[Close] 

Security Operations Center Network Engineer

The Security Operations Center Network Engineer is a network administrator providing rapid response problem identification and resolution for a ddos attack mitigation network. Ideal candidates will have a background in network engineering for a service provider infrastructure. He or she acts as a mentor for network operations employees and processes, serves as an escalation point for network related issues, and works on elected projects to improve network operations. The role has a heavy customer communications component. As a Security Operation Center Network Engineer, you will be responsible for: Follow workflow procedures of operations center in large global environment Participate in day, evening or overnight security operations center shift schedule Establish and document procedures for network operations  Troubleshoot customer-facing issues and communicate with customers as needed Serve as escalation point for infrastructure and customer integration issues Provide rapid response problem identification and resolution for ddos attack mitigation platform Troubleshoot platform and customer integration issues Monitor and respond to all required operational support system events About the Team This is an excellent position for somebody with a senior network professional witha desire to work in a customer facing high energy, team environment. The Prolexic Security Services SOC is a 24/7 operations center, which is responsible for rapid response ddos mitigation. Each shift is a team-oriented cross-functional unit charged with the detection and mitigation of DDoS attacks, customer communications, and resolution of platform integration issues. Regular training, knowledge sharing, and continuous improvement are important elements of the SOC. Required Education and Experience Applicants must meet one of the following education and experience requirements:  5 years of relevant experience and a Bachelor's degree in Computer Science, MIS, Engineering, or its equivalent or 3 years of relevant experience and a Master's degree in Computer Science, MIS, or Engineering Required Skills 5 years experience with one of the following: HTTP(S), TCP/IP, DNS, SSL. RHCT or 2 years equivalent experience administering linux/unix systems. Operational experience with security issues and access control mechanisms (firewall, ids). Desired Skills Service provider experience a huge plus Operational experience with security issues and access control mechanisms toprevent unwanted access.  Working knowledge of network routing and network troubleshooting Knowledge of various DDoS attack types (UDP/ICMP Flood, SYN Flood, HTTP Get Flood, TCP Connection Attack, TCP Flag-based Attacks) a huge plus  Working knowledge of tcpdump/ethereal/wireshark software Ability to navigate bash and administer a linux system Experience administering web application systems Perl/PHP/Python experience a huge plus Certifications (CISSP, CCNP, CCIE, ITIL, RHCE) a plus Have the drive and take ownership to personally resolve issues Ability to work in a fast paced, team environment without unnecessarily increasing stress levels Demonstrate a high level of attention to detail Ability to handle contention and potential conflict situations with clients professionally  To contribute and participate in a continuous improvement cycle  To be motivated to take advantage of all training opportunities and gain the appropriate qualification Akamai Technologies is an Affirmative Action, Equal Opportunity Employer that values the strength that diversity brings to the workplace. All qualified applicantswill receive consideration for employment and will not be discriminated against onthe basis of gender, race/ethnicity, protected veteran status, disability, or other protected group status. 015810
Salary Range: NA
Minimum Qualification
5 - 7 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.