Home

Network Architect---Oklahoma (Onsite) at Remote, Remote, USA
Email: [email protected]
From:

Mohammed Shaik,

www.abidisolutions.com

[email protected]

Reply to:   [email protected]

Job Title: Network Architect

Location: Oklahoma (Onsite) Locals preferred (Relocation is also Allowed)

Only  USC/ GC

Network Architecture and Design:

Proficiency in designing and implementing complex network architectures.

Experience with network segmentation, redundancy, and resilience strategies.

Knowledge of both traditional and modern network technologies (SD-WAN, MPLS, etc.).

Cybersecurity Skills:

Expertise in network security principles and best practices.

Familiarity with various security technologies like firewalls, intrusion detection/prevention systems, and VPNs.

Understanding of threat modeling and risk assessment in network design.

Industrial Control Systems (ICS) and SCADA:

Experience with ICS and SCADA systems, which are commonly used in electrical utilities.

Knowledge of the security challenges and protocols specific to operational technology (OT) and ICS environments.

Compliance and Regulatory Standards:

Understanding of relevant industry standards and regulations such as NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection).

Ability to ensure network designs comply with these regulatory requirements.

Experience in Electrical Utility Environments:

Direct experience or strong understanding of the operational environment of electrical utilities.

Knowledge of utility-specific technologies like smart grids and distributed energy resources.

Responsibilities

Participates in workstream planning process including inception, technical design, development, testing and delivery of security solutions;

Collaborates closely with infrastructure, architecture and application teams to design security solutions that incorporate present and future views of security;

Leads the design and implementation of network security solutions for intrusion detection and notification, security auditing, alerting, and response.

Defines and validates baseline security configurations for networking and telecommunications equipment;

Collaborates with IT Security Architects on optimization of the security footprint (tools enhancement, hardware improvements, new software tools, etc.);

Troubleshoots, diagnoses and resolves high severity security issues or problems escalated by senior leadership;

Collaborates in the development of security implementation requirements, acceptance criteria, and assists in generating statements of work (SOWs);

Participates in discussions with architecture team around security standards and practices;

Communicates and influences other engineers, managers and business/clinical teams on ensuring policies and procedures regarding use of security products, techniques, and patterns are followed;

Directs efforts to identify discrepancies resulting from security audits, develops plans for corrective action, and tracks actions to closure;

Recommends security products by researching needs and evaluating corporate standards list;

Reviews security information system schematics, diagrams, and other program documentation to assist with development and preparation of cost estimates;

Designs and implements security solutions for intrusion detection and notification, security auditing, alerting, and response, background with Palo Alto Networks preferred.

Performs capacity and future growth planning of the enterprise security infrastructure to ensure a highly available security environment;

Analyzes and reports on key security metrics and Key Performance Indicators (KPIs);

Certifies the security functionality of network components and services within the release;

Implements security solutions for intrusion detection and notification, security auditing, alerting, and response, virus detection and removal, password complexity enforcement, and media protection;

Verifies security systems by developing and implementing test scripts and running security scans;

Validates baseline security configurations for operating systems, applications, networking and telecommunications equipment;

Maximizes security footprint by monitoring security tools, troubleshooting escalated security problems and incidents, scheduling security upgrades, identifying security gaps, and evaluating and implementing enhancements;

Troubleshoots, diagnoses, and resolves problems; keeps customers informed about network security problems and resolutions;

Communicates status and documents problems and resolutions for future reference;

Evaluates vendor solutions to ensure compliance with requirements and cost-effectiveness;

Maintains enterprise IT standards across the network security;

Responsible for managing Tier 2 and Tier 3 incidents response

Keywords: information technology green card South Dakota
[email protected]
View all
Mon Feb 19 23:49:00 UTC 2024

To remove this job post send "job_kill 1133666" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,