A career in IBM Software means you’ll be part of a team that transforms our customer’s challenges into solutions.
Seeking new possibilities and always staying curious, we are a team dedicated to creating the world’s leading AI-powered, cloud-native software solutions for our customers. Our renowned legacy creates endless global opportunities for our IBMers, so the door is always open for those who want to grow their career.
IBM’s product and technology landscape includes Research, Software, and Infrastructure. Entering this domain positions you at the heart of IBM, where growth and innovation thrive.
The IBM Asset Life Cycle Software team is looking for a technical, talented, innovative and enthusiastic Security and Compliance Tech Lead to lead and drive compliance, security awareness, training, applying best practices for secured development. Security is something that every development team needs to incorporate into every phase of their product development life cycle and the Security and Compliance Focal is expected to ensure security is built into the design, planning, implementation, and execution of our products.
The Security Tech Lead should continuously consider the attack vectors and security weaknesses within the product offering and provide solutions to remediate those. Should be Technical with understanding of Micro-services architecture, SaaS, Cloud Security and Infrastructure; Collaborate with all stakeholders to drive security solutions; Possess a growth mindset to keep up with the changing security landscape
Total working experience of 6+ yrs. 4+ yrs with designing/building SaaS offerings and 2+ yrs as a security tech lead
Domain expertise in cloud sw and infrastructure technologies.
Very good understanding in pen testing methodologies and exploits (web apps, containers, APIs, databases, operating systems, cloud technologies, etc).
Ability to communicate tech aspects to Executives, IT staffs, CISO team, auditors.
Experience with scripting languages (Shell, Python, Bash, etc.).
Familiarity with OWASP Top Ten, NIST, CIS and MITRE ATT&CK
Experience in successful driving & execution of compliance programs for common IT security stds/regulations.
Access Management – understand the concepts of need to know, least privilege, individual accountability, privilege access monitoring, access revalidation, etc.
Vulnerability Mgmt – be able to regularly scan your systems and remediate any vulnerabilities found within required time frames
Data Protection – understand the types of data services deal with and have measures in place to protect that data (e.g. encryption, file permissions, etc.)
Configuration Mgmt – understand how to securely harden a system or application upon deployment
Health Checking – know how to check that a system/application is configured correctly on an ongoing basis and remediate any issues
Logging & Monitoring – ensure there is a process in place to store key logs with data integrity in place to protect those logs and independently monitor the logs for any unusual activity
Change Management – understand & follow the discipline of change management to ensure that changes to systems, applications and environments are properly planned and vetted to avoid disruption to their service
Business Continuity – understand the business continuity requirements and actively participate in its planning
Risk Management – understand the gaps in compliance or areas of risk that need to be analyzed & addressed either by remediation activities or formal Risk Evaluations to ensure mitigation, executive awareness, and approval
Audits –support audits by providing evidence or being interviewed as required
Common Attack Patterns – know what the common attack vectors facing the industry (e.g. CWE 25 or OWASP Top 10), be able to describe an attack with an example, describe what a successful exploitation/impact looks like, and what best practice remediation is.
Certifications / Credentials – CISSP (preferred), CCNP/CCIE (preferred), CCSP, CISA/CRISC/CISM.