Tell Me More ↓We are seeking a skilled Security Tools Deployment Specialist to oversee the planning implementation and management of security tools across our IT infrastructure (Cloud Azure platform and On-Prem). The ideal candidate will have a strong technical background hands-on experience with security tools and a solid understanding of cybersecurity principles to ensure robust protection against threats.Install configure and manage a variety of security tools including but not limited to firewalls intrusion detection prevention systems (IDS IPS) endpoint protection SIEM solutions and vulnerability scannersBe well-versed in Security Operations Cloud Technologies Identity & Access Management (IAM) Resiliency and Digital Forensics & Incident Response (DFIR)Our employees enjoy varying other options too: utilizing our BeWell Program (with online consultants in law tax life events psychology coaching); opting in for the Retirement pension plan and we have a Cafeteria platform with Kyndryl benefits points.Expertise in enterprise-grade security solutions (e.g. Splunk CrowdStrike Palo Alto McAfee)Skilled in forensic investigations and incident response frameworks (SANS NIST)Experienced in IAM solution deployments including architecture integration and management (Okta SailPoint Azure AD)Proficient in Cloud architecture design and deployment (AWS Azure Google Cloud)... Click to read more.
|
||
Tell Me More ↓As a Customer Technology Advisor you will possess strong technical and business acumen allowing you to provide value driven solutions within the practice services domain(s). Your exceptional customer facing skills combined with your articulate communication style and interpersonal finesse will enable you to effortlessly convey the technical benefits of Kyndryl's capabilities perfectly matching the unique needs of each customer.Applied knowledge of application modernization and containerization technologies (e.g. Docker Kubernetes OpenShift Helm Tanzu) and methodologies.Applied technical expertise on containerization platforms (Red Hat OpenShift Kubernetes Suse Rancher Docker VMware Tanzu) methodologies (DevSecOps GitOps) and corresponding tools and best practices (image registries persistent object storage helm kustomize container security & networking) with applied knowledge of enterprise Kubernetes infrastructure and application management Extensive experience with cloud platforms (AWS Azure Google Cloud) and their container-related services (e.g. EC2 ECS EKS AKS App Services GKE Cloud Run).Automation technologies and tools (Ansible Terraform)Data-Driven Assessment: Ability to evaluate existing applications to identify best modernization strategy (i.e. workload analysis). This involves analyzing technical debt complexity and business impact.General knowledge of cloud native microservices development methodologies languages IDEs middlewaresOrchestration management and automation (e.g. Zero Touch approach as well as Infrastructure as Code methodologies and developments).5 years of experience (minimum) selling technical services for multi-industry customersRelevant certifications for one or more of the 3 hyperscalers (e.g. Microsoft Azure AWS Google) on their container-related services (e.g. EC2 ECS EKS AKS App Services GKE Cloud Run).Redhat certifications (at least)Red Hat Enterprise Linux (certificazione EX200 preferred not required)Red Hat OpenShift Platform (certificazione EX280 preferred not required)Proven ability to develop and present technical solutions to clients. (c'e'e gia sopra credo)Fluent English (written and spoken).Show vs tell (hands-on) capability including top skills in client-facing presentation preparation and fluent speakingVMware (full suite) Hyper-V Nutanix.Red Hat OpenShift Virtualization (EX380)Red Hat OpenShift Advanced Cluster Management (EX480)Main languages used in the cloud environment (e.g. Python Java).... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓Hands-on experience in any Public Cloud Infrastructure (AWS Azure GCP IBM)... Click to read more.
|
||
Tell Me More ↓Subject matter expertise in at least one platform (e.g. cloud computing cloud hyperscaler X86 mainframe midrange)Experience in Agile (Kanban SAFe and Scrum)Have experience with Operating Systems (Windows Linux Unix)... Click to read more.
|
||
Tell Me More ↓Kennis van AIOps Monitoring (inclusief APM) Event Management en ObservabilityHigh level kennis van Kubernetes deployments (Openshift Nutanix NKE etc) is een pre... Click to read more.
|
||
Kyndryl Graduate Program - IT Strategy Consultant - Cloud / Security / Digital Workplace / Applications / Data / Network / Mainframe (m/f/x)
Tell Me More ↓Basic understanding of core services offered by established cloud hyperscalers (e.g. Microsoft AWS Google Cloud etc.).Understanding of IT operations and IT service management frameworks (e.g. ITIL COBIT).Applied experience in Agile (Kanban SAFe and Scrum)... Click to read more.
