Lead Cybersecurity EngineerNetwork
Experience: 812 years
MustHave: Expertise in Intrusion Detection Systems (IDS) Network Detection and Response (NDR) and Cloud Security
Requirements:
8 years of overall Enterprise IT Security experience preferably in technical security roles or operations.
Domain expertise in network security controls including Intrusion Detection Systems (IDS) Network Detection and Response (NDR) and Cloud security.
Knowledge of PCI/DSS ISO 27002 SOC 2 and its technical controls.
Responsible for effectiveness and continuous improvement of security controls.
Experience in IT systems and/or networking infrastructure.
Indepth understanding of all layers of the OSI model TCP/IP network fundamentals and networking hardware such as routers switches and firewalls.
Familiarity with Enterprise firewalls particularly Palo Alto Netskope Web Gateway Jamf Protect and EDR tools (a plus).
Experience in multifactor authentication intrusion detection and managing threat intelligence.
Knowledge of border testing security policies DR procedures & policies remediation strategies and risk assessment within the industry.
Strong understanding of IT controls including security concepts and terminology related to applications databases operating systems and IT operations
Experience in data protection & archiving disaster recovery business continuity and implementation
Ability to write and deploy security policies and procedures as needed.
Relevant security certifications such as OSCP ISC2 CISSP SANS CEH etc. are a major plus.
IT Security Responsibilities:
Manage IT Security Operations budget and resources and participate in IT planning and project management.
Strengthen and formalize security processes both within the security team and with other supporting resources.
Oversee and manage security projects including design implementation and integration of new or upgraded technologies.
Manage industry best practice guidance and security hardening guidelines for all OF technologies.
Manage the Identity and Access Management (IAM) Program.
Work closely with crossfunctional teams to communicate and integrate control requirements.
Manage all internal and external security compliance engagement activities.
Manage document and communicate compliance requirements timelines and road map to supporting teams and leadership.
Develop and implement a security training program based on policies.
Communicate the compliance posture and effectiveness to management on a scheduled basis.
Develop and work with supporting teams to design and implement an automated control strategy and exception reporting process.
IT Network Responsibilities:
Proactively monitor and handle problems related to networks
Monitor network traffic and troubleshoot networks in case of problems
Monitor and resolve issues of LAN and WAN
Troubleshoot and monitor the LAN connectivity
Monitor network changes and configure them to ensure the best possible application performance for endusers
Troubleshoot network issues onsite and with higher levels of support as required
Manage VLANs Trunks Ether channels and switching environments
Configure and maintain security switching and wireless infrastructure
Good understanding of Routing Global Protect VPN policies NAT in PaloAlto firewalls
Good understanding of wireless management systems and their troubleshooting
Monitor network issues such as Packet Loss and Latency issues
Troubleshoot and maintain Remote Access VPN networks.
pci/dss,network detection and response,wireless management systems,soc 2,jamf protect,switches,lan troubleshooting,iso 27002,nat,network security,intrusion detection system,compliance requirements,multi-factor authentication,remote access vpn networks,cyber security,intrusion detection systems (ids),it controls,disaster recovery,it planning,project management,osi model,netskope web gateway,security certifications,routers,tcp/ip network fundamentals,security policies,security processes,data protection,cloud security,threat intelligence,security compliance engagement activities,dr procedures,network monitoring,network detection and response (ndr),trunks,security projects,identity and access management (iam) program,vlans,automated control strategy,routing,global protect vpn,risk assessment,it security operations,ether channels,business continuity,edr tools,palo alto,integration of technologies,firewalls,security training program