In this role, you'll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology.
A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe.
You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat.
Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience.
As a Cybersecurity Consultant, you'll unleash your exceptional technical prowess to gather and analyze business and technical requirements, skillfully crafting and implementing resilient Enterprise-wide Security Management processes and procedures.
As an esteemed member of our collaborative advisory team, your pivotal contribution will be crucial in establishing comprehensive security measures, ensuring the safeguarding of our clients' invaluable intellectual property and assets. Your responsibilities may encompass:
- Work as a team member with client personnel and other IBM teams to identify functional requirements and subsequently working with or in some instances leading others in the identification, justification and design of the client's solution.
- Participate in a wide range of design activities, from requirements analysis through systems, application and/or process design specification and implementation
- Gain knowledge across multiple platforms, processes or architectures
- Experience in one or more of the following security domains: Security Operations Consulting (SOC); Vulnerability Management, Threat Intelligence, Malware Reverse Engineering, Digital Forensic & Incident Response, Security Information & Event Management, Infrastructure and Endpoint Security (IES), and/or Security Strategy Risk and Compliance (SSRC).
- Exposure to software tools such as Java, Python, C/C++, Java, Ruby, GO, Golang or bash, C#; Sharepoint; Software code Testing and Test Automation is helpful.
- Familiarity with network design, network security, authentication, authorization techniques, and encryption protocols and standards.
- Exposure to different Security Assessment tools (NMAP, Nessus, Metasploit, Netcat)
- Familiarity with network security tools for vulnerability scanning, network monitoring, network sniffing, routers, firewalls, Intrusion detection and protection, anomaly detection and encryption standards.
- Security certifications
- Knowledge in Network Design and Security, Web or Custom Application Development, Mobile Development, Software Engineering, Identity and Authentication Technology.