Job Description
<p>Requirement for implementation engineer resource specifically skilled in the detailed design document build, implementation and turnover to production IT/Cyber Security solutions.</p><p><br></p><p>Minimum of 10 years of experience in technical capability, with at least 8 years in a technical role, preferably working for an IT Services or Systems Integration organization n</p><p>ā¢ Good degree level qualification in an Computer Science or related field</p><p>ā¢ Experience of security product installations to best practice standards.</p><p>ā¢ Manages implementation tasks, with attention to detail and while under pressure</p><p>ā¢ Leads the technical implementation for complex technical projects involving participants from multiple areas of the company or vendors</p><p>ā¢ Demonstrable experience of involvement within medium to large-scale project driven implementations</p><p>ā¢ Technical deployment understanding of troubleshooting methodologies, steps, and tools</p><p>ā¢ Experience of mentoring, training and teaching operational support personnel</p><p>ā¢ A mind-set and desire to confidently hand over into operational support with pride. Technical deployment and operational expertise in using various security ecosystems products.</p><p>ā¢ Excellent inter-personal and communication skills; capable of writing technical documentation, acting as a vendor liaison, work closely with other Senior Engineers and peers.</p><p>ā¢ Maintains and evangelizes strong values of integrity, commitment, and self-improvement to self and others</p><p><br></p><p>Candidates must be able to demonstrate in-depth knowledge of installation and configuration in six or more of the following security technologies:</p><p><br></p><p>CISSP, CCIE-Security, or any other industry standard professional level security certification.</p><p><br></p><p><strong>Security Technologies:</strong></p><p>o Virtual Private Network (VPN)</p><p>o EDR / End Point Security</p><p>o Privilege Access Management (PAM) / Identity & Access Management (IAM)</p><p>o Data Classification and Data Loss Prevention (DLP)</p><p>o OS Administration (Windows or Linux) – Intermediate level</p><p>o Hardware Security Module (HSM)</p><p>o File Integrity Monitoring (FIM) and Security Configuration Management (SCM) solution</p><p>o Public Key Infrastructure (PKI) solution</p><p>o Digital Rights Management (DRM)/ Document Protection</p><p>o User Authentication (SAML/MFA/SSO)</p><p>o Disk Encryption/Email Encryption</p><p>o Web Application Firewall (WAF)</p><p>o Network Access Control (NAC)</p><p>o Secure Web Browsing</p><p><br></p><p><strong>Corresponding Security Products:</strong></p><p>o F5, Pulse Secure (Ivanti Secure)</p><p>o McAfee, Symantec, Trend Micro, Cybereason, Cisco AMP (Secure End Point), Carbon Black</p><p>o Delinea Secret Server (Thycotic), BeyondTrust, CyberArk, Sailpoint, Micro Focus</p><p>o Bolden James, Forcepoint, Symantec, McAfee, Digital Guardian</p><p>o Windows, Linux</p><p>o Thales, Gemalto</p><p>o TripWire, Trend Micro FIM</p><p>o Microsoft PKI</p><p>o Seclore, File Cloud</p><p>o HID, Thales, Secret Double Octopus, ADFS, VMware Workspace ONE Access</p><p>o MS Bitlocker, McAfee, Symantec</p><p>o F5, Imperva, NetScaler</p><p>o Forescout, Cisco ISE, Aruba Clear Pass</p><p>o Garrison, Ericom</p><p></p>