Full-Time Network-Security Consultant
NOTE: This job listing has expired and may no longer be relevant!
You wish to join Excellium because… You are motivated, passionate and not routine-oriented!
As a Network-Security Consultant, you’ll be part of a dynamic and passionate team. You will have the opportunity to fully invest yourself, to innovate and to create using the latest technologies. Listening being at the heart of our company, you will quickly find a sense of belonging at Excellium. In order to understand our business, our customers’ challenges and to support them we regularly organize workshops as well as training sessions. We will help you develop your skills and give you the possibility to work on motivating and stimulating projects adapted to your profile and allowing you to surpass yourself.
Integrated within a multidisciplinary team, as Network-Security Consultant you will work within the Network & Security department. This service aims at offering the best technologies to our customers in order to limit exposure and protect their equipment as well as their data. Solutions can be deployed on-site or via a cloud platform.
YOUR MISSION AS A NETWORK-SECURITY CONSULTANT
You will be in charge of:
◼ Carrying out consultancy and expertise assignments,
◼ Gathering technical requirements and proposing a solution adapted to customer needs,
◼ Defining the architecture and taking part in the design of technical solutions,
◼ Assisting the sales departments in the pre-sales phase: producing models, presenting technical solutions, responding to the technical part of calls for tender,
◼ Implementing or supporting operational teams during the production phase,
◼ Managing projects related to security solutions.
YOUR PROFILE AS A NETWORK-SECURITY CONSULTANT
You have a degree in engineering or a Master’s degree specialising in information systems security, and you have successful experience in the technologies sought.
As Network-Security Consultant you will have expertise in one or more of the following areas:
◼ Web and Database Application firewalls,
◼ Protection systems against unknown threats (Sandboxing
◼ Strong authentication and SAML identity federation, OpenID Connect, …
◼ Encryption (IPSEC VPN, data encryption, …),
◼ Hardware Security Module (HSM),
More specifically, you are familiar with the technologies of the following manufacturers,
◼ Firewalls: Checkpoint, Palo Alto Networks, Fortinet,
◼ Web Proxy: Bluecoat ProxySG, McAfee Web Gateway R,
◼ Load Balancing / WAF: F5, Netscaler, DenyAll, Imperva,
◼ Email Security: Cisco, TrendMicro, Trustwave,
◼ Strong authentication: RSA, Gemalto, RCDevs,
◼ HSM: Gemalto, Thales,
◼ Sandboxing: BlueCoat MAA, TrendMicro,
◼ Identity Federation: Microsoft ADFS, auth0, okta.
If you are passionate about IT security, curious and seeking out the latest news, security flaws and technological advances then apply!
How to ApplyYou can apply by email at firstname.lastname@example.org
607 total views, 2 today