Info Security Engineer - NO C2C

02 Dec 2024

Vacancy expired!

Info Security Engineer - NO C2C

Location: Charlotte, NC. Potential for full-time conversion based on performance. Candidate will work remote until the enterprise return to office goes into effect. Upon return to office, candidate will be expected to work from a preapproved office location.

Contract length: 6-24 months21-21424This position is with the Network Security Authentication team providing authentication, authorization, and accounting services through TACACS+, RADIUS, and 802.1X. This team is responsible for the development, certification, deployment, and maintenance required to provide these services using the Cisco Identity Services Engine platform.

Candidate MUST HAVE working knowledge of Cisco Identity Services Engine.

Required qualifications:
  • 3+ years of Network experience
  • 1 + years of experience in technical deployment, configuration, integration and administration of at least one of the following network security technologies: TACACS, RADIUS, or 802.1x

Desired Qualifications:
  • Scripting against API
  • Splunk experience

Job Description: Designs, documents, tests, maintains, and provides issue resolution recommendations for moderately complex security solutions related to networking, cryptography, cloud, authentication/directory services, email, internet, applications, and/or endpoint security. Provides security consulting on medium projects for internal clients to ensure conformity with corporate information security policy, and standards. Leads computer security incident response activities for moderately complex events, conducts technical investigation of security related incidents and conducts post-incident digital forensics to identify causes and recommend future mitigation strategies. Reviews and correlates security logs. Identifies security vulnerabilities/issues, performs risk assessments, and evaluates remediation alternatives. Possesses subject matter expertise in industry leading security solutions and best practices used to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification/modeling/monitoring, incident response, access management, and business continuity. May interface with senior management.