We are seeking a candidate with the following experience:
- 8 years of overall Enterprise IT Security experience preferably in technical security roles or operations.
- Domain expertise of network security controls including Intrusion Detection Systems (IDS) Network
- Detection and Response (NDR) and Cloud security.
- Knowledge of PCI/DSS ISO 27002 SOC 2 and its technical controls.
- Responsible for effectiveness and continuous improvement of security controls.
- Experience in IT systems and/or networking infrastructure.
- Indepth understanding of all layers of the OSI model TCP/IP network fundamentals networking hardware such as routers switches and firewalls.
- Familiarity with Enterprise firewalls particularly Palo Alto Netskope Web Gateway Jamf Protect and EDR tools (a plus).
- Experience in multifactor authentication intrusion detection and managing threat intelligence.
- Strong decisionmaking and analytical skills
- Knowledge of border testing security policies DR procedures & policies remediation strategies and risk assessment within the industry.
- Ability to complete work to given quality standards by agreedupon deadlines
- Willingness to learn new product lines and technologies quickly and efficiently
- Strong understanding of IT controls including security concepts and terminology related to applications databases operating systems and IT operations
- Experience in data protection & archiving disaster recovery business continuity and implementation
- Excellent written communication skills demonstrating the ability to write with purpose clarity and accuracy
- Ability to write and deploy security policies and procedures as needed.
- Relevant security certifications such as OSCP ISC2 CISSP SANS CEH etc. are a major plus.
- Job Description:
- IT Security Responsibilities:
- Manage IT Security Operations budget and resources and participate in IT planning and project management.
- Strengthen and formalize security processes both within the security team and with other supporting resources.
- Oversee and manage security projects including design implementation and integration of new or upgraded technologies.
- Manage industry best practice guidance and security hardening guidelines for all OF technologies.
- Manage the Identity and Access Management (IAM) Program.
- Work closely with crossfunctional teams to communicate and integrate control requirements.
- Manage all internal and external security compliance engagement activities.
- Manage document and communicate compliance requirements timelines and road map to supporting teams and leadership.
- Develop and implement a security training program based on policies.
- Communicate the compliance posture and effectiveness to management on a scheduled basis.
- Develop and work with supporting teams to design and implement an automated control strategy and exception reporting process.
- IT Network Responsibilities:
- Proactively monitor and handle problems related to networks
- Monitor network traffic and troubleshoot networks in case of problems
- Monitor and resolve issues of LAN and WAN
- Troubleshoot and monitor the LAN connectivity of the entire Networks
- Monitor network changes and configure them to ensure the best possible application performance for end users
- Troubleshoot network issues onsite and with higher levels of support as required
- Manage VLANs Trunks Ether channels and switching environments
- Configure and maintain security switching and wireless infrastructure
- Good understanding of Routing Global Protect VPN policies NAT in PaloAlto firewalls
- Ability to work independently with minimal guidance
- Good understanding of wireless management systems and their troubleshooting
- Monitor network issues such as Packet Loss and Latency issues
- Troubleshoot and maintain Remote Access VPN networks.
isc2 cissp,ceh,intrusion detection,threat intelligence,enterprise firewalls,tcp/ip network fundamentals,ids/ips,iso 27002,switches,security certifications,tcp/ip,netskope,intrusion detection systems (ids),routing,oscp,it controls,network detection and response (ndr),business continuity,cloud security,ndr,palo alto,data protection,it security,dr procedures,pci/dss,network security controls,disaster recovery,sans,osi model,multi-factor authentication,firewalls,soc 2,jamf protect,cyber security,edr tools,security policies,risk assessment,netskope web gateway