02 Nov
Checkpoint Firewall Consultant-
Vacancy expired!
Themesoft Inc - Checkpoint Firewall Consultant-
Qualification Candidates with Bachelor degree and certification preferred
- Excellent and effective communication skills
- Ready to work in 247 shifts
- Security Check Point certification is preferred
- Protect digital files and information systems against unauthorized access, modification, or destruction
- Managing all CheckPoint Firewall related issues.
- Plan and document the configuration and verification of routing protocols and their optimization in enterprise networks
- Designing and planning networks specific to client requirements and industry-standard principles
- Ability to independently troubleshooting and debugging broad, complex, and unique networks solution involving mixed media
- Maintain data and monitor security.
- Conduct internal and external security audits
- Manage network, intrusion detection and prevention systems
- Analyze security breaches to determine their root cause
- Recommend and install appropriate tools and countermeasures
- Define, implement and maintain corporate security policies
- Security awareness training
- Coordinate security plans with outside vendors
- Analyze business requirements to develop technical network solutions and their framework.
- In-depth knowledge of Checkpoint Firewall and F5 Load Balancer
- Good knowledge on Checkpoint firewall and F5 Load Balancer design/ implementation.
- In-depth knowledge on site to site VPN design and build
- Develop technology roadmaps.
- Develop test plans, implementation plans, and project timelines for various projects.
- Stay abreast of how technology infrastructures are currently impacting and driving competitors.
- Write functional requirements/specifications documents.
- Upgrade hardware and software components as required
- Solve complex problems with many variables and solution
- Social engineering given that humans are the weakest link in the security chain, an analyst's expertise can help with awareness training
- Forensics investigation and analysis of how and why a breach or other compromise occurred
- Troubleshooting the skill to recognize the cause of a problem
- TCP/IP, computer networking, routing and switching an understanding of the fundamentals: the language, protocol and functioning of the internet
- ISO27001 assessment specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization's risk management
- Cloud computing the risks and benefits of using a vendor's remote servers to store, manage and process an organization's data
Vacancy expired!