Provide technical design, development and maintenance of databases and associated master files for accessibility, security and integrity of company data. Perform logical data modeling, physical database design, programming and implementation.
Experience in the operation and theory behind Intrusion Detection Systems, and familiarity with Sourcefire (Snort rules apply), SIEM Technologies, Enterprise Security Tools, web gateway management, centralized log analysis, PCAP, and AntiVirus.
Evaluate risk and perform due diligence and periodic security reviews on IT vendors. Partner with other stakeholders to develop and maintain disaster recovery procedures and periodically test those procedures for effectiveness.
In this role, you will intimate understanding of TCP/IP and the functioning of its component protocols, ability to read, and analyze, using various toolsets such as tcpdump, wireshark, etc; how they work and what information they produce.
The individual will need to be able to document and communicate effectively with customers and internal teams, assist in the investigation of events and follow-up with corrective actions and reporting.
In this role, the selected candidate will lead the research and evaluation of emerging networking/firewall and VPN technology, and industry and market trends to assist in project development and prioritization.