Firewall Assessment

IL, Oak Brook
Posted 3 years ago

Security Check Point certification is preferred

Job Description:
The Candidate should take care of the day-to-day operations and data structures by overseeing operational performance.
They configure Expertise in Checkpoint Firewall.
The professionals must have an in-depth understanding of the CheckPoint Firewall.

Tasks and Responsibilities:

Plan, implement, and upgrade checkpoint firewalls.
Protect digital files and information systems against unauthorized access, modification, or destruction.
Managing all CheckPoint Firewall related issues.
Plan and document the configuration and verification of routing protocols and their optimization in enterprise networks.
Designing and planning networks are specific to client requirements and industry-standard principles.
Ability to independently troubleshooting and debugging broad, complex, and unique networks solution involving mixed media.
Maintain data and monitor security.
Conduct internal and external security audits.
Manage network, intrusion detection, and prevention systems.
Analyze security breaches to determine their root cause.
Recommend and install appropriate tools and countermeasures.
Define, implement, and maintain corporate security policies.
Security awareness training.
Coordinate security plans with outside vendors.

Technical skills required:

Good experience in the CheckPoint firewall.
Analyze business requirements to develop technical network solutions and their framework.
In-depth knowledge of Checkpoint Firewall and Firewall management systems - Tufin.
Good knowledge on Checkpoint firewall and F5 Load Balancer design/ implementation.
In-depth knowledge on site to site VPN design and build
Develop technology roadmaps.
Develop test plans, implementation plans, and project timelines for various projects.
Write functional requirements/specifications documents.
Upgrade hardware and software components as required.
Solve complex problems with many variables and solutions.
Social engineering – given that humans are the weakest link in the security chain, an analyst’s expertise can help with awareness training.
Forensics – investigation, and analysis of how and why a breach or other compromise occurred.
Troubleshooting – the skill to recognize the cause of a problem.
TCP/IP, computer networking, routing, and switching – an understanding of the fundamentals: the language, protocol, and functioning of the internet.
ISO27001 assessment – specifications for a framework of policies and procedures that include all legal, physical, and technical controls involved in an organization’s risk management.
Cloud computing – the risks and benefits of using a vendor’s remote servers to store, manage and process an organization’s data.

Apply Online

A valid email address is required.
A valid phone number is required.
You can share this story by using your social accounts: