Network Security / en Senior Security Engineer /job-opening/senior-security-engineer-1 <span>Senior Security Engineer</span> <div class="text-long"><p style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);box-sizing:border-box;color:rgb(38, 35, 33);font-family:Circular, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen, Ubuntu, Cantarell, &quot;Fira Sans&quot;, &quot;Droid Sans&quot;, &quot;Helvetica Neue&quot;, sans-serif;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;line-height:var(--line-height-base);margin-bottom:1rem;margin-top:0px;orphans:2;outline:none;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;" id="isPasted"><strong style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;"><u style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Responsibilities:</u></strong><br>&nbsp;</p><p style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);box-sizing:border-box;color:rgb(38, 35, 33);font-family:Circular, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen, Ubuntu, Cantarell, &quot;Fira Sans&quot;, &quot;Droid Sans&quot;, &quot;Helvetica Neue&quot;, sans-serif;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;line-height:var(--line-height-base);margin-bottom:1rem;margin-top:0px;orphans:2;outline:none;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;" id="isPasted">The Security Engineer role includes platform Security Monitoring and Analytics; overseeing and performing Security Engineering tasks and functions; and developing and maintaining application security services for lab and production environments, supporting number porting services for the NPAC (Number Porting Administration Center). In addition, the candidate will be responsible for securing existing systems and applications; evaluating the security for 3<sup style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">rd</sup> party applications, host systems, development software, devices, and technologies for vulnerabilities; and developing requirements for related security solutions. Candidate must develop a thorough understanding of the solution (platform, application, and processes being developed and implemented) to fully meet the technical requirements of the position.&nbsp;</p><p style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);box-sizing:border-box;color:rgb(38, 35, 33);font-family:Circular, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen, Ubuntu, Cantarell, &quot;Fira Sans&quot;, &quot;Droid Sans&quot;, &quot;Helvetica Neue&quot;, sans-serif;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;line-height:var(--line-height-base);margin-bottom:1rem;margin-top:0px;orphans:2;outline:none;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;">&nbsp;<strong style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Some essential functions of the role include, but are not limited to the following:</strong></p><ul style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);box-sizing:border-box;color:rgb(38, 35, 33);font-family:Circular, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen, Ubuntu, Cantarell, &quot;Fira Sans&quot;, &quot;Droid Sans&quot;, &quot;Helvetica Neue&quot;, sans-serif;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;orphans:2;outline:none;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;"><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;"><strong style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Must be available to support changes and maintenance windows, as needed and required (off-hours).</strong></li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;"><strong style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Must be available to work in the Security 24 x 7 On-Call rotation and initiate escalation procedures to counteract potential threats/vulnerabilities.</strong></li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Assist with incident response and potential breach activities, on a 24x7 schedule, if necessary.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Conduct security assessments to identify vulnerabilities in existing systems.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Design and implement security measures to protect against potential threats.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Develop, implement, and manage security policies and procedures.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Test, evaluate, deploy, and configure security products and solutions.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Administer and support security platform components including: &nbsp;SIEM, HIDS, NIDS, FW, WAF, etc.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Create and update SIRP response plans and lead incident response teams.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Monitor system, network, and application activity for signs of unauthorized access or malicious activity.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Perform security audits and risk assessments.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;" id="isPasted"><strong style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Bachelor’s degree in computer science, computer engineering, or similar technical discipline or 6+ years of equivalent work experience.</strong></li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;" id="isPasted"><strong style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;font-weight:bolder;outline:none;">Work remote in commutable distance to Bridgewater, NJ or Dallas TX</strong></li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;"><strong style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">US Citizenship required</strong></li></ul><p style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);box-sizing:border-box;color:rgb(38, 35, 33);font-family:Circular, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen, Ubuntu, Cantarell, &quot;Fira Sans&quot;, &quot;Droid Sans&quot;, &quot;Helvetica Neue&quot;, sans-serif;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;line-height:var(--line-height-base);margin-bottom:1rem;margin-top:0px;orphans:2;outline:none;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;">&nbsp;</p><p