Boundary Security Engineer

Booz Allen HamiltonSan Antonio, TX
1d

About The Position

Boundary Security Engineer The Opportunity: A well-designed secure network is critical to move data and enable the Department of Defense (DoD) to achieve their mission, but how can an organization make sure their network will fit their evolving needs? Crafting the right network with the right equipment and software requires a combination of technical skill and careful planning. That’s why we need you, a Boundary Security Engineer, who knows how to utilize your craft to facilitate the needs of the DoD. As a security engineer on our team, you’ll work with the DoD to develop a reliable, secure network to support critical missions. You’ll collaborate with SMEs, customers, vendors, and users to learn the strategic goals and operational needs that shape the network requirements. You’ll then share your expertise during the planning of acquisition, installation, configuration, and maintenance of the network components. From resolving interoperability issues across platforms, to supporting the acquisition of hardware, you’ll put your hardware and software talents to good use. This is your chance to share your experience with backbone networks, cloud technologies, and core networking while broadening your security and network engineering work. You’ll dive into challenging hands-on problem-solving, and encounter opportunities to learn new tools and skills. We focus on growing as a team to make the best solutions for our customers. As a Boundary Security Engineer at Booz Allen, you’ll design and test new boundary security capabilities in a lab environment and implement newly tested boundary security capabilities into production environments. You will provide implementation teams with remote network firewall and security appliance support. You will also identify and support security requirements for switched and routed networks and implement network security best practice configuration and associated hardware and software. You’ll discover and assess complex client enterprise network deployments, apply leading-edge security principles, theories, and concepts, and contribute to the development of new principles and concepts. You’ll work on unusually complex problems, provide highly innovative solutions, operate with substantial latitude for unreviewed action or decision, and mentor or supervise employees in both company and technical competencies. Work with us as we secure and protect DoD enterprise networks for the better. What You’ll Work On: Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management. Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. Perform risk and vulnerability assessments in network, system, and application areas. Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise. Join us. The world can’t wait.

Requirements

  • 4+ years of experience with network security and the design of IT systems or networks for large commercial enterprises or government agencies
  • 4+ years of experience with firewall and enterprise security design, including device hardening, intrusion detection systems and intrusion prevention systems, SIEM, firewalls, internet protocol security, vulnerability assessment, and intrusion detection
  • Experience with Palo Alto firewalls and Cisco or Juniper firewalls
  • Secret clearance
  • HS diploma or GED
  • Ability to obtain a DoD 8570 IAT Level II Certification within 90 days of hire date

Nice To Haves

  • Experience designing and implementing Cloud-native and over the top networking in AWS, Azure, or GCP
  • Knowledge of DoD IT and Cloud security policies, including STIGs and DoD Cloud SRG, and how to apply them to the design and implementation of Cloud solutions
  • Possession of excellent verbal and written communication skills, including public speaking, prior publications, and speaking engagements in industry or vendor forums

Responsibilities

  • Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management.
  • Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises.
  • Perform risk and vulnerability assessments in network, system, and application areas.
  • Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise.

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service