L2 Security Engineer

Company Name:
Link Technologies
You can view a formatted version of this
Posting and APPLY at:
Link Technologies is currently seeking an L2 Security Engineer a full-time
with our client in Las Vegas,
. If you are seeking an exciting opportunity, please contact us.
Roles and responsibilities
The position will be responsible for day-to-day network security operations and assigned
. Major functions include network security risk management, Internet defense, vulnerability assessment and remediation, and security policy development. The position requires a thorough understanding of
networks, network security and design principles. Thorough working knowledge of OSI model and especially TCP/IP stack as well as being able to troubleshoot problems at the packet layer using trace tools. In addition, schedule security penetration testing/vulnerability scans and evaluate the results and determine what corrective measures must be taken, monitor security audit and intrusion detection system logs for network anomalies and validate/test security architecture. Also, the engineer must have working experience in both implementation and support of firewalls, IPS, load balancers, proxy servers, routers, switches, authentication
, wireless 802.11 g/n and encryption methods.
Skill Set Functions
Performs maintenance and management of assigned security technologies and functions that include firewalls, intrusion detection systems, authentication devices, encryption, event log monitoring, reporting, incident response, security analysis and/or other security activities.
Review security event logs and system journals; remediate system security anomalies.
Administer firewall, URL filtering, and vulnerability assessment technologies using GUI consoles.
Design and implement network infrastructure security solutions meeting the immediate and long term business requirements.
Maintain accurate records of system security baseline policies; audit security baselines and report status.
Perform network security self-assessments and work with 3rd party vendors.
Schedule security penetration testing and Vulnerability scans as required. Evaluate the results and determine what corrective measures must be taken. Recommend procedures ensuring upgrades, patches and new apps are installed correctly and on time.
Perform general network tasks as an individual contributor and as a project lead.
Participate in On-call support rotation.
Understand ITIL change management.
Networking Vendors: Cisco, HP, Aruba, Brocade, Checkpoint, Bluecoat, Infoblox, Solarwinds, Palo Alto.
Networking Technologies: Routing, OSPF, BGP, MPLS, Wireless, DWDM, VLAN.
Networking Security: Intrusion detection, firewalls, VPN, Sourcefire, RSA. Radius.
Network Administration: Configuration backups, user administration, SNMP, AAA.
Certifications a plus: CCNA, CCNP, CISSP.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.