Preview

example

Good Essays
Open Document
Open Document
257 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
example
The Senior Network Security Engineer is an IT professional with responsibility for designing, implementing and supporting network security solutions for the organization. In collaboration with members of the Architecture and Engineering, Systems Administration, Database Administration, IT Development and Application Support teams, the Senior Network Security Engineer will implement practical solutions to secure the bank's internal and external network infrastructure.

This includes the on-going maintenance and management of hardware and software that secures the organization's network, analyzing and troubleshooting problems and monitoring for potential network security problems or incidents.

Duties & Responsibilities

· Installation, configuration, maintenance and support of Checkpoint firewalls, Palo Alto firewalls, Nortel VPNs, Website Filtering devices, Cisco NAC, Remote Access and Intrusion Detection/Prevention systems.
· Network Traffic monitoring; early detection and fast reaction to unexpected “suspicious" situations (i.e. unusual traffic volume, port attacks, rogue devices in the network, etc.).
· Network design and security
· Web and network security exploit identification
· Intrusion detection/prevention and network traffic analysis
· Security event analysis and monitoring
· Monitor compliance with information security procedures and policies
· Regular penetration testing, reporting and issue resolution
· Liaising with global colleagues on the development of new designs and standards
· Work with project teams to design and implement secure network connectivity solutions
· Provide an escalation path for operations and deployment staff to resolve problems
· Evaluate and certify new technologies or new versions of existing products
· Integrate new products into the infrastructure
· Act as escalation point to vendor to resolve problems

You May Also Find These Documents Helpful

  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Secure service: The main objective of this network is to provide secure administrative computing service to DesignIT. It is designed to be functionally and physically isolated from access by people not employed by DesignIT so as to minimize the risk of unauthorized use.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    C200 Task 1

    • 4180 Words
    • 12 Pages

    The organization chosen is ABE Defense Systems. ABE Defense Systems is a global organization and a premiere defense contractor, specializing in defense, aerospace and cyber security. The organization that will be discussed is the network operations center of ABE Defense Systems. The leader selected is the director of the network operations center. The reason the director of network operations center was selected was to better understand the role and requirements of the position. This is a challenging position, responsible for the oversight and operations of all information technology’s “break and fix” services provided to its customers, the engineers and non-technical employees of ABE Defense Systems.…

    • 4180 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document.…

    • 6754 Words
    • 32 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    and facility access as well as the concepts for protecting the hardware and software assets of an enterprise.…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Powerful Essays

     You will learn to identify policy violations and security breaches and to appropriately monitor threats and control activity across the network.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Network Security

    • 495 Words
    • 2 Pages

    For the first few decades of their existence, computer networks where primarily used by university researchers. Network security involves the authorization of access to data . Users assigned an ID and password that allows them to access the information and programs with in their authority. Network security covers verity of computer networks both public and private that are used in everyday jobs conducting transactions and communications among business, government agencies and individuals.…

    • 495 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Security

    • 23429 Words
    • 94 Pages

    to develop an information security program. We need a thorough review of our policies and…

    • 23429 Words
    • 94 Pages
    Powerful Essays