Monday, April 6, 2020

Security Engineer Tier 3

Job Title: Security Engineer Tier 3
Duration: Long-term
Location: Austin, TX (Remote till COVID 19)
Phone Hire

Job Description
The preferred candidate will have a total of 10 years' experience in the Information Technology/ Information Security industry, with minimum of 5 years of experience as a Security Engineer configuring and maintaining Network Security technologies.

This is an engineer role and the candidate must be able to demonstrate ability to install, manage and maintain Firewalls in both on-premise and cloud environments.  Demonstrated experience in supporting CISCO Firewalls as an engineer is REQUIRED.   Holding one or more CISCO Security Certifications is REQUIRED. Holding one or more vendor-neutral security certifications (e.g., Security +, CISM, CISSP) is a plus for this position.

Selected candidates must be US Citizens, pass a CJIS background check process, and complete basic safety and security training to meet the customer requirements.
·        Provision firewalls for customer.
·        Perform Changes to Firewalls as specified by customers.
·        Develop and maintain rule sets for firewalls.
·        Help determine tactics, techniques, and procedures (TTPs) for firewalls.
·        Recommend computing environment vulnerability corrections.
·        Vendor certifications such as CCNP or Fortinet Network Security Expert Level 4 or better are desirable.
·        Other industry certifications such as CISSP, GCIH, CEH, etc. are a plus.
·        Ability to configure, deploy, and troubleshoot Cisco and Fortigate Firewall Platforms
·        Ability to configure, deploy, and troubleshoot Imperva and Fortigate Web Application Firewall Platforms
·        Under limited supervision support and engineering of the WAF and Firewall policies
·        Engineer and Architect solutions using WAFs, firewalls or other security products. Develops and maintains WAF and firewall security design documentation.
·        Work with internal delivery teams to integrate applications with WAF policies
·        Provide accurate and timely reporting on all project deliverables
·        Recommends secure and effective solutions for system/application development in compliance with Information
·        Ability to analyse firewall configurations and rule sets.
·        Working knowledge of VMWare NSX or Fortigate VMX
·        Working knowledge of McAfee SIEM/Security Suite knowledge preferred
·        Working knowledge of Windows Active Directory Domains
·        Working Knowledge of various Linux OS
·        Strong Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
·        Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
·        Knowledge of computer networking concepts and protocols, and network security methodologies.
·        Knowledge of cybersecurity and privacy principles.
·        Knowledge of cyber threats and vulnerabilities.
·        Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.
·        Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
·        Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
·        Knowledge of incident response and handling methodologies.
·        Knowledge of network traffic analysis methods.
·        Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
·        Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
·        Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
·        Knowledge of security system design tools, methods, and techniques.
·        Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities.
·        Knowledge of defense-in-depth principles and network security architecture.
·        Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
·        Knowledge of the common attack vectors on the application layer.
·        Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
·        Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored).
·        Knowledge of system administration, network, and operating system hardening techniques.

Ashish Verma
IDC Technologies Inc
Work: 408-650-6283