|
||
Tell Me More ↓- Experience with basic project planning documents (project management plan test plan migration plan etc.)- Basic IT knowledge (architecture)- Fluency in Japanese (written and oral or other relevant language as needed)... Click to read more.
|
||
Tell Me More ↓ (e.g. custom validations approval chains UI modifications workflows and APIs). between Coupa and various ERPs (e.g. SAP Oracle NetSuite D365 F&O Maconomy) using APIs Coupa Link and middleware tools.data extraction transformation and loading (ETL) processesCoupa API integrations middleware tools (Mulesoft Boomi SnapLogic etc.) and ERP connectivityRPA (Robotic Process Automation) tools for process automation... Click to read more.
|
||
Kyndryl Graduate Program - IT Strategy Consultant - Cloud / Security / Digital Workplace / Applications / Data / Network / Mainframe (m/f/x)
Tell Me More ↓Basic understanding of core services offered by established cloud hyperscalers (e.g. Microsoft AWS Google Cloud etc.).Understanding of IT operations and IT service management frameworks (e.g. ITIL COBIT).Applied experience in Agile (Kanban SAFe and Scrum)... Click to read more.
|
||
Tell Me More ↓In the role of a Security Professional within Kyndryl Offensive Security focusing on Threat-Led Penetration Testing (TLPT) and Red Teaming you will be instrumental in executing complex security assessments and advanced penetration testing. Your work will uncover critical vulnerabilities and contribute to the strategic defense of client digital ecosystems.Execute Threat-Led Penetration Testing (TLPT) and Red Teaming operations across a variety of platforms including web network mobile and cloud environments.Ongoing wellbeing initiatives (including mental health support) team outings and seasonal gifts.spouses and children (provided certain conditions are met).Personal and professional development both in-person and online (certified trainings on-the-job coaching & mentoring career progression support). we also nurture new talent and 'career changers' through our comprehensive education programs and exclusive accreditations.Flexible working opportunities (part-time and home office) for a better work-life balance.Experience with a range of penetration testing tools and frameworks (e.g. Metasploit Burp Suite OWASP).... Click to read more.
|
||
Tell Me More ↓Experience and market knowledge in at least 3 of these areas (architectural solution design + presales level) SASE ZT IAM PAM Endpoint protection CSPM hyperscalers security suites Threat Intelligence TH OT security NW security application protection encryptionGood knowledge of managed cyber security MDR incident response (CSIRT) security operations vulnerability management security assurance (GRC) and cyber security standardsFamiliar with main cyber security Vendors the solutions and the local contacts able to work with them in new business opportunities (PA Crowdstrike Fortinet Trendmicro Thales Cisco Netskope Nozomi....)Security tooling for Endpoint Detection and Response (EDR) Security Information and Event Management (SIEM)... Click to read more.
|
||
Junior IT Consultant - IT Strategy/ Cloud / Security / Digital Workplace / Network / Mainframe (m/f/x)
Tell Me More ↓Understanding of IT operations and IT service management frameworks (e.g. ITIL COBIT). - Allowances for lunch job bike and other benefits (e.g. Parental Bonding). - High-quality technical equipment (Apple or Lenovo) modern technologies and the opportunity to realise innovative proof of concepts (e.g. CoPilot Intune PowerApps).... Click to read more.
|
||
Tell Me More ↓As a trusted and experienced Consultant you will be responsible for a vast number of essential technical components such as analyzing the customer's current state defining IT Strategy including key outcomes designing conceptual solutions planning and executing design and implementation work (with support from technical specialists) and accounting for time cost and quality targets. You will also develop IP and own specific assets tools and white papers articulating point of views in a specific domain assemble and lead a team of consultants and architects and facilitate and capture lessons learned from engagements to update methodologies and assets.• Subject matter expertise in at least three domains (e.g. cloud computing IT strategy infrastructure IT operations applications enterprise architecture solution architecture automation data management AI ML IoT and cloud governance models) to advise on industry-leading solutions• Data modeling and analytical experience using common tools (e.g. Excel Tableau)• Awareness of broad competencies and depth in specific competency areas (IT strategy enterprise architecture solution architecture process reengineering automation)... Click to read more.
|
||
Tell Me More ↓Experience and market knowledge in at least 3 of these areas (architectural solution design + presales level) SASE ZT IAM PAM Endpoint protection CSPM hyperscalers security suites Threat Intelligence TH OT security NW security application protection encryptionGood knowledge of managed cyber security MDR incident response (CSIRT) security operations vulnerability management security assurance (GRC) and cyber security standardsFamiliar with main cyber security Vendors the solutions and the local contacts able to work with them in new business opportunities (PA Crowdstrike Fortinet Trendmicro Thales Cisco Netskope Nozomi....)Security tooling for Endpoint Detection and Response (EDR) Security Information and Event Management (SIEM)... Click to read more.
