Job #: 1816

Title: Endpoint Security

Region:

  • Northern New Jersey
  • Job Type:

  • Contract
  • Contract Pay Rate:
  • $75-100
    • Anywhere
    • Posted 9 months ago

    ​This position is for a seasoned professional individual contributor in Information Technology, who works independently with minimal supervision.  Designs network security perimeter architecture and relevant security controls.  Reviews internal and external IT projects and applications for risk and adherence to security policies and industry best practices.  Participates on Internal Security project teams to deploy security technologies and to make recommendations for hardware/software products for future release.

     

    o             The consultant is principally responsible for assisting with the planning, deployment and troubleshooting of approved endpoint security software on the new JLT acquisition systems.

    o             The consultant will work with senior leadership and project management office on reporting of the status of the deployment and migration of the security products on JLT systems.

    o             Partner with and provide information security expertise to the operating companies to provide guidance and direction on secure application hosting for hundreds of internal and client facing application systems.  Assess applications and the associated data flow for risk to sensitive data, systems, or infrastructure.  Collaboratively document security controls and application access requirements associated with hosted applications and systems.

    o             The consultant should be able to identify manual and repeatable processes and automate them using industry standard scripting languages.

    o             The consultant will document and update knowledge base to assist various teams to follow and remediate issues.

    o             The consultant will also attend meetings with Solutions team to identify reparative issues and fix them.

    o             End-to-End enterprise-wide tier III troubleshooting of network, desktop, server (hardware & software) and application performance & connectivity across the global wide area network as it relates to Information Security.  Participate in or lead Computer Incident Response Teams (CIRT) as necessary by providing tier III support to mitigate active security incidents possible threatening the Global computing environment.

    o             The consultant is expected to be on-call during business hours as a Tier III escalation point; work with Major Incident team to resolve issues.

    Qualifications

    o             4-year college/university degree required.

    o             Minimum 5+ years of advanced endpoint security products like zScaler zAPP, ZIA, McAfee and FireEye with large scale implementations spanning multiple business lines distributed globally.

    o             Extensive knowledge of zScaler, McAfee security products, SSL Interception, design and use of Proxy Pac file is required.

    o             Strong background as a senior engineer in security infrastructure and various network technologies to include devices such as firewalls, VPN, intrusion/extrusion detection, vulnerability & risk assessment tools, encryption technologies, virus/worm/malware prevention, E-business and web application technologies, Data Loss Prevention, whole disk & device encryption solutions, two-factor authentication, common Windows (desktop & server) platforms, various UNIX platforms, TCP/IP, SNMP, CGI, HTML and miscellaneous security related toolsets are all required.

    o             Strong knowledge of scripting tools such as powershell, python, Perl, etc.

    o             Good written and verbal communication skills a must.

    o             Good knowledge of AD and good understand of networking and network security technologies.

    o             Must be able to quickly and succinctly architect and create technical solution documentation.

    o             Must be a self-starter, work with limited supervision & be able to work well with others in a globally diverse IT environment.

    o             Strong knowledge of common security controls on windows, unix-based operating systems.

    o             Familiarity with SIEM technologies, Single Sign on (SSO) and 2FA/MFA is an advantage.

     

     

    Your Name*

    Your Email*

    Your Phone*

    Your Message

    Please attach your Resume*