What you’ll be doing...

You will be responsible for the design and implementation of network security end-to-end architectures, systems, configurations, controls, policies, and processes to ensure that Verizon’s global wireline networks and customers are protected against sophisticated cyber security threats. You will work directly with Verizon’s vendors, industry partners, network planning, engineering, and operations teams to ensure that all network elements, systems, and applications contain and implement the best possible cyber security protections.

You will be responsible for developing applicable policy standards for the practical application of cyber security requirements and ensuring they are implemented consistently. Working with Verizon’s network planning, engineering, and operations teams you will develop and document requirements that specify the criteria to meet the cyber security standards for each network element type, system, and application. Additionally, you will be responsible for developing and documenting an applicable process or methodology for implementing the security standards on an ongoing basis. You will be responsible for designing and developing new process or methodologies to enhance security and streamline new or existing workflows.

You will participate in requirement review meetings to analyze areas of security concerns. Partner with development teams to ensure the security requirements and specifications are address appropriately. Participate in development, testing and production releases for verification, support and resolution of any anomalies related to security requirements. You will produce documented frameworks or architectures, which describe and are used to manage the implementation of these technical security environments. Develop, create, and drive current and new data collection and reporting methods to ensure that the proper data is being captured and retained by these processes in compliance with corporate standards and in support of both internal and external audits.

What we’re looking for...

You’ll need to have:

  • Bachelor’s degree or four or more years of work experience.
  • Six or more years of relevant work experience.

Even better if you have:

  • A degree
  • 7+ years of experience and background in network security, telecommunications with work history over the last three or more years in a technical support role.
  • Strong knowledge of network security standards and their implementation in compliance to corporate security policies.
  • Knowledge of security best practices with prior responsibilities protecting information assets.
  • Ability to translate security requirements implementation into formal written procedures.
  • Strong knowledge of Network Layers, Network Architecture and Network Topology.
  • Strong knowledge OpenStack framework implementation.
  • Experience in the support of Data, transport and Midrange network platforms.
  • Experience in User / system administration of Linux, UNIX and Windows servers.
  • Experience with TACACS / RADIUS AAA user and administrative support.
  • Experience with Shell, Expect, Python and JavaScript.
  • An understanding of general database concepts, hardware and software troubleshooting.
  • Excellent documentation and organization skills.
  • Ability to multi-task, take direction, prioritize, and manage multiple activities / tasks to achieve objectives.
  • Excellent verbal, written, and interpersonal skills. Ability to present and communicate to both superiors and peers.
  • Knowledge and experience in designing, configuring, implementing, troubleshooting and supporting security solutions on multi-site critical network environments.
  • Experience in integrating security requirements with identity stores, relational databases, application servers and physical access management systems.
  • Experience Building, updating, and maintaining technical training documentation.
  • Experience analyzing security components of targeted system to identify weaknesses and develop opportunities for improvement (evaluation process).
  • Experience providing policy and procedure interpretation and clarification, technical information and security guidance to managers, data owners, project leads, application development teams, system operators and users.
  • Experience coding and testing Java enterprise systems.
  • Experienced in communicating security risks in business terms that can be clearly understood at all levels of the organization.
  • Experienced providing technical training and assistance to junior team members.

22CyberNET 22CyberARCH

When you join Verizon...

You’ll be doing work that matters alongside other talented people, transforming the way people, businesses and things connect with each other. Beyond powering America’s fastest and most reliable network, we’re leading the way in broadband, cloud and security solutions, Internet of Things and innovating in areas such as, video entertainment. Of course, we will offer you great pay and benefits, but we’re about more than that. Verizon is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Verizon.

Equal Employment Opportunity

We're proud to be an equal opportunity employer- and celebrate our employees' differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.