Network security consultant job description
Example network security consultant requirements on a job description
- Expertise in network security protocols
- Strong knowledge of intrusion detection and prevention systems
- Experience with firewalls and VPN technologies
- Ability to manage and handle security incidents
- Proficiency in network infrastructure design and implementation
- Excellent communication and interpersonal skills
- Effective problem-solving and decision-making abilities
- Ability to work well under pressure and meet tight deadlines
- Strong analytical and critical thinking skills
- Ability to work independently and as part of a team
Network security consultant job description example 1
RKON network security consultant job description
Since our inception in 1998, RKON has been focused on providing cutting-edge IT services to clients across the US. Through thought leadership and consistent client successes, the RKON team has become an established and prominent force in the IT industry, delivering innovative solutions for modern IT problems.
Recognized by Okta's Core Value Awards as having the best company culture in the industry, and by Computerworld as one of the 100 Best Places to Work in IT, Rapid7's 2022 North American MSSP partner of the year, RKON takes pride in our cohesive and creative work environment. From the beginning we've attentively built our company culture, fostering an environment that promotes collaboration, ingenuity, and imagination, working with the knowledge that our products are only as good as our team.
Sr. Network Security Consultant
The RKON Network Security Consultant is responsible for the support and maintenance of a multi-Tenant environment, both cloud-based and on-premises, requiring cooperative support from both our clients and members of the Professional Services team. As a high-level Security Engineer, you will be required to have experience and extensive knowledge of varying Network technologies, including, but not limited to Palo Alto, Check Point, Fortinet, Next-Generation Firewalls, Pulse Secure, Meraki, and Juniper. A clear understanding of network security and best practices.
Your primary responsibilities will be to provide onboarding/project support to our clients, perform build and release, as well as, applying requested changes and modifications to the existing environment.
Education/Experience
Expert level of Check Point troubleshooting and debugging High level knowledge of Check Point Security blades including IPS, App Control and URL Filtering, Anti Bot, Sandblast threat prevention and Endpoint Security High level understanding of Network Security architecture High level understanding of TCP/IP and networking Solid understanding of virtual router redundancy protocol (vrrp), Cluster XL technology and IP clustering for high availability and Cluster Control Protocol (CCP) Site-to-Site VPN & Client to Site VPN troubleshooting Other Firewall knowledge a plus (Cisco/Juniper/Fortinet/Palo Alto) Working experience performing Security Assessments a plus Multiple security certifications a plus Check Point CCSA and CCSE certifications preferred
Roles and Responsibilities
Perform technical assessments for our clients, and build out the recommended changes to their environment. Having familiarity with a wide range of network security products (F5, Check Point, Palo Alto, Meraki, Juniper, Cisco). Support and upgrade appliances, open servers, and infrastructure Support Check Point VSX firewall virtualization Support and build Site-to-Site VPNs & Client Site VPNs Support and build Check Point Software Blade Technologies Maintain an expert understanding and knowledge of the GAIA operating system Support and implement Firewall security policies as needed. Design and perform seamless upgrades of existing Management & Firewall infrastructure remotely and onsite Operate in a team environment as well as self-directed Collaborates with other team members as necessary to ensure customer service levels agreements (SLA's) are met Execute defined Enterprise System strategies to support corporate initiatives Some travel required (25%) Mentoring other support engineers on your team.
Expectations
Ability to speak to and work with individuals of all skill levels from users up to "C" level executives Strong ability to articulate details without losing sight of the audience you're communicating with Strong ability to multitask Strong troubleshooting skills Candidate must not be narrow-focused but consider all angles when providing guidance or recommendations
What RKON Offers
Competitive pay Flexible hours Flexible working option Vacation/Sick/Personal time Training programs A team of highly skilled peers available to help
Network security consultant job description example 2
Peraton network security consultant job description
Reviews scan results to ensure that the applications being placed on the network adhere to the DoDI 8500.2 and the transformation to 8510.01 (RMF) guidance.
General: Support INSCOM Enterprise Cybersecurity Services Support (ECSS) via a wide range of services to INSCOM HQs and supported organizations with tasks to include continuously monitoring cyber threats, vulnerabilities, and risks to reduce threat surface; increasing visibility into cybersecurity; and improving the ability to respond to cybersecurity issues. ECSS also provides Risk and Vulnerability Assessments, perform Security Architecture Reviews and System Security Engineering while simplifying Risk Management Framework (RMF) for DoD Information Technology execution, employing innovative approaches for managing risk, and increasing the level of automation when carrying out specific tasks. Lastly, ECSS provides IA services for general and preferred user account management on all networks (NIPR/SIPR/JWICS).
