The Perimeter Security Build Engineer will play a crucial role in developing and implementing perimeter security solutions for our organization. This role emphasizes the hands-on deployment, and configuration of security systems at the network's edge, focusing on protecting against external threats. The ideal candidate will possess a strong background in network security, with a particular emphasis on building and implementing robust security infrastructures.
Key Responsibilities:
Security Infrastructure Development:
Design, build, and deploy perimeter security solutions, including firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and VPNs.
Implement security measures that effectively safeguard the organization's network periphery.
Ensure new security solutions are seamlessly integrated into the existing network architecture.
Network Routing and Configuration
Understand and manage network routing protocols and configurations.
Ensure optimal network performance and security through effective routing strategies.
Troubleshoot routing issues and optimize network routes for security and efficiency
Configuration and Implementation:
Configure security infrastructure for optimal protection and performance.
Collaborate with network architects and IT teams to ensure alignment of security measures with overall network strategy.
Documentation and Compliance:
Document build processes, configurations, and standard operating procedures.
Ensure compliance with relevant security policies and regulatory standards in all implementation tasks.
Collaboration and Communication:
Work closely with various internal teams and security vendors to enhance perimeter security.
Effectively communicate project statuses, challenges, and achievements to stakeholders.
Qualifications:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field.
4+ years of experience
in network security, with a focus on security infrastructure development and implementation.
Strong familiarity with security technologies, including but not limited to
Checkpoint, Palo Alto Networks, and Cisco
.
Knowledge of
network protocols
, routing, and
firewall management
.
Basic Understanding of automation scripting languages such as
Python or PowerShell or Ansible
is desirable.
Understanding of Cloud Security is an advantage.
Relevant certifications are highly desirable, including CompTIA Security+, CCNA, Check Point Certified Admin (CCSA), Palo Alto Networks Certified Network Security Administrator (PCNSA).
Skills:
Excellent technical skills with a strong focus on
security infrastructure
and problem-solving.
Ability to manage multiple projects and tasks simultaneously.
Strong communication and teamwork capabilities.
Detail-oriented approach with a commitment to high-quality outcomes.
Work Environment:
This role may require occasional after-hours work for important implementations or urgent problem resolutions.
Hybrid-model work with office and remote days.
Weekend work is periodically expected with adequate off-days provided.
Career Path:
Opportunities for advancement into senior engineering roles, security architecture, or specialized cybersecurity areas.
-
Job Family Group:
Technology
-
Job Family:
Information Security
-
Time Type:
Full time
-
Most Relevant Skills
Please see the requirements listed above.
-
Other Relevant Skills
For complementary skills, please see above and/or contact the recruiter.
-
Citi is an equal opportunity employer, and qualified candidates will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other characteristic protected by law.
If you are a person with a disability and need a reasonable accommodation to use our search tools and/or apply for a career opportunity review Accessibility at Citi.
View Citi's EEO Policy Statement and the Know Your Rights poster.
Beware of fraud agents! do not pay money to get a job
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.