Network Security Admin/ Engineer (Only Locals)other related Employment listings at Geebo

Network Security Admin/ Engineer (Only Locals)

In-person interview required after a Phone Screen Only local candidates preferred Notes from the manager:
Must know patch management and what vulnerabilities are Facilitate and coordinate, PM work by putting security changes into place Patch management, servers, etc.
Windows security How to manage expectations of security process Manage 25 vulnerabilities Excellent communicator and pick up the phone and run a meeting if need be Articulate and good documentation and office skills Nice to have:
Understand how CCM works (The Cloud Controls Matrix (CCM) is a baseline set of security controls created by the Cloud Security Alliance to help enterprises assess the risk associated with a cloud computing provider.
Position Description Objective of Position:
Seeking a Network Security Admin/ Engineer to work with information security, risk & compliance department internally and regulatory bodies to secure the bank assets and mitigate the system vulnerabilities for servers, workstations, network appliances (e.
g.
, Printers, ATM's, DVR's), and network devices (e.
g.
, Routers and Switches).
The engineer will help plan, design, implement, and support IT security related system components, including support of a broad range of security solutions including Vulnerability Scan & Remediation, Risk Analysis, Regulatory Compliance, Security Assessment & Audit, Cyber Security, IDS/IPS, DLP, System Hardening, PKI, Authentication, Authorization and Encryption, and reporting.
As a Network Security Admin/ Engineer, the successful candidate will join an existing systems team to install, deploy and manage the company's security measures in a rapidly expanding enterprise environment.
The technologies involved include Microsoft System Center Configuration Manager (SCCM), Nessus, AD Manager, Windows OS Patches and 3rd Party Applications Patches.
Strong candidates are well organized, efficient and excellent communicators with strong attention to deadlines and customer expectations.
He or she will also possess the ability to handle concurrent projects as well as a proven aptitude for quickly adapting to new challenges.
Function as the primary point-of-contact for IT Security measures design, planning, standards and procedures, development and delivery responsibilities Function as the IT security SME to remediate the vulnerabilities and risks identified by InfoSec and/or outside vendors using tools such as SCCM Act as the primary point-of-contact to communicate and exchange information between IT and InfoSec, Risk & Compliance teams, and outside regulatory bodies Demonstrate proven success designing a cost effective, resilient and secure IT systems Respond to IT security support calls during business hours, carry pager for off hours emergencies.
Troubleshoot and perform root cause analysis for IT security related problems, issues, and systems outages Must be proficient in Visio and must be able to read/update network diagrams.
Required skills/competencies:
Current security certifications or demonstrated experience with current versions of Microsoft SCCM for patching and vulnerabilities management.
Bachelor's degree required.
Minimum 3 years of IT engineering and project management experience designing and deploying enterprise-level systems Detailed understanding of Windows server operating systems and server vitalization securities risks and remediation solutions Strong networking experience.
Self-starter with excellent organization, administrative, interpersonal and technical leadership skills.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.