Network Security Architect Architecture - Chesapeake, VA at Geebo

Network Security Architect

Dollar Tree is seeking a Network Security Architect who can be an interface with internal and external partners.
This individual will be aware of all internal standards and systems which makeup network and security requirements.
S/he will be able to interface with both internal and external needs of business partners and internal enhancements.
The candidate will also be required to interface and work with the internal security and network team as a project member as time permits.
This role will also require continual learning of new technologies to bring ideas back to the teams for consideration and enhancements to current standards.
NetSec Architect Responsibilities Enhances security team accomplishments and competencies by planning the delivery of solutions and answering technical questions.
Plans, research, and designs network/security architecture for IT systems, in conjunction with respective technology owners.
Develops and reviews requirements for LANs, WANs, VPNs, firewalls, routers, and related network devices.
Documents and reviews security protocols by evaluating business strategies and requirements.
Assists with the responses to, and investigates, security incidents and provides thorough post-event analyses.
Develops project timelines driven by business outcomes in conjunction with leaders within the security and network teams.
Reviews system security measures and suggest necessary enhancements.
Verifies security systems by developing testing plans, penetration ideas.
Updates job knowledge by tracking and understanding emerging security practices and standards, participating in educational opportunities, reading professional publications, and participating in professional organizations.
Developing network and related architectures and solutions based on requirements from project demand, engineering, and operations, as well as key customers Working across the organization to provide technical leadership for the network infrastructure Assessing new technologies and best practices for adoption Driving standardization and automation into all aspects of the network platform Engaging with internal and external customers for briefings, issue escalation, and complex solution development Enabling the extended team's vitality through training, mentoring, and skills transfer Documenting network capabilities as appropriate for both internal and external consumption Security Architect Qualifications and Skills Strong working knowledge of IT risks, cyber security, and computer operating software Advanced understanding of security protocols, cryptography, and security Experience implementing multi-factor authentication Strong working knowledge of routing protocols (BGP, EIGRP,OSPF) Requirements Bachelor's degree in computer science, MIS, Information Technology or related field 5
years of experience in IT risk management and information security 5
years of experience designing service provider network infrastructures, at scale, e.
g.
, MPLS/BGP, routing, switching, SDN/NFV, EVPN, VXLAN 2
years of creation of technical diagrams and performing presentations on topics CCIE/JNCIE or comparable certifications preferred 5
years of experience in developing network or security architectures 2
years in python or similar programming language (bonus) Team leadership experience Great communication and interpersonal skills Experience implementing security solutions Recommended Skills Architecture Automation Border Gateway Protocol Business Informatics Coaching And Mentoring Computer Security Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.