About The Position

This role requires an experienced Technology Architect with a strong background in computing and information security. The architect will be responsible for delivering on assigned duties and other deliverables as directed by management. Key responsibilities include leveraging expert-level technical proficiency in F5 technologies, managing large enterprise clustered firewalls, load balancers, and proxies, and applying advanced understanding of networking and security best practices. The role also involves performing technical vulnerability assessments, building enterprise network and cloud infrastructure solutions, and administering remote access infrastructure.

Requirements

  • Degree in Computer Science, Engineering, Technical Diploma, or equivalent combination of education and/or experience.
  • 10+ years of progressive experience in computing and information security, including experience with security technology and remediation of Security Incidents.
  • Expert level technical proficiency with F5 LTM, APM, ASM, GTM.
  • Proficient technical experience working with large enterprise clustered high-availability firewalls, load balancers and proxies, including Checkpoint, Broadcom ProxySG, Zscalar ZIA.
  • Advanced understanding of networking technologies and information security best practices.
  • Advanced knowledge in Network, Web and Authentication protocols to perform network traffic / packet analysis.
  • Experience in performing and overseeing technical vulnerability assessments of I&T environment.
  • Technical experience working with LAN/WAN wired and wireless network and security technologies in a large enterprise environment.
  • Technical experience building clustered enterprise network and Cloud infrastructure solutions.
  • Working technical experience in administering remote access infrastructure.
  • Working experience with programming languages such as Unix/Linux/Windows shell script, Python.
  • Demonstrated familiarity with intrusion detection and vulnerability assessment in perimeter networks.
  • Familiar with theories and requirements of enterprise information security, cloud security, network security, application security, cryptography, and key management.

Responsibilities

  • Deliver on all duties as outlined in the assignment.
  • Complete other deliverables as directed by management.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service