Urgently Hiring
Easy Apply
Essential Jobs
Industry 0

16 Telecom Jobs in syracuse, ny



    Competitive Telecoms Group
    Syracuse, NY 13201
    Refer friends, get paid!

    Job Description

    Network Engineer Summary This position is primarily responsible for engineering, configuration, maintenance, and process support of the Network Routing and Switching platform. The network includes Cisco, Juniper, and Brocade Routers, Switches and Peripherals in support of a national VOIPSIP Sonus Networks platform. This position is also responsible for providing subject matter expertise for the implementation and support of the Sonus infrastructure, multi-Carrier network, and end customer access by performing the following duties. ESSENTIAL DUTIES AND RESPONSIBILITIES Core duties and responsibilities include the following. Other duties may be assigned. Implements new network solutions and drives the creation and maintenance of standards, guidelines and procedures. Participates in the planning, design, and development of technology road map for enterprise network architecture. Drives the implementation, integration, and initial configuration of new network technologies. Implements enhancements to existing network infrastructure in accordance with enterprise policy and standard best operating practices. Monitors in-place solutions for efficient and appropriate operations. Reviews necessary logs and reports to interpret the implications of activity and devise plans for appropriate resolution. Develops procedures and provides training for analyzing and troubleshooting of the network infrastructure. Monitors, analyzes, and predicts trends for system performance and resource utilization. Participates in the testing and evaluation of new technologies to ensure compatibility and functionality. EDUCATION ANDOR EXPERIENCE Bachelor's degree (B.A.) from four-year college or university or three to five years related experience andor training or equivalent combination of education and experience. COMPUTER SKILLS To perform this job successfully, an individual should have knowledge of Accounting Software (QuickBooks) Database Software (Access) Development Software Internet Software Manufacturing Software Payroll Systems Spreadsheet Software (Excel) Contract Management Systems Design Software Human Resource Systems Inventory Software Order Processing Systems Project Management Software Word Processing Software (Word) Electronic Mail Software (Outlook) Presentation software (PowerPoint) and Publisher software. CERTIFICATES, LICENSES, REGISTRATIONS Certifications such as CCNP, CCDP, CCIE, GSEC, CISSP, CISM OTHER SKILLS AND ABILITIES Ability to effectively prioritize, delegate and execute tasks in a high-pressure environment. OTHER QUALIFICATIONS 6-8 years of working technical experience with designing, building, installing, configuring, and supporting network infrastructure. Expert understanding of network architecture design techniques, theories, principles, and practices. Previous participation in network infrastructure architecture and design initiatives. In depth engineering experience in perimeter solutions, including the design, low level engineering, and delivery of new hardware systems for client applications across the enterprise. Excellent DMZ network and application hosting infrastructure knowledge including topology, security policies, firewalls and L2L3 switch and router infrastructure is required. Functional understanding of diverse set of networked applications requiring perimeter management solutions, including SIP, RTP,HTTP, HTTPS, SSH, FTP, DNS, NTP, and others. Experience developing and maintaining high level and low level design diagramsdocumentation. Architectingimplementingoperating Routers (Cisco, Juniper, ADTRAN and Brocade) Architectingimplementingoperating firewall and web application firewall products (Cisco ASA) Architectingimplementingoperating secure remote access (Juniper VPN, ADTRAN CISCO) Internalexternalsplit DNS configurations Network routingswitching (routing protocols, BGP, OSPF,multicast, other LANWANMAN protocols and technologies) Other security technologies, such as IDSIPS, web proxy, vulnerability scanning tools, multi-factor authentication, etc
    Posting ID: 599936664Posted: 2021-01-16