Security Engineerother related Employment listings at Geebo

Security Engineer

Company Name:
Blue Rose Technologies LLC
Requirements
BS degree in Computer Science, Information Systems or related field
8 or more years of IT Security Experience
(CISSP) Certified Information Systems Security is strongly preferred.
A strong understanding of networking and network implementations.
Professional Experience in UNIX, Windows, Linux, TCP/IP, Storage Devices, network devices, fail safe strategies, system architecture, LAN and WAN methods and Intranet/Internet security environments, patch management, vulnerability testing.
Excellent analytical, written, oral communication and presentation skills
Strong project management skills with the ability to manage several initiatives at one time
Technologies
Firewalls, ideally Palo Alto
Palo Alto Intrusion Detection/Prevention
Sourcefire Intrusion Prevention
Juniper SSL/VPN
Blue Coat proxies
Symantec End Point Protection
Vulnerability scanners
Entrust
Overview
Assists in providing the safekeeping and integrity of information assets by maintaining systems and controls that prevent unauthorized access, modification, disclosure, and/or deletion of information from production systems networks and resources.
Directly interfaces with business line technical experts to provide guidance on authorization authentication and encryption solutions.
Consults with business units regarding their changing business and technical plans to ensure that information security issues are addresses early in the project life cycle.
Provides advocacy during the design and development of network security focusing on firewalls, Intrusion Detection/Prevention Systems, Digital Signatures, Certificate Authorities, PKI, encryption schemas, centralized authentication and access control.
Implements and reviews changes to security rule sets.
Monitors changes in hardware, software and user requirements at all sites to ensure security is not compromised or degraded.
Leads the design and further establishment of perimeter system security, and defense in depth.
Initiates, facilitates and promotes activities to foster information security awareness by developing and deploying Education and Awareness Programs.
Assists with forensic/security investigations.
Monitors, maintains and provides operational support of the security infrastructure.
Audit and monitor IT Security best practices including Firewall/Network Design, Anti Virus Strategy, Platform Maintenance, systems access ID and logon procedures and policies, file transfer protocols and data loss prevention.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.