Identity and Authentication Security Engineer
- Contract
Company Description
vTech can help you avoid the daunting task of writing and posting job offers, shifting through resumes and laboring through the lengthy interview process. Our Staffing solutions will allow you to elude those tasks and place topnotch, high-caliber professionals in the position you need to fill.
We use our expertise, knowledge, and global resources to deliver top-quality candidates and tailor our IT and Non-IT recruitment services to your needs. This allows us to deliver the required results in a timely manner that meets your schedule at a substantially reduced cost.
We pride ourselves for having one of the fastest growth rate and also the lowest turnover rates in the industry just 2.5 percent annually. We focus on the training and retaining qualified professionals with high personal and work ethics. With the help of our extensive database of internal candidates and CATS applicants tracking system, we can provide quality resources within the limited time frame.
We have also successfully placed hundreds of candidates in the areas related to Information Technology, Engineering, professional, Scientific & Clinical, etc. for both our commercial and government clients.
- Source: A recruiter sources candidates from various sources; the search starts from our proprietary database. Using advanced sourcing methods like social media, professional networking media, internal, and 3rd party job boards, we identify qualified candidates.
- Validate: A recruiter validates the candidates’ experience and skill sets against our client’s position.
- Initial Screening: Based on the position and the client’s work culture, the recruiter uses initial screening questions to determine the most suitable candidates.
- Submit: the recruiter will submit to the technical team qualified candidates who have passed the initial screening.
- Technical Screening: The technical team then prepares a matrix of the particular requirements and required experience for the position and using a list of questions and the results, re-validates the candidates’ technical skills.
- Background Check: Administrative personnel will provide a detailed background check, as required, per client agreement.
- On board: On successfully completing the above steps, the candidates are welcomed on board and assisted to ensure a smooth integration at the client’s location.
Job Description
Description:
The Identity and Authentication Security Engineer/Admin will be responsible for technical support to security technologies supporting implementation and operations of the multi-layer secure authentication infrastructure.
The Identity and Authentication Security Engineer/Admin will be responsible for technical support to security technologies supporting implementation, evolution and operations of the multi-layer authentication infrastructure.
The Identity and Authentication Security Engineer/Admin will provide onsite and remote support to the District Authentication Systems (Secure Multi-factor, Active Directory, Public Key Infrastructure (PKI) solutions, S/Mime, SSL). He/she will Partner with system and application teams including Enterprise Architecture to determine/create integration strategies/patterns that allow secure access across district programs and applications.
Provide support services to define security requirements, identify the appropriate configuration for each unique District environment, and perform tasks associated with the day-to-day operations and maintenance on installed Cyber Security systems and applications.
Required Skills:
• Experience with Secure Authentication Systems, deployment and operation
• Experience with Managed Public Key Infrastructure (PKI) Solution, deployment and operation
• Experience with Wireless Authentication, OTP and multi-factor authentication platforms
• Experience with Active Directory, LDAP, Radius, NTLM, SAML, AADL, IWA and Open directory platforms
• Experience with RSA Secure ID, Cisco ACS, SecureAuth, OneLogin, Okta
• Experience with strong authentication technologies and protocols (PKI, S/Mime, SSL)
• Troubleshooting, Scanning & Analysis tools
• Networking and Network Operations
Qualifications:
• Bachelor of Science in Electrical Engineering, Computer Science, Information Technology, or equivalent data security and networking experience required
• CISSP, CISM, or relevant IPS Vendor training/certification preferred
• Background check and credit check will be required
Experience and Skills:
• Specific knowledge, skills, and abilities required by the incumbent to successfully fulfill the Major Duties and perform the Tasks required for this position include:
• Server Administration background – Windows and/or Linux/Unix
• Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth).
• Knowledge of defense-in-depth principles and network security architecture.
• Knowledge of communication methods, principles, and concepts that support network infrastructure
• Skill in implementing the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise IT architecture
• Skill in analyzing and securing an enterprise architecture
• Knowledge of engineering concepts
• Skill in integrating and supporting information system security architecture
Specific Tasks:
• Analysis, design, configuration, implementation, documentation and operation of Intrusion Prevention System devices.
• Manage system deployments, upgrades, ongoing maintenance and operations.
• Configuration and operation of security device authentication, management & logging platforms.
• Assist in requirement gathering related to implementation of security infrastructure technology solutions across enterprise and service provider networks.
• Provide Tier3 support for NOC personnel troubleshooting network issues.
• Identify, troubleshoot, and resolve complex network connectivity issues as well as advise on network security related issues.
• Provide occasional off-hours support for planned maintenance work and unplanned support issues. May occasionally require on-site work at a data center during off-hours.
Responsibilities:
1. Coordinates IT project management, engineering, maintenance, QA, and risk management.
2. Plans, coordinates, and monitors project activities.
3. Develops technical applications to support users.
4. Develops, implements, maintains and enforces documented standards and procedures for the design, development, installation, modification, and documentation of assigned systems.
5. Provides training for system products and procedures.
6. Performs application upgrades.
7. Performs, monitoring, maintenance, or reporting on real- time databases, real-time network and serial data communications, and real-time graphics and logic applications.
8. Troubleshoots problems.
9. Ensures project life-cycle is in compliance with District standards and procedures.
Minimum Education/Certification Requirements:
Bachelor’s degree in Information Technology or related field or equivalent experience
Skills Required:
• Prior experience as technical support to security technologies for implementation, evolution and operations of the authentication insfrastructure
• Experience with Secure Authentication Systems, deployment and operation
• Experience with Managed Public Key Infrastructure (PKI) Solution, deployment and operation
• Experience with strong authentication technologies and protocols
• Prior hands on experience with PKI
• Prior hands on experience with S/Mime
• Prior hands on experience with SSL
• Experience with Active Directory
• Experience with LDAP
• Experience with Radius
• Experience with NTLM
• Experience with SAML
• Experience with AADL
• Experience with IWA
• Experience with Open directory platforms
• Experience/familiarity with one or more of these technologies: RSA Secure ID, Cisco ACS, SecureAuth, OneLogin, Okta
• 16+ yrs planning, coordinating, and monitoring project activities
• 16+ yrs leading projects, ensuring they are in compliance with established standards/procedures
Additional Information
All your information will be kept confidential according to EEO guidelines.