Friday 26 August 2011

Security Specialist

Job Description
Security Specialist


Must Haves:

• 10 years of demonstrated experience
• Excellent data center network design and integration skills and experience.
• Excellent knowledge of best practices for network design, build and networking products andsolutions.
• Excellent skills and experience designing networks based on Checkpoint Firewall-1/VPN software(NG-AI) Checkpoint 4.1, NG, NGAI, NGX, VSX, Juniper SRX, Juniper SA SSL VPN and JunipervGW firewall.
• Excellent knowledge with RSA secure ID, Cisco ACS, LDAP, TACAS and RADIUS
• Cisco FWSM, ASA
• Knowledge and experience with Routers and Switches including Cisco 3750(G/E/X), and 6500series devices (VSS), Nexus 7000, 5000, 2000 and 1000V series.
• Senior skill set with Layer 2 protocols, i.e. STP. GLBP, VSS
• Strong skills in networking protocols (I.E Transmission Control Protocol/Internet Protocol(TCP/IP), Domain Name System (DNS), Simple Mail Transfer Protocol (SMTP),Post OfficeProtocol(POP3) and File Transfer Protocol(FTP) including knowledge of wireless and remoteaccess technologies
• Solid knowledge and experience with Layer 2 protocols including but not limited to (STP), (GLBP)and (VSS).
• Solid knowledge and experience with static and dynamic routing protocols; including but notlimited to; Exterior Gateway Protocol (EGP) Interior Gateway Protocol, Routing InformationProtocol (IGP), Open Shortest Path First Protocol (OSPF) and Border Gateway Protocol (BGP)
• Experienced with MPLS (Multi Protocol Label Switching) and VPLS Virtual Private LAN Services(VPLS)
• Ability to manage multiple priorities, concurrent objectives, projects and activities.
• Effective judgment in prioritizing and time allocation.• Excellent technical and non-technical written and oral communication skills.


Education Requirements:

• MCSE, CISSP, CCNP, CCIP or CCIE designation is an asset but not required
• University Degree or Diploma in Computer Science, Engineering or related discipline orequivalent


Any other relevant information regarding expectations and role:

Occasionally, working outside of normal business hours, and on weekends, is necessary toaccommodate system implementations, maintenance, and responses to outages

• Carry out unit testing, system testing and integration testing tasks
• Provide technical expertise in their area of responsibility
• Assist in creation of Security design strategy as directed by Security lead
• Assist in design of overall Security configurations as directed by Security lead
• Assist in IP addressing strategy
• Assist and create standardize approaches to provisioning
• Create virtual interfaces on firewalls, implement routing and firewall rules
• Perform testing as directed by the project


Contact Information
Company Name Zylog Systems (Canada) Ltd.

No comments:

Post a Comment