IntroductionAt IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, lets talk.Your Role and Responsibilities**Job Description:**The IBM Cloud Platform Services team is looking for a technical, talented, innovative and enthusiastic Security and Compliance Architect to lead and drive compliance, security awareness, training, applying best practices for secured development across our growing portfolio of next generation features for IBM Cloud.Security is something that every development team needs to incorporate into every phase of their product development life cycle and the Security and Compliance Focal is expected to ensure security is built into the design, planning, implementation, and execution of our network services.**Required Qualifications:**+ **Technical** : Fundamentals of computer science and deep technical understanding of Cloud offerings and network infrastructure.+ **Communicative** : Good communication skills and be able to explain to the development teams and auditors on controls and compliance.+ **Collaborative** : candidate needs to be able to collaborate with architects, developers, and non-technical stakeholders to drive security solutions across the organization.+ **Respected** : candidate should have a good track record as a security professional in the industry.+ **Growth Mindset** : The world of security is highly dynamic and IBM is a company that thrives on innovation and maturation, our Security and Compliance Architects must possess a growth mindset to keep up with the ever-changing security landscape and seek opportunities to increase their breadth and depth of security topics.**Responsibilities:**The Senior Security and Compliance Architect should continuously consider the attack vectors and security weaknesses within the product offering and provide solutions to remediate those weaknesses. This overarching responsibility drives the requirement for the Security and Compliance Focals to be proficient in the Required Skills section below.+ Represents the team during security reviews with Auditors and respond to any/all audit requests+ Communicates and articulates to the Executive team about the security posture of represented services+ Reports back to their GM Security Focal and BISO, as needed, on security issues that might affect the whole organization+ Provides recommendations on security decisions and improvements+ Adopts Security and Privacy by Design practices within their teams for applicable business units+ Regularly participates in Security Focal Interlock calls to receive training, share best practices and receive feedback **Required Skills:**+ **Access Management** - understand the concepts of need to know, least privilege, individual accountability, privilege access monitoring, access revalidations, etc. and ensure your service implements them. Know to avoid the use of shared IDs, excessive privileges, weak passwords, etc.+ **Patch Management** - know how to keep your systems up to date with patches as required to ensure that your service is always running on supported operating systems+ **Vulnerability Management** - be able to regularly scan your systems and remediate any vulnerabilities found within required time frames+ **Inventory Management** - ensure that the list of assets under your control are properly registered in their system of record+ **Data Protection** - understand the types of data your service deal with and have measures in place to protect that data (e.g. encryption in transit and at rest, locked down file permissions, etc.) Configuration Management - understand how to securely harden a system or application upon deployment+ **Health Checking** - know how to check that a system/application is configured correctly on an ongoing regular basis and remediate any issues within required time frames+ **Logging & Monitoring** - ensure there is a process in place to store key logs with data integrity in place to protect those logs and have a process in place to independently monitor those logs for any unusual activity+ **Change Management** - understand and follow the discipline of change management to ensure that changes to systems, applications and environments are properly planned and vetted to avoid disruption to their service+ **Business Continuity** - understand what business continuity requirements are necessary in your organization and actively participate in ongoing business continuity planning+ **Risk Management** - understand where there are gaps in compliance or areas of risk that need to be analyzed and addressed either by remediation activities or formal Risk Evaluations to ensure mitigation, executive awareness, and approval+ **Audits** - be prepared to support audits by providing evidence or being interviewed as required+ **Common Attack Patterns** - know what the common attack vectors facing the industry (e.g. CWE 25 or OWASP Top 10), be able to describe an attack, give a generic example of the payload, describe what a successful exploitation/impact looks like, and what best practice remediation is+ **Common IT Compliance / Regulatory Standards** - expert knowledge and understanding of SOC1/2/3, ISO27K, HIPAA, PCI, FBA (formerly FFIEC), FedRAMP, GDPR.+ **Certifications / Credentials** - CISSP (preferred), CCNP/CCIE (preferred), CCSP, CISA/CRISC/CISM.+ Strong knowledge and understanding in penetration testing methodologies and exploits (web applications, containers, APIs, network devices, databases, operating systems, and various cloud technologies)+ Strong knowledge and understanding of offensive cybersecurity operations and defensive integrations, including enumeration and exploitation of various cloud-based technologies and development of secure applications.+ Strong ability to communicate highly technical aspects to Executives, IT staffs, CISO team, auditors, respectively.Required Technical and Professional Expertise+ 5+ years of demonstrating experience in successful driving and executing compliance programs for common IT security standards/regulations: SOC1/2/3, ISO27K, HIPAA, PCI, FBA (formerly FFIEC), FedRAMP, GDPR, etc.+ 5+ years of working experience with designing/building cloud network infrastructure.+ Expert knowledge of all layers of the OSI model, most importantly the network (layer 3) and application (layer 7).+ Domain expertise in cloud network infrastructure technologies.+ Strong experience with various scripting languages (Python, Ruby, Bash, etc.).+ Familiarity with serverless services, containerization and other cloud technologies.+ Strong familiarity with OWASP Top Ten, NIST, CIS and MITRE ATT&CKPreferred Technical and Professional ExpertiseNoneNoneAbout Business UnitDigitization is accelerating the ongoing evolution of business, and clouds - public, private, and hybrid - enable companies to extend their existing infrastructure and integrate across systems. IBM Cloud provides the security, control, and visibility that our clients have come to expect. We are working to provide the right tools and environment to combine all of our client's data, no matter where it resides, to respond to changing market dynamics.Your Life @ IBMWhat matters to you when you're looking for your next career challenge?Maybe you want to get involved in work that really changes the world? What about somewhere with incredible and diverse career and development opportunities - where you can truly discover your passion? Are you looking for a culture of openness, collaboration and trust - where everyone has a voice? What about all of these? If so, then IBM could be your next career challenge. Join us, not to do something better, but to attempt things you never thought possible.Impact. Inclusion. Infinite Experiences. Do your best work ever.About IBMIBM's greatest invention is the IBMer. We believe that progress is made through progressive thinking, progressive leadership, progressive policy and progressive action. IBMers believe that the application of intelligence, reason and science can improve business, society and the human condition. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 IBMers serving clients in 170 countries.Location StatementFor additional information about location requirements, please discuss with the recruiter following submission of your application.IBM intends this job to be performed entirely outside of Colorado.Being You @ IBMIBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.