Introduction At IBM, work is more than a job – it’s a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you’ve never thought possible. Are you ready to lead in this new era of technology and solve some of the world’s most challenging problems? If so, lets talk.
Your Role and Responsibilities
We have a team of security compliance leaders overseeing solutions for this complex environment, collaborating with security architects and Cloud DevOps teams internally and around IBM. The security compliance leader’s role is to determine the secure operation of the all computer systems, servers, and network connections in accordance with our policies, procedures, and compliance requirements. A security compliance leader in our team will participate in some or all of the following:
Providing subject matter expertise in the creation, implementation, and maintenance of appropriate enterprise programs, policies, and procedures to be compliant with all applicable regulations including ISO, SOC, HIPAA, PCI, FedRAMP/FISMA
Having the ability to utilize working knowledge of information security best practices such as: NIST 800 series, ISO 27000 series, GDPR, etc
Interpreting standards, requirements, and their application to the enterprise Cloud environment in the most reasonable and cost-effective manner Developing, implementing, maintaining, and overseeing enforcement of security policies
Collaborating with security architects and technical security teams to define and implement security processes and procedures based on industry-standard best practices and compliance requirements. Defining the requirements and validating the procedures and audit testing methodology
Conducting regularly scheduled audits on systems and hosting third-party audits as required in order to maintain certifications and compliance certificates.
Working with the DevOps teams to prepare ongoing client reporting, information for prospective clients, and marketing materials
Providing training to teams as needed
Assisting team members and internal clients in addressing highly complex security issues applicable to enterprise environment
Required Technical and Professional Expertise
Minimum of 10 years of relevant compliance experience and cybersecurity knowledge
Compliance leaders do not require dev experience, but it is an advantage. 10+ years of security compliance audit experience would be more appropriate
Ability to utilize working knowledge of information security best practices such as: NIST 800 series, ISO 27000 series, GDPR, etc
Experience with compliance programs such as FFIEC or FedRAMP/ FISMA, HIPAA, GDPR, SOC 2, or PCI
Experience in risk assessment processes, policy development, proposals, work statements, product evaluations, and delivery of technology
Ability to understand enterprise business computing operations/requirements, and in particular, Cloud
Ability to stand firm on issues yet be flexible and creative when working with customers to find effective solutions
Ability to understand and interpret laws and regulatory requirements related to information protection, and develop and implement appropriate processes to achieve and maintain compliance and reduce risk
Preferred Technical and Professional Expertise
Working in a change-controlled production environment.
Diagnosing the root cause of problems and propose solutions: Examples would be failed patches, tooling issues, false positives on system tests, authentication problems.
Expertise in system configuration, especially privilege control (for example sudoer configuration), and system level firewall (iptables)
An understanding of basic networking concepts: ipsec tunnels, firewalls, routers, public and private addressing.
Project Management knowledge and experience a strong plus
Experience with operations of data centres or Cloud, and networking security including security systems such as firewalls, intrusion detection, vulnerability scanning, OS patching, health checking
Experience with container-based architectures and implementations such as Kubernetes, docker, etc.
Education qualification:
Computer science BSc or equivalent
Security/privacy specific training such as CIPT, CRISC, CISSP