Security Engineer
hong kong
Regional IT services and solutions provider
Job Description
• Planning, design, installation, configuration and deployment of security solution and enforcing security best practices comply with customer requirements such as security policy and regulation.
• This is a critical post-sale role align across the Security Line of Business. The Security Consultant plays a key part in Technology Services Delivery team to ensure security solution deployed at the highest quality and standard.
• Participate in the project implementation and coordinate new installations, designs and migrations for security solutions
• Delivery of specific technical solutions to meet the technical requirements and specifications
• Engage in technical problem solving across multiple technologies
• Working on projects in a collaborative fashion with other teams to ensure Customer Success metric outcomes are delivered
• Providing post-installation troubleshooting and technical support by phone or online
• Keep up-to-date with the latest news and threats in the security industry
Job Requirements
• University Degree or Diploma in relevant fields (e.g. Engineering, computer science, data communication, and etc).
• Non-degree/diploma holders will be reviewed based in job experience
• At least 5 years’ experience in IT Security or Post-sales delivery roles.
• Relevant security certifications will be advantages
• Experienced network/system senior Consultant/consultant/project management
• Good product knowledge in Checkpoint, Palo Alto, FireEye and Arcsight SIEM.
• Successful track record of IT security software and technology implementation in an enterprise/complex environment
• Distinct ability to communicate technology effectively to individuals, group and management with deeper degrees of expertise
• Able to mentor, plan and lead a team of engineers
• Ability in create technical documents, such as design document, test plan, functionality test, as-built configuration document, operation guide
• Ability to solve technical problems independently
• Ability to follow up and follow through
• Take ownership and initiative
• Knowledge of security infrastructure product, such privilege access management, SIEM, IPS, Firewall, VPN, sandbox technologies
• Security background is essential, comfortable with concepts, such as man-in-the middle attack, DNS poisoning, masquerade attack, segregation of duties
• Excellent interpersonal, communication and presentation skills
• Proactive with ability to succeed in a dynamic environment
• Prefer with CISSP or equivalent security professional certification
• Ability to work remotely from own initiative
#J-18808-Ljbffr