Network Security Tier 3 Engineer ( StealthWatch )

Depends on Experience

Contract: Corp-To-Corp, Independent, 12 Month(s)

  • No Travel Required


Network SecurityStealth Watch

Job Description

We are seeking a Tier 3 Network Security (StealthWatch) job role. If you are interested please apply with your most recent resume. 
Title: Tier 3 Network Security Engineer (StealthWatch)
Location: Austin TX
Duration: 12 months+
Qualifying Experience:
Ability to configure, deploy, and troubleshoot Cisco Stealthwatch Platform to include Flow Sensors, Flow Collectors, Data Store, Data Broker, Telemetry Broker, and TAP/SPAN.
Provide accurate and timely reporting on all project deliverables.
Recommends secure and effective solutions for system/application development in compliance with Information
Working knowledge of Windows Active Directory Domains
Strong Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
Knowledge of incident response and handling methodologies.
Knowledge of network traffic analysis methods.
Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and
Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
Knowledge of security system design tools, methods, and techniques.
Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities.
Knowledge of defense-in-depth principles and network security architecture.
Knowledge of cyber defense and information security policies, procedures, and regulations.
Knowledge of the common attack vectors on the application layer.
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored).
Knowledge of system administration, network, and operating system hardening techniques.
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access,
escalation of privileges, maintaining access, network exploitation, covering tracks).
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems
performance monitoring), and tools.
Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of how to use network analysis tools to identify vulnerabilities.


Warm Regards,
Zahid H Ansary
C: lt;br />|