The job below is no longer available.

You might also like

in Miami, FL

  • U.S. Navy 30d ago
    Urgently hiring Use left and right arrow keys to navigate
  • U.S. Navy 30d ago
    Urgently hiring Use left and right arrow keys to navigate
  • $50
    est. per hour
    University of Miami 2h ago
    Urgently hiring5.7 mi Use left and right arrow keys to navigate
  • $50
    est. per hour
    University of Miami 2h ago
    Urgently hiring5.7 mi Use left and right arrow keys to navigate
  • $20.00+
    Verified per hour
    the goodtime hotel 3h ago
    Urgently hiring10.3 mi Use left and right arrow keys to navigate
Use left and right arrow keys to navigate
Estimated Pay $41 per hour
Hours Full-time, Part-time
Location Miami, Florida

Compare Pay

Estimated Pay
We estimate that this job pays $41.08 per hour based on our data.

$26.64

$41.08

$65.17


About this job

Job Description

Job Description
We connect our employees with some of the best opportunities around.

Time and again, our employees tell us that the most important thing we offer is respect. Federal Staffing Solutions puts people to work in all types of jobs. When you work with us, you build a relationship with a team of employment professionals in your community who have, in turn, built professional relationships with the businesses that are hiring.

We are looking for a Microsoft Windows Network Security Engineer to work in Miami, FL supporting our client.

Salary: $91,000
Clearance: US Citizen


Requirements:

  • Bachelor’s degree in Computer Science, Information Technology, Computer Forensics, Cyber Security or similar field with 12+ years of experience. Additional experience in lieu of degree.
  • 8+ years of successfully implementing advanced cyber security technology in a complex environment
  • 5+ years’ experience with CISCO and Juniper Networks
  • Understanding of networking environments and related Technologies (routing, switching, VLANs, subnets, firewalls); Windows operating systems
  • Understanding of IT security principals, technologies, best practices to include logical access control; PKI and other encryption methods; network-based and host-based IDS/IPS; security configuration baselines; auditing; vulnerability discovery and management
  • Ability to work independently to identify errors, pinpoint root causes, and devise solutions with minimal oversight;
  • Extensive in-depth technical experience with network infrastructure, operating systems, database, and web applications
  • Experience with scanning and elevation tools (Nessus, Retina, Wireshark, NMAP, etc.); and,
  • Excellent verbal and written communication skills.
  • Understanding of networking environment to include networking technologies (routing, switching, VLANs, subnets, firewalls); TCO/IP stack’ Windows operating systems; common networking protocols; and common enterprise technologies
  • Demonstrated experience in testing and implementing network vulnerability and protection
  • Senior-level knowledge of information security concepts, policy frameworks, and best practices
  • Experience with Hardware Lifecycle Management, Software Maintenance and Assurance, Logging and Configuration Management
  • ONSITE REQUIREMENTS: 5 days/week for 90 days then 2 day/week (Maybe < 90 days if known Sys Admin)
  • Must have atleast one of the following: CAP - Certified Authorization Professional CCSP – Certified Cloud Security Professional Certified Advanced Security Professional (CASP+) CompTIA Security+ CompTIA Security+ CE GCIH – Incident Handler GCWN – Windows Security Administrator GISF – Security Fundamentals GICSP –Cyber Security Professional GSSP SEI (Software Engineering Institute) CISSP – Certified Information Systems Security CSSLP – Certified Secure Software Lifecycle Professional SSCP – Systems Security Certified Practitioner CCNP Security CEH – Certified Ethical Hacker ENSA – EC-Council Network Security Administrator ECSP – EC-Council Certified Secure Programmer MCSE – Microsoft Certified Solutions Expert (Server) RHCE RHCA VCA (Certified Associate) VCP (Certified Professional) VCAP (Certified Advanced Professional) VCIX (Implementation Expert) VCDX (Certified Design Expert) Converged Infrastructure Specialist Certified Implementation Engineer Specialist Certified Data Administrator Professional Certified Storage Associate CSSBB - Certified Six Sigma Black Belt Splunk Certified Architect

Preferred Qualifications:

  • LINUX/UNIX-based operating systems; common networking protocols; and common enterprise technologies;
  • ISC2 Certified Authorization Professional (CAP) or ISC2 Certified Cloud Security Professional (CCSP) certification or CompTIA Certified Advanced Security Practitioner (CASP+)
  • CISSP, CISA, GIAC, Security +, Certified Ethnical Hacker, etc.

  • Essential Requirements: US Citizenship is required.


Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation. While performing the duties of this job, the employee will regularly sit, walk, stand and climb stairs and steps. May require walking long distance from parking to work station. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.


Job Duties:

  • Monitor multiple threat and vulnerability sources to evaluate technical risk to the Government i.e. SANS, US-CERT advisories, DHS Information Security Vulnerability Bulletins and communicate relevant infrastructure alerts, bulletins, and technical advisories to the Government.
  • The technical scanning and remediation and reporting of systems hardware, software vulnerabilities.
  • Coordination of scanning methodology and Patch management, monitoring, deployment reporting, piloting, operational coordination and testing.
  • Systems technical risk status, data analytics and weakness remediation reporting.
  • Security Architecture consultation, review and documentation of new systems, test systems and changes to new and existing Government systems to ensure compliance with baseline security and best practices.
  • The development and maintenance Standard Operating Procedures to ensure coordinated risk monitoring and reporting.
  • Make security content (e.g., Firewall, Router Switch) recommendations to include new access control, filters or ruleset modifications, removals to improve security posture and mitigate cyber threats.
  • Assist the Government with the reporting and management of system level security violations and incidents.
  • Assist with development of system security engineering SOPs, playbooks, work instructions, and other procedures and processes to mature cyber security capabilities.
Equal Opportunity Employers