|
||
Kyndryl Graduate Program - IT Strategy Consultant - Cloud / Security / Digital Workplace / Applications / Data / Network / Mainframe (m/f/x)
Tell Me More ↓Basic understanding of core services offered by established cloud hyperscalers (e.g. Microsoft AWS Google Cloud etc.).Understanding of IT operations and IT service management frameworks (e.g. ITIL COBIT).Applied experience in Agile (Kanban SAFe and Scrum)... Click to read more.
|
||
Tell Me More ↓• Experience in advising clients on one or more regulatory requirements (e.g. HIPAA PCI DSS FBA GDPR DORA)• Understanding and daily use of Microsoft Office 365 Suite and other productivity tools (e.g. Excel Word PowerPoint SharePoint) to accomplish audit and compliance related tasks... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓• ITインフラストラクチャー(OS、ネットワーク、Cloudなど)全般の基本スキル• Basic skills knowledge in IT infrastructure (network compute cloud computing etc)• Understanding and daily use of Microsoft Office 365 Suite and other productivity tools (e.g. Excel Word PowerPoint SharePoint Teams) to accomplish audit and compliance related tasks • English Language Skill (TOEIC 730+)... Click to read more.
|
||
Tell Me More ↓As a Customer Technology Advisor you will possess strong technical and business acumen allowing you to provide value driven solutions within the practice services domain(s). Your exceptional customer facing skills combined with your articulate communication style and interpersonal finesse will enable you to effortlessly convey the technical benefits of Kyndryl's capabilities perfectly matching the unique needs of each customer.Externally recognized as an expert in the technology and or solutioning areas including technical certifications supporting subdomain focus area(s) including: Application Data & AI and CloudKnowledge of building and managing containerized environments (e.g. Kubernetes OpenShift EKS AKS GKS Tanzu)Knowledge of orchestration management and automation (e.g. Zero Touch approach Terraform Ansible as well as Infrastructure and Enterprise as a Code methodologies and developments)Knowledge of the main languages used in the cloud environment (e.g. Python Java) will be an advantage... Click to read more.
|
||
Kyndryl Graduate Program - IT Strategy Consultant - Cloud / Security / Digital Workplace / Applications / Data / Network / Mainframe
Tell Me More ↓Basic understanding of core services offered by established cloud hyperscalers (e.g. Microsoft AWS Google Cloud etc.).Understanding of IT operations and IT service management frameworks (e.g. ITIL COBIT).Applied experience in Agile (Kanban SAFe and Scrum)... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓As a trusted and experienced Consultant you will be responsible for a vast number of essential technical components such as analyzing the customer's current state defining IT Strategy including key outcomes designing conceptual solutions planning and executing design and implementation work (with support from technical specialists) and accounting for time cost and quality targets. You will also develop IP and own specific assets tools and white papers articulating point of views in a specific domain assemble and lead a team of consultants and architects and facilitate and capture lessons learned from engagements to update methodologies and assets.Deep expertise in cloud technologies (AWS Azure GCP) and IT modernization strategies. Software engineering experience (beneficial but not required). ... Click to read more.
|
||
Tell Me More ↓ CISSP (Certified Information Systems Security Professional) OSCP (Offensive Security Certified Professional) OSEP (Offensive Security Experienced Penetration Tester) OSED (Offensive Security Exploit Developer). OSCE3 (Offensive Security Certified Expert 3). Extensive experience in offensive security particularly with Mainframe and Cloud platforms (AWS Azure Google Cloud). Demonstrated ability to discover and mitigate complex security vulnerabilities. Previous experience speaking at security conferences and leading educational sessions.... Click to read more.
|
||
Kyndryl Graduate Program - IT Strategy Consultant - Cloud / Security / Digital Workplace / Applications / Data / Network / Mainframe (m/f/x)
Tell Me More ↓Basic understanding of core services offered by established cloud hyperscalers (e.g. Microsoft AWS Google Cloud etc.).Understanding of IT operations and IT service management frameworks (e.g. ITIL COBIT).Applied experience in Agile (Kanban SAFe and Scrum).... Click to read more.
|
||
Tell Me More ↓A Technical Support Representative combines the know-how of tech support with problem solving and customer service so bring your people skills and we'll teach you the rest. It's a fun and fast-paced role where you'll start learning and contributing right away. The first month you learn the ropes and get set up with one client on production. Soon you'll be multi-tasking and providing interactive solutions (chat email MS Teams) while treating our customers to concierge-level care.6 months of experience in Customer support roles (Preferred)... Click to read more.
