Security Engineer with Network Background

Remote - Torrance, California, United States

Applications have closed

The Security Engineer will be responsible will be providing assessment, architecture, design, engineering, administration, and hands-on operational support. This individual will also be responsible for implementation and administration of network security hardware and software, enforcing the network security policy and complying with requirements of external security audits and recommendations. The Security Engineer will also be responsible for designing, installing, maintaining, and supporting LAN, WAN and VoIP infrastructures for high-profile T2 clients. They will provide high-level technical support for voice and data network systems, create and maintain network documentation, maintain hardware and software standards, and work on projects as needed in order to upgrade to new and improved communication equipment and procedures. The Security Engineer must be well versed with the advanced engineering and administration of multi-protocol routers, multilayer switches, network security devices and network management systems.

Other responsibilities include:

  • Analyzing, troubleshooting and correcting network security events remotely and on-site.
  • Performing analysis of system/network security needs and contributes to design, integration, and installation of hardware and software.
  • Maintaining and administering perimeter security systems such as firewalls and intrusion detection systems
  • Project management, documentation, and strong communication skills.

Ideal candidates should be proficient in the following technology areas:

  • Firewall and packet inspection technologies
  • Authentication and encryption technologies
  • Intrusion Prevention technologies
  • Remote access technologies
  • DNS/DHCP administration using bind and/or IP management software suite
  • Application and session layer load balancing technologies (F5 preferred)
  • TCP/IP and security protocols
Routing and switching

Requirements

Requirements:

  • Functional knowledge of LAN/WAN communications, network hardware such as Palo Alto/Cisco routers, ethernet switches, bridges, gateways and firewalls.
  • Experience with cybersecurity threat and vulnerability analysis.
  • Experience with investigation, documentation, and remediation of system/network vulnerabilities.
  • Experience working with SIEM, vulnerability and penetration tests
  • Functional knowledge of routing protocols such as RIP, EIGRP, BGP and OSPF
  • Strong understanding and practical experience with technologies like MPLS, VPLS, MLA VPNs and Traffic Engineering.
  • Duties involve among others, management of local and wide area network, projects, and installation of new devices, system and on-going maintenance of infrastructure
  • Performing analysis of network/system security needs and contributes to design, integration, and installation of hardware and software.
  • Maintaining and administering perimeter security systems such as firewalls and intrusion detection systems
  • In-depth knowledge of:
    • Firewall and packet inspection technologies
    • Authentication and encryption technologies
    • Intrusion Prevention technologies
    • Remote access technologies
    • TCP/IP and security protocols

Preferred Skills and Experience:

  • Identity Access Management (IAM)
    • OKTA Lifecycle Management is a plus
  • SSO, MFA


Desired Certifications:

  • MCSE, CCNA, CCNP, CCIE, CNE

Benefits

Medical, Dental, Vision, 401-K, generous vacation and other.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits CCNP DNS Encryption Firewalls IAM Intrusion detection Intrusion prevention Network security SIEM SSO TCP/IP VPN Vulnerabilities

Perks/benefits: Health care

Regions: Remote/Anywhere North America
Country: United States
Job stats:  19  4  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.