Contract
Description
Introduction
At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, lets talk.
Your Role and Responsibilities
As an Information Security Specialist, you would be client facing and will be the primary technical interface/bridge between the onsite managed security services team and IBM offshore managed security services team. The role involves being on-site at the Client location in Johannesburg, South Africa, and will be responsible overall for the Vulnerability Management service, network security device health and availability management, troubleshooting / Incident Management / RCA, and preventative maintenance.
Activities include:
Scan accurately: Keep up with known and emerging security threats that can compromise the managed cloud environment and /or information systems operated by IBM.
Create detailed reports outlining greatest vulnerability risks and provide remediation recommendations
Manage compliance: Get more accurate scan results to better track, understand, and report on the managed cloud environment security posture
Schedule vulnerability scans via the centralized web-based portal and ranking of vulnerabilities.
Manage the capacity planning for network security devices.
Coordinate with the IBM offshore managed security service team on maintain system management and configuration of firewall software (i.e., firmware and operating system) on network infrastructure systems and devices, which is maintained by IBM.
Required Technical and Professional Expertise
Network Security Management / experience.
Security Management experience.
Client Facing / experience.
Communicate effectively in English in professional contexts.
Palo Alto Networks experience.
Checkpoint Network Security experience.
Qualys / Vulnerability Management tools experience.
Preferred Technical and Professional Expertise
Experience in the telecommunication and media industry.
Cisco Network Security experience.
Broad applied IT security knowledge (cross technology).
About Business Unit
IBM is a leading provider of enterprise security solutions. Named by industry analysts as a leader in 12 security market segment categories, IBM Security is a multi-billion dollar business that is rapidly growing. In an industry focused on building walls, IBM Security is focused on creating an open, connected security ecosystem that leverages AI and cloud to help clients improve compliance, stop threats, and grow their business securely.
Your Life @ IBM
What matters to you when youre looking for your next career challenge?
Maybe you want to get involved in work that really changes the world? What about somewhere with incredible and diverse career and development opportunities where you can truly discover your passion? Are you looking for a culture of openness, collaboration and trust where everyone has a voice? What about all of these? If so, then IBM could be your next career challenge. Join us, not to do something better, but to attempt things you never thought possible.
Impact. Inclusion. Infinite Experiences. Do your best work ever.
About IBM
IBMs greatest invention is the IBMer. We believe that progress is made through progressive thinking, progressive leadership, progressive policy and progressive action. IBMers believe that the application of intelligence, reason and science can improve business, society and the human condition. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 IBMers serving clients in 170 countries.
Location Statement
For additional information about location requirements, please discuss with the recruiter following submission of your application.
Being You @ IBM
Affirmative Action and/or EE candidates will be given first preference as per our employment equity strategies.
Requirements
.