|
||
Tell Me More ↓As a trusted and experienced Consultant you will be responsible for a vast number of essential technical components such as analyzing the customer's current state defining IT Strategy including key outcomes designing conceptual solutions planning and executing design and implementation work (with support from technical specialists) and accounting for time cost and quality targets. You will also develop IP and own specific assets tools and white papers articulating point of views in a specific domain assemble and lead a team of consultants and architects and facilitate and capture lessons learned from engagements to update methodologies and assets.• Subject matter expertise in at least three domains (e.g. cloud computing IT strategy infrastructure IT operations applications enterprise architecture solution architecture automation data management AI ML IoT and cloud governance models) to advise on industry-leading solutions• Data modeling and analytical experience using common tools (e.g. Excel Tableau)• Awareness of broad competencies and depth in specific competency areas (IT strategy enterprise architecture solution architecture process reengineering automation)... Click to read more.
|
||
Tell Me More ↓Work with cross functional teams (network cloud software compute) to ensure integration requirements and meet customer acceptance criteria.Demonstrated experience in one or more of the following: datacenter networking (Cisco ACI VMware NSX Juniper etc.) campus networking (Cisco Aruba etc.) wide area networking (Velocloud Versa Viptela etc.) Enterprise wireless networking (Cisco Aruba Ruckus etc.) cloud networking (AWS Azure Google Oracle IBM) and or Network Security networking (Cisco PaloAlto Checkpoint ForcePoint firewalls F5 LB)Cisco CCNP certification (CCIE Preferred RS DC or enterprise)... Click to read more.
|
||
Tell Me More ↓The ideal candidate is highly skilled in the Network Security space and has a deep understanding of Zero Trust security principles IT architectures SASE and SSE solutions Identity & Access Management (IAM) and endpoint security.• Security Technologies and Tools: o Experience with Next-Generation Firewalls (NGFW) from leading vendors on the market (e.g. Palo Alto Networks Fortinet Cisco Check Point). o Advanced knowledge of Identity & Access Management (IAM) solutions including Okta CyberArk Microsoft Azure AD. o Experience with endpoint security solutions including those in the Security Service Edge (SSE) area. • Cloud and Hybrid Security Architectures and Solutions:o Familiarity with Secure Access Service Edge (SASE) and SSE architectures. o Experience with leading SASE SSE solutions (e.g. Zscaler Netskope Palo Alto Networks Prisma Access).• Bachelor's Degree in Computer Science Computer Engineering or similar discipline (preferred but not required).CISSP (Certified Information Security Professional) • CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) • Specific certifications from major NGFW vendors (e.g. Palo Alto Networks PCNSE Fortinet NSE Cisco CCNP Security Check Point CCSA CCSE) • Specific certifications from major IAM vendors (e.g. Okta Certified Professional CyberArk Defender Microsoft Certified: Identity and Access Administrator Associate) • Experience with cloud security solutions. • Knowledge of Italian and European security regulations.... Click to read more.
|
||
Tell Me More ↓• Knowledge of middleware (MQ DataPower IIB etc.)... Click to read more.
|
||
Tell Me More ↓In the role of a Security Professional within Kyndryl Offensive Security focusing on Threat-Led Penetration Testing (TLPT) and Red Teaming you will be instrumental in executing complex security assessments and advanced penetration testing. Your work will uncover critical vulnerabilities and contribute to the strategic defense of client digital ecosystems.Execute Threat-Led Penetration Testing (TLPT) and Red Teaming operations across a variety of platforms including web network mobile and cloud environments.Our employees enjoy varying other options too: utilizing our BeWell Program (with online consultants in law tax life events psychology coaching); opting in for the Retirement pension plan and we have a Cafeteria platform with Kyndryl benefits points.Experience with a range of penetration testing tools and frameworks (e.g. Metasploit Burp Suite OWASP).... Click to read more.
|
||
Tell Me More ↓Assist the sales team in pre-sales activities including defining the scope of work (SOW) preparing proposals and conducting solution demonstrations.Additional certifications in Google (e.g. Google DevOps Google Security etc).Experience with other cloud platforms (e.g. AWS Azure) is a plus.... Click to read more.
