About The Position

We are more than a health system. We are a belief system. We believe wellness and sickness are both part of a lifelong partnership, and that everyone could use an expert guide. We work hard, care deeply and reach further to help people uncover their own power to be healthy. We inspire hope. We learn, grow, and achieve more – in our careers and in our communities. Job Description Summary: Reports to Cybersecurity Functional Leader, the Network Security Engineer has knowledge of all major Network Security tools and a fundamental knowledge of networking, network infrastructure, and web technologies. The Network Cybersecurity Engineer works closely with the Senior Cybersecurity engineers, business analysts, architects, vendor partners, and other teams across the IT organization to secure complex applications and services. This role implements the designs created by the Senior Cybersecurity Engineers and enforces security controls for the application or service architecture which safeguards the integrity and security of the application environment in alliance with architects and other tech leads. In addition, the incumbent is responsible for maintaining daily operations and implementing assigned project work. As a High Reliability Organization (HRO), responsibilities require focus on safety, quality and efficiency in performing job duties. The job profile provides an overview of responsibilities and duties and is not intended to be an exhaustive list and is subject to change at any time

Requirements

  • Bachelor's Degree (Required)
  • Degree, or equivalent experience.
  • Field of Study/Experience: Computer Science, Information Systems, Mathematics, or Engineering.
  • Years of Experience: 5+ years in network and data security.
  • SPECIALIZED KNOWLEDGE Expertise in network design, infrastructure, switching and routing, architecture, and security tools.
  • Fundamental understanding of Cybersecurity across all disciplines.
  • Excellent debugging, troubleshooting, and analytical skills.
  • Knowledge of IT service management (ITSM) and Information Technology Infrastructure Library (ITIL).
  • Knowledge of IT standards and controls.
  • Knowledge of Next Generation Firewalls, Intrusion Prevention Systems, IPsec VPNs, On Premise and Cloud Proxies, and Network Access Control Systems.
  • Understanding of information principles and processes.
  • Implement security controls for cloud, systems, networks, and data controls.
  • Assess system and application security threats and vulnerabilities.
  • Fundamental understanding of encryption methods and standards.
  • Basic understanding of security standards including HIPAA, CIS, NIST, PCI DSS, and HITRUST.
  • Knowledge of Azure Infrastructure as a Service (IaaS) network security design and architecture.

Nice To Haves

  • Is adaptable to new technology.
  • Forward-thinking, with ability to be strategic when looking at future technology.
  • Possesses a continuous-learner mindset.
  • Ability to estimate the financial impact of technology alternatives.
  • Ability to quickly comprehend the functions and capabilities of existing, new, and emerging technologies that enable and drive new business designs and models.
  • Demonstrated ability to work well with others and be respected as a leader.
  • Certified Information Systems Security Professional (CISSP).
  • Certified Cloud Security Professional (CCSP).
  • AZ-500 Azure Security Engineer Associate.

Responsibilities

  • Security Expertise - Serves as the deep technical expert for Cybersecurity principles spanning network, application, system, cloud, and end point use cases. Applies security knowledge to identify and assess risk, develop create and secure solutions to protect enterprise data and systems. Adapts to new and emerging technologies.
  • Leads Initiatives - Guides their teams through technical issues and challenges. Leads technology change to deliver security and secure business outcomes while also virtually leveraging subject matter experts from any other needed technical area. Oversees, or consults on, technology implementation and modification activities (for example, projects and products), particularly for new or shared solutions.
  • Collaboration - Works with architects, Business Analysts, Product Owners and peers providing technical expertise by integrating security controls to ensure the security and integrity of the application environment. Reviews and provides security input into architectural designs and requirements.
  • Technical Documentation - Creates, reviews, and approves technical documentation for applications supported and providing specifications for vendors.
  • Research and Analysis - Analyzes, plans, justifies, schedules, and coordinates the implementation and maintenance of the specialty area’s administrative, operational, and financial initiatives including TCO, optimization, and efficiency.
  • Technology Strategy - Leads the development of technology strategy and roadmap within a given area of specialty including design, documentation, communication, and implementation of new or existing standards for infrastructure technologies while remaining current on industry trends.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service