Secur Solutions Group
Information Technology Security Specialist
Secur Solutions Group, Palo Alto, California, United States, 94306
Key Responsibilities:
Cybersecurity Risk Assessment & Mitigation:
Cyber Risk Assessment:
Conduct comprehensive cyber risk assessments in support of technology initiatives, identifying IT-related risks and recommending appropriate security controls to mitigate those risks. Risk Monitoring & Management:
Continuously track and manage risk mitigations and exceptions, ensuring that risk reduction measures are implemented and that monitoring capabilities are integrated into the solutions to detect and respond to evolving threats. Compliance & Best Practices:
Ensure that all security measures and controls are in compliance with internal policies, industry standards, and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS). Network Security Design & Implementation: Solution Design:
Design High-Level (HLD) and Low-Level (LLD) network security solutions, tailoring the security architecture to meet specific business requirements and security needs. Firewall & UTM Solutions:
Implement and manage firewall and Unified Threat Management (UTM) solutions, including but not limited to Checkpoint, Fortigate, Palo Alto firewalls, and AWS-based security configurations. Encryption & Authentication:
Design and deploy robust encryption technologies (e.g., Symantec 12.1.4) and implement two-factor authentication solutions (e.g., RSA Secure ID) to ensure secure access to corporate resources. Cloud Security:
Manage and secure cloud environments, including AWS firewalls, AWS Shield, and AWS WAF, to safeguard cloud-based assets and services. Security Incident & Problem Management: Incident Management:
Respond to and resolve security incidents, monitoring for any unauthorised access, vulnerabilities, or breaches in the network. Investigate the root cause and implement remediation strategies. Change Management:
Oversee changes in the network security environment, including the installation, configuration, and maintenance of firewalls, load balancers (e.g., F5 LTM/ASM), and proxy servers (e.g., Bluecoat, ZIA, ZPA). Proxy & Web Security:
Manage and secure proxy servers and web security gateways (WSGA, Websense), ensuring that all outbound and inbound traffic adheres to the organisation’s security policies. Global Client Support & Collaboration: Client Communication:
Act as a liaison for global clients, understanding their security requirements and proposing tailored solutions that address their unique needs. Client Support:
Provide ongoing support for security infrastructure deployed across various client locations, including resolving incidents, handling requests, and managing vulnerabilities. Security Monitoring & Reporting: Network Monitoring:
Utilise network monitoring tools (e.g., SolarWinds, CA Spectrum, and E-Health) to proactively identify potential threats and vulnerabilities in the network. Reporting & Documentation:
Maintain detailed records of risk assessments, security incidents, mitigations, and system configurations. Prepare reports for management and stakeholders on security posture and risk mitigation progress. Training & Awareness: Security Awareness:
Educate internal teams and clients on best security practices, risk management strategies, and incident response protocols. Continuous Improvement:
Stay updated with the latest trends, tools, and technologies in network security, ensuring the company’s security measures remain current and effective. Job Requirements: Qualifications: Experience:
10+ years of experience in network security, systems security, and risk management, with a proven track record in implementing network security solutions and managing complex security infrastructures. Education:
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field (or equivalent experience). Certifications:
ITIL Foundation (V3 or higher) VMware 6.x or similar (preferred) Relevant certifications in network security such as CISSP, CISM, or CompTIA Security+.
Technical Skills: Network Security:
Expertise in designing and implementing network security solutions, including firewalls (Checkpoint, Fortigate, Palo Alto), VPN solutions, and UTM. Cloud Security:
Proficient in securing cloud environments such as AWS, including AWS WAF, AWS Shield, and AWS Firewall management. Proxy & Web Security:
Experience with proxy servers and web security gateways such as Bluecoat, ZIA, ZPA, WSGA, and Websense. Network Monitoring:
Hands-on experience with network monitoring tools like SolarWinds, CA Spectrum, and E-Health to ensure security and performance. Authentication & Encryption:
Strong knowledge of authentication mechanisms (e.g., RSA Secure ID Two-Factor Authentication) and encryption solutions (e.g., Symantec 12.1.4). Incident Management & Troubleshooting:
Experience in handling security incidents, conducting root cause analysis, and troubleshooting security issues. Firewalls & Load Balancers:
Expertise in managing firewalls, load balancers (e.g., F5 LTM/ASM), and network configurations to ensure a secure and efficient IT infrastructure. Soft Skills: Analytical & Problem-Solving:
Strong analytical skills with the ability to assess complex security risks, identify vulnerabilities, and recommend effective solutions. Communication Skills:
Excellent written and verbal communication skills to liaise with clients, teams, and management. Ability to explain complex security issues to non-technical stakeholders. Collaboration & Teamwork:
Able to collaborate with multiple teams, both internal and external, to implement solutions and drive security initiatives. Client-Focused:
Strong client management skills with the ability to understand and address specific security needs for global clients.
