IntroductionInformation and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.
Your Role and ResponsibilitiesWe are seeking a highly skilled and motivated Technical Network Security Engineer who will be responsible for providing Expert Support (Design, Configuration and Troubleshooting) to our customer, focusing on Cisco's Security Technology Portfolio -Cisco Stealthwatch (Secure Network Analytics). Required Technical and Professional ExpertiseCustomer Support:- Respond promptly to customer inquiries, troubleshoot, and resolve issues related to target technologies.
- Provide remote support and on-site assistance as required, ensuring timely issue resolution.
- Working in co-ordination with customer and customer NI team ensuring to get deep understanding of customer network and traffic flows.
Technical Expertise:- Demonstrate a comprehensive understanding of Cisco’s Security Products Portfolio.
- Stay updated on the latest developments in Cisco technologies and incorporate them into troubleshooting and support activities.
- Troubleshooting and Problem Resolution
- Excellent knack to Diagnose and resolve complex security and data routing issues involving Cisco hardware, software, and protocols in the shortest period.
- Ability to use advanced Troubleshooting methodologies
- Deep command of software diagnostic capabilities (traces, logs, show commands, performance measurements, deep knowledge of security, Switching and Routing protocols).
- Utilize network programming languages like Python and automation tools such as Ansible for efficient data collection, correlation and issue resolution.
- Collaborate with clients and network operators to plan and execute maintenance windows effectively.
- Creative problem solver, comfortable with challenging the status quo and rapidly responding to escalated issues.
- Create and maintain detailed documentation, including knowledge base articles, troubleshooting guides, best practices, and comprehensive records of maintenance window activities.
- Document automated solutions using scripts and playbooks for future reference.
Qualifications / Required Skills- 5-7 years of experience in working Cisco's Security Technology Portfolio and working as a Technical Specialist to manage the overall operation for ‘Secure Network Analytics’ (formerly Steathwatch)
- minimum of 3-4 years of relevant experience
- Bachelor’s degree in Electronics and Communication, Computer science, Information Technology, or related field
- A solid foundation in Electronics and Communication, computer science or a related field provides the fundamental knowledge required for understanding networking principles and technologies.
- Cisco Certifications
- CCNP (Cisco Certified Network Professional)
- Demonstrates advanced knowledge and skills in Cisco networking.
- Validates the ability to plan, implement, verify, and troubleshoot complex network solutions.
- CCIE (Cisco Certified Internetwork Expert) Preferred
- A highly regarded expert-level certification that demonstrates a deep understanding of Cisco networking technologies.
- Expert written and oral communication skills, including experience with executive-level presentations.
Preferred Technical and Professional Expertise- Knowledge of and experience with standard network logging formats, network management systems and network security monitoring systems, security information, and event management, network packet analysis tools, and forensic analysis tools.
- Knowledge of and experience with web proxy, firewalls, IPS, IDS, mail content scanning appliances, enterprise Antivirus solutions, Network Analysers, and domain name servers desired
- Demonstrated knowledge in one or more of the following areas: network security principles, host-based security principles, network and system administration, forensic analysis principles
- Knowledge related to the current state of cyber international relations, adversary tactics, and trends.