Overall role Purpose :
To assume a technical/lead role for moderate-sized, MACs or large-sized network infrastructure projects. Responsible to develop, document, and analyse business & technical requirements; conduct alternatives analyses; prepare project specifications, contribute to the development of plans & schedules; communicate with stakeholders; coordinate approvals; and deliver fully validated and tested results on-time, within projected time.
Prepare and maintain documentation necessary to ensure key information is readily available to the IT team for support and maintenance of the infrastructure. Maintain daily activity, task, and systems status information for standard reporting processes. The successful candidate must be a self-starter with good communication and facilitation skills.
KEY Accountabilities :
- Technically strong in providing support and implementation of malware protection systems and technologies.
- Plan for and operationalize new security services in-line with changing threat profiles and organisational context
- Manage change (decommissioning, service change and service tuning) of existing security services in response to changing threat profiles, organisational context and opportunities for automation and consolidation.
- Provides customers and partners with a consistently high-quality support and implementation experience
- Responsible for implementing part or the entire load balancing technical solution to the client, in accordance with an agreed technical design. Occasionally responsible for providing a detailed technical design for enterprise solutions.
- Often leads small to medium technical projects. Works with and under the direction of the Project/Technical Manager and with customer nominated representatives. Liaises with Solutions Architect as appropriate.
- Provides technical support and input on the application of technology to a defined business segment. Provides advice on solution and integration opportunities to defined segments.
- Maintains high schedule adherence (work hours and on-phone time)
- Manages multiple projects/changes and prioritizes based upon customer and business needs
- Adhere to set standards and processes whilst implementation
- Ability to work after hours and on alternate work schedule in order to meet implementation windows.
- Prepare task implementation documents after understanding the requirement
- Adherence to change management processes and procedures
- Undertake the implementation work of the assigned project. This may or may not be the implementation of the task implementation document that the candidate has prepared. Implementation time may be OOH (Out of Office Hours) and will be in accordance with the time set aside for the implementation of the works (this could be OOH or weekends)
- Qualify design requirements /change requests and ensure that the request are incorporated into the design documentation and well documented to enable implementation personnel (may be others of the team) to carry out works.
- Maintain up to date documentation on the changes that are being performed on the network (this typically involves the update of network diagrams, design documentation, network management information, and other standards related documentation)
- Ensure all implementation related activities are Co-ordinated and Consistent to standards.
- Ensure the handover of new or changes to design into Operations and other Support teams.
- Provide the highest level of escalation support to Operations team in the event of a crisis situation during the project handhold period (typically 2-3 weeks post the implementation of the works).
- Provides technical support and input on the application of technology to a defined business segment. Provides advice on solution and integration opportunities to defined segments.
- Provides technical leadership on specific integration activities that are part of an engagement.
- Communicates across client community, and is viewed as adding value.
- Able to communicate and present complex issues with assurance and confidence. Demonstrates the use of consulting skills including: questioning, listening, ideas development, permission and rapport, and influencing.
- Ability to conduct/lead oral status/technical interchange meetings with clients on small to medium sized engagements.
- Owns and produces customer documentation. Ability to translate technical details into concise and easy to understand written form. Ability to write relevant components of a proposal document (e.g. answer specific RFP questions). Ability to translate verbal requirements from face to face client meetings into requirements documents, statements of work, and proposals.
- Able to discuss (within own area of expertise) requirements with a customer, and to challenge and clarify when appropriate. From the requirements, able to develop a high level design or plan, and then estimate the amount of effort required to deliver. Able to advise the engagement owner about the risks associated with this work package.
- Ability to work with a team to provide written responses to technical proposals and /or reports/documentation for delivery.
- Provide single point of contact and hands-on escalation and remediation for critical issues
- Respond rapidly to unplanned events, including afterhours for Severity 1 issues
- Proactively communicate relevant technical information and alerts on known issues, hot fixes, new releases, etc.
- Show a strong desire to expand skills to other areas information security such as database security, intrusion prevention/detection and other related solutions/products.
Technical Competencies (Skills and Experience)
Essential:
- 8+ years of IT infrastructure and security solution design, network operations, & related project experience.
- Experience with financial industry production environments (advantage)
- Competent to provide guidance, recommendations, best practices, etc. for malware protection systems operations and solutions
- Experience in stabilizing and optimizing malware protection system performance, including rules and reports
- Experience with malware protection system upgrades, installs and configuration
- Experience with liaisoning with FireEye Support, Engineering, Product Management, and others within Fireye on behalf of the customer
- Thorough understanding and implementation experience in more than one of the following areas:
FireEye Email Security (Email MPS 5300, 83xx)
FireEye Web Security (Web MPS 2310, 4310, 73xx)
FireEye File Security (File MPS 5300 83xx)
FireEye Malware Analysis (MAS 4310, 7300)
Central Management system (CMS 4310, 7300)
- Able to work with very low supervision
- Proven track record in a team environment
- Analytical thinker with strong attention to detail
- Must be able to read, write and speak English fluently, including technical concepts and terminology.
- Must be able to relay technical information to customers with varying skill levels
Desirable:
- Experience with Remedy (ITSM tool)
- Exposure to ITIL processes and way of working
- FireEye trained
Qualifications :
- Bachelor’s degree in Computer Science or related technology discipline; or equivalent technical experience.
- At least 3+ years in Malware prevention, DLP, Database security environments, IT Security, assets and data protection domains preferred
- ITIL Foundation Certificate
- CISSP (advantage)
- SANS – GIAC, GSEC (advantage)
If anybody interested (OR) any referrals then please share profiles to mailto:surya@crystalconsultants.in OR reach me on 9866178034 for more details.