Systems, Infrastructure & Security Management
What We Do
In a modern enterprise, Infrastructure Management is a big challenge. The pace at which, technology changes, can quickly lead to chaos unless it is managed in a controlled way. In order to achieve this and to proactively meet the challenges of the future, one needs Tooling. Our teams at ISL, work on making these tools possible and also help customers use these tools to achieve their goals.
The Tivoli suite of products addresses the space of IT Infrastructure Management & Security - be it the challenge of managing the identity of the users who log into the enterprise's systems to control the access to the data they can see, or to provide the support to customers and the enterprise employees. Activities in our department are related mostly to the Tivoli Security product offerings. They include server and client side development, product testing & support, information development (technical documentation).
Supported by the most versatile and complete set of systems management tools, we are now working on the state of the art automation of infrastructure management. This is complemented by an active team working in the area of Autonomic Computing.
For more information, visit http://www.ibm.com/software/in/tivoli/
Why would someone want to come and work in the area?
IT Service management has had a history of over 25 years. The constant quest for delivering the best and making sure that all the resources are used to their maximum capacity is ever challenging. Added to this, the constant threat of breach of security makes for a very dynamic work environment. And, one can not escape constant learning. In this environment staying innovative becomes a second nature. IBM Tivoli has best of the breed offering in the Security and Storage Management area's with Gartner rating Tivoli security products in the magic quadrant. Successful candidates would have opportunity to build on existing software development skills to help deliver enterprise class large scale Identity and Security products. They would also get to work in cross-functional and geographically dispersed teams to deliver a specific line, project or a SDLC phase for a product.
Skills Important to the area
A typical candidate will be a mature programmer with excellent application and systems level development experience. A good appreciation of the domain of Identity management, Security & Systems management would an added advantage. An ideal candidate would have that invaluable quality of maturity and an eternal quest to learn more.
The Key technical skills are