About the job Senior Network Security EngineerThe Application Security Engineer is responsible for managing tickets of high complexity, conducts advanced and complicated tasks, and provides resolution to a diverse range of complex problems. This position uses considerable judgement and independent analysis within defined policies and practices. Applies analytical thinking and deep technical expertise in achieving client outcomes, while coaching and mentoring junior team members across functions.Provides technical support to field engineers, technicians, and product support personnel who are diagnosing, troubleshooting, repairing, and debugging complex electro/mechanical equipment, computer systems, complex software, or networked and/or wireless systems. Responds to situations where first-line product support has failed to isolate or fix problems in malfunctioning equipment or software. Reports design, reliability and maintenance problems or bugs to design engineering/software engineering.May be involved in customer installation and training. Provides support to customer/users where the product is highly technical or sophisticated in nature.In a less sophisticated environment, as with many applications products where the user is nontechnical, this position would generally interact with product support personnel and potentially the customer when the customers problem cannot be resolved directly by first-level resources.They will develop, coordinate and executes policies, methods and procedures, and supervises personnel; when assigned as an expert, performs work requiring a very high level of technical knowledge of a specific area or ability to integrate at a high level the knowledge of several areas, manages and provides technical leadership of projects involving large-scale, complex and highly analytical tasks. Positions at this level are distinguished from Senior Engineers, in that the latter performs more specific and small-scale, though complex, analytical tasks.Work is performed within a broad framework of general policy and requires creativity and resourcefulness to accomplish goals and objectives, and in applying concepts, plans and strategies which may deviate from traditional methods and practices. Serves as a lead technical contact and systems integrator for large complex deployments, with a focus on securing vulnerabilities and reducing risk of system and/or asset compromises.Key Roles and Responsibilities:Ensure that assigned infrastructure at the client site is configured, installed, tested and operational.Perform necessary checks, apply monitoring tools and respond to alerts.Identify problems and errors prior to or when it occurs and log all such incidents in a timely manner with the required level of detail.Assist in analyzing, assigning and escalating support calls.Investigate third line support calls assigned and identify the root cause of incidents and problems.Report and escalate issues to 3rd party vendors if necessary.Provide onsite technical support to clients and provide field engineering services to clients.Expected to take ownership of relevant technologies according to domain or specialization.Conduct monthly random review of incidents and service requests, analyze, and recommend improvement in quality.Provide continuous feedback to clients and affected parties and update all systems and/or portals as prescribed by company.Proactively identify opportunities for work optimization including opportunities for automationKnowledge, Skills and Attributes:Ability to communicate and work across different cultures and social groups.Ability to plans activities and projects well in advance and considers possible changing circumstances.Ability to maintain a positive outlook at work.Ability to work well in a pressurized environment.Ability to work hard and put in longer hours when it is necessary.Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting.Ability to adapt to changing circumstances.Ability to place client at the forefront of all interactions, understanding their requirements and creating a positive client experience throughout the total client journey.Strong documentation and report writing.Ability to use reporting to trend and provide insight to risks.Ability to work collaboratively as one team across different business areas.Solid understanding of networking and networksGood understanding and appreciation of technical design and business principlesDemonstrates project management and administration ability.Good project skills which are demonstrated in the execution of installations and other assignments.Demonstrate customer engagement skills.Demonstrate relevant domain specialist knowledge.Client focused and displayed a proactive approach to solving problems.Ability to work under pressure.Ability to coach, mentor and provide guidance to team members.Good understanding of project management principles.Be proficient in the implementation, configuration of the products in the security GTM.Academic