|
||
Tell Me More ↓: Experiencia en la administración de sistemas operativos (Windows Linux Unix) y en la gestión de servidores.: Experiencia en soluciones de almacenamiento como SAN NAS y tecnologías de almacenamiento en la nube (Amazon S3 Azure Blob Storage).: Conocimientos en herramientas de extracción transformación y carga (ETL) como Talend Informatica y Apache Nifi.: Experiencia en la administración de bases de datos SQL (MySQL PostgreSQL Oracle) y NoSQL (MongoDB Cassandra).: Conocimientos en la implementación y gestión de almacenes de datos (Data Warehouses) y soluciones de BI (Business Intelligence).... Click to read more.
|
||
Tell Me More ↓As a trusted and experienced Consultant you will be responsible for a vast number of essential technical components such as analyzing the customer's current state defining IT Strategy including key outcomes designing conceptual solutions planning and executing design and implementation work (with support from technical specialists) and accounting for time cost and quality targets. You will also develop IP and own specific assets tools and white papers articulating point of views in a specific domain assemble and lead a team of consultants and architects and facilitate and capture lessons learned from engagements to update methodologies and assets.• Bachelor's degree in IT or related field (Master's preferred) or relevant experience. • Proven ability to develop business cases (ROI TCO) and commercial proposals. • Certifications in TOGAF ITIL or cloud platforms (AWS Azure). ... Click to read more.
|
||
Tell Me More ↓We are seeking a skilled Security Tools Deployment Specialist to oversee the planning implementation and management of security tools across our IT infrastructure (Cloud Azure platform and On-Prem). The ideal candidate will have a strong technical background hands-on experience with security tools and a solid understanding of cybersecurity principles to ensure robust protection against threats.Install configure and manage a variety of security tools including but not limited to firewalls intrusion detection prevention systems (IDS IPS) endpoint protection SIEM solutions and vulnerability scannersBe well-versed in Security Operations Cloud Technologies Identity & Access Management (IAM) Resiliency and Digital Forensics & Incident Response (DFIR)Our employees enjoy varying other options too: utilizing our BeWell Program (with online consultants in law tax life events psychology coaching); opting in for the Retirement pension plan and we have a Cafeteria platform with Kyndryl benefits points.Expertise in enterprise-grade security solutions (e.g. Splunk CrowdStrike Palo Alto McAfee)Skilled in forensic investigations and incident response frameworks (SANS NIST)Experienced in IAM solution deployments including architecture integration and management (Okta SailPoint Azure AD)Proficient in Cloud architecture design and deployment (AWS Azure Google Cloud)... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓104 UCAS points from AP courses (candidates will need to provide the recruitment team with this document).... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓Storage dataset (RMM HSM CDS & Catalog file) reorganization.Storage box Configuration (DASD & Tape).Storage box data migration (DASD to DASD and Tape to tape)Disaster recovery planning & implementation (Tape recovery DASD Replication Tape Replication Hyperswap).Disk replication setup using the CSM (Copy Services Manager) GDPS.Storage Management related knowledge under the z OS: including DFSMS ISMF NaviQuest DFSMSHSM DFSMSdss DFSMSdfp DFSMSrmm ICF Catalog IDCAMs ICKDSF VSAM and Non-VSAM Datasets (PS PDS PDSE GDG)Vendor Products for storage management including IBM (TACM TAAM) CA (CA Disk CA-allocate and CA-1) FDR products Storage monitoring tools (Omegamon XE for storage BMC-SRM CA-Vantage)Expertise in Storage hardware subsystems including IBM DASD (DS8K) IBM Automated tape library and IBM Virtual tape library (TS7700 TS7720 TS7740 TS7760 TS7770)Configuration of DASD (carving & connecting) & Tape hardware (setting up TS7700) for mainframesExperience in EMC's storage (VMAX Powermax and DLM) and Replication (SRDF GDDR)Experience in Hitachi's storage (USPV VSP) and replication (HUR Shadow-Image BCM)... Click to read more.
|
||
Tell Me More ↓As a trusted and experienced Consultant you will be responsible for a vast number of essential technical components such as analyzing the customer's current state defining IT Strategy including key outcomes designing conceptual solutions planning and executing design and implementation work (with support from technical specialists) and accounting for time cost and quality targets. You will also develop IP and own specific assets tools and white papers articulating point of views in a specific domain assemble and lead a team of consultants and architects and facilitate and capture lessons learned from engagements to update methodologies and assets. IBMZ IBMi Application oriented approach for problem solving required relevant experience in development tools and specific application and system architecture. (IBM ADDI IBM ABO IDz EE BMC Topaz Workbench)Subject matter expertise in mainframe inclusive of System z and System i and adjacent environments (e.g. cloud computing cloud hyperscaler X86 midrange)... Click to read more.
