Cybersecurity Consultant

IBM

4

(723)

Taguig, Philippines (Remote)

Why you should apply for a job to IBM:

  • 4.4/5 in supportive management
  • 82% say women are treated fairly and equally to men
  • 80% would recommend this company to other women
  • 91% say the CEO supports gender diversity
  • Ratings are based on anonymous reviews by Fairygodboss members.

    #736916BR

    Position summary

    and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience.

    Your Role and Responsibilities

    As an entry level Security Consultant, you'll unleash your exceptional technical prowess to gather and analyze business and technical requirements, skillfully crafting and implementing resilient Enterprise-wide Access Management processes and procedures.

    As an esteemed member of our collaborative advisory team, your pivotal contribution will be crucial in establishing comprehensive security measures, ensuring the safeguarding of our clients' invaluable intellectual property and assets. Your responsibilities may encompass:

    • Work as a team member with client personnel and other IBM teams to identify functional requirements and subsequently working with or in some instances leading others in the identification, justification and design of the client's solution.

    • Participate in a wide range of design activities, from requirements analysis through systems, application and/or process design specification and implementation.

    • Gain knowledge across multiple platforms, processes or architectures

    Required Technical and Professional Expertise

    • Knowledge of network security zones, Firewall configurations, IDS policies and systems communications from Layer 1 to 7

    • Experience with Network and Network Security tools administration, Systems Administration (Linux and Windows), Middleware, and Application Administration

    • Knowledge in networking and attack methods such as SQLi and pivoting, packet capture and analysis

    • Experience in multiple security areas such as SIEM, EDR, XDR, ASM, IDS, APT, and WAF and Security Assessment tools (NMAP, Nessus)

    • Experience with log search tools such as HP Arcsight, Splunk, usage of regular expressions and natural language queries and knowledge of log formats and ability to aggregate and parse log data for syslog, http logs, DB logs for investigation purposes.

    • Experience on creation of containment strategy and execute.

    Preferred Technical and Professional Expertise
    Experience or exposure on the following skills is a plus:

    1. Computer Forensic Investigation such as Windows Forensic Analysis FOR408 - (Optional GCFE certification) or
    2. Perimeter Protection in Depth - SEC502 (optional GCFW certification) or
    3. Advanced Security Essentials - SEC501 (optional GCED certification) or
    4. Intrusion Detection in Depth - SEC503 (GCIA certification) or equivalent or
    5. Hacker Techniques, Exploits & Incident Handling - SEC504 (optional GCIH certification) or
    6. GIAC Continuous Monitoring (optional GMON certification) or
    7. Advanced digital forensics and Incident Response - FOR 508 (Optional GCFA certification) or equivalent

    Why you should apply for a job to IBM:

  • 4.4/5 in supportive management
  • 82% say women are treated fairly and equally to men
  • 80% would recommend this company to other women
  • 91% say the CEO supports gender diversity
  • Ratings are based on anonymous reviews by Fairygodboss members.