Essential Duties and Responsibilities:
Collects/programs/compiles/assembles and maintains tools to perform successful penetration testing and provides results.
Develops/implements/manages/monitors security devices such as firewalls, IDS/IPS, log management systems, authentication and VPN systems.
Works as a liaison between IT, the lines of business and Information Security to ensure full and complete implementation of security controls, standards and policies.
Provides security architecture and design expertise for networking environments.
Manages IT and company compliance issues. Produces detailed documentation including data flow diagrams, logical diagrams, and physical diagrams as required.
Develops, enhances and executes security operations processes.
Assists IT operations with remediation planning and implementations
Designs, builds and implements security network controls, monitoring and configuration management tools
Develops intrusion protection and monitoring capabilities
Provides threat analysis and risk management services
Contributes to incident response and event handling
Additional participation and collaboration in network and systems security installation, configuration, and review as required.
Additional duties as assigned by manager
Education and/or Experience:
2+ years’ experience
BS degree or equivalent preferred
Strong experience performing penetration testing and detecting glitches in security, configuring and managing firewalls
Strong experience with network routing, switching, TCP/IP addressing design and troubleshooting, packet capture and analysis
Experience design, implementation and management of VPN solutions.
Experience with network intrusion protection solutions
Solid understanding of security concepts, principles and practices
Strong experience with network and application level firewalls
Experience with design and implementation of large scale security projects
Experience with log management, reporting tools and development
Experience with strong authentication techniques
Ability to develop quantitative, prioritized action plans to mitigate risk
Incident response experience
Process, procedure, and standards development experience
Good customer service skills
Solid team player with a “can do" attitude
Excellent written and oral communication and documentation skills
Past security training and certification, such as CEH (certified ethical hacker) or CISSP preferred.
Email résumé in word or pdf format to firstname.lastname@example.org