Delaware County Intermediate Unit-posted 11 months ago
Morton, PA

The Network Security Engineer is responsible for designing, implementing, and maintaining the enterprise network infrastructure while ensuring its security, stability, and optimal performance. This role combines expertise in network architecture with cybersecurity to safeguard organizational systems and data against threats, vulnerabilities, and unauthorized access. The engineer will proactively manage network operations, conduct threat analyses, enforce security policies, and respond to incidents, playing a critical role in maintaining a secure and efficient IT environment.

  • Design, configure and maintain network operations software, applications and appliances (e.g. operating systems; firewall; VolP; content filtering, spam filtering; layer 2 & 3 core switches; routers; Wireless controllers/AP; routine maintenance programs, etc.).
  • Administer and maintain the IU's Network infrastructure.
  • Serve as lead engineer and point of contact in support of DCIU's regional wide area network and connections to customer school entities.
  • Ensure high availability, reliability, and scalability of network services to meet enterprise needs.
  • Monitor network performance and troubleshoot issues to ensure optimal operation.
  • Work alongside the Network Systems Administrator to configure and maintain all on-premise and cloud-based systems in production and disaster recovery environments.
  • Conduct vulnerability assessments, penetration tests, and security audits to identify and address risks.
  • Investigate and respond to cybersecurity incidents, implementing mitigation strategies and incident reports.
  • Collaborate with the rest of the IT team to integrate security best practices into new and existing systems and applications.
  • Provide ad hoc data analysis support to all internal clients.
  • Work with stakeholders to understand business requirements and ensure network and security solutions align with organizational goals.
  • Partner with technology teams to design solutions that mitigate risk.
  • Share knowledge of future trends, tools, procedures and systems in infrastructure security, internal controls and risk management.
  • Demonstrate a high level of personal integrity and the ability to discreetly handle sensitive, personal and confidential case information.
  • Heavy involvement with creating the organization's disaster recovery plan, a procedure that IT employees follow in case of emergency.
  • Perform regular preventative maintenance on network and security systems to ensure optimal performance and reliability.
  • Plan and execute hardware and software upgrades, replacements, and lifecycle management to minimize downtime and maintain system integrity.
  • Make recommendations to management on enhancements to existing and new security hardware, software or related tools.
  • Assist in evaluating, planning, configuration, and implementation of new/existing security applications/tools.
  • Create and maintain data security documentation, policies and procedures.
  • Assist in the identification, response, investigation, and remediation of potential breaches of and issues surrounding data security.
  • Interface with users of technology, employing a high degree of tact and diplomacy to promote a positive image of the department.
  • Resolve problem situations in a professional manner.
  • Maintain competency and enhance professional growth and development through continuing education and conferences.
  • Perform other duties as assigned by the Supervisor of Information Technology or CITO.
  • Bachelor's Degree strongly preferred (Computer Information Systems, Computer Science) or equivalent years of work experience.
  • 5 years' experience in systems administration, network administration or cybersecurity.
  • 3+ years of hands-on experience managing enterprise networks, including routers, switches, firewalls, and wireless infrastructure.
  • Strong knowledge of cybersecurity principles, including threat detection, incident response, and vulnerability management.
  • Experience with network security tools such as firewalls, IDS/IPS, endpoint protection, and VPNs.
  • Proficiency with network protocols (e.g., TCP/IP, DNS, DHCP) and network troubleshooting tools (e.g., Wireshark, SolarWinds).
  • Demonstrated ability to identify, analyze, and mitigate security risks and vulnerabilities.
  • Experience with cloud security and management, particularly in platforms like AWS, Azure, or Google Cloud.
  • Familiarity with backup and disaster recovery solutions, including Datto or similar appliances.
  • Hands-on experience with endpoint management tools (e.g., JAMF, Snipe-IT) and service desk systems (e.g., Fresh Service).
  • Experience working in an educational or public-sector IT environment.
  • Technical consulting background.
  • Experience with Next-Generation Antivirus (NGAV) solutions, such as CrowdStrike, SentinelOne, or Carbon Black.
  • Experience in development, planning, and implementation of IT Security strategy.
  • Experience with network penetration testing, application vulnerability assessments, risk analysis and compliance testing.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service