Design and develop coding standards across infrastructure, application, and data security, building out guidelines and standards to drive a standardized set of security requirements that align with internal policies and meet external compliance/regulatory requirements.

More Uses of the Firewall Toolkit:

  • Stay up to date on technologies trends, in the field of application architecture, micro services, cloud application delivery, next generation virtualization, and virtual runtime technologies.
  • Confirm your organization assess applications, design threat models, document potential risk vectors, check for code vulnerabilities, recommend proportional controls and ensure risks are resolved expeditiously.
  • Audit: conduct vulnerability review against internet information services, apache, application program interfaces (API) and associated cryptographic functions and exchanges.
  • Secure that your business complies; applications supported vary from finance, engineering, human resources, to infrastructure and edge applications as Firewall, routing, domain services, and the underlying hardware platform.
  • Manage work with leadership and architecture teams to advance and improve the current network security posture for end users and data center resources.
  • Establish proactive, confidence inspiring client and support team relationships to ensure support, maintenance and project work meet business goals.
  • Create application threat models, perform secure code review, and ensure the use of secure coding practices, with the support of the Infosec team.
  • Provide technical support/engineering for network/cloud Firewalls, network/cloud Intrusion detection/prevention systems, virtual private networks, and web security gateways.
  • Lead: network/infrastructure security technologies (Firewall, access control, intrusion detection, intrusion prevention, administrative access control) and compliance (PCI, SOX, HIPAA).
  • Create, maintain and own tracking details of infrastructure surrounding the underlying network security systems to ensure the security tool deployments are operating effectively and with proven efficacy.
  • Become the expert in Cybersecurity, Firewalls, network security, information assurance, Linux, Unix, security information and event management (SIEM), application security, security engineering, and security architecture.
  • Be accountable for triaging security incidents using security tools as web application Firewall, bot prevention, cloud security monitoring and detection, forensic acquisition and analysis.
  • Provide guidance on network infrastructure and implementation of routers, switches, Firewalls, and associated network equipment and security concepts.
  • Warrant that your project participates with the Service Delivery and Transition teams in planning and coordinating implementation, reviewing quality control of systems functional design, usability, functionality, and implementation.
  • Drive: review and approve standards and requirements for maintenance of all aspects related to server administration (patch management, server builds, availability, performance, compliance, audits).
  • Manage work with project management, architecture, business, technical, and security teams to achieve project delivery regarding network security related initiatives.
  • Enable developers and product teams to deliver secure by design applications and infrastructure, by providing Cybersecurity expertise and guidance throughout the system development lifecycle.
  • Devise: partner with application development teams to identify security requirements for products, develop security architecture, develop detailed design, and provide support to help integrate security controls during solution deployment.
  • Manage effectively reported system, application and device vulnerabilities and through remediation and maintenance in adherence with incident response policies.
  • Drive: conduct research on IAM products, services, protocol, and standards to remain abreast of developments in the identity and access management industry.
  • Foster collaboration with software product development, architecture, and IT teams to ensure releases are delivered with repeatable and audit able processes.
  • Analyze and diagnose a wide variety of network connectivity problems, hardware failures, software problems, Firewall security issues, performance problems, and unresolved problems reported by other groups.
  • Systematize: conduct research on network products, services, protocols and standards to remain abreast of developments in the information security industry.
  • Perform threat modeling on existing and upcoming feature set in the Fast platform so that appropriate security controls can be built from the ground up.
  • Be accountable for operating systems, applications, databases, servers, networking architecture, routers, switches, Firewalls, Cybersecurity, programming languages etc.
  • Ensure you can be counted on to exceed goals successfully; Is constantly and consistently one of the top performers; Very bottom line oriented; Steadfastly pushes self and others for results.
  • Classify and prioritize threats through use of Cyber threat intelligence, intrusion detection systems, Firewalls and other boundary protection devices, and any.
  • Provide consultation on best practices to internal customers to ensure processes are embedded at the correct time and frequency and to ensure compliance to security standards.
  • Govern: review new and existing systems to address technical solutions to provide enhanced security and ensure baseline security requirements are met.
  • Identify: information drive your business and you must protect the confidentiality, integrity, and availability of systems and processes across the enterprise.

 

Categories: Articles