|
||
Tell Me More ↓As a Customer Technology Advisor you will possess strong technical and business acumen allowing you to provide value driven solutions within the practice services domain(s). Your exceptional customer facing skills combined with your articulate communication style and interpersonal finesse will enable you to effortlessly convey the technical benefits of Kyndryl's capabilities perfectly matching the unique needs of each customer.Understanding of cybersecurity frameworks (e.g. NIST ISO 27001) and compliance requirements.... Click to read more.
|
||
Tell Me More ↓- Middleware (JBoss Cluster) Minimum 4 years of experience managing and administering JBoss clusters in high availability environments. - WebLogic Tomcat JBOSS Minimum 4 years of experience in the administration of WebLogic Tomcat and JBOSS. - CA API Gateway Minimum 4 years of experience implementing managing and optimizing CA API Gateway in production environments. - Confluent: 4 years of experience managing platforms based on Kafka (Confluent).- OpenShift: 4 years of experience in OpenShift administration and operation container optimization and resource management. - Workload. 4 years of experience managing and optimizing workloads on platforms such as OpenShift Red Hat etc. - Data Masking (TDM) Experience implementing data masking tools and processes. - Fortify (Code Security Analysis) Experience using Fortify or other static code security analysis tools. - Linux and Windows (Intermediate Level) Experience in administration and troubleshooting of Linux and Windows systems at an intermediate level. - IIS 3 years of experience in configuring and administering IIS in high availability environments.... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓Subject matter expertise in at least one platform (e.g. cloud computing cloud hyperscaler X86 mainframe midrange)Experience in Agile (Kanban SAFe and Scrum)Have experience with Operating Systems (Windows Linux Unix)... Click to read more.
|
||
Tell Me More ↓Subject matter expertise in at least one platform (e.g. cloud computing cloud hyperscaler X86 mainframe midrange)Experience in Agile (Kanban SAFe and Scrum)Have experience with Operating Systems (Windows Linux Unix)... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓ |
||
Tell Me More ↓Hands-on experience in any Public Cloud Infrastructure (AWS Azure GCP IBM)... Click to read more.
|
||
Tell Me More ↓Operating as a single point of contact (SPOC) for service delivery across different technologies and platforms.Perform root cause analysis resolution and or escalation for production systems (excluding business applications).Execute production subsystem (e.g. IMS CICS DB2 IDMS) started tasks restarts as per support team specifications during special activity changes and upgrading.Expertise in Job Control Language (JCL) and job abend codes.Experience with performance monitoring tools (OMEGAMON RMF SMF).... Click to read more.
|
||
Tell Me More ↓As a trusted and experienced Consultant you will be responsible for a vast number of essential technical components such as analyzing the customer's current state defining IT Strategy including key outcomes designing conceptual solutions planning and executing design and implementation work (with support from technical specialists) and accounting for time cost and quality targets. You will also develop IP and own specific assets tools and white papers articulating point of views in a specific domain assemble and lead a team of consultants and architects and facilitate and capture lessons learned from engagements to update methodologies and assets.• Subject matter expertise in at least three domains (e.g. cloud computing IT strategy infrastructure IT operations applications enterprise architecture solution architecture automation data management AI ML IoT and cloud governance models) to advise on industry-leading solutions• Data modeling and analytical experience using common tools (e.g. Excel Tableau)• Awareness of broad competencies and depth in specific competency areas (IT strategy enterprise architecture solution architecture process reengineering automation)... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓Planning and executing design and implementation work (with support from technical specialists)• Subject matter expertise in at least three domains (e.g. cloud networking DC_LAN Campus-LAN SD-WAN operations ITIL network automation network security IoT and governance models) to advise on industry-leading solutions... Click to read more.
|
||
Tell Me More ↓ |
||
Kyndryl Graduate Program - IT Strategy Consultant - Cloud / Security / Digital Workplace / Applications / Data / Network / Mainframe (m/f/x)
Tell Me More ↓Basic understanding of core services offered by established cloud hyperscalers (e.g. Microsoft AWS Google Cloud etc.).Understanding of IT operations and IT service management frameworks (e.g. ITIL COBIT).Applied experience in Agile (Kanban SAFe and Scrum)... Click to read more.
|
||
Kyndryl Graduate Program - IT Strategy Consultant - Cloud / Security / Digital Workplace / Applications / Data / Network / Mainframe (m/f/x)
Tell Me More ↓Basic understanding of core services offered by established cloud hyperscalers (e.g. Microsoft AWS Google Cloud etc.).Understanding of IT operations and IT service management frameworks (e.g. ITIL COBIT).Applied experience in Agile (Kanban SAFe and Scrum)... Click to read more.
