Network Architect---Oklahoma (Onsite) at Remote, Remote, USA |
Email: [email protected] |
From: Mohammed Shaik, www.abidisolutions.com [email protected] Reply to: [email protected] Job Title: Network Architect Location: Oklahoma (Onsite) Locals preferred (Relocation is also Allowed) Only USC/ GC Network Architecture and Design: Proficiency in designing and implementing complex network architectures. Experience with network segmentation, redundancy, and resilience strategies. Knowledge of both traditional and modern network technologies (SD-WAN, MPLS, etc.). Cybersecurity Skills: Expertise in network security principles and best practices. Familiarity with various security technologies like firewalls, intrusion detection/prevention systems, and VPNs. Understanding of threat modeling and risk assessment in network design. Industrial Control Systems (ICS) and SCADA: Experience with ICS and SCADA systems, which are commonly used in electrical utilities. Knowledge of the security challenges and protocols specific to operational technology (OT) and ICS environments. Compliance and Regulatory Standards: Understanding of relevant industry standards and regulations such as NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection). Ability to ensure network designs comply with these regulatory requirements. Experience in Electrical Utility Environments: Direct experience or strong understanding of the operational environment of electrical utilities. Knowledge of utility-specific technologies like smart grids and distributed energy resources. Responsibilities Participates in workstream planning process including inception, technical design, development, testing and delivery of security solutions; Collaborates closely with infrastructure, architecture and application teams to design security solutions that incorporate present and future views of security; Leads the design and implementation of network security solutions for intrusion detection and notification, security auditing, alerting, and response. Defines and validates baseline security configurations for networking and telecommunications equipment; Collaborates with IT Security Architects on optimization of the security footprint (tools enhancement, hardware improvements, new software tools, etc.); Troubleshoots, diagnoses and resolves high severity security issues or problems escalated by senior leadership; Collaborates in the development of security implementation requirements, acceptance criteria, and assists in generating statements of work (SOWs); Participates in discussions with architecture team around security standards and practices; Communicates and influences other engineers, managers and business/clinical teams on ensuring policies and procedures regarding use of security products, techniques, and patterns are followed; Directs efforts to identify discrepancies resulting from security audits, develops plans for corrective action, and tracks actions to closure; Recommends security products by researching needs and evaluating corporate standards list; Reviews security information system schematics, diagrams, and other program documentation to assist with development and preparation of cost estimates; Designs and implements security solutions for intrusion detection and notification, security auditing, alerting, and response, background with Palo Alto Networks preferred. Performs capacity and future growth planning of the enterprise security infrastructure to ensure a highly available security environment; Analyzes and reports on key security metrics and Key Performance Indicators (KPIs); Certifies the security functionality of network components and services within the release; Implements security solutions for intrusion detection and notification, security auditing, alerting, and response, virus detection and removal, password complexity enforcement, and media protection; Verifies security systems by developing and implementing test scripts and running security scans; Validates baseline security configurations for operating systems, applications, networking and telecommunications equipment; Maximizes security footprint by monitoring security tools, troubleshooting escalated security problems and incidents, scheduling security upgrades, identifying security gaps, and evaluating and implementing enhancements; Troubleshoots, diagnoses, and resolves problems; keeps customers informed about network security problems and resolutions; Communicates status and documents problems and resolutions for future reference; Evaluates vendor solutions to ensure compliance with requirements and cost-effectiveness; Maintains enterprise IT standards across the network security; Responsible for managing Tier 2 and Tier 3 incidents response Keywords: information technology green card South Dakota |
[email protected] View all |
Mon Feb 19 23:49:00 UTC 2024 |