Skill: endpoint security , epo , vulnerability , ids / ips , guardium , unix , security , database , linux , penetration testing , vulnerability management , windows , infrastructure , ethical hacking , infrastructure security; Exp: 0-3 years; Job Description About IBM IBM has been present in India since 1992. IBM India’s solutions and services span all major industries including financial services, healthcare, government, automotive, telecommunications and education, among others. As a trusted partner with wide-ranging service capabilities, IBM helps clients transform and succeed in significant circumstances. The diversity and breadth of the entire IBM portfolio of research, consulting, solutions, services, systems and software, rarely distinguishes IBM India from other companies in the industry. Our Culture IBM is committed to crafting a diverse environment and is proud to be an equal opportunity employer. You will receive consideration for employment without regard to your race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. We are committed to compliance with all fair employment practices regarding citizenship and immigration status Business Unit Introduction The Chief Information Officer organization plays a key role in IBMs ability to turn vision to reality by making the environments simpler, more intuitive and more effective. Its work is all about enabling IBM’s strategy by giving IBMers the modern tools they need to do their work, be responsive to its Clients, and to act with speed and agility. Who you are As Security Architect you will Working solutions to build, test and measure the security technology solutions to dedicatedly monitor application, infrastructure and people areas. What you’ll do You will understand the Security policy requirements, transform them in to workable solutions and build and test the solutions. Your role requires a dedicated approach where any potential risks on the respective domain needs to be detected and required actions to be taken to mitigate the potential security incidents. Your role expected to demonstrate complete technical ownership of the respective security platforms being handled. You will analyze the different testing processes and bring in automation in testing and reporting. You will design and build tools and processes around dedicated testing and also participate in requirement gathering, implementation and direct the different teams on tools usage. You will Get along with different organizational units to ensure the security solution implemented is working properly up to the company security requirements, raise any issues, risks, and call out as needed. Revise and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in overall processes. . How well help you grow Youll have access to all the technical and management training courses o to become the expert you want to be Youll learn directly from authority developers in the field; team leads love to mentor You have the opportunity to work in many different areas to determine really excites you Required Technical and Professional Expertise Understanding of enterprise level application and infrastructure security fundamentals and associated technologies Knowledge on App and infrastructure penetration testing, knowledge on tools like Kali Linux, burp suite, vulnerability management tools like AppScan, Qualys, McAfee vulnerability manager, Contrast etc. Deep understanding of System, Network and endpoint security technologies like WAF (Web Application Firewalls like Signal sciences, KONA, etc), in Firewalls, IDS/IPS, ePO, Database transaction monitoring tools (McAfee, Guardium, Symantec products). General understanding of Network, Systems, Databases, and Middleware components and their basic hardening configuration. Knowledge tools like AppScan, Qualys, McAfee vulnerability manager, Contrast etc. Good understanding of analyzing the vulnerabilities and remediation approach on infrastructure and middleware components. Preferred Tech and Prof Experience Application and infrastructure penetration testing Ethical hacking methodologies and using of Ethical hacking tools. Knowledge on Application, Middleware and Database technologies. Understanding of Unix, Windows Operating systems and scripting. Soft Skills Excellent organizational skills, Analytical and good attention to detail Problem solver, Decision-making and influence others Process documentation and Excellent reporting skills Self-motivated individual who can work under their own direction towards agreed targets/goals Ability to deal with change and be open to it Good time management and an ability to work under stress Superb communication and interpersonal skills Standout colleague and accept agile working methodologies. EO Statement IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
Function: IT Software : Software Products & Services