Network and IT Security Consultant for NJ
I am looking for resource for below role:
Location: Bloomfield NJ - local to NJ
Duration: 12 Months
Start Date: Jan 1 2026
CLosing Submission: Oct 16 2025
Work Authorization: GC/CTZ preferred
. Network and IT Security
Consultant. The Network and IT Security Consultant shall be appointed by the
Township Council by a majority vote of a quorum of its members. They shall
serve for a term of one (1) year from the first day of January of the year of their
appointment. The Network and IT Security Consultant shall receive such
compensation as the Council may agree upon and determine.
Core Roles and Responsibilities.
The Network and IT Security Consulting Services shall include but not be limited to General IT Network and IT Security consultation and shall provision the following services for all Township offices in support of the Township IT Department Director:
A network security consultant is
responsible for every aspect of data safety in a network, ensuring minimum
vulnerabilities by adopting and integrating the latest processes and technology
to prevent malicious attacks. A network security engineer job description often
includes:
• Implementing network security blueprints
• Configuring Network and IT Security Appliances to secure network
integrity
• Managing information and data access
• Maintaining and updating Network Switches and firewalls and
systemic testing of the organization’s network and systems for vulnerabilities.
• Play a vital role in the organization's incident recovery and
all disaster recovery efforts
• Working with other disciplines to ensure network security and
project completion
The role of a network security consultant, also potentially called a network
architect or cybersecurity engineer, involves a wide range of expertise. As a
network security consultant, you must deeply understand the wide range of the
company’s security products, business processes, and how they work together.
Documentation:
A network security consultant analyzes and designs the safety protocols
implemented in a network. You’ll map out your organization’s information
network and security structure and identify areas where access authorization is
needed. The network security roles and responsibilities of security architects
include:
• Building blueprints, models, and strategies to strengthen the
security of networks.
• Assisting in and representing the organization as an expert in
official and required documentation
• Testing existing safety systems and protocols in an agreed-upon
time and schedule
• Monitoring and improving identity security across a computer
system
• A network security consultant will work with other designated
staff and company consultants to ensure a security system is strong enough to
prevent cyberattacks. Their roles and responsibilities share similarities and
provide a well-rounded system to protect an organization’s data.
Network maintenance
• Ensure computer networks operate seamlessly and adapt
organizational network security to suit the company’s changing capacity.
Through network maintenance, network engineers reduce downtime and disruptions
while ensuring that all systems and computers run successfully.
• Identify the most effective systems and preventive protocols to
handle cyberattacks, malware, and viruses and monitor networks for suspicious
activity.
• Assist with setting up processes that mitigate and hasten
cyberattack recovery, including emergency response protocols.
• Apply and ensure that network and security appliances are
properly, systematically updated, and patched.
• Perform a quarterly vulnerability test on the township’s
networks. The outcome of each test shall be a report with actionable
recommendations for remediation where necessary.
• Assess the architecture and configuration of the network on an
ongoing basis and make changes to the configuration as needed to optimize for
performance and security.
Planning:
Assist with developing a complete IT
Department assessment comprehensive plan. Assist in quarterly reviewing Cyber
Security Roadmap (CSR). Shall be an available point of contact for all
disaster recovery and cybersecurity incident responses. Be available for at
least two yearly disaster recovery simulations, provide documentation, and
review the result
Anticipated Special Project: Assisting with and consulting in but
not limited to the following: One domain Microsoft Intune Implementation, two
separate networks SIEM integration, two separate domain Proofpoint Spam Filter
integra
Certification & Experience
Applicants must possess Cisco Certified Internetwork Expert (CCIE)
certification.
Experience in Cisco and Fortigate Firewalls. Experience configuring,
maintaining, troubleshooting,
setting up, and managing a network for Aruba Switches and Avaya VoIP is also
required.
Thanks & Regards,
Ashok L
Technical Recruiter | Reddaiah Technologies Inc.