About the job:
Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.
What You'll Be Doing
Day-to-Day Responsibilities:
- Configuration and Deployment of NGFW’s: Set up, configure, and deploy Next-Gen Firewalls (NGFWs) like FTD, Palo Alto, and Fortigate based on network requirements. Implement security policies, access control lists (ACLs), and VPN configurations.
- Troubleshooting and Issue Resolution: Monitor firewall performance, investigate alerts, and address any anomalies or security incidents. Troubleshoot connectivity issues, rule misconfigurations, and security breaches.
- Security Policy Management: Regularly review and update security policies to align with evolving threats and compliance requirements. Collaborate with stakeholders to ensure policies meet business needs without compromising security.
- Performance Optimization: Optimize firewall performance by fine-tuning configurations and rules to enhance network security and efficiency.
- Vendor Interaction and Evaluation: Engage with vendors for product updates, patches, and new feature evaluations. Research and recommend improvements or new technologies to enhance network security posture.
- Deployment of Endpoint Solutions: Deployment and Management: Deploy and manage Endpoint Protection solutions such as Symantec and TrendMicro across the organization's devices. Ensure antivirus, anti-malware, and endpoint security software are up to date and functioning correctly.
- Threat Detection and Response: Monitor endpoint security tools for threat detection, analyzing and responding to security alerts promptly. Investigate and contain security incidents on endpoints, performing root cause analysis.
- Patch Management: Coordinate and implement patches, updates, and security fixes for endpoint protection software. Maintain endpoint compliance with security standards and best practices.
- Documentation and Reporting: Maintain detailed documentation of endpoint security configurations, incidents, and resolutions. Generate regular reports on endpoint security status, threats detected, and resolved incidents for stakeholders.
- User Education and Support: Provide guidance and support to end-users on best security practices for endpoints. Conduct training sessions or create educational materials to increase awareness of endpoint security risks.
- Collaboration and Integration: Collaborate with network and system teams for seamless integration of endpoint security solutions with overall network architecture.
- Occasional Responsibilities for F5 LTM/ASM and Proxy Solutions:
- F5 LTM/ASM: Support and Consultation: Provide guidance and support to teams managing F5 LTM/ASM configurations or troubleshooting issues. Offer expertise during critical deployments or major updates involving F5 solutions.
- Ad Hoc Troubleshooting: Assist in diagnosing and resolving complex issues related to load balancing, SSL termination, or ASM policies.
- Knowledge Sharing and Training: Conduct training sessions or workshops for team members to enhance their understanding of F5 solutions.
- Proxy Solutions: Consultation and Advice: Offer advice and recommendations on proxy solution selection or integration based on specific project requirements.
- Assistance with Policy Implementation: Provide support in defining and implementing proxy policies aligned with security and compliance standards.
- Advisory Role in Security Measures: Offer insights into optimizing proxy security controls or advising on security best practices for proxy deployments.
Key Skills:
- Network Security Fundamentals: Understanding of networking protocols, TCP/IP, OSI model, and network security principles. Strong grasp of firewall technologies, VPNs, and network access control.
- NGFW and Endpoint Solutions Expertise: In-depth knowledge of NGFW platforms like Cisco FTD, Palo Alto, or Fortigate. Proficiency in deploying, configuring, and managing endpoint security solutions such as Symantec, TrendMicro, or similar products.
- F5 LTM/ASM Competency: Proficiency in configuring and managing F5 Load Balancers (LTM) and Application Security Manager (ASM). Understanding of traffic management, SSL offloading, and web application security policies.
- Proxy Solutions Proficiency: Familiarity with proxy server solutions for content filtering, caching, and security controls. Knowledge of configuring and managing proxy policies, SSL inspection, and user authentication.
- Troubleshooting and Incident Response Skills: Strong problem-solving abilities to troubleshoot network security issues, perform root cause analysis, and mitigate security incidents promptly.
- Documentation and Reporting: Ability to maintain comprehensive documentation and generate reports on security configurations, incidents, and resolutions.
Certifications:
- Cisco Certifications: Cisco Certified Network Associate (CCNA) Security or Cisco Certified Network Professional (CCNP) Security for NGFW expertise.
- Palo Alto Networks Certifications: Palo Alto Networks Certified Network Security Engineer (PCNSE) for Palo Alto NGFW proficiency.
- F5 Certifications: F5 Certified BIG-IP Administrator (F5-CA) for managing F5 LTM. F5 Certified Technology Specialist: Application Security Manager (F5-CTS ASM) for ASM skills.
- Vendor-Specific Endpoint Security Certifications: Certifications related to Symantec Endpoint Protection or TrendMicro Endpoint Security, depending on the solutions in use.
- General Security Certifications: CompTIA Security+, Certified Ethical Hacker (CEH) for overall security knowledge and best practices.
Note: Must be fluent in Arabic and currently residing in Saudi Arabia
Workplace type: On-site Working