[Close] 

Data Security Consultant

Job Description
The Data Security Consultant will be a key performer and critical team member in delivering IBM Data Security projects across some of the most exciting clients in North America. The candidate will help develop long term Data Security strategies that develop a vision for clients over 3-5 year horizons. You will be integral in implementing and establishing supporting security programs around Data Loss Prevention (DLP), Database Activity Monitoring, Tokenization/Encryption, Cloud Access Security Brokers (CASB), and data discovery technologies. You will help drive a data-centric protection agenda for clients that is tool agnostic, bringing the best that IBM and its strategic partners have to offer around Data Security to clients.
Core Consulting:
+ Effective writing, communication and presentation skills
+ The ability to work easily with diverse and dynamic teams
+ Comfortable working in a project based / client serving model
+ Ability to absorb professional knowledge quickly and develop skills
+ Must be able to draw upon professional concepts to collaborate with others to carry out assigned duties
+ Ability to work in a matrix management model
+ Challenge the validity of given procedures and processes with the intent to enhance and improve
+ Demonstrated analytical skills
Data Security Skills:
+ Understanding of concepts involving Data Loss Prevention (DLP), Encryption/Tokenization, Database Activity Monitoring technologies for clients to help address risk and to enhance our clients? security posture.
+ Will have the ability to help architect solutions for customers.
+ Ability to work with clients to understand requirements and problem-sets and design solutions to address their Data Security needs.
+ Willingness to learn new technology and explore the Data Security product space and assess technology from vendors.
Must be willing to be in an operational role that requires on-call rotation and occasional holiday support. Must live or be willing to relocate to Austin, TX or Atlanta, GA along with willingness to travel 50-75% in North America depending on client requirements.
Required Technical and Professional Expertise
+ At least 2 years of experience working with consulting and systems integration methods
+ At least 1 year of experience working in projects related to data security
+ At least 1 year of experience in designing and implementing data security
+ Experienced level knowledge of Linux / Unix administration
+ Experience with diagnosing, troubleshooting, and remediating Linux / Unix based appliances
+ Experience performing typical maintenance of applications such as product updates, hardware refreshes, patching, etc.
+ Basic knowledge in encryption key management concepts
+ Basic knowledge in security industry regulations/standards (Payment Card Industry (PCI DSS), HIPAA, Gramm-Leach-Bliley Act (GLBA)) and compliance frameworks (ISO 27002,NIST, Cobit)
+ Must live or be willing to relocate to Austin, TX or Atlanta, GA
+ Willingness to travel 50-75% in North America
+ Willingness to be in an operational role that requires on-call rotation and occasional holiday support
Preferred Tech and Prof Experience
+ At least 3 years of experience working with consulting and systems integration methods
+ At least 3 years of experience working in projects related to data security
+ At least 2 years of experience in managing large-scale technology deployment projects
+ At least 2 years of experience in information security consulting (providing professional services consulting for end clients)
+ Basic knowledge in and experience in database security (Oracle, MySQL, Sybase, DB2)
+ Basic knowledge of Data Loss Prevention
+ Possesses hands-on familiarity with the Voltage SecureData product, RSA Data Protection Manager, Vormetric, and/or Gemalto
+ Certified in CISSP or equivalent certification
EO Statement
IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.