Firewalls both on-premise and cloud based including Fortinet Good knowledge of application & content delivery platforms: f5 - BIG-IQ, AFM, ASM, LTM, GTM & DDoSmitigation Strong Knowledge of Application Level & Network Layer Security Protections Strong knowledge of dynamic routing protocols: BGP, OSPF Strong knowledge of packet more »
security skills related to the design and implementation of secure networking solutions. Experience with network security products including Firewalls, IDS/IPS, WAF, DDoSmitigation solutions. Akamai experience is desirable. In this role, you will be at the forefront of shaping secure connections that drive our more »
security skills related to the design and implementation of secure networking solutions. Experience with network security products including Firewalls, IDS/IPS, WAF, DDoSmitigation solutions. Akamai experience is desirable. In this role, you will be at the forefront of shaping secure connections that drive our more »
mining in support of the company's cyber goals and digital transformation. Develop and execute the cyber roadmap for platform development and threat mitigation, in alignment with the unit’s cyber vision and strategy. Lead complex technical deliverables, ensuring timely and budget-compliant completion. Work autonomously within a …/AD, etc. Advanced knowledge in Privileged Access Management (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for cloud platforms (e.g., AWS, Azure) utilizing open-source tools, DevOps, and automation (e.g., Zabbix more »
mining in support of the company's cyber goals and digital transformation. Develop and execute the cyber roadmap for platform development and threat mitigation, in alignment with the unit’s cyber vision and strategy. Lead complex technical deliverables, ensuring timely and budget-compliant completion. Work autonomously within a …/AD, etc. Advanced knowledge in Privileged Access Management (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for cloud platforms (e.g., AWS, Azure) utilizing open-source tools, DevOps, and automation (e.g., Zabbix more »