Home

Urgent ::Security Engineer Perimeter at Remote, Remote, USA
Email: [email protected]
From:

ashish,

Tekinspirations

[email protected]

Reply to:   [email protected]

Hi,

Job Title: Security Engineer Perimeter

Remote

Total of 10 years' experience in the Information Technology industry, with minimum of 5 years of experience in Information Security.

Experience deploying and maintaining security technologiesand the systems they run on to support MSSP environment.

Experience in Cloud and/or Data Center technologies and strong knowledge of VMWare and virtual technologies. 

Vendor certifications on one or more core technologies (VMWare, McAfee, Fortinet, Cisco) are preferred but may be compensated by experience.

Responsibilities:

Provision firewalls and WAFs for customer.

Develop and maintain rule sets for firewalls.

Help determine tactics, techniques, and procedures (TTPs)for firewalls.

Recommend computing environment vulnerability corrections.

Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).

Perform patch management for MSSP Security tools and customer's security tools.

Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.

Ability to work with provided security policies to design and implement network and security rules and configurations across varioussecurity platforms.

Qualifying Experience and Attributes :

 Vendor certifications such as CCNP or Fortinet Network Security Expert Level 4 or better are desirable.

Other industry certifications such as CISSP, GCIH, CEH etc. are a plus.

Ability to configure, deploy, and troubleshoot Cisco and FortiGate Firewall Platforms

Ability to configure, deploy, and troubleshoot Imperva and FortiGate Web Application Firewall Platforms

Under limited supervision support and engineering of the WAF and Firewall policies

Engineer and Architect solutions using WAFs, firewalls or other security products. Develops and maintains WAF and firewall securitydesign documentation.

Work with internal delivery teams to integrate applications with WAF policies

Provide accurate and timely reporting on all project deliverables

Recommends secure and effective solutions for system/application development in compliance with Information

Ability to analyze firewall configurations and rule sets.

 Working knowledge of VMWare NSX or FortiGate VMX

 Strong knowledge of VMWare Solutions (vCenter and VSAN a big plus)

McAfee SIEM/Security Suite knowledge preferred

 Strong knowledge of Virtualized and/or Cloud Computing.

 Working knowledge of Windows Active Directory Domains

Working Knowledge of various Linux OS

 Strong Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Ability to interpret the information collected by network tools (e.g. NS lookup, Ping, and Traceroute).

Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge of cybersecurity and privacy principles.

Knowledge of cyber threats and vulnerabilities.

Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.

Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).

Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).

Knowledge of incident response and handling methodologies.

Knowledge of network traffic analysis methods.

Knowledge of new and emerging information technology (IT)and cybersecurity technologies.

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge of security system design tools, methods, and techniques.

Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities.

Knowledge of defense-in-depth principles and network security architecture.

Knowledge of different types of network communication(e.g., LAN, WAN, MAN, WLAN, WWAN).

Knowledge of cyber defense and information security policies, procedures, and regulations.

Knowledge of the common attack vectors on the application layer.

 Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).

 Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored).

 Knowledge of system administration, network, and operating system hardening techniques.

 Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

 Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

 Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

 Knowledge of packet-level analysis using appropriate tools(e.g., Wireshark, tcpdump).

 Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge of how to use network analysis tools to identify vulnerabilities.

Skill in using protocol analyzers.

Keywords: information technology
[email protected]
View all
Sat Jan 21 05:20:00 UTC 2023

To remove this job post send "job_kill 298553" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,