What you’ll be doing...

In this role, you will deliver consulting project activities, ranging from client identification through final invoicing through medium to long term engagements requiring varied interpersonal and technical skills. Technical responsibilities include problem identification, system architecture definition, hardware/software specification and/or design, implementation, testing, client training, and solution deployment. Performance is evaluated based on billable hours and contractual deliverables. While being viewed by customers as a consultant, your performance will be measured by delivery of agreed solutions within budgeted hours. You will work on problems of complex scope where analysis of situations or data requires a review of a variety of factors. You'll exercise judgment within defined procedures and practices to determine appropriate action.

  • Identifying, assessing and upgrading customer information technology infrastructure regarding risks and vulnerabilities.
  • Identifying gaps in the security architecture, and developing recommendations for long and short term roadmap for corrections.
  • Working closely with the PM team to ensure that project scope is correctly delivered and that the TM practice requirements are defined and delivered.
  • Providing security configuration services around firewall ruleset design, review, implementation and operation management.
  • Providing firewall ruleset analysis, workflow automation and implementation of automation where necessary.
  • Utilizing your applicable knowledge of:
    • Firewalls
    • Network intrusion detection
    • Security audits, diagnostics, forensic tools
    • Management tools and procedures
    • Enterprise security programs
  • Documenting (textual and graphical as appropriate), communicating, recommending and taking appropriate action to resolve risks and issues associated with security vulnerabilities across the Customer IT Environment.
  • Installing, maintaining, staging, automating and operating Security Services (services, equipment and software), including virus Software and definitions/signatures, patches, host based agents, Data Loss Prevention (DLP), web filtering, spam prevention and other monitoring software.
  • Keeping the Customer IT Environment updated at N Release Level at all times, subject to customer-approved waivers.
  • Performing e-mail security management, with a focus on reducing spam, and filtering inappropriate content, and viruses.
  • Providing, maintaining (at N Release Level) and administering end point security management tools across the Customer IT Environment, authorized users, data centers and network assets.
    • Anti-virus (e.g. Symantec, Palo Alto and TrendMicro, Tanium, Carbonblack)
    • DLP (e.g. WebSense and Palo Alto)
    • Web filtering (e.g. WebSense and Palo Alto)
    • Spam filtering (e.g. Proofpoint)
  • Monitoring end point security tool sets, including NIDS, HIDS, DLP Systems, and Network behavioral analysis tools, such as Arbor PeakflowX.
  • Documenting, maintaining (at N Release Level) and managing DLP (host and network) existing equipment, software and tools.
  • Managing DLP rules based on customer policies and procedures.
  • Notifying the customer of viruses and system vulnerabilities or threats that could lead to adverse effects - within agreed SLA of the virus, system vulnerability or threat being published by industry-recognized sources or identified by the service provider.
  • Managing and configuring BitLocker.

What we’re looking for...

You'll need to have:

  • Bachelor’s degree or four or more years of work experience.
  • Four or more years of relevant work experience.

Even better if you have:

  • Bachelor’s degree in Computer Science or a relevant field.
  • Eight or more years of relevant work experience.
  • Ten or more years of technical experience, including five or more years in security services.
  • Three or more years of hands-on experience in the following technologies:
    • Qualys
    • Cisco ASA firewall
    • Cisco ISE
    • PaloAlto Firewall
    • CheckPoint Next Generation Firewall
    • Symantec Endpoint Protection
    • WebSense Web Content Filtering
    • TrendMicro Deep Security (HIDS)
    • MobileIron/Mobile Device Management/ProofPoint
    • Carbon Black
    • Tanium
  • Strong analytical skills.
  • Excellent written and verbal communication skills and the ability to:
    • Read, analyze, and interpret common scientific and technical journals
    • Document procedures that conform to a prescribed style and format
    • Present information to management, public groups, and/or boards of directors
  • Consulting experience within a Professional Services organization.
  • Industry certification such as CISSP, CCSE, SANS or other security certifications, such as GCIA, GCIH, GREM, GPEN, CEH.

When you join Verizon...

You’ll be doing work that matters alongside other talented people, transforming the way people, businesses and things connect with each other. Beyond powering America’s fastest and most reliable network, we’re leading the way in broadband, cloud and security solutions, Internet of Things and innovating in areas such as, video entertainment. Of course, we will offer you great pay and benefits, but we’re about more than that. Verizon is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Verizon.