Security Consultant

Overview

Full Time

Skills

Cyber security
Information assurance
Information systems
Information security
Network security
Professional writing
Firewall administration
OSI model
CISSP
Firewall
Design
DMZ
ACL
NAT
SSL
Inspection
Network
DPI
DDOS
iptables
IPsec
Virtual private network
IDS
Compilers
Computer hardware
Switches
Debugging
Computer networking
TCP
UDP
Border Gateway Protocol
DNS
DHCP
Macros

Job Details

Description Here

Education
  • Bachelors degree required; preferred in Cyber Security, Information Assurance, Computer Information Systems (CIS), Information Security and Business
  • Masters degree preferred in Information Assurance, Information Security or related discipline


Certifications Preferred
  • Certified Information Systems Security Professional (CISSP)


Work Experience
  • 1-3 years of consulting experience for security consulting firms
  • 7 to 12 years in enterprise firewalls and secure design (DMZ s, ACL s, NAT/PAT, ssl-offloading & traffic inspection)


Specialized Knowledge, Skills, and Abilities
  • Working knowledge and consulting experience in the majority of the following areas:
    • Zero Trust Architectures
    • Network Segmentation
    • Network Security
    • OT Networks
  • Ability to perform concurrent tasks in complex environments under adjusting priorities
  • Ability to communicate and modify approach, language, and style to different audiences
  • Professional writing style and experience with demonstrable technical and business-related artifacts is required
  • Networking (Security). Industry-level expertise in any of the following networking (security) aspects
    • Network security platforms, including segmentation, ACLs, DPI, DDoS protection. Examples include: Software: iptables, ipsec, VPN, IDS, firewall management platforms, ACL compilers and tooling. Hardware: switch ACLs, stateful firewalls, network segmentation, security zones
    • OSI model and debugging network traffic
    • Networking protocols (TCP/UDP, BGP, DNS, DHCP)
  • Familiarity in firewall solutions in Zero-Trust, Network Admission Control, Micro-segmentation, Macro-segmentation, virtual networks, or Identity Defined Networks (IDN).