We use cookies to make your experience of using our website better. To comply with the e-Privacy Directive we need to ask your consent to set these cookies.

Employers

Stealth Network Security Consultant, London

col-narrow-left   

Location:

London, United Kingdom 

Job Category:

Information Technology
-

EU work permit required:

Yes
col-narrow-right   

Job Views:

804

Posted:

29.07.2016
col-wide   

Job Description:

Unisys StealthTM is an innovative, software-based security solution that:
  • Conceals communication endpoints making them undetectable to all unauthorized parties inside and outside the enterprise
  • Implements with no disruption to your existing IT infrastructure, it merely rests on top
  • Tightens access control by basing it on user identity and not physical devices, so security moves with the user and is easier to manage
  • Protects sensitive data in motion from potential compromise through encryption
  • Reduces costs by allowing you to consolidate and virtualize networks, servers, and cloud architectures
  • Supports regulatory compliance such as PCI and other requirements that are drawing resources away from your core business and mission focus
  • Strengthens agility so you can quickly and easily adapt to meet emerging business and mission requirements
  • Helps executives future-proof their security investments by aligning with enterprise transformation trends
https://unisyssecurity.com/
  
 Responsibilities:
 
  • Understanding of network architectures, topologies, and networking services and protocols (e.g. BGP, MPLS, TCP/IP, IPSec, VLANs, VPNs, etc.)
  • Well versed in network security architectures, topologies and risk mitigation techniques and topologies.
  • Guides the activities of network engineers and focused teams for network discovery, diagrams, toolset recommendations, and physical/logical architectures
  • Ability to generate SOWs, BOEs, WBS, and product specifications and recommendations. Works in a leadership role with the customer to guide the network and Stealth deployment strategy
  • Manages the activities to configure and test the deployed infrastructure to achieve client sign-off
  • Creates complex design artifacts including network layouts and logical/physical designs
  • Contributes to the preparation and presentation of technical trade-offs and Total Cost of Ownership results to managers, customers and peers
  • Ensures proper documentation for the corporate knowledgebase, including design, procedural and lessons learned. This also includes maintaining and updating existing documentation
  • Leads pre-sales client engagements, such as Workshops, Proof of Concepts and Demonstrations, and provides input on infrastructure architectural designs, blueprints, integration of infrastructure architecture artifacts, and asset management/ reuse resulting in the creation and deployment of world-class solution
  • Wide knowledge of system, security, and network engineering best practices and industry trends

Job Requirements:

Skills, Experience & Qualifications:
 
  • Knowledgeable in network security procedures, best practices, and implementation
  • Experience participating in technical presentations to a variety of clients, and designing and integrating client solutions involving multiple systems across an entire unit or organization
  • Highly knowledgeable on security and network tools including: network monitors, firewalls, VPN’s
  • Ability to troubleshoot software issue and customer applications as required, specifically Network Interfacing (single and multiple NICs) on UNIX O/S server platforms, Linux Red Hat and/or AIX.
  • Able to analyze the technical and business requirements for a specific information systems technology, and design and implement the infrastructure required
  • Cisco experience and Certifications a plus - CISSP, Security+, CCNP, CCNA, Network+, MCSA
  • Excellent documentation skills are required
  • Advanced technical writing skills are required
  • Experience deploying or integrating solutions in various Authentication Schemes; e.g. LDAP, Radius, Kerberos, Multi-Factor, Smartcard concepts (HSPD-12 vs. CAC), One Time Password (OTP), etc.
  • Advanced Host and Network Troubleshooting skills – TCP dumps, Network Debug Tools, etc…
  • Bachelor’s degree in Information Technology, Computer Science or advanced degree/Certifications in related discipline
  • Deployment and operations framework knowledge: e.g. ITIL Framework
  • Applicants selected will be subject to a background check. Security clearances would be advantageous.
Interested in position? Please contact: Anna Gulyás, Anna.Gulyas@hu.unisys.com.

Employment Type:

Full time
Company Info
Unisys

Budapest, Hungary
Phone:
Web Site:
Save Contact
Company Profile


comments powered by Disqus