About the role
AI summarisedThe Network Infrastructure & Security Engineer will be responsible for the end-to-end design, deployment, operation, and optimization of critical network infrastructure. This role involves developing and implementing robust cybersecurity policies, managing vendor relationships throughout the solution lifecycle, and providing advanced maintenance for network devices and security systems to defend against evolving threats.
ResearchOnsiteBioinformatics Institute
Key Responsibilities
- Design, deploy, and operate network infrastructure including routers, switches, and firewalls.
- Develop, implement, and enforce cybersecurity policies, standards, and procedures to protect systems and data.
- Manage vendor relationships through the full lifecycle of solution deployment, from selection to post-implementation review.
- Perform ongoing maintenance and optimization of network devices (routers, switches, firewalls, load balancers) and security systems (IDS/IPS, SIEM, EDR).
- Monitor network activity for suspicious behavior and security incidents, taking prompt action to contain and eradicate threats.
- Conduct vulnerability assessments, penetration testing, and security audits on deployed systems.
- Develop and implement incident response plans to manage cyberattacks effectively.
- Research, evaluate, and recommend new cybersecurity and network solutions to enhance security posture.
- Maintain detailed documentation of all network configurations, security policies, and incident response procedures.
Requirements
- Bachelor degree in Computer Science, Information Technology, Cybersecurity, Network Engineering, or related field.
- 3 to 5 years of proven experience in cybersecurity and/or network engineering roles.
- Hands-on administration experience with enterprise routers and switches configuration and troubleshooting.
- Proficiency in configuring and managing firewalls, IDS/IPS, and other security appliances.
- Strong understanding of TCP/IP, routing protocols (BGP, ISIS, OSPF), VLANs, VPNs, and wireless technologies.
- Knowledge of common attack vectors, security vulnerabilities, and defensive strategies.
- Experience with operating systems (Windows, Linux, UNIX).
- Ability to explain complex technical concepts to non-technical stakeholders and manage vendors effectively.