Implementation Engineer Security
منذ 2 يوم
source : HireeJobsGulf

Requirement for implementation engineer resources specifically skilled in the detailed design build implementation and turnover to production of Security Systems Secure Authentication Solutions Content Disarm and Response Solutions Secure Browsing Solutions IRM DRM Solutions Generic Role and Responsibilities Minimum of 5 years of experience in technical capability with at least 2 years in a technical role preferably working for an IT Services or Systems Integration organisation Good degree level qualification in an Computer Science or related field Experience of security product installations to best practice standards Manages implementation tasks with attention to detail and while under pressure Leads the technical implementation for complex technical projects involving participants from multiple areas of the company or vendors Demonstrable experience of involvement within medium to largescale project driven implementations Technical deployment understanding of troubleshooting methodologies steps and tools Experience of mentoring training and teaching operational support personnel A mindset and desire to confidently hand over into operational support with pride Technical deployment and operational expertise in using various security ecosystems products Excellent interpersonal and communication skills capable of writing technical documentation acting as a vendor liaison work closely with Senior Implementation Engineers and peers Maintains and evangelises strong values of integrity commitment and selfimprovement to self and others Technical REQUIREMENTS Candidates must be able to demonstrate indepth knowledge of installation and configuration in three or more of the following core functions Security technologies such as Secure Authentication Solutions Content Disarm and Response Solutions Secure Browsing Solutions IRM DRM Solutions PKI solutions SIEM Log Monitoring DLP Encryption Vulnerability Management Payload Analysis Sandboxing Endpoint Behaviour Analysis and Forensics Endpoint Threat Detection and Response Security Configuration Management Identity and Access Management Security Orchestration and Automation Digital Rights Management Security Products such as Secret Double Octopus ForgeRock Deep Secure Garrison Seclore WatchDox Splunk ARCsight LogRhythm Symantec Forcepoint DLP Tripwire Rapid7 FireEye Wildfire RedSeal NetBrain Dell TPAM Centrify SailPoint Invotas Carbon Black Palo Alto Traps Ivanti HEAT Cryptoflow Stealth Titus Thycotic CyberArk PAM REQUIREMENTS Skills Required Must be able to demonstrate experience with Security integration with ecosystems such as monitoring nextgen firewalls log management storage networking virtualisation PKI Enterprise security product implementation and configuration Scripting bash perl python PowerShell desirable Linux Windows configuration Certification REQUIREMENTS SSCP or similar desirable Vendorspecific certifications at least two

قدِّم طلب ترشيحك
بريدي الالكتروني
بالضغط على "واصل" ، أعطي موافقة نيوفو على معالجة بياناتي وإرسال تنبيهات إلي بالبريد الإلكتروني ، على النحو المفصل في سياسة خصوصية لـ نيوفو . يجوز لي سحب موافقتي أو إلغاء الاشتراك في أي وقت.
استمارة الطلب