Assure a high level of user satisfaction with group performance through daily monitoring of user complaints, as well as seeking out user perceptions of technical services performance as observed by manager and measured by manager's interaction with users, departmental user meetings, and the climate survey when available.
In this role, the selected candidate manages, reviews and updates internal website, monitors website behavior and performs customer experience analysis; creates holistic dashboards; leads collaborations/design sessions with staff members from other departments in the development of web/interfaces and applications.
The chosen candidate will implement, audit, and test security-relevant software components, including but not limited to: penetration testing, network and API security, and cryptographic key management.
Employ innovative thought and automation to improve operational productivity, workflow, system performance and trader support. Participate in the full software development life-cycle of operational monitoring systems.
Maximize network performance by monitoring performance; troubleshooting network problems and outages; scheduling upgrades; collaborating with network architects on network optimization. You will be part of the networking support team and serve on the as a operaitonal network architect.
Proven technical knowledge of networking technologies, tools & processes, including routing & switching, L4-7 traffic management (e.g. load balancing, DNS) and firewalls, across WAN, datacenter fabric and campus networks, as well as networking protocols such as TCP/IP, UDP, MPLS, OSPF, BGP, etc.
In this role, the selected candidate will gather KPI and metric requirements from Business Unit customers, and then deliver solutions; evaluate, design and implement solutions in support of the global low latency, high speed trading plant.
Responsible for following established guidelines and identifying and resolving problems. Individual at this level is expected to use some independence of thought but to refer more complex problems to supervisors or other experts.
Performs deep-dive investigations into the security of services and applications as part of IT risk assessments and security reviews to ensure that appropriate security configurations are in place and effective. This requires deep technical expertise in all IT disciplines including; communications and network security, identity and access management, client-side, server-side, databases, and application development.
Analyze and isolate issues. Monitor networks to ensure security and availability to specific users. Evaluate and modify system's performance. Determine network and system requirements. Maintain integrity of the network, server deployment, and security. Ensure network connectivity throughout a company's LAN/WANinfrastructure is on par with technical considerations.
Participates in Computer Security Incident Response Team (CSIRT) and with Disaster Recovery/Continuity of Operations Planning (DR/COOP). Provides support to planning, designing and implementing security controls which safeguard and monitor events for information systems, enterprise applications and data.
Must have an intimate hands on knowledge of complex network designs, dynamic routing (OSPF & BGP & PIM), QoS, Matrix switching and network instrumentation- taps., SPAN, netflow, sFlow etc.Security & WAN technologies.