Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Level 3 Border Protection Engineer

Job Title: Level 3 Border Protection Engineer
Contract Type: Permanent
Location: Dublin, Dublin
Industry:
Salary: £200 - £300 per day
Start Date: ASAP
Duration: 6 months
REF: Level 3_1410935597
Contact Name: Sam Freedman
Contact Email: samf@montash.com
Job Published: about 3 years ago

Job Description

Montash have been engaged by a Global Organisation to source and secure a Level 3 Border Protection Engineer to manage and maintain the day to day security operations and system change lifecycle for IP Address Management and DNS.

Key Responsibilities

Working with the Senior Security Border Protection Engineer to manage and maintain the configuration/availability and system lifecycle of all key IPAM devices in the region.

Responding to incident escalation requirements from security tools and support SOC functions in the region.

Operating and maintaining IPAM tools within the Security Response responsibility

Assisting coordination and implementation of security services across the Group

Skills and Requirements

2-3 years' experience in managing enterprise IPAM environments

Qualified IP address/DNS management tools

Qualified BlueCat IPAM Administrator preferable

Experience with CISCO Network devices and working knowledge towards CCNA standard certification

Knowledge managing DNS and DHCP systems/IP address management

Good knowledge of Network Architecture (related to configuring DHCP scopes)

Qualified or working towards certification like CISPP or CISA

This is an urgent requirement for a Level 3 Border Protection Engineer to join a Global Organisation, please submit your CV for a confidential conversation

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...