
bayt.com
Job Description
Major Responsibilities – include but not limited to:
- Administration and configuration and day to day operation of following security devices:
- Palo Alto NextGen firewall
- Juniper SRX firewall
- Cisco ASA site to site and remote VPN
- Bluecoat Reverse proxy
- Tenable security center
- Veracode Application scanner
- Palo Alto traps endpoint security
- Digital certificates
- Perform penetration testing.
- Plan, implement and upgrade security measures and controls
- Manage intrusion detection and prevention systems
- Manage web filtering solution
- Configuration of security policies and network address translation.
- Working closely with network and systems teams to troubleshoot the day to day operational issues.
- Perform daily check lists to make sure the device are working as expected.
- Stay up-to-date on information technology trends and security standards.
Competency
Technical
- Excellent knowledge in following device/technology:
- Penetration testing
- Application scanning and web attacks
- NextGen Firewall
- Intrusion Prevention System
- Reverse proxy
- Web application firewall
- Web filtering
- Endpoint Security
- VPN
- Vulnerability Scanning
- Digital certificates
Autonomy
- Works under limited supervision
- Uses discretion in identifying and resolving complex problems and assignments.
- Determines when issues should be escalated
Influence
- Interacts with and influence department/Project team member across the university
- Makes decisions which may have impact on the work assigned to individuals or phases of project.
Complexity
· Performs a broad range of work, sometimes complex and non-routine, in a variety of environments
Business Skills
- Understand and uses appropriate methods, tools and applications.
- Demonstrates an analytical and systematic approach to problem solving.
Skills
- Degree in computer, network or Information Security related fields
- At least 6-8 years in-depth experience in information security systems and network security domain.
Two or more of the following certification preferred:
- Certified Ethical Hacker (CEH)
- Certified Information Systems Security Professional (CISSP)
- Cisco Certified Internetwork Expert – (CCIE Security)