Cyber Security Network Security Engineer (Jr. to Sr. Level)

Job Description:


A strong multi-tasker with a keen eye for detail, a successful Network Security Engineer can think one step ahead of criminals. This roles responsibilities may range from installing, configuring, testing, operating, maintaining, and managing networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems.  ZeroDay Partners is seeking Network Security Engineer candidates with the following capabilities to be considered for incoming opportunities:

Potential Responsibilities: The following is a list of skills that the ideal candidate will have experience in.  Depending on the specific role within the team, the responsibilities may vary from the list below.

  • Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling).
  • Develop and implement network backup and recovery procedures.
  • Diagnose network connectivity problem.
  • Implement new system design procedures, test procedures, and quality standards.
  • Install and maintain network infrastructure device operating system software (e.g., IOS, firmware).
  • Install or replace network hubs, routers, and switches.
  • Integrate new systems into existing network architecture.
  • Monitor network capacity and performance.
  • Patch network vulnerabilities to ensure that information is safeguarded against outside parties.
  • Provide feedback on network requirements, including network architecture and infrastructure.
  • Test and maintain network infrastructure including software and hardware devices.


Preferred Knowledge:


  • Knowledge of computer networking concepts and protocols, and network security methodologies. 
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. 
  • Knowledge of cybersecurity and privacy principles.
  • Knowledge of cyber threats and vulnerabilities. 
  • Knowledge of specific operational impacts of cybersecurity lapses.
  • Knowledge of communication methods, principles, and concepts that support the network infrastructure.
  • Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware.
  • Knowledge of organization's Local and Wide Area Network connections.
  • Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
  • Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). 
  • Knowledge of local area and wide area networking principles and concepts including bandwidth management.
  • Knowledge of measures or indicators of system performance and availability.
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of remote access technology concepts.
  • Knowledge of server administration and systems engineering theories, concepts, and methods.
  • Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
  • Knowledge of Virtual Private Network (VPN) security.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of network tools (e.g., ping, traceroute, nslookup) 
  • Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
  • Knowledge of web filtering technologies.
  • Knowledge of the capabilities of different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
  • Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA).
  • Knowledge of Wi-Fi.
  • Knowledge of Voice over IP (VoIP).
  • Knowledge of the common attack vectors on the network layer.
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
  • Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of symmetric key rotation techniques and concepts.
  • Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
  • Knowledge of Personally Identifiable Information (PII) data security standards.
  • Knowledge of Payment Card Industry (PCI) data security standards.
  • Knowledge of Personal Health Information (PHI) data security standards.
  • Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. 
  • Knowledge of an organization's information classification program and procedures for information compromise.
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
  • Knowledge of controls related to the use, processing, storage, and transmission of data.


Preferred Skills:


  • Skill in analyzing network traffic capacity and performance characteristics.
  • Skill in establishing a routing schema.
  • Skill in implementing, maintaining, and improving established network security practices.
  • Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.
  • Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol).
  • Skill in securing network communications.
  • Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
  • Skill in configuring and utilizing network protection components (e.g., Firewalls, VPNs, network intrusion detection systems).
  • Skill in implementing and testing network infrastructure contingency and recovery plans.
  • Skill in applying various subnet techniques (e.g., CIDR)
  • Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).


Preferred Abilities:

  • Ability to operate network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
  • Ability to operate common network tools (e.g., ping, traceroute, nslookup).
  • Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).
  • Ability to operate the organization's LAN/WAN pathways.
  • Ability to monitor measures or indicators of system performance and availability.
  • Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
  • Ability to monitor traffic flows across the network.
  • Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).

Preferences:

  • Completion of a Bachelor’s degree or equivalent program in Computer Science, Computer Engineering, Electrical Engineering, Network Security, Information Security, Information Technology, or Mathematics (or equivalent work experience)
  • 1+ years of experience as a cyber security analyst or related role.
  • Certifications preferred but not required.

Want to apply later?

Type your email address below to receive a reminder

ErrorRequired field

Apply to Job

ErrorRequired field
ErrorRequired field
ErrorRequired field
Error
Error
insert_drive_file
insert_drive_file