Required Skills

Cyber Security LAN WAN WLAN

Work Authorization

  • Us Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 9th Jan 2021

JOB DETAIL

CyberSecurity Engineer

Boston, MA

Longterm

 

Video Interview

 

Need Local Candidates Only.

 

Boston-basedclient is looking for a Cyber Security Engineer with a comprehensive skill setin network security operations, cyber security tools, intrusion detection, andsecured networks. This hands-on role requires assisting in analyzing theenvironment, coordinating data gathering and helping to generate solutions on aday-to-day basis. Additionally, this role will contribute to the long-rangeplanning activities of the overall IT team, and may oversee projects andinvestigations related to threat management and security breaches.

 

Underthe supervision of the Security Manager, working individually or as part of aproject team, the Cyber Security Engineer will continuously assess security andrelated risks to the enterprise office locations, assets, and employees andmake recommendations for mitigation strategies that will decrease risk. Theywill assist in maintaining the confidentiality, integrity, and availability ofcomputer workstations, servers, and local area networks.

 

PrimaryResponsibilities:

TheCyber Security Engineer will be responsible for all operational aspects ofnetwork security engineering: design, implementation, optimization, monitoringand troubleshooting of our LAN, WAN, WLAN and DR networks.

•Provide technical support for numerous standalone and network systems toinclude penetration testing, vulnerability scanning, virus updates, patches,service packs, and hot fixes, policies related to onboarding/offboarding ofstaff, media controls, and ensuring all security related documentation isnotated as required.

•Monitor networks and systems for security issues through the use of varioussecurity tools.

•Perform vulnerability scans, analyze results and assist with the remediation asnecessary.

•Conduct regular audits to ensure authorized systems are being operated securelyand are in compliance with security policies and procedures.

•Monitor access to all information systems and report on compliance withestablished policies and procedures, relative to the level of potential riskand recommend appropriate corrections.

•With the Security Manager, leverage security best practices to assess, design,test, approve, implement, and support new and existing multi-tier solutions inmultiple sites and data centers.

•Create accurate network diagrams and documentation for planning security-basedchanges, investigating network impact, and issuing resolution procedures.

•Assist in implementing site procedures for marking, handling, and controlling,removing, transporting, sanitizing, reusing, and destroying media/equipment.

•Participate in and often lead investigations pertaining to threat assessmentand mitigation for both internal and external threats.

•Conduct investigations of anomalies found during audit trail analysis.

•Participate in security related investigations as needed to ensure that policydefined tasks are completed.

 

TechnicalQualifications:

 

Educationand Experience

•Bachelor’s degree or higher in Information Technology or other engineering ortechnical discipline and IT experience with Cyber Security Informationexperience. Four year relevant experience may be substituted with professionalcertification

•Certified Information Systems Security Professional (CISSP)

•CISA – Certified Information Systems Auditor (CISA)

•CEH – Certified Ethical Hacker (CEH)

•CISM – Certified Information Security Manager (CISM)

•ISSAP – Information Systems Security Architecture Professional (ISSAP)

•ISSEP – Information Systems Security Engineering Professional (ISSEP)

•Experience with Windows OS Windows Server, Windows Domains, Active Directory,and GPO's.

•In depth understanding of NIST SP 800-61.

•Familiarity with routers, switches, firewalls, load balancers, proxies,accelerators, and wireless technologies.

•Strong ability with security policy administration, ACLs, IPS/IDS, portscanning and pen-testing tools.

•Experience in threat management and assessment as it relates to physicalsecurity.

•Experience with corporate security risk assessment, analysis and mitigatingcontrols.

•Experience with endpoint security solutions, including file integritymonitoring, white listing, and data loss prevention.

 

PersonalAttributes:

•Excellent analytical and problem solving skills.

oUses problem solving techniques such as root cause analysis to resolve issues.

•Highly self-motivated and self-directed, with keen attention to detail.

•Demonstrates excellent oral and written communication skills.

•Ability to work independently and on multiple projects simultaneously.

•Collaborates and assumes a technical leadership role when required.

•Comfortable with presenting policies, mentoring colleagues on security bestpractices.

•Ability to explain network and security concepts to both fellow technical staffin detail, and to non-technical staff at an appropriate level.

•Is effective in prioritizing tasks within a high-pressure competingenvironment.

•Strong organizational skills.

•Demonstrates an interest in working hard in a fast-paced environment, enjoyschallenges, and has fun while doing it.

 

Mahima Raj

Mahima@tekinspirations.com

Direct : 469-353-7766

IT Technical Recruiter|TEK Inspirations LLC

13573 Tabasco, Cat Trail, Frisco, TX 75035

Company Information