The IBM Cloud Networking Services group is looking for a technical, talented, innovative and enthusiastic Security and Compliance Focal professional to lead and drive compliance, security awareness, training, applying best practices for secured development across our growing portfolio of next generation network services for IBM Cloud.
Security is something that every development team needs to incorporate into every phase of their product development life cycle and the Security and Compliance Focal is expected to ensure security is built into the design, planning, implementation, and execution of our network services.
Required Qualifications : Technical : First and foremost, strong grasp of computer science and deep technical understanding of Cloud Security and Network Infrastructure.
Communicative : Candidate needs to have good communication skills and be able to explain to the development teams why they must jump through extra security hoops.
Collaborative : Candidate needs to be able to collaborate with architects, developers, and non-technical stakeholders to drive security solutions across the organization.
Respected : Candidate should have a good track record as a security professional in the industry. They will be expected to establish trust and respect with the network service development teams.
Growth Mindset : The world of security is highly dynamic and IBM is a company that thrives on innovation and maturation, our Security and Compliance Focal must possess a growth mindset to keep up with the ever-changing security landscape and seek opportunities to increase their breadth and depth of security topics.
Responsibilities : The Senior Security and Compliance Focal should continuously consider the attack vectors and security weaknesses within their service or product offering and provide solutions to remediate those weaknesses.
Communicates and articulates to leadership team about the security posture of represented network services. This overarching responsibility drives the requirement for the Security and Compliance Focal to be proficient in the Required Skills section below.
Required Skills : System Administration -have an in-depth knowledge of administrative commands to manage operating systems and applications in a secure manner (e.
g. knowing what commands to run to check on patch status and apply new patches)Access Management -understand the concepts of need to know, least privilege, individual accountability, privilege access monitoring, access revalidations, etc.
and ensure your service implements them. Know to avoid the use of shared IDs, excessive privileges, weak passwords, etc.
Patch Management -know how to keep your systems up to date with patches as required to ensure that your service is always running on supported operating systemsVulnerability Management -be able to regularly scan your systems and remediate any vulnerabilities found within required time framesInventory Management -ensure that the list of assets under your control are properly registered in their system of recordData Protection -understand the types of data your services deal with and have measures in place to protect that data (e.
g. encryption in transit and at rest, locked down file permissions, etc.) Configuration Management - understand how to securely harden a system or application upon deploymentHealth Checking -know how to check that a system / application is configured correctly on an ongoing regular basis and remediate any issues within required time framesLogging & Monitoring -ensure there is a process in place to store key logs with data integrity in place to protect those logs and have a process in place to independently monitor those logs for any unusual activityChange Management -understand and follow the discipline of change management to ensure that changes to systems, applications and environments are properly planned and vetted to avoid disruption to their serviceBusiness Continuity -understand what business continuity requirements are necessary in your organization and actively participate in ongoing business continuity planningRisk Management -understand where there are gaps in compliance or areas of risk that need to be analyzed and addressed either by remediation activities or formal Risk Evaluations to ensure mitigation, executive awareness, and approvalAudits -be prepared to support audits by providing evidence or being interviewed as requiredCommon Attack Patterns -know what the common attack vectors facing the industry (e.
g. CWE 25 or OWASP Top 10), be able to describe an attack, give a generic example of the payload, describe what a successful exploitation / impact looks like, and what best practice remediation isCertifications / Credentials -CISSP (preferred), CCNP / CCIE (preferred), CCSP, CISA / CRISC / CISM.