BS 12-15, MS 10-13. Phd 10+ Will consider: HS 16+ Years, BA/BS 10+ Years, or MA/MS 8+ Years.
- Familiarity with RHEL, Linux, Windows, CentOS, VMWare, and RHEV
-
Expertise using cyber tools (ACAS required and Splunk strongly desired) to identify anomalous behavior in scan logs and critical malware issues to report regulatory cyber security compliance.
-
Familiar with developing, testing, and integrating security tools as well as configuring and installing the tools.
-
Experience designing, developing, implementing, and enforcing security requirements.
-
Expertise preparing Security Test and Evaluation plans.
-
Has provided certification and accreditation support.
-
Experience developing security plans and contingency plans.
-
Skilled in conducting security audits and developing mitigations to identified risks. Has conducted vulnerability assessments.
Requires: DoD 8570 IAT Level II Certification
- Must be maintain for duration of contract in ATCTS.
- Desired, but not required: IAM Level III 8570 certification
Clearance: Active TS/SCI (CI Polygraph not required)
Work location: Fort Belvoir and/or Metro Park
Hours: HQ INSCOM core hours are 0900 - 1500. HQ INSCOM personnel and Contractor personnel are expected to work an 8-hour workday and a 40-hour workweek. Prior to working outside of normal hours of operation, coordination must be made with the Government team lead and the INSCOM COR for approval.
Travel: None expected
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.
An Equal Opportunity Employer including Disability/Veteran.
Colorado Salary Minimum: $96,300Colorado Salary Maximum: $233,700
The estimate displayed represents the typical salary range for this position, and is just one component of Peraton's total compensation package for employees. Other rewards may include annual bonuses, short- and long-term incentives, and program-specific awards. In addition, Peraton provides a variety of benefits to employees.
Network security consultant job description example 3
ePlus network security consultant job description
Job Responsibilities:
* Developing Sales Engineering presentations and supporting materials
* Assist in creating and/or responding to Bill-of-Materials (BOM) and Statements of Work (SOW)
* Planning and designing solutions for multi-vendor Security Solutions
* Be available as a pre-sales resource for sales team members, as necessary
* Serve as an escalation point for Engineers, Sr. Engineers and Consultants
* Troubleshoot complex technology issues
* Assess Customer environment and make recommendations on solutions and improvements
* Escalate issues to other team members and subject matter experts, as necessary
* Provide deployment and implementation services of multi-vendor Security solutions in an IT environment
* Be available to meet customers' IT needs
* Meet with key vendors to stay current on products and technologies
* Lead a team of engineers on a professional services projects
* Maintain multiple advanced manufacturer specific advanced certifications. i.e.: CCIE, R/S. Voice, Brocade, CISSP, VCDX, UCS
* Serve each and every customer to ePlus' standards
Your Corporate Responsibilities:
Internal Control responsibilities vary by role and are subject to change. Please discuss your individual internal control responsibilities with your immediate supervisor on a regular basis.
* Handle confidential matters and information professionally
* Conduct business in a professional, competent and ethical manner
* Adhere to corporate policies and procedures
Job Knowledge/Skills:
* Excellent customer service skills on phone and in person
* Professional demeanor and good communication skills
* Ability to think and come up with solutions quickly
* Must be fully knowledgeable and able to design and plan, implement and support IT solutions using two or more of the following technologies:
* Virtualization
* Storage Area Networks (SAN)
* Networking
* Collaboration (Messaging)
* VoIP
* Video Conferencing
* Backup
* Blade Server Technology
* Security
Education and Experience:
* Bachelor's degree preferred
* 10+ years of hands on experience in IT
* Multiple industry-recognized Certifications preferred. i.e.: CCIE, VCP, NACP, CISSP
Physical Requirements of Position:
Ability of finger dexterity to be used primarily to make small movements such as typing, picking up small objects or pinching fingers together. Movements frequently and regularly required using the wrists, hands and/or fingers. Speech ability must be at a level where one must convey detailed or important instructions or ideas accurately, loudly or quickly. Hearing ability must be at a level to hear average or normal conversations and receive ordinary information. Visual ability must be average with ordinary visual acuity necessary to prepare or inspect documents or products, or operate machinery. Physical strength for sedentary work with sitting most of the time. May have to exert or lift up to 10-20 pounds of force occasionally.
ePlus is an equal opportunity employer and does not discriminate or allow discrimination on the basis of race, color, religion, gender, age, national origin, citizenship, disability, veteran status or any other classification protected by federal, state, or local law. ePlus promotes affirmative action for minorities, women, disabled persons, and veterans.
#LI-KB!