#J-18808-Ljbffr
Conduct comprehensive cyber risk assessments in support of technology initiatives, identifying IT-related risks and recommending appropriate security controls to mitigate those risks. Risk Monitoring & Management:
Continuously track and manage risk mitigations and exceptions, ensuring that risk reduction measures are implemented and that monitoring capabilities are integrated into the solutions to detect and respond to evolving threats. Compliance & Best Practices:
Ensure that all security measures and controls are in compliance with internal policies, industry standards, and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS). Network Security Design & Implementation: Solution Design:
Design High-Level (HLD) and Low-Level (LLD) network security solutions, tailoring the security architecture to meet specific business requirements and security needs. Firewall & UTM Solutions:
Implement and manage firewall and Unified Threat Management (UTM) solutions, including but not limited to Checkpoint, Fortigate, Palo Alto firewalls, and AWS-based security configurations. Encryption & Authentication:
Design and deploy robust encryption technologies (e.g., Symantec 12.1.4) and implement two-factor authentication solutions (e.g., RSA Secure ID) to ensure secure access to corporate resources. Cloud Security:
Manage and secure cloud environments, including AWS firewalls, AWS Shield, and AWS WAF, to safeguard cloud-based assets and services. Security Incident & Problem Management: Incident Management:
Respond to and resolve security incidents, monitoring for any unauthorised access, vulnerabilities, or breaches in the network. Investigate the root cause and implement remediation strategies. Change Management:
Oversee changes in the network security environment, including the installation, configuration, and maintenance of firewalls, load balancers (e.g., F5 LTM/ASM), and proxy servers (e.g., Bluecoat, ZIA, ZPA). Proxy & Web Security:
Manage and secure proxy servers and web security gateways (WSGA, Websense), ensuring that all outbound and inbound traffic adheres to the organisation’s security policies. Global Client Support & Collaboration: Client Communication:
Act as a liaison for global clients, understanding their security requirements and proposing tailored solutions that address their unique needs. Client Support:
Provide ongoing support for security infrastructure deployed across various client locations, including resolving incidents, handling requests, and managing vulnerabilities. Security Monitoring & Reporting: Network Monitoring:
Utilise network monitoring tools (e.g., SolarWinds, CA Spectrum, and E-Health) to proactively identify potential threats and vulnerabilities in the network. Reporting & Documentation:
Maintain detailed records of risk assessments, security incidents, mitigations, and system configurations. Prepare reports for management and stakeholders on security posture and risk mitigation progress. Training & Awareness: Security Awareness:
Educate internal teams and clients on best security practices, risk management strategies, and incident response protocols. Continuous Improvement:
Stay updated with the latest trends, tools, and technologies in network security, ensuring the company’s security measures remain current and effective. Job Requirements: Qualifications: Experience:
10+ years of experience in network security, systems security, and risk management, with a proven track record in implementing network security solutions and managing complex security infrastructures. Education:
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field (or equivalent experience). Certifications:
ITIL Foundation (V3 or higher) VMware 6.x or similar (preferred) Relevant certifications in network security such as CISSP, CISM, or CompTIA Security+.
Technical Skills: Network Security:
Expertise in designing and implementing network security solutions, including firewalls (Checkpoint, Fortigate, Palo Alto), VPN solutions, and UTM. Cloud Security:
Proficient in securing cloud environments such as AWS, including AWS WAF, AWS Shield, and AWS Firewall management. Proxy & Web Security:
Experience with proxy servers and web security gateways such as Bluecoat, ZIA, ZPA, WSGA, and Websense. Network Monitoring:
Hands-on experience with network monitoring tools like SolarWinds, CA Spectrum, and E-Health to ensure security and performance. Authentication & Encryption:
Strong knowledge of authentication mechanisms (e.g., RSA Secure ID Two-Factor Authentication) and encryption solutions (e.g., Symantec 12.1.4). Incident Management & Troubleshooting:
Experience in handling security incidents, conducting root cause analysis, and troubleshooting security issues. Firewalls & Load Balancers:
Expertise in managing firewalls, load balancers (e.g., F5 LTM/ASM), and network configurations to ensure a secure and efficient IT infrastructure. Soft Skills: Analytical & Problem-Solving:
Strong analytical skills with the ability to assess complex security risks, identify vulnerabilities, and recommend effective solutions. Communication Skills:
Excellent written and verbal communication skills to liaise with clients, teams, and management. Ability to explain complex security issues to non-technical stakeholders. Collaboration & Teamwork:
Able to collaborate with multiple teams, both internal and external, to implement solutions and drive security initiatives. Client-Focused:
Strong client management skills with the ability to understand and address specific security needs for global clients.
#J-18808-Ljbffr