Reston, Virginia, USA
253 days ago
Senior Solution Consultant - Network Security

Job Title:

Senior Solution Consultant - Network Security

Role Overview:

Join an industry leading team performing challenging and meaningful work. Trellix is supporting a critical U.S. Public Sector customer in the planning, deployment, migration, operation, and sustainment of key network security systems comprised of Trellix and third-party technologies.

The network security solution consultant will work with the customer and diverse stakeholders throughout the customer organization to create technical project plans, schedules, test plans, deployment plans, and migration plans to evolve the customer’s systems to the next generation capabilities.

Candidates should have experience in large-scale operational environments focusing on cyber defense along with experience performing incident analysis, developing defensive capabilities, and designing and implementing security solutions.

About the role: 

•You will be responsible for overall customer experience and successful delivery of services.
•You will build and maintain strong customer relationships.
•You will serve as a cyber systems engineering subject matter expert and trusted advisor.
•You will lead the service delivery process from a technical perspective, including planning, risk management, development of technical documents, stakeholder communication, system testing, and execution.
•You will coordinate and collaborate with cross-functional teams within Trellix and with the customer organization.
•You will serve as a customer advocate capturing and responding to inquiries, concerns, and feedback.
•You will ensure compliance with policies, processes, procedures, and quality standards.
•You will assist in the development project plans, schedules, other project management artifacts.
•You will assist with creating and delivering recurring presentations describing project plans, activities, and status updates.

Develops and delivers detailed IT solutions through consulting project activities. Responsibilities include client identification through final invoicing for engagements requiring varied interpersonal and technical skills. Technical responsibilities include problem identification, system architecture definition, hardware/software specification and/or design, implementation, testing, client training, and solution deployment. Performance is typically evaluated based on utilization, (i.e., billable hours). Project management activities include interaction with company and client managers and cost/schedule monitoring. May have some financial responsibilities including project cost estimating, proposal generation, and invoicing. May participate in sales and proposal presentations in addition to completing ongoing team account activities. Identifies additional product/services opportunities in customer organization. Performance is typically measured by the capture of the consulting engagement and/or delivery of agreed solutions within budgeted hours.

About You:

You are self-motivated and passionate about cybersecurity and information technology.You have experience with enterprise network technology planning, deployment, user migration and operations.You have excellent communication and interpersonal skills, with the ability to build strong relationships with customers and internal stakeholders.You have strong analytical and problem-solving skills, with the ability to identify and mitigate project risks and issues.You have attention to detail and strong documentation skills, with the ability to create and maintain project plans, proposals, and reports.You have expertise with cyber threats, attack vectors, detection capabilities, and associated countermeasures.You have a clear understanding of organizational Incident Management processes in relation to threats and vulnerabilities. You have experience with alert management and system tuning.You have a high-level understanding of malware types, malware detection methods, and malware analysis techniques.You possess knowledge of MITRE ATTACK and DEFEND frameworks along with Kill Chain methodology and the Diamond Model.You have experience with identifying and mitigating cyber threats, including detection and countermeasures strategies and tools.You understand technical vulnerabilities and associated risk.You are willing to travel up to 30%.

Required Qualifications:

At least 7 years of information security, network engineering, or systems engineering experience.Six (6) years of experience in an enterprise LAN/MAN/WAN environmentFour (4) years of experience in network administration and analysisBachelor’s degree in information security or a related field (or four years of experience, in addition to the experience requirements above)Experience working with complex system implementations and organizational processes to include maintaining network system documentation.Experience maintaining the integrity and security of networks and connected systems.Experience with and knowledge of network routing, protocols, packet flow, TCP and UDP traffic.Understanding of security infrastructure (proxies, firewalls, email filtering technologies, and network intrusion detection systems) and host-based security toolsExperience with IDS/IPS, sandboxing, packet capture, and network investigation technologies.Experience with scripting languages such as PowerShell and/or Python.Experience with Trellix IPS, NX, IVX, PX, and/or IA is preferred.

Certifications

DoD 8570.01 Information Assurance Technical (IAT) Level II, required (or a willingness to achieve IAT Level II within six months of hiring)

Clearance Requirement:  Active Top Secret/SCI clearance

Company Benefits and Perks:

We work hard to embrace diversity and inclusion and encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.

Retirement PlansMedical, Dental and Vision CoveragePaid Time OffPaid Parental LeaveSupport for Community Involvement

We're serious about our commitment to diversity which is why we prohibit discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.

Confirm your E-mail: Send Email