The point where experts and best companies meet
Share
Security Infrastructure Development:
Design, build, and deploy perimeter security solutions, including firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and VPNs.
Implement security measures that effectively safeguard the organization's network periphery.
Ensure new security solutions are seamlessly integrated into the existing network architecture.
:
Understand and manage network routing protocols and configurations.
Ensure optimal network performance and security through effective routing strategies.
Troubleshoot routing issues and optimize network routes for security and efficiency
Configuration and Implementation:
Configure security infrastructure for optimal protection and performance.
Collaborate with network architects and IT teams to ensure alignment of security measures with overall network strategy.
Documentation and Compliance:
Document build processes, configurations, and standard operating procedures.
Ensure compliance with relevant security policies and regulatory standards in all implementation tasks.
Collaboration and Communication:
Work closely with various internal teams and security vendors to enhance perimeter security.
Effectively communicate project statuses, challenges, and achievements to stakeholders.
Qualifications:
Bachelor’s degree in computer science. Information Technology, Cybersecurity, or related field.
10 years of experience in network security, with a focus on security infrastructure development and implementation.
Strong familiarity with security technologies, including but not limited to Checkpoint, Palo Alto Networks, and Cisco.
Knowledge of network protocols, routing, and firewall management.
Basic Understanding of automation scripting languages such as Python or PowerShell or Ansible is desirable.
Understanding of Cloud Security is an advantage.
Skills:
Excellent technical skills with a strong focus on security infrastructure and problem-solving.
Ability to manage multiple projects and tasks simultaneously.
Strong communication and teamwork capabilities.
Detail-oriented approach with a commitment to high-quality outcomes.
This job description provides a high-level review of the types of work performed. Other job-related duties may be assigned as required.
Information Security
Time Type:
View the " " poster. View the .
View the .
View the
These jobs might be a good fit