Hello!
Greetings from QNC Consulting!
We have an urgent requirement for the below position. Please go through the job description and let me know you’re interested.
Job Title: Firewall Assessment
Location: Oak Brook,IL
Duration: 9 Months
Qualification: Security Check Point certification is preferred
Job Description:
· The Candidate should take care of the day-to-day operations and data structures by overseeing operational performance.
· They configure Expertise in Checkpoint Firewall.
· The professionals must have an in-depth understanding of the CheckPoint Firewall.
Tasks and Responsibilities:
· Plan, implement, and upgrade checkpoint firewalls.
· Protect digital files and information systems against unauthorized access, modification, or destruction.
· Managing all CheckPoint Firewall related issues.
· Plan and document the configuration and verification of routing protocols and their optimization in enterprise networks.
· Designing and planning networks are specific to client requirements and industry-standard principles.
· Ability to independently troubleshooting and debugging broad, complex, and unique networks solution involving mixed media.
· Maintain data and monitor security.
· Conduct internal and external security audits.
· Manage network, intrusion detection, and prevention systems.
· Analyze security breaches to determine their root cause.
· Recommend and install appropriate tools and countermeasures.
· Define, implement, and maintain corporate security policies.
· Security awareness training.
· Coordinate security plans with outside vendors.
Technical skills required:
· Good experience in the CheckPoint firewall.
· Analyze business requirements to develop technical network solutions and their framework.
· In-depth knowledge of Checkpoint Firewall and Firewall management systems - Tufin.
· Good knowledge on Checkpoint firewall and F5 Load Balancer design/ implementation.
· In-depth knowledge on site to site VPN design and build
· Develop technology roadmaps.
· Develop test plans, implementation plans, and project timelines for various projects.
· Write functional requirements/specifications documents.
· Upgrade hardware and software components as required.
· Solve complex problems with many variables and solutions.
· Social engineering – given that humans are the weakest link in the security chain, an analyst’s expertise can help with awareness training.
· Forensics – investigation, and analysis of how and why a breach or other compromise occurred.
· Troubleshooting – the skill to recognize the cause of a problem.
· TCP/IP, computer networking, routing, and switching – an understanding of the fundamentals: the language, protocol, and functioning of the internet.
· ISO27001 assessment – specifications for a framework of policies and procedures that include all legal, physical, and technical controls involved in an organization’s risk management.
· Cloud computing – the risks and benefits of using a vendor’s remote servers to store, manage and process an organization’s data.
No comments:
Post a Comment