Jobs for Veterans, Veteran Job Board | GiJobs.com

Post Jobs

Job Information

IBM IBM Cloud Network Services Senior Security Compliance Focal in Raleigh, North Carolina

Introduction

At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, lets talk.

Your Role and Responsibilities

The IBM Cloud Networking Services group is looking for a technical, talented, innovative and enthusiastic Security and Compliance Focal professional to lead and drive compliance, security awareness, training, applying best practices for secured development across our growing portfolio of next generation network services for IBM Cloud.

Security is something that every development team needs to incorporate into every phase of their product development life cycle and the Security and Compliance Focal is expected to ensure security is built into the design, planning, implementation, and execution of our network services.

Required Qualifications:

  • Technical: First and foremost, strong grasp of computer science and deep technical understanding of Cloud Security and Network Infrastructure.

  • Communicative : Candidate needs to have good communication skills and be able to explain to the development teams why they must jump through extra security hoops.

  • Collaborative : Candidate needs to be able to collaborate with architects, developers, and non-technical stakeholders to drive security solutions across the organization.

  • Respected : Candidate should have a good track record as a security professional in the industry. They will be expected to establish trust and respect with the network service development teams.

  • Growth Mindset: The world of security is highly dynamic and IBM is a company that thrives on innovation and maturation, our Security and Compliance Focal must possess a growth mindset to keep up with the ever-changing security landscape and seek opportunities to increase their breadth and depth of security topics.

Responsibilities:

The Senior Security and Compliance Focal should continuously consider the attack vectors and security weaknesses within their service or product offering and provide solutions to remediate those weaknesses. Communicates and articulates to leadership team about the security posture of represented network services. This overarching responsibility drives the requirement for the Security and Compliance Focal to be proficient in the Required Skills section below.

Required Skills:

  • System Administration - have an in-depth knowledge of administrative commands to manage operating systems and applications in a secure manner (e.g. knowing what commands to run to check on patch status and apply new patches)

  • Access Management - understand the concepts of need to know, least privilege, individual accountability, privilege access monitoring, access revalidations, etc. and ensure your service implements them. Know to avoid the use of shared IDs, excessive privileges, weak passwords, etc.

  • Patch Management - know how to keep your systems up to date with patches as required to ensure that your service is always running on supported operating systems

  • Vulnerability Management - be able to regularly scan your systems and remediate any vulnerabilities found within required time frames

  • Inventory Management - ensure that the list of assets under your control are properly registered in their system of record

  • Data Protection - understand the types of data your services deal with and have measures in place to protect that data (e.g. encryption in transit and at rest, locked down file permissions, etc.) Configuration Management - understand how to securely harden a system or application upon deployment

  • Health Checking - know how to check that a system/application is configured correctly on an ongoing regular basis and remediate any issues within required time frames

  • Logging & Monitoring - ensure there is a process in place to store key logs with data integrity in place to protect those logs and have a process in place to independently monitor those logs for any unusual activity

  • Change Management - understand and follow the discipline of change management to ensure that changes to systems, applications and environments are properly planned and vetted to avoid disruption to their service

  • Business Continuity - understand what business continuity requirements are necessary in your organization and actively participate in ongoing business continuity planning

  • Risk Management - understand where there are gaps in compliance or areas of risk that need to be analyzed and addressed either by remediation activities or formal Risk Evaluations to ensure mitigation, executive awareness, and approval

  • Audits - be prepared to support audits by providing evidence or being interviewed as required

  • Common Attack Patterns - know what the common attack vectors facing the industry (e.g. CWE 25 or OWASP Top 10), be able to describe an attack, give a generic example of the payload, describe what a successful exploitation/impact looks like, and what best practice remediation is

  • Certifications / Credentials - CISSP (preferred), CCNP/CCIE (preferred), CCSP, CISA/CRISC/CISM.

Required Technical and Professional Expertise

  • 5+ years of demonstrated experience in successful driving and execution of compliance programs for common IT security standards/regulations: SOC1/2/3, ISO27K, HIPAA, PCI, FBA (formerly FFIEC), FedRAMP, GDPR, etc.

  • 5+ years of working experience with designing/building cloud network infrastructure.

  • Expert knowledge of all layers of the OSI model, most importantly the network (layer 3) and application (layer 7).

  • Strong experience with various scripting languages (Python, Ruby, Bash, etc.).

  • Familiarity with serverless services, containerization and other cloud technologies.

  • Strong familiarity with OWASP Top Ten, NIST, CIS and MITRE ATT&CK

  • 5+ years of demonstrating experience in system or application administration role(s).

Preferred Technical and Professional Expertise

  • 7+ years of demonstrated experience in successful driving and execution of compliance programs for common IT security standards/regulations: SOC1/2/3, ISO27K, HIPAA, PCI, FBA (formerly FFIEC), FedRAMP, GDPR, etc.

  • 7+ years of working experience with designing/building cloud network infrastructure.

  • Expert knowledge of all layers of the OSI model, most importantly the network (layer 3) and application (layer 7).

  • Expert knowledge and understanding in penetration testing methodologies and exploits (web applications, containers, APIs, network devices, databases, operating systems, and various cloud technologies).

  • Expert knowledge and understanding of offensive cybersecurity operations and defensive integrations, including enumeration and exploitation of various cloud-based technologies and development of secure applications.

  • Deep understanding and implementation with serverless services, containerization and other cloud technologies.

About Business Unit

Digitization is accelerating the ongoing evolution of business, and clouds - public, private, and hybrid - enable companies to extend their existing infrastructure and integrate across systems. IBM Cloud provides the security, control, and visibility that our clients have come to expect. We are working to provide the right tools and environment to combine all of our client’s data, no matter where it resides, to respond to changing market dynamics.

Your Life @ IBM

What matters to you when you’re looking for your next career challenge?

Maybe you want to get involved in work that really changes the world? What about somewhere with incredible and diverse career and development opportunities – where you can truly discover your passion? Are you looking for a culture of openness, collaboration and trust – where everyone has a voice? What about all of these? If so, then IBM could be your next career challenge. Join us, not to do something better, but to attempt things you never thought possible.

Impact. Inclusion. Infinite Experiences. Do your best work ever.

About IBM

IBM’s greatest invention is the IBMer. We believe that progress is made through progressive thinking, progressive leadership, progressive policy and progressive action. IBMers believe that the application of intelligence, reason and science can improve business, society and the human condition. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 IBMers serving clients in 170 countries.

Location Statement

For additional information about location requirements, please discuss with the recruiter following submission of your application.

Being You @ IBM

IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.

DirectEmployers