Network Security Engineer
Washington, DC
Job Id:
132609
Job Category:
Job Location:
Washington, DC
Security Clearance:
Top Secret
Business Unit:
Zachary Piper
Division:
Zachary Piper Solutions
Position Owner:
Nevine Rehan
Job Title: Senior Network Security Administrator
Location: Fully Onsite in Washington, DC
Pay Range: $130,000 - $165,000
Job Summary:
The Senior Network Security Administrator will administer, support, and maintain network capabilities, including Intrusion Protection Systems (IPS), Firewalls, and Communications Security (COMSEC). This role involves providing Tier II and Tier III support, planning and implementing information security measures, and ensuring the health and optimization of network security systems.
Responsibilities:
- Provide Tier II and Tier III support for IPS, COMSEC, and network equipment.
- Plan, coordinate, and implement the organization’s information security strategies.
- Analyze requirements and potential solutions for technical and economic feasibility.
- Design optimized firewall and IPS rule structures and ensure standards are maintained.
- Monitor and maintain the health of all firewalls/IPS and recommend improvements.
- Develop and maintain documentation of firewall/IPS procedures.
- Develop and maintain complex schematics related to network security.
- Research, evaluate, recommend, design, test, and implement new network security technologies.
- Display expert knowledge of current security tools and practices.
- Provide support to network engineers under general guidance.
- Implement highly complex networks linking numerous computing platforms, operating systems, and network topologies across widely dispersed geographical areas.
- Implement engineering processes for timely and appropriate integration of all applicable COMSEC requirements.
- Incorporate new connections and services into the network and COMSEC network as required by the customer.
- Prepare test plans and oversee test execution.
- Prepare documents required to add, change, or delete services to the NSD network.
- Participate in systems analysis and design definition of the COMSEC network.
- Identify impacts on network services, capabilities, and availability due to network configuration changes, and advise management on mitigation actions.
- Perform detailed studies of network and COMSEC performance, identifying key management parameters for trend analysis.
- Serve as a COMSEC expert advising the customer on technology matters.
- Provide functional guidance, technical support, training, and quality assurance/quality control to Associate personnel.
- Manage and maintain COMSEC inventory and devices, ensuring compliance with NSD and NSA guidelines.
- Administer, support, and maintain network capabilities, including wide area and local area networks.
- Perform operations and support activities.
- Evaluate network changes for operational impact.
- Evaluate network performance and resolve network and connectivity problems.
- Manage local area network performance and troubleshoot problems.
- Maintain network infrastructure in accordance with STIG guidelines.
Required Qualifications:
- 10+ years of Systems Engineering/Administration experience.
- Hands-on experience with configuration to deployment of Cisco FMC1000 physical and FMC VMware, Cisco ISE, and IPS products.
- Experience managing IPsec VPN, Site-to-Site VPN to Azure cloud.
- Expertise with IPS, COMSEC, and network equipment.
- Bachelor’s Degree required; advanced degree preferred.
#LI-NR1
Keywords: Senior Network Security Administrator, Network Security, Intrusion Protection Systems, IPS, Firewall, COMSEC, Tier II Support, Tier III Support, Information Security, Cisco FMC1000, Cisco FMC VMware, Cisco ISE, Cisco IPS, IPsec VPN, Site-to-Site VPN, Azure Cloud, Network Engineering, Systems Administration, Network Performance, Network Troubleshooting, STIG Guidelines, Cybersecurity, Network Infrastructure, Network Capabilities, Wide Area Networks, Local Area Networks, Network Equipment, Network Devices, Network Topologies, Network Health, Firewall Optimization, IPS Rule Structure, Security Tools, Security Practices, Network Schematics, Network Security Technologies, Test Plans, Test Execution, Network Configuration, Contingency Plans, Network Services, Network Availability, Trend Analysis, COMSEC Inventory, COMSEC Devices, NSD Guidelines, NSA Guidelines, Functional Guidance, Technical Support, Training, Quality Assurance, Quality Control, Operations Support, Operational Impact, Connectivity Problems, Washington DC, Zachary Piper Solutions, Full-time, Onsite, $130,000-$165,000 Salary, Bachelor's Degree, Advanced Degree, Systems Engineering, Administration Experience, Network Design, Network Implementation, Network Maintenance, Network Monitoring, Network Documentation, Security Standards, Security Procedures, Security Analysis, Security Evaluation, Security Recommendations, Security Implementation, Security Research, Security Testing, Security Integration, Security Management, Security Compliance, Security Consulting, Security Advisory, Security Expertise, Security Solutions, Security Feasibility, Security Coordination, Security Planning, Security Coordination, Security Execution, Security Oversight, Security Improvement, Security Enhancement, Security Optimization, Security Monitoring, Security Health, Security Trends, Security Impact, Security Mitigation, Security Restoration, Security Scenarios, Security Actions, Security Studies, Security Parameters, Security Performance, Security Circuit, Security Rate, Security Matters, Security Technology, Security Matters, Security Support, Security Training, Security QA, Security QC, Security Inventory, Security Devices, Security Guidelines, Security Operations, Security Activities, Security Changes, Security Evaluation, Security Problems, Security Troubleshooting, Security Infrastructure, Security STIG, Security Compliance, Security Network, Security Capabilities, Security WAN, Security LAN, Security Equipment, Security Devices, Security Topologies, Security Health, Security Optimization, Security Rule Structure, Security Standards, Security Tools, Security Practices, Security Schematics, Security Technologies, Security Test Plans, Security Test Execution, Security Configuration, Security Contingency, Security Services, Security Availability, Security Analysis, Security Inventory, Security Devices, Security Guidelines, Security Support, Security Training, Security QA, Security QC, Security Operations, Security Impact, Security Problems, Security Troubleshooting, Security Infrastructure, Security STIG, Security Compliance, Security Network, Security Capabilities, Security WAN, Security LAN, Security Equipment, Security Devices, Security Topologies, Security Health, Security Optimization, Security Rule Structure, Security Standards, Security Tools, Security Practices, Security Schematics, Security Technologies, Security Test Plans, Security Test Execution, Security Configuration, Security Contingency, Security Services, Security Availability, Security Analysis, Security Inventory, Security Devices, Security Guidelines, Security Support, Security Training, Security QA, Security QC, Security Operations, Security Impact, Security Problems, Security Troubleshooting, Security Infrastructure, Security STIG, Security Compliance, Security Network, Security Capabilities, Security WAN, Security LAN, Security Equipment, Security Devices, Security Topologies, Security Health, Security Optimization, Security Rule Structure, Security Standards, Security Tools, Security Practices, Security Schematics, Security Technologies, Security Test Plans, Security Test Execution, Security Configuration, Security Contingency, Security Services, Security Availability, Security Analysis, Security Inventory, Security Devices, Security Guidelines, Security Support, Security Training, Security QA, Security QC, Security Operations, Security Impact, Security Problems, Security Troubleshooting, Security Infrastructure, Security STIG, Security Compliance, Security Network, Security Capabilities, Security WAN, Security LAN, Security Equipment, Security Devices, Security Topologies, Security Health, Security Optimization, Security Rule Structure, Security Standards, Security Tools, Security Practices, Security Schematics, Security Technologies, Security Test Plans, Security Test Execution, Security Configuration, Security Contingency, Security Services, Security Availability, Security Analysis, Security Inventory, Security Devices, Security Guidelines