Network Infrastructure Engineer II

Intone NetworksMobile, AL
296d

About The Position

The Network Infrastructure Engineer II position is a contract role with a duration of 12 months. The engineer will be responsible for managing and implementing network infrastructure solutions, ensuring security protocols are followed, and maintaining the integrity of the organization's information systems.

Requirements

  • In-depth knowledge of Fortinet firewalls and adjacent solutions.
  • Expert-level understanding of Cisco networking solutions (L2 and L3).
  • Knowledge of security protocols and technologies (SSL/TLS, IPsec, IDS/IPS).
  • Understanding of security threats and vulnerabilities.
  • Knowledge of virtualization technologies (VMware, OpenStack).
  • Familiarity with cloud computing platforms (AWS, Azure).
  • Basic understanding of core Storage Area Networks (Fiber Channel).
  • Ability to handle multiple tasks effectively.
  • Ability to work under pressure and to prioritize.
  • Excellent organizational skills.
  • Proficient in reading and writing in English.
  • Ability to handle difficult individuals and situations.
  • Ability to make independent judgment decisions with little or no supervision.
  • Ability to see clearly with or without corrective lenses and hear clearly with or without aids.
  • Ability to use hands, fingers, and wrists repetitively, using a computer keyboard and other office equipment, regularly.
  • Ability to stand, sit, and move around the building and elsewhere regularly.
  • Ability to reach overhead, bend, and squat regularly.
  • Ability to lift up to 20 lbs. regularly and up to 50 lbs. occasionally with assistance.
  • Ability to climb ladders occasionally.
  • Ability to travel via automobile and airplane regularly.

Nice To Haves

  • Certification in Cisco UCS Platform.
  • Certification in Cisco MDS.
  • Certification in Fortinet Platforms.
  • Certification in F5 Load Balancers.

Responsibilities

  • Implement and act in accordance with the organization's information security policies.
  • Protect assets from unauthorized access, disclosure, modification, destruction or interference.
  • Execute particular security processes or activities.
  • Ensure responsibility is assigned to the individual for actions taken.
  • Report security events or potential events or other security risks to the InfoSec department.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service