitoring (optional GMON certification) or equivalent
  • Advanced digital forensics and Incident Response – FOR 508 (Optional GCFA certification) or equivalent

Recommended

  • Computer Forensic Investigation such as Windows Forensic Analysis FOR408 – (Optional
  • GCFE certification)
  • Perimeter Protection in Depth – SEC502 (optional GCFW certification)
  • Advanced Security Essentials – SEC501 (optional GCED certification

想知道成为IBMer是种什么感觉吗?


About IBM

IBM’s greatest invention is the IBMer. We believe that through the application of intelligence, reason and science, we can improve business, society and the human condition, bringing the power of an open hybrid cloud and AI strategy to life for our clients and partners around the world.

Restlessly reinventing since 1911, we are not only one of the largest corporate organizations in the world, we’re also one of the biggest technology and consulting employers, with many of the Fortune 50 companies relying on the IBM Cloud to run their business.

At IBM, we pride ourselves on being an early adopter of artificial intelligence, quantum computing and blockchain. Now it’s time for you to join us on our journey to being a responsible technology innovator and a force for good in the world.

主要职位详细信息

没有看到合适的岗位?

不要担心。加入我们的人才网络,获得有关最新机会的新闻。