Looking for network security engineer

0 views
Skip to first unread message

yamini

unread,
Oct 31, 2025, 9:43:25 AM (5 days ago) Oct 31
to Durga, Alfaz, Vigneshwar ITSyntax, sys1...@googlegroups.com, HOTLIST_AVAILA...@googlegroups.com, reqs...@gmail.com, jobsu...@gmail.com, us-canada-bench-s...@googlegroups.com, usj...@nvoids.com, swapnago...@gmail.com, majn...@googlegroups.com, it_jo...@googlegroups.com, hemaf...@googlegroups.com, c2c-java-...@googlegroups.com, c2c-avne...@googlegroups.com, thrinadh...@googlegroups.com, primev...@googlegroups.com, ajaxsc...@googlegroups.com, all-c2c-recr...@googlegroups.com, ash...@1pointsys.com, c2c-requirements_...@googlegroups.com, c2cdaily-req...@googlegroups.com, cma...@shorecg.com, corm-...@googlegroups.com, corp-to-cor...@googlegroups.com, corp2c...@googlegroups.com, dc...@googlegroups.com, dileepradcom-softwa...@googlegroups.com, direct-clien...@googlegroups.com, direct-itclien...@googlegroups.com, dot...@googlegroups.com, hot-list---business-analyst-dat...@googlegroups.com, it-software...@googlegroups.com, itrecr...@googlegroups.com, java_develo...@googlegroups.com, jobs-provi...@googlegroups.com, lda-...@googlegroups.com, ni...@ethosindia.biz, ocempl...@googlegroups.com, pla...@googlegroups.com, qa-c2c-re...@googlegroups.com, r...@itsyntax.com, reqcl...@googlegroups.com, requirements-...@googlegroups.com, ric...@vls-systems.com, saibersys-co...@googlegroups.com, sap-recruiters--sap-jo...@googlegroups.com, send-h...@googlegroups.com, staffing-...@googlegroups.com, tmg-st...@googlegroups.com, us-it-recruiter-...@googlegroups.com, us-it-recr...@googlegroups.com, us-it-recruite...@googlegroups.com, us-it-technical-r...@googlegroups.com, us-itv...@googlegroups.com, us-staffi...@googlegroups.com, usa-it-r...@googlegroups.com, usa-job-r...@googlegroups.com, usit-recruitmen...@googlegroups.com, wistac...@googlegroups.com, Swathi Gorla

Job Title: Network Security Engineer

Location: Mclean, VA/Richmond, VA and Plano, TX

Hybrid Location

 Visa:H1B/GC/USC 

Top Skills:

  1. Networking Concepts & Protocols:
    • Understanding of HTTPS, TLS, CIDR notation, RFC 1918 address space.
  2. Network Security Platforms:
    • Experience with internet proxy platforms like Broadcom/Symantec and Sophos.
    • Experience with firewall platforms such as Checkpoint and Palo Alto.
  3. Cloud Security Services:
    • Knowledge of cloud-based network security tools like AWS Security Groups, VPC, Azure NSG, VNET.
  4. Security Tools & Compliance:
    • Experience with firewall audit and compliance tools like Tufin.
  5. Security Certifications (Preferred but valuable):
    • AWS Certified Solutions Architect
    • CISSP
    • CompTIA Security+
    • CISM (ISACA)

 

The Domain Boundary Compliance Program exists to manage the risk associated with business applications that need to establish network connectivity between dissimilar network segment types by:

● Providing a set of allowable connectivity patterns

● Owning and operating the process for evaluating new connection requests between these dissimilar network segment types

● Processing exception requests for network connection requests that don't fall into the allowable connectivity patterns list

 

Responsibilities

● Ensure policy and configuration changes to network security platforms (initially internet proxy and firewalls) are aligned with enterprise standards, have adequate business justification, and doesn’t cause unmitigated risks or vulnerabilities before being deployed

● Work with internet proxy platforms. Identify risk categories and threat level for internet access being requested

● Maintain proxy policies such as incorporating updates as new categories or threat levels are identified, extend policies as requests are implemented, and performing periodic reviews to ensure policies are not exposing Capital One to unmitigated risk such as data loss

● Work with IP address management, exception management, document repository, intranet sites, Microsoft Excel, Google Sheets, and other tools fluidly and efficiently

● Verify connection request details against systems of record to ensure they are accurately populated, work with the customer to correct of necessary

● Respond to customer requests for information or help in