Develops and implements security solutions. Administers security technology systems by architecting and engineering/developing trusted systems into secure systems. Assists in the development of implementation and deployment plans that are aligned to the organizational strategic plan objectives and security requirements. Advises management in developing cybersecurity policies, processes, and procedures.
ESSENTIAL FUNCTIONS:
20% Assists with day-to-day support of security solutions.
20% Assists with engineering support and system administration of specialized cybersecurity solutions.
15% Solves complex problems and answers routine questions about the installation, operation, configuration, and customization of cybersecurity software.
15% Identifies potential conflicts with the implementation of any cybersecurity solutions.
10% Answers routine questions about the installation, operation, configuration, and customization of cybersecurity solutions.
10% Reviews and analyzes appropriate cybersecurity solution system logs for performance and functional anomalies.
10% Works with system design architects and project managers to provide security requirements.
Qualifications
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
To perform this engineering position the resource must have 3 to 5 years experience with Palo Alto Firewalls. Must be able to configure firewalls, manage and upgrade firewall systems, configure routing, and support WildFire Threat protection.
Any F5 Load Balancer and Gigamon packet broker experience is a plus.
Education Level: Bachelor's Degree Education Details: Computer Science, Information Technology, or related field Experience: 5 years relevant IT security experience
In Lieu of Education
In lieu of a Bachelor's degree, an additional 4 years of relevant work experience is required in addition to the required work experience.
Preferred Qualifications
Knowledge, Skills and Abilities (KSAs)
Ability to perform risk assessments and investigate cyber security incidents. , Advanced
Ability to understand vulnerabilities at a technical level., Advanced
Knowledge of hardware and software, networks, data centers, systems, and cyber security related issues. , Advanced
Proficient in ethical hacking techniques., Proficient
Strong critical thinking ability and investigative/problem solving skills., Advanced
CISSP Certified Information Systems Security Professional Upon Hire Req or