|
||
Kyndryl Graduate Program - IT Strategy Consultant - Cloud / Security / Digital Workplace / Applications / Data / Network / Mainframe (m/f/x)
Tell Me More ↓Basic understanding of core services offered by established cloud hyperscalers (e.g. Microsoft AWS Google Cloud etc.).Understanding of IT operations and IT service management frameworks (e.g. ITIL COBIT).Applied experience in Agile (Kanban SAFe and Scrum).... Click to read more.
|
||
Tell Me More ↓The consulting organization you are leading will focus on creating new types of platforms and new platform managed services. This will include identifying potential platforms (for example we have considered the idea of standing up a platform that is specifically designed to host converted Cobol code that is now in Java... this requires a bunch of services in the platform like a console) and creating service capabilities to establish them for customers. It will also include working with existing service owners who have built Internal Development Platforms CI CD Platforms Legacy Infrastructure Platforms and more to help create managed capabilities for them.In order to fulfill all of these responsibilities you will need to be a seasoned professional with experience in managed services infrastructure platforms DevOps product management mindset (as opposed to siloed service management) an ability to collaborate across management structures geographies and leadership.... Click to read more.
|
||
Tell Me More ↓As a Core Enterprise Customer Technology Advisor you will possess strong technical and business acumen allowing you to provide value-driven solutions within the practice services domain(s). Your exceptional customer-facing skills combined with your articulate communication style and interpersonal finesse will enable you to effortlessly convey the technical benefits of Kyndryl's capabilities perfectly matching the unique needs of each customer.Develop initial technical solution strategy for capturing driving Core Enterprise and Z Digital Transformation-oriented professional services capabilities (Advisory Implementation and Management Services alike).Develop non-binding indicative estimate (NBIE) solution proposals to include cost cases to be priced draft deployment timelines technical operational dependencies draft architecture.Apply technical and competitive insights specific to Kyndryl's Core Enterprise and Z Practice professional services (also understand MicroFocus AWS Azure GCP but also Mainframe Modernisation solution engineering collaboration partnering concepts).Ability to develop non-binding indicative estimate (NBIE) solution proposals to include cost cases work breakdown structures to be priced draft deployment timelines technical operational dependencies draft architecture outcomes and related KPIs.AWS and or Azure and or GCP technical certification is a must (at least 1 of the 3).Strong understanding of automation techniques tools products (e.g. Ansible) and the role of automating in driving effective IT operations.... Click to read more.
|
||
Tell Me More ↓You're good at what you do and possess the required experience to prove it. However equally as important - you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused - someone who prioritizes customer success in their work. And finally you're open and borderless - naturally inclusive in how you work with others. Required Skills and Experience• 2+ years of experience in more than one of the following GRC frameworks; enterprise risk management internal audit regulatory compliance management policy management third party risk management • Working knowledge of common audit and compliance tools • Experience in analyzing and translating business requirements into control objectives designing security controls and implementation within a security management cycle • Excellent understanding of security standards and best practices e.g. ISO27001 NIST • Experience in advising clients on one or more regulatory requirements (e.g. HIPAA PCI DSS FBA GDPR DORA) • Experience performing GRC maturity assessments • Experience with coordinating SOC 2 and or ISO 27001 audits Preferred Skills and Experience• Valid and current certification in: CRISC - Certified in Risk and Information System Controls ; CGEIT - Certified in the Governance of Enterprise IT ; CERA - Chartered Enterprise Risk Analyst; CISM - Certified Information Security Manager; CISA - Certified Information Security Auditor; CISSP • Statistical analysis and models • Basic skills in network compute cloud computing • Understanding and daily use of Microsoft Office 365 Suite and other productivity tools (e.g. Excel Word PowerPoint SharePoint) to accomplish audit and compliance related tasks • Experience with project management and ability to manage security initiatives or projects... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓Storage dataset (RMM HSM CDS & Catalog file) reorganization.Storage box Configuration (DASD & Tape).Storage box data migration (DASD to DASD and Tape to tape)Disaster recovery planning & implementation (Tape recovery DASD Replication Tape Replication Hyperswap).Disk replication setup using the CSM (Copy Services Manager) GDPS.Storage Management related knowledge under the z OS: including DFSMS ISMF NaviQuest DFSMSHSM DFSMSdss DFSMSdfp DFSMSrmm ICF Catalog IDCAMs ICKDSF VSAM and Non-VSAM Datasets (PS PDS PDSE GDG)Vendor Products for storage management including IBM (TACM TAAM) CA (CA Disk CA-allocate and CA-1) FDR products Storage monitoring tools (Omegamon XE for storage BMC-SRM CA-Vantage)Expertise in Storage hardware subsystems including IBM DASD (DS8K) IBM Automated tape library and IBM Virtual tape library (TS7700 TS7720 TS7740 TS7760 TS7770)Configuration of DASD (carving & connecting) & Tape hardware (setting up TS7700) for mainframesExperience in EMC's storage (VMAX Powermax and DLM) and Replication (SRDF GDDR)Experience in Hitachi's storage (USPV VSP) and replication (HUR Shadow-Image BCM)... Click to read more.
