hero

Explore thousands of opportunities across Tech:NYC’s member network.

674
companies
10,838
Jobs

Security Consultant-Security Strategy, Risk & Compliance Services

IBM

IBM

IT, Legal
Posted on Feb 4, 2025
Introduction

In this role you will join IBM Consulting via our world class Associate Program for university hires. As an Associate at IBM Consulting you will have the opportunity to work with a diverse range of clients worldwide. Our clients' technical and business needs are constantly evolving. We're hiring inspired, talented individuals, who believe no problem is too big to solve.

We focus on your professional development through ongoing learning, mentorship, development of technical skills, and continuous personal growth, all grounded in a culture of coaching and career advancement. If you see yourself as someone who never stops learning and who wants to unleash your potential, the IBM Consulting Associates Program is for you.

A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe.

You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat.

Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience.

Your role and responsibilities

Put your technical skills in the spotlight securing our clients’ most important assets. As an Associate Security Consultant, you’ll help in the collection and analysis of existing business and technical requirements to develop and implement Enterprise-wide Access Management processes and procedures. You’ll be an important part of an advisory team for all security measures necessary to protect client’s intellectual property and assets. Leveraging a growth mindset, you’re ready and willing to deliver business value, wherever needed.

Work you could do as an Associate Security Consultant:
  • Work as a team member with client personnel and other IBM teams to identify functional requirements and subsequently working with or in some instances leading others in the identification, justification, and design of the client's solution.
  • Participate in a wide range of design activities, from requirements analysis through systems, application and/or process design specification and implementation.
  • Gain knowledge across multiple platforms, processes, or architectures
Required education
Bachelor's Degree
Required technical and professional expertise
Qualifications:
  • Outcome focused, possessing a high level of resilience, you demonstrate the flexibility and resolve needed to achieve success a across a broad range of consultative contexts
  • Familiarity with network design, network security, authentication, authorization techniques, and encryption protocols and standards.
  • Experience in one or more of the following security domains: Security Intelligence & Operations Consulting (SIOC); Data Security; Identity & Access Management, Infrastructure and Endpoint Security (IES), and/or Security Strategy Risk and Compliance (SSRC).
  • Knowledge in Network Design and Security, Web or Custom Application Development, Mobile Development, Software Engineering, Identity and Authentication Technology.
  • Exposure to software tools such as Java, Python, C/C++, Java, Ruby, GO, Golang or bash, C#; Sharepoint; Software code Testing and Test Automation is helpful.
  • Familiarity with network security tools for vulnerability scanning, network monitoring, network sniffing, routers, firewalls, Intrusion detection and protection, anomaly detection and encryption standards.