You haven't searched anything yet.
Title: Network Engineer - Consultant - Onsite
Description:
Scope of the project: the position will work as a security architect within the division of information security and will assist with the implementation, integration, and operationalizing security technologies.
This position requires experience in information security architecture and solution design to assist in the strategic planning, designing, and implementation of new systems and changes in current systems in a secure manner.
Daily duties / responsibilities:
Responsible for planning, designing, development and implementation of enterprise security architecture solutions that align with business goals and risk tolerance. Leveraging the client approved processes and technologies wherever possible.
Lead process definition, redesign and/or technology innovation of security architecture, to ensure dis solutions support secure delivery of enterprise business architecture and services.
Design, deploy and manage countermeasures to known security threats and develop preventative mitigation strategies for new and emergent threats to enterprise data, networks and associated services.
Ensure, validate and measure the consistent application of protective measures throughout the enterprise business application and infrastructure support environments. Take appropriate action to protect the client data and technology services.
Provide innovative technical leadership and expert guidance on the selection, procurement and best-value utilization of security capabilities supportive of:
Authentication, authorization and accounting of system access
Logging and event management
Vulnerability and configuration management
Compute, storage and network infrastructure
Cloud computing
New and emergent technologies
Establish, maintain and evolve a best practice methodology for security development lifecycle (sdl) which assures deep integration of secure design and development practices are implemented at all stages of the system or software development lifecycles (sdlcs).
Required skills (rank in order of importance):
Expert understanding of system design and the engineering process
Cyber security awareness and understanding
Expert understanding of information computer and network security. Its operation, engineering, and architecture
Experience with unix, windows, linux, cisco/palo al to/fortinet firewalls, web apps, databased, strong authentication, network security protocols and procedures
Expert understanding of access control, logging and reporting systems
Onapsis vulnerability management platform
Preferred skills (rank in order of importance):
Network firewalls, intrusion prevention systems (jps), switching and routing infrastructure
Identity and access management (1am)
Privileged user management (pum)
Security information event management (siem) systems
security frameworks: nist, csf, cjis, irs 1075, cms mars-e
Vulnerability assessment (va)
Application security (appsec)
Sap experience
Required education/certifications:
Bachelor's degree in an
Information technology or
Information security related
Field
6 years' of relevant work
Experience may be substituted in lieu of education
Minimum 5 years of experience in supporting large it environments and/or system deployments
Preferred education/certifications:
Ceh
Ccna
Skills :
Network Security ---risk/vulnerability assessments --Yes --1 --Lead --Currently Using --6 Years
Networking & Directories-- Network security --Yes --1 --Lead --Currently Using --6 Years
Networking & Directories --privileged user management (PUM) --No --1 --Expert --Within 6 Months --4 - 6 Years
Specialties Cisco --Yes --1 --Lead Currently Using --6 Years.
Note :
Remote Work Availability: 0% .
Candidate must be able to work two (2) days on-site each week.
Mandatory skills:
Cisco, risk assessment, vulnerability assessment, privileged user management, Identity and access management,
Network firewalls, intrusion prevention systems, switching infrastructure, routing infrastructure, system deployment,
Security information event management, SIEM, security framework, nist, csf, cjis, irs 1075, cms mars-e,
Sap, Vulnerability assessment, Application security, Information security, Cyber security,
system design, engineering process, access control, logging, reporting systems, vulnerability management, configuration management,
unix, windows, linux, cisco, palo, firewalls, web apps, database, authentication, network security protocols, network procedure,
Authentication, authorization, accounting, Logging, event management, network infrastructure, Cloud computing
VIVA USA is an equal opportunity employer and is committed to maintaining a professional working environment that is free from discrimination and unlawful harassment. The Management, contractors, and staff of VIVA USA shall respect others without regard to race, sex, religion, age, color, creed, national or ethnic origin, physical, mental or sensory disability, marital status, sexual orientation, or status as a Vietnam-era, recently separated veteran, Active war time or campaign badge veteran, Armed forces service medal veteran, or disabled veteran. Please contact us at for any complaints, comments and suggestions.
Contact Details :
Account co-ordinator: Binodh Thankappan
VIVA USA INC.
3601 Algonquin Road, Suite 425
Rolling Meadows, IL 60008
| ;/p>
Full Time
IT Outsourcing & Consulting
$79k-96k (estimate)
04/14/2024
05/04/2024
viva-it.com
ROLLING MEADOWS, IL
100 - 200
1996
Private
VASANTHI ILANGOVAN
$10M - $50M
IT Outsourcing & Consulting
Viva provides Information Technology consulting and staffing solutions.