|
||
Tell Me More ↓ |
||
Tell Me More ↓ |
||
Tell Me More ↓Your responsibilities include providing a perspective on the customer's industry and defining a solution strategy appropriate to the problem at hand. You will offer technical support to the sales force to implement new ideas and research emerging concepts and ideas. Additionally you will integrate the latest consulting and innovation offerings into the solutions approach. Collaborating with all internal entities you will design solve and document transformation solutions. You will define and propose solutions that are well integrated with the information systems (IS) and optimized for both the customer and our company. Ensuring the coherence of the technical solution and the associated cost model is crucial as is preventing risks and potential technical impacts based on the proposed solutions. You will assist with the project's deployment ensuring compliance with the chosen standards and work closely with other architects. Creating processes to improve the efficiency of our customers or our own efficiency is also part of your role. You will be active in design activities including high-level design (HLD) low-level design (LLD) and costings. Finally you will be responsible for the performance availability and scalability of the infrastructure.Computing technologies: SDE (Software Defined Environment) infrastructures Containers and Microservices Object storageIT Department processes and organisation (ITIL practices DevSecOPs ChatOps FinOps SRE)... Click to read more.
|
||
Tell Me More ↓【KJTS】IT ヘルプデスク (沖縄)... Click to read more.
|
||
Tell Me More ↓• Work in 8X5 model as part of Global SOC Team that operates in office time with possible on-call (8:00 - 17:00)• Provide insight and expertise to examine malicious code (malware) attack vectors network communication methods analyze threats against target systems and networks determine target network capabilities and vulnerabilities.Ongoing wellbeing initiatives (including mental health support) team outings and seasonal gifts.spouses and children (provided certain conditions are met).Personal and professional development both in-person and online (certified trainings on-the-job coaching & mentoring career progression support); we also nurture new talent and 'career changers' through our comprehensive education programs and exclusive accreditations.Flexible working opportunities (part-time and home office) for a better work-life balance.Proven experience with operations using commonly used information security solutions (with main focus on MS Sentinel MS Defender)Experience in Cloud Security monitoring and in advanced analytics (UEBA)Knowledge of the most common and used frameworks (E.g. NIST CSF ISO2700x CMM SOC etc.)English: Fluent (German would be a plus)CompTIA Security+ GIAC Security Essentials Certification (GSEC) SIEM & EDR Foundation certificates (Such as Microsoft Sentinel and Defender).Microsoft Splunk SANS.org security certifications related to SIEM EDR products and operations (in example Microsoft AZ-500)Knowledge on MITRE Frameworks (ATT&CK D3FEND)Knowledge of threat actor groups tactics techniques and procedures (TTPs).... Click to read more.
|
||
Tell Me More ↓3 to 5 years of experience in Knowledge of the regulatory frameworks of Security in Audits (PCI SOX etc).Certified Information Systems Security Professional (CISSP)... Click to read more.
|
||
Tell Me More ↓Hands-on experience in any Public Cloud Infrastructure (AWS Azure GCP IBM)... Click to read more.
|
||
Tell Me More ↓Hands-on experience in any Public Cloud Infrastructure (AWS Azure GCP IBM)... Click to read more.
|
||
Tell Me More ↓(ECSA - Epic Certified Cloud Architect)Architect and design cloud solutions for Epic applications (EHR Epic Cogito MyChart etc.) ensuring high performance scalability and security.Lead the migration of Epic systems and applications to cloud platforms (AWS Azure GCP) optimizing infrastructure for cloud-native environments.Utilize cloud-native technologies (containers Kubernetes) and manage services like load balancing (e.g. Citrix NetScaler Big IP F5) and Virtual Desktop Infrastructure (VDI) solutions.Create technical documentation and diagrams for cloud-based Epic solutions (e.g. Visio draw.io).Public Cloud Certification Experience (AWS Azure etc.).Knowledge of load-balancing technologies (e.g. Citrix NetScaler Big IP F5).Proficiency with MS Office tools (Visio Project PowerPoint Excel etc.) and SharePoint.... Click to read more.
|