collateral in addressing the customers’ viewpoints and complex requirements. What we are looking for Enterprise networks (IP Layer 1-7) Enterprise network security and boundaryprotection Service provider networks (e.g DWDN, SDH, OTN) ICT vendor technologies, solutions, and products (e.g Cisco, Juniper, Pal-alto, F5, Nokia). Industry more »
analysis and systems engineering methodologies in support of requirements management and architecture development. Computer, Network and Cloud Security architectures and controls, System Hardening, Secure BoundaryProtection architectures and controls, Cryptographic controls (Data at Rest, Data in Transit, Public Key Infrastructure (PKI)), Security Monitoring and System Security Audit. National more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications Actively monitoring and supporting the design/build/configure/operate/maintain cycle of interconnected systems, and proactively … IEC Cybersecurity Risk Assessment Specialist DESIRED TOOLS/INDUSTRY EXPERIENCE: Tools: Wireshark, Nmap, Tenable, Defender for IoT, Kali, Cobalt Strike, Splunk Technologies, network infrastructure, boundaryprotection devices, enterprise LAN/WAN, ICS/SCADA Industries: FCEB Enterprise, SLTT, ICS/OT environments of critical infrastructure sectors more »
IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications Actively monitoring and supporting the design/build/configure/operate/maintain cycle of interconnected systems, and proactively … IEC Cybersecurity Risk Assessment Specialist DESIRED TOOLS/INDUSTRY EXPERIENCE: Tools: Wireshark, Nmap, Tenable, Defender for IoT, Kali, Cobalt Strike, Splunk Technologies, network infrastructure, boundaryprotection devices, enterprise LAN/WAN, ICS/SCADA Industries: FCEB Enterprise, SLTT, ICS/OT environments of critical infrastructure sectors more »
IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications Actively monitoring and supporting the design/build/configure/operate/maintain cycle of interconnected systems, and proactively … IEC Cybersecurity Risk Assessment Specialist DESIRED TOOLS/INDUSTRY EXPERIENCE: Tools: Wireshark, Nmap, Tenable, Defender for IoT, Kali, Cobalt Strike, Splunk Technologies, network infrastructure, boundaryprotection devices, enterprise LAN/WAN, ICS/SCADA Industries: FCEB Enterprise, SLTT, ICS/OT environments of critical infrastructure sectors more »