Qualifications:Advanced diploma, degree, or relevant qualification in IT/Computing (or demonstrated equivalent work experience).Certified in the following technologies.Security +.Higher certifications in the flowing key vendors.Fortinet (NSE 5 7).Networking certifications.Advantageous Certifications:Up to date and relevant ITIL certification.Industry certifications (CISM, CISSP etc.).Cisco Certified Internetwork Expert - Routing and Switching (CCIE).Cisco Certified Network Professional - Wireless (CCNP).Cisco Certified Internetwork Expert - Security (CCIE-S).Fortinet technology certifications.Requirements:Oversee the implementation of complex IT security plans.Provide test automation and technical support for a network or a virtual private network.Perform firewalls and other network tools.Provide system documentation and diagrams as well as maintenance documentation.Implement change management procedures that accommodate system architecture changes.Identify and document undocumented areas of a network to develop a network diagram.Evaluate current IT resources and technology resources develops and maintains security policy by identifying and evaluating threats to the organization's information assets.Ensures that the systems and networks of the organization are secure and operational.Uses threat modeling techniques and threat intelligence to develop and maintain a network-based risk assessment tool.Analyzes and detects risks and vulnerabilities associated with new technologies, processes, and applications.Identifies and investigates risk and vulnerability issues and develops and implements solutions to resolve them.Assists in developing and maintaining standards and procedures.Performs security audit and penetration testing activities to evaluate security safeguards and identify ways to improve security posture.Provides network security, network penetration testing, and traffic analysis services to large commercial organizations.Conducts comprehensive investigations and audits, performs all necessary forensics procedures, and responds to client requests for information.Reviews client network policies, policies, and security documents, and recommends changes or alterations.Experience with deploying network systems.Experience with security principles and principles of design.Ability to work independently with minimal supervision.Partake and abide by CAB processes when involved in changes.A well-working acquaintance in the Linux environment.Security administration port security on switches and IP security on Routers via Access list.Preparing monthly work status reports and updating technology-specific documents.Responsible for designing and implementation of customers' network infrastructure.Installing, Configuring, and Troubleshooting of Networking Equipment's: Routers and Switches.Managing, Maintaining, and Configuring an Internetwork with the help of WAN technologies like PPP, Frame-relay, dedicated T1s, ISDN.Knowledge of Layer-2 Switching, Vlans, and Access-list.Routing Protocols: OSPF, EIGRP, IGRP, RIP, and RIPv2.Advanced knowledge of Multi-Protocol Label Switching (MPLS), Voice over IP (VoIP), Firewall PIX, Cisco Call Manager, and routing protocol BGP.Good understanding of OSI Model, TCP/IP protocol suite (IP, ARP, ICMP, TCP, UDP, SMTP, FTP, TFTP).IP addressing and subnetting, Routing concepts.Sound knowledge of routing protocols - RIP V1/V2, OSPF, IGRP and EIGRPSwitch Configuration and VLAN setup on Cisco 1900, 2950, 2960 switches.Implemented SNMP on devices to allow for network management.Implemented traffic filters using Standard and Extended access lists, Distribute-Lists, and Route Maps.Implementation of HSRP, DHCP, DNS, FTP, TFTP, MRTG.Perform Troubleshooting end-to-end between two sites.Working knowledge of enterprise level network design and implementation.Required Experience:Solid years of work experience.Solid experience required in in Engineering function within a medium to large ICT organization.Solid experience of Managed Services.Excellent working knowledge of ITIL processes.Excellent experience working with vendors and/or 3rd parties.
#J-18808-Ljbffr
Orion Labs is a dynamic cloud and development consulting firm specializing in AWS, Terraform, and Kubernetes. We are committed to delivering exceptional clou...
Orionlabs - Western Cape
Published 14 days ago
Mukuru is on the lookout for a Senior Enterprise DevOps Engineer to join our amazing team of experts. This role is open to applicants from Cape Town, Johanne...
Mukuru - Western Cape
Published a month ago
The Body Shop is an International brand of luxury bath, body and beauty products operating in retail locations throughout South Africa. We currently have a v...
Clicks Group Limited - Western Cape
Published 14 days ago
Kick-start your career in the online gaming world and experience the very latest in technology and innovation. Who we are We're part of Super Group, the NYSE...
Betway Group - Western Cape
Published 14 days ago
Built at: 2024-12-25T04:25:37.296Z