Post Job Free
Sign in

Network Security Engineer

Company:
msysinc
Location:
Remote, OR
Posted:
April 02, 2024
Apply

Description:

Title: Network Security Engineer

Location: Remote

Length: Long term

Restriction: W2 or C2C

Description:

Interview Type: Either Webcam Interview or In Person *** Very long term project initial PO for 1 year, expect to go for 4+ years *** *** Remote *** may need to visit onsite once in a year at Raleigh NC; expenses will be paid for this

*** The manager has a strong preference for local NC candidates. ***

Short Description:

Responsible for the Weekends and Holidays Midnight to Noon, (12:00 AM – 12:00 PM), and two weekdays, 12:00 AM – 9:00 AM. Specifically, Fri & Mon12AM 9AMSat & Sun + Holidays12AM – noon. Additionally, weekly team meeting on Mon at 9AM.

Job Description:

Scope Of Work:

No. 1: 40% Security Operations and Network Operations (SOC):

Responsible for the Weekends and Holidays Midnight to Noon, (12:00 AM – 12:00 PM), and two weekdays, 12:00 AM – 9:00 AM. Specifically, Fri & Mon 12AM 9AM Sat & Sun + Holidays 12AM – noon. Additionally, weekly team meeting on Mon at 9AM.

Assist in maintaining the NCAOC Security Operations Center security posture.

Responsible on Weekends and Holidays to respond to Network Operations Center priority one circuit outages.

Responsible for creating, triaging, updating, and seeing closure of Security Operations Incident, Request, and Enterprise Change Management tickets.

Monitors and maintains Firewalls and corresponding management tools (FMC, ASDM), Intrusion Prevention Systems (IPS), Vulnerability Management (VM), Cisco Umbrella domain name security, ISE network Access Control, Posturing, and Profiling, IPsec VPN tunnels, AnyConnect remote users and security module, Third Party Partner Security Incident and Event Manager (SIEM), and other network and cloud security tools.

Use tools (Wireshark and interface captures, and log searching) to assist in troubleshooting network, device configuration, and network security related problems.

Responsible for firewall cleanup processes, tasks, and learning firewall tools to assist in performing these processes and tasks.

Follow and maintain SOC process and technology documentation.

Open and work to closure vendor TAC cases, mostly Cisco, to resolve incidents and device issues.

Provide reports and metrics for the SOC Supervisor or Operations and Administration Manager as requested.

Interface with all other TSD technical teams in initiatives and activities the require Security Operations Center resources.

No. 2: 20% Network Security and Cybersecurity:

Monitor and respond to Third Party Partner initiated security investigations.

Provide support of the established Incident Response Policy from beginning preparation and prevention through post incident activity.

Subscribe to and monitor Security Product Advisories and Cybersecurity Organization Bulletins researching and ensuring coverage of security device risks and Common Vulnerability Enumerations (CVE)

Update PSIRT/CVE spreadsheet or other report tracking mechanism to report progress and coverage of Security Product Advisories and Cybersecurity Organization Bulletins.

Monitor and Maintain the IPS signatures, Block lists, URL reputation lists, and malware file lists to ensure latest security recommendations are implemented.

Use monitoring and security diagnostic tools to threat hunt for network and device vulnerabilities, security risks and potential threats.

Research trends to assist the Security Operations team in staying up to date on industry best practices and current Cybersecurity trends, tools, techniques, and procedures.

No. 3: 30% Network Patching, Upgrading, and Maintenance:

Evaluate, plan, and implement network devices, (switches, routers, management tools, etc.) and network security devices and tools (firewalls, IPS, ISE, etc.) upgrades and patches on a monthly and as needed schedule.

Coordinates with various TSD teams in the evaluation, planning and implementation of patching, upgrading, and maintenance.

Update patching spread sheet to reflect historic and current versioning.

Uses software tools to manage patching, upgrading and maintenance of network and security devices (Visio, Microsoft Office, etc.)

No. 4: 10% Security Industry and Product Research and Training

Attend, classes, seminars, webinars, conferences, training sites, and research product documentation, to enhance professional development and to progress in the field of Network and Cybersecurity trends and developments.

Use NCAOC provided resources to attain Security Professional Certificates, (Ex. Cisco CCNA routing and switching, CCNA Security, CCNP Security, CISSP)

Knowledge, Skills and Abilities:

Knowledge:

Knowledge of enterprise network security technologies: Cisco FTD and ASA firewalls, IPS, FMC, IPsec tunnels, AnyConnect client, Cisco ISE, Cisco Umbrella, Third Party SIEM, DDI, DNS, VLANS, NAT Cisco Secure Endpoint (AMP), Load Balancing IP/Domain/URL security intelligence sources (Virus Total, TALOS, etc.)

Knowledge and or possession of Security Profession Certificates, (Cisco CCNA routing and switching, CCNA Security, CCNP Security, CISSP) is preferred but not required.

Knowledge of NCAOC security policy and Criminal Justice Information System (CJIN) policies is preferred but not required.

Skills:

Skills in enterprise security technology fundamental knowledge of the following, IPsec, IPS/IDS Snort Engine, SIEM, Identity Services Engine (ISE), Vulnerability Management, Access Control/AAA networking fundamentals in the areas of enterprise network topology, routers, switches, servers, NAT, DNS TCP/IP architecture and functionality, Wireshark and interface captures, and log searching to assist in troubleshooting configuration and network security related problems.

Abilities:

Ability to plan and manage complex projects independently and within a team communicate effectively with users to determine and resolve problems communicate technical information to lay persons interpret and follow established employment and policies produce highly technical documents consider the implications of new technology implementations balance the application and system access business needs of users with network security protections.

Required Skills:

Configuration and administration of Cisco ASA Firewalls 3 Years

Configuration and administration of Cisco FTD Firewalls 3 Years

Fundamental knowledge of the following, IPsec, IPS/IDS Snort Engine, SIEM, Identity Services Engine (ISE), Vulnerability Management 3 Years

Fundamentals in the areas of enterprise network topology, routers, switches, servers, NAT, DNS TCP/IP architecture and functionality 3 Years

Works independently to accomplish short and long term project goals with clear and concise communication to team members and management 3 Years

Apply