A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe.
You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio including Software and Red Hat.
Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role you'll be encouraged to challenge the norm investigate ideas outside of your role and come up with creative solutions resulting in groundbreaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment
Responsibilities
* Candidate should have working experience in the field of File Integrity Monitoring
* Responsible for security researcher to provide insight and understanding of new and existing information security threats
* Responsible to participate in recommending improvements to FIM security process procedures policies security incident management and vulnerability management processes.
* You will be involved in evaluating recommending implementing and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems
* Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements
* Work in a 24x7 Security Operation Centre (SOC) environment
Minimum 2+ yearsβ experience in FIM.
* Proven expertise in handling FIM products from Microsoft Tripwire etc.
* Proficient in monitoring security events from various SOC channels (SIEM Tickets Email and Phone) based on the security event severity to handle the service support teams tier2 information security specialists
* Expertise in Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach
Perferred OEM certification