NIST 800-30) methodologies. Attack classification and characterisation frameworks (e.g. MITRE ATT&CK) Computer, Network and Cloud Security architectures and controls, System Hardening, Secure BoundaryProtection architectures and controls, Cryptographic controls (Data at Rest, Data in Transit, Public Key Infrastructure (PKI)), Security Monitoring and System Security Audit. National more »
Technology, or related discipline and at least 3 years of relevant experience Relevant experience may be considered in lieu of required education Experience with boundaryprotection techniques and technologies Experience in NIST 800-53 and Risk Management Framework (RMF) controls Ability to learn and adapt in a fast more »
collateral in addressing the customers’ viewpoints and complex requirements. What we are looking for Enterprise networks (IP Layer 1-7) Enterprise network security and boundaryprotection Service provider networks (e.g DWDN, SDH, OTN) ICT vendor technologies, solutions, and products (e.g Cisco, Juniper, Pal-alto, F5, Nokia). Industry more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »
data center infrastructure and experience with Cisco Routers, Switches, Nex Gen Firewalls, ESXi, VMware. • Utilizing Juniper SRX equipment and Palo-Alto Firewalls to engineer boundaryprotection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS more »