Dimension Data Circular Logo

Security Engineer L3

Dimension Data Riyadh, Saudi Arabia Posted: 09 Jul 2024

Financial

  • Estimate: $50k - $80k*
  • Zero income tax location

Accessibility

  • Office Only
  • No Visa Provided

Requirements

  • Experience: Senior
  • English: Professional
  • Arabic: Fluent

Position

About the job: Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

What You'll Be Doing
Day-to-Day Responsibilities:

  • Configuration and Deployment of NGFW’s: Set up, configure, and deploy Next-Gen Firewalls (NGFWs) like FTD, Palo Alto, and Fortigate based on network requirements. Implement security policies, access control lists (ACLs), and VPN configurations.
  • Troubleshooting and Issue Resolution: Monitor firewall performance, investigate alerts, and address any anomalies or security incidents. Troubleshoot connectivity issues, rule misconfigurations, and security breaches.
  • Security Policy Management: Regularly review and update security policies to align with evolving threats and compliance requirements. Collaborate with stakeholders to ensure policies meet business needs without compromising security.
  • Performance Optimization: Optimize firewall performance by fine-tuning configurations and rules to enhance network security and efficiency.
  • Vendor Interaction and Evaluation: Engage with vendors for product updates, patches, and new feature evaluations. Research and recommend improvements or new technologies to enhance network security posture.
  • Deployment of Endpoint Solutions: Deployment and Management: Deploy and manage Endpoint Protection solutions such as Symantec and TrendMicro across the organization's devices. Ensure antivirus, anti-malware, and endpoint security software are up to date and functioning correctly.
  • Threat Detection and Response: Monitor endpoint security tools for threat detection, analyzing and responding to security alerts promptly. Investigate and contain security incidents on endpoints, performing root cause analysis.
  • Patch Management: Coordinate and implement patches, updates, and security fixes for endpoint protection software. Maintain endpoint compliance with security standards and best practices.
  • Documentation and Reporting: Maintain detailed documentation of endpoint security configurations, incidents, and resolutions. Generate regular reports on endpoint security status, threats detected, and resolved incidents for stakeholders.
  • User Education and Support: Provide guidance and support to end-users on best security practices for endpoints. Conduct training sessions or create educational materials to increase awareness of endpoint security risks.
  • Collaboration and Integration: Collaborate with network and system teams for seamless integration of endpoint security solutions with overall network architecture.
  • Occasional Responsibilities for F5 LTM/ASM and Proxy Solutions:
    • F5 LTM/ASM: Support and Consultation: Provide guidance and support to teams managing F5 LTM/ASM configurations or troubleshooting issues. Offer expertise during critical deployments or major updates involving F5 solutions.
    • Ad Hoc Troubleshooting: Assist in diagnosing and resolving complex issues related to load balancing, SSL termination, or ASM policies.
    • Knowledge Sharing and Training: Conduct training sessions or workshops for team members to enhance their understanding of F5 solutions.
    • Proxy Solutions: Consultation and Advice: Offer advice and recommendations on proxy solution selection or integration based on specific project requirements.
    • Assistance with Policy Implementation: Provide support in defining and implementing proxy policies aligned with security and compliance standards.
    • Advisory Role in Security Measures: Offer insights into optimizing proxy security controls or advising on security best practices for proxy deployments.

Key Skills:

  • Network Security Fundamentals: Understanding of networking protocols, TCP/IP, OSI model, and network security principles. Strong grasp of firewall technologies, VPNs, and network access control.
  • NGFW and Endpoint Solutions Expertise: In-depth knowledge of NGFW platforms like Cisco FTD, Palo Alto, or Fortigate. Proficiency in deploying, configuring, and managing endpoint security solutions such as Symantec, TrendMicro, or similar products.
  • F5 LTM/ASM Competency: Proficiency in configuring and managing F5 Load Balancers (LTM) and Application Security Manager (ASM). Understanding of traffic management, SSL offloading, and web application security policies.
  • Proxy Solutions Proficiency: Familiarity with proxy server solutions for content filtering, caching, and security controls. Knowledge of configuring and managing proxy policies, SSL inspection, and user authentication.
  • Troubleshooting and Incident Response Skills: Strong problem-solving abilities to troubleshoot network security issues, perform root cause analysis, and mitigate security incidents promptly.
  • Documentation and Reporting: Ability to maintain comprehensive documentation and generate reports on security configurations, incidents, and resolutions.

Certifications:

  • Cisco Certifications: Cisco Certified Network Associate (CCNA) Security or Cisco Certified Network Professional (CCNP) Security for NGFW expertise.
  • Palo Alto Networks Certifications: Palo Alto Networks Certified Network Security Engineer (PCNSE) for Palo Alto NGFW proficiency.
  • F5 Certifications: F5 Certified BIG-IP Administrator (F5-CA) for managing F5 LTM. F5 Certified Technology Specialist: Application Security Manager (F5-CTS ASM) for ASM skills.
  • Vendor-Specific Endpoint Security Certifications: Certifications related to Symantec Endpoint Protection or TrendMicro Endpoint Security, depending on the solutions in use.
  • General Security Certifications: CompTIA Security+, Certified Ethical Hacker (CEH) for overall security knowledge and best practices.

Note: Must be fluent in Arabic and currently residing in Saudi Arabia

Workplace type: On-site Working

Apply now

Jobs you might like   View all jobs

About Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including systems integration, managed services infrastructure, cloud solutions, business applications, customer experience, and intelligent security solutions. We provide innovative solutions that optimize today’s evolving technology environments, enabling clients to leverage data in a digital age.