Job Details
Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:
Skills And Tools:
Job Description
- Configure and monitor a variety of security devices and tools, including but not limited to: Anti-Virus endpoint, IDS/IPS, Firewalls, SIEM, NAC, patch management, and Vulnerability Management tools, etc.
- Create and execute policy and audit plans; identify security risks and operation needs.
- Remain up to date with current attack methods and characteristics in order to identify threats and advice on prevention, mitigation and remediation.
- Monitor, troubleshoot and analyse network performance across the organizations LANs, WANs and wireless deployments
- Ensures compliance with all applicable configuration standards.
- Generates reports on assessment findings and summarizes them to facilitate remediation tasks.
- Plans, develops, and executes vulnerability scans of organization information systems.
- Research emerging threats and vulnerabilities to aid in the identification of network incidents.
- Recommends improvements to the Information Security Program to the IT Manager.
- Recommends improvements to the Information Security Program to the IT Manager.
- Administers and troubleshoots domain accounts, business applications, and infrastructure system accounts through the entire lifecycle (creation, modification, deletion) throughout the enterprise.
- Responds to inquiries regarding logs and reports of domain controllers, business applications and infrastructure systems.
Job Requirements
- Bachelor’s degree in computer science (or related area) preferred.
- Knowledge of industry standards for Information Security.
- Knowledge of a programming language, such as PERL, C, Python, Ruby, etc.
- Good knowledge of Cisco ISE, WSA, IronPort, ASA with firepower.
- Good knowledge of Palo alto and next-generation firewalls.
- Problem Solving Skills.
- Expertise in all types of network security applications, protocols, and procedures.