Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

CISCO Network Security Consultant

Job Title: CISCO Network Security Consultant
Contract Type: Contract
Location: London, England
Industry:
Salary: €500 per day
Start Date: ASAP
Duration: 3-6 months
REF: LO-124585425_1503500795
Contact Name: Ashley Andrews
Contact Email: AshleyA@montash.com
Job Published: about 2 months ago

Job Description

CISCO Network Security Consultant - Urgent

I have been engaged by a global Consultancy who require a CISCO Network Security Consultant for a 3-6 month Contract in Germany.

CISCO Network Security Consultant is responsible for working on a highly complex and diverse network Security infrastructure to deliver Network Support 24x7 shift based model. You Should have a demonstrated experience in Network Security troubleshooting including Security products such as Firewalls, IPS/IDS, VPN Gateways, Forward/Reverse Proxy, AAA Solutions, Splunk etc

Responsibilities:

  • Ability to isolate and solve complex technical problems with the ability to interact with people
  • Build, Document, and review the firewall ACL, NAT and IPS rule set pertinent to customer business requirements
  • Root Cause Analysis on Network/Secure Internet Access outages
  • Participate in all internal and external audits, as required

Required Skill Level:

  • YOU MUST BE FLUENT IN GERMAN
  • Bluecoat 900-10B, 900-20, 900-30, 9000-20B, Director-510, S200-10, DLP700, DLP2700, DLP1700
  • Experience with enterprise proxy solutions
  • Cisco ASA5585-X-SSP-20, ASA 5525-X,
  • Strong knowledge of TCP/IP networking, network protocols and packet analysis

If you are a CISCO Network Security Consultant looking for a new challenge then please get in touch with me on 0207 014 0239 or Ashleya@montash.com

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...