A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe. You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio.
As a Security Consultant, you'll unleash your exceptional technical prowess to gather and analyze business and technical requirements, skillfully crafting and implementing resilient Enterprise-wide Access Management processes and procedures.
As an esteemed member of our collaborative advisory team, your pivotal contribution will be crucial in establishing comprehensive security measures, ensuring the safeguarding of our clients' invaluable intellectual property and assets.
Your responsibilities may encompass:
Work as a team member with client personnel and other IBM teams to identify functional requirements and subsequently working with or in some instances leading others in the identification, justification and design of the client's solution.
Participate in a wide range of design activities, from requirements analysis through systems, application and/or process design specification and implementation.
Gain knowledge across multiple platforms, processes or architectures
This job can be performed from anywhere in the US.
Familiarity with network design, network security, authentication, authorization techniques, and encryption protocols and standards.
Experience in one or more of the following security domains: Security Intelligence & Operations Consulting (SIOC); Data Security; Identity & Access Management, Infrastructure and Endpoint Security (IES), and/or Security Strategy Risk and Compliance (SSRC).
Exposure to software tools such as Java, Python, C/C++, Java, Ruby, GO, Golang or bash, C#; Sharepoint; Software code Testing and Test Automation is helpful.
Familiarity with network security tools for vulnerability scanning, network monitoring, network sniffing, routers, firewalls, Intrusion detection and protection, anomaly detection and encryption standards.