Jump to content

Cybersecurity Consultant

3 days ago


 Share

Job Opportunity Details

Type

Full Time

Salary

Not Telling

Work from home

No

Weekly Working Hours

Not Telling

Positions

Not Telling

Working Location

Taguig City, Taguig City, National Capital Region, Philippines   [ View map ]
Introduction
In this role, you'll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world.​ Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology.

A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe.

You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat.

Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience.

Your Role and Responsibilities
As a Cybersecurity Consultant, you'll provide consulting services to analyze and resolve security incidents and to work with the client to achieve an overall superior security posture. Your responsibilities may encompass:
  • Responsible for conducting incident response operations according to documented procedures and industry best practices.
  • Will be required to participate in multiple intelligence communities and be able to disseminate pertinent information throughout the SOC.
  • Helps client IT and business executives understand Security issues, risks, exposures, and vulnerabilities using interviews, workshops and assessments.
  • Define business drivers and develop associated endpoint strategy, programs, incident response plans, and remediation recommendations and roadmaps.


Required Technical and Professional Expertise
  • Knowledge of network security zones, Firewall configurations, IDS policies and systems communications from Layer 1 to 7
  • Experience with Network and Network Security tools administration, Systems Administration (Linux and Windows), Middleware, and Application Administration
  • Knowledge in networking and attack methods such as SQLi and pivoting, packet capture and analysis
  • Experience in multiple security areas such as SIEM, EDR, XDR, ASM, IDS, APT, and WAF and Security Assessment tools (NMAP, Nessus)
  • Experience with log search tools such as HP Arcsight, Splunk, usage of regular expressions and natural language queries and knowledge of log formats and ability to aggregate and parse log data for syslog, http logs, DB logs for investigation purposes.
  • Experience on creation of containment strategy and execute.


Preferred Technical and Professional Expertise
  • Experience or exposure on the following skills is a plus:
  1. Computer Forensic Investigation such as Windows Forensic Analysis FOR408 – (Optional GCFE certification) or
  2. Perimeter Protection in Depth – SEC502 (optional GCFW certification) or
  3. Advanced Security Essentials – SEC501 (optional GCED certification) or
  4. Intrusion Detection in Depth – SEC503 (GCIA certification) or equivalent or
  5. Hacker Techniques, Exploits & Incident Handling – SEC504 (optional GCIH certification) or
  6. GIAC Continuous Monitoring (optional GMON certification) or
  7. Advanced digital forensics and Incident Response - FOR 508 (Optional GCFA certification) or equivalent

More Information

Application Details

  • Organization Details
    IBM PH
 Share


User Feedback

Recommended Comments

There are no comments to display.

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Add a comment...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...