About the Role
The role involves securing network environments through engineering solutions, monitoring for vulnerabilities, and responding to security incidents using established protocols and modern tools.
Responsibilities
- Design and deploy secure network architectures
- Configure and manage firewalls, routers, and switches
- Monitor network traffic for suspicious activity
- Respond to security breaches and incidents
- Implement intrusion detection and prevention systems
- Maintain network security documentation
- Conduct regular vulnerability assessments
- Perform security audits and compliance checks
- Support incident response procedures
- Update and patch security systems
- Collaborate with IT teams on threat mitigation
- Ensure alignment with security policies
- Troubleshoot network connectivity issues
- Optimize network performance with security in mind
- Assist in cloud security integration
- Manage access controls and authentication systems
- Evaluate emerging security technologies
- Participate in disaster recovery planning
- Enforce encryption standards
- Support secure remote access solutions
- Track security metrics and reporting
- Coordinate with vendors for support
- Maintain system logs and alerts
- Promote security awareness practices
- Ensure regulatory compliance
Nice to Have
- Master’s degree in cybersecurity or related field
- Certifications such as CISM or CEH
- Experience with cloud platforms like AWS or Azure
- Knowledge of DevSecOps practices
- Familiarity with container security
- Experience in financial or healthcare sectors
- Leadership in security projects
- Incident response team experience
- Threat intelligence analysis
- Automation of security workflows
Compensation
Not specified
Work Arrangement
Hybrid
Team
Security-focused technology team
About the Role
This position plays a critical part in safeguarding digital assets by engineering robust network defenses and ensuring continuous protection across hybrid environments.
What We’re Looking For
We seek a detail-oriented professional with hands-on experience in securing enterprise networks and a proven ability to adapt to evolving cyber threats.
Available