* Client: State of Alabama*
*Need Expert or Strong Senior Most Consultant*
Position: Network Security Engineer
Location: Montgomery, AL
Duration: 12-36 months
Rate: $55/hr C2C Max
The Network Security Engineer position will be responsible for designing, implementing, maintaining, and supporting web application firewalls and other security devices within the Agency in order to ensure the integrity of high availability security infrastructure for maximum performance and stability of critical applications & services.
Minimum Requirements:
• Security oriented advanced certifications such as CISSP, CISA, CISM, SANS GCIH\GCED, CASP, etc.
• Professional CE Systems Certification (MCSE, MCITP:EA, VCP, CCNP, or similar) is required
• 3-5 years of Information Security Experience
• 7-10 years of Enterprise IT Systems Experience
• Advanced proficiency in managing web application firewalls, intrusion detection \ prevention systems
• Proficient knowledge of cryptographic systems and key management
• Advanced knowledge of Host-based security end-point management
• Advanced knowledge of data encryption tools such as Bitlocker, McAfee Endpoint Protection, etc
• Advanced knowledge of Cloud Computing and Virtual Services
• Subject Matter Expert knowledge of Patch Management Tools such as: Microsoft SCCM, WSUS, etc
• Subject Matter Expert knowledge of Computer and Server Operating Systems and hardening
• Subject Matter Expert knowledge of Microsoft Active Directory GPOs
This includes:
§ Provides Subject Matter Expert performance of engineering, operations, implementation, and maintenance of all Information Security-related systems architecture to include: Firewalls, IPS\IDS, Domain Structures, Virtual Services, Host-based Malware Defense and Management, Patch Management, and OS hardening.
- Implement, communicate and enforce the organization's security policies. Responsible for developing additional feedback for the ongoing IT security awareness.
- Perform periodic security compliance auditing, assessments and reviews for evidence of vulnerability or compromise and assists in/facilitates the implementation of a resolution.
- Respond to IT security incidents, providing initial assessment of impact severity and types of incidences being addressed. Coordinates resolution efforts for reporting to management personnel for critical or serious incidents.
- Monitor computing resources for evidence of compromise, responding to security incidents. Analyzes compromised computing resources to improve security design, policy compliance, and to understand and document new threat profiles. Monitors and enforces compliance with security policies, standards and guidelines. Prepare reports for presentation to management.
Regards,
Rahman,
Sr Resource Recruiter
703 246 1849
You received this message because you are subscribed to the Google Groups "US Jobs: Requirements, Clients and Consultants" group.
To unsubscribe from this group and stop receiving emails from it, send an email to recruiters-r-us+unsubscribe@googlegroups.com.
To post to this group, send email to recruiters-r-us@googlegroups.com.
Visit this group at http://groups.google.com/group/recruiters-r-us.
For more options, visit https://groups.google.com/d/optout.
No comments:
Post a Comment