Job Details
Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:
Skills And Tools:
Job Description
- Configure and monitor a variety of security devices and tools, including but not limited to: Routing, TCP-IP, Anti-Virus endpoint, IDS/IPS, Firewalls, SIEM, NAC, patch management, and Vulnerability Management tools, etc.
- Create and execute policy and audit plans; identify security risks and operation needs.
- Remain up to date with current attack methods and characteristics in order to identify threats and advice on prevention, mitigation and remediation.
- Monitor, troubleshoot and analyze network performance across the organizations LANs, WANs and wireless deployments
- Troubleshooting LAN, WAN, VPNs, and Internet connectivity issues
- Ensures compliance with all applicable configuration standards.
- Generates reports on assessment findings and summarizes them to facilitate remediation tasks.
- Plans develops and executes vulnerability scans of organization information systems.
- Research emerging threats and vulnerabilities to aid in the identification of network incidents.
- Recommends improvements to the Information Security Program to the IT team
- Administers and troubleshoots domain accounts, business applications, and infrastructure system accounts through the entire lifecycle (creation, modification, deletion) throughout the enterprise.
- Responds to inquiries regarding logs and reports of domain controllers, business applications and infrastructure systems.
Job Requirements
- +4 years of experience
- Knowledge of common L4-L7 protocols such as SSL, HTTP, DNS, SMTP and IPSec
- A degree in computer science, IT, systems engineering, or related qualification.
- Experience with Firewalls especially Sophos (functionality and maintenance) and Endpoint Security.
- CCNA & MCITP knowledge is a must
- Knowledge of industry standards for Information Security & Cloud Security
- Knowledge of system security (e.g. intrusion detection systems) and data backup/recovery
- Have knowledge about SIEM Solutions.
- Strong attention to detail with an analytical mind and outstanding problem-solving skills.
- Great awareness of cybersecurity trends and hacking techniques