Intimate understanding of TCP/IP and the functioning of its component protocols, ability to read, and analyze, using various toolsets such as tcpdump, wireshark, etc; how they work and what information they produce.
Has organized and coordinated technical Vulnerability Assessments including systems and network vulnerability assessments, penetration testing, web application assessments, social engineering assessments, physical security assessments, wireless security assessments and implementing secure infrastructure solutions.
Participate in development, testing and Implementation phases in support of the Software development life cycle. Develop automation scripts (Perl, Python or shell scripting) for software builds and deployments.
Works across engineering teams to lead, define, and manage requirements (system, element, segment, subsystem, and interface level); Performs requirements development, analysis, allocation, review, tracing, and validation.
Monitoring/alerting, centralized logging, security, telephony (VOIP, WebRTC, on-premises and hosted), Active Directory, LDAP, Amazon Web Services, VMWare, Desktop Management (MAC/Windows), Mac OS X, Windows, Linux.
Develop and recommend security designs and frameworks for technology systems by defining process and architecture for creating secure networks, systems, and applications. Is experienced using common architectural reference models and tools such as TOGAF and SABSA.
The individual should have an investigative mindset that allows them to think out of the box as to why events are occurring and provide a rapid, but accurate, response to the emerging threats and trends.
Provides application software development services or technical support for defined projects; assists with the analysis, development, implementation and support of the business application software suite using Oracle WebCenter Sites, Oracle ATG/BCC platform, Endeca, and/or other development tools/technologies.