style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);box-sizing:border-box;color:rgb(38, 35, 33);font-family:Circular, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen, Ubuntu, Cantarell, &quot;Fira Sans&quot;, &quot;Droid Sans&quot;, &quot;Helvetica Neue&quot;, sans-serif;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;line-height:var(--line-height-base);margin-bottom:1rem;margin-top:0px;orphans:2;outline:none;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;">&nbsp;<strong style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">General Skills and Qualifications</strong>:</p><ul style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);box-sizing:border-box;color:rgb(38, 35, 33);font-family:Circular, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen, Ubuntu, Cantarell, &quot;Fira Sans&quot;, &quot;Droid Sans&quot;, &quot;Helvetica Neue&quot;, sans-serif;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;orphans:2;outline:none;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;"><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Information security engineering subject matter expert.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Strong analytical and problem-solving abilities.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Effective communication and collaboration skills to work with cross-functional teams.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Analyze threats and attacks reported from multiple sources both internal and external.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Knowledge of operating systems, virtualization, and database platforms.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Operating systems: Enterprise Linux, Solaris, Windows.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Virtualization: VMware, LDOMs, OVM.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Scripting and /or development ability to integrate, enhance, or customize existing security tools.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Oracle Database, security auditing and logging.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Knowledge of network devices, security solutions, and technologies.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Network, System, and Application event reporting and logging.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Understanding configuration policy changes for router, switch, firewall, load balancing, updates, upgrades, &nbsp;and lifecycle management.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Expertise in configuring and managing firewalls, intrusion detection systems, and other security devices.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">ACL creation, update, and review.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">SIEM, event log processing, correlation, alarming, and reporting.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">WAF policy development and tuning.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">NIDS policy development and tuning.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Endpoint monitoring and controls, FIM, HIDS, EDR.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Application security review and assessments.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Experience with vulnerability assessment and penetration testing.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Vulnerability scanning, scan development and tuning, review and reporting, develop and support remediation plans.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Manage penetration test engagements, review findings, and manage remediation efforts.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Knowledge of security frameworks and industry best practices.</li></ul><p style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);box-sizing:border-box;color:rgb(38, 35, 33);font-family:Circular, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen, Ubuntu, Cantarell, &quot;Fira Sans&quot;, &quot;Droid Sans&quot;, &quot;Helvetica Neue&quot;, sans-serif;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;line-height:var(--line-height-base);margin-bottom:1rem;margin-top:0px;orphans:2;outline:none;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;"><br><strong style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Additional Skills</strong>:</p><ul style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);box-sizing:border-box;color:rgb(38, 35, 33);font-family:Circular, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen, Ubuntu, Cantarell, &quot;Fira Sans&quot;, &quot;Droid Sans&quot;, &quot;Helvetica Neue&quot;, sans-serif;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;orphans:2;outline:none;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;"><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Knowledge and/or experience with the following security applications are a plus – Wazhu, QRadar, Fortinet, CrowdStrike, QLIK, RedSeal, and Tenable Security Center/Nessus.</li><li style="--tw-ring-color:rgba(59,130,246,.5);--tw-ring-inset:var(--tw-empty,/*!*/ /*!*/);--tw-ring-offset-color:#fff;--tw-ring-offset-shadow:0 0 #0000;--tw-ring-offset-width:0px;--tw-ring-shadow:0 0 #0000;--tw-shadow:0 0 #0000;box-sizing:border-box;outline:none;">Security Industry certification(s) preferred</li></ul></div> <span><span>adesordi</span></span> <span><time datetime="2024-12-06T11:23:03-05:00" title="Friday, December 6, 2024 - 11:23">Fri, 12/06/2024 - 11:23</time> </span> <div><a href="https://workforcenow.adp.com/mascsr/default/mdf/recruitment/recruitment.html?cid=7cf2fb51-6207-4e4f-bc51-66e9507c846b&amp;ccId=19000101_000001&amp;jobId=538463&amp;source=CC2&amp;lang=en_US" rel="nofollow" target="_blank">https://workforcenow.adp.com/mascsr/default/mdf/recruitment/recruitment.html?cid=7cf2fb51-6207-4e4f-bc51-66e9507c846b&amp;ccId=19000101_000001&amp;jobId=538463&amp;source=…</a></div> <div> <div>Location</div> <div><a href="/taxonomy/term/21" hreflang="en">US/Remote</a></div> </div> <div> <div>Department</div> <div><a href="/taxonomy/term/47" hreflang="en">Network Security</a></div> </div> <div> <div>Job ID</div> <div>3021</div> </div> Fri, 06 Dec 2024 16:23:03 +0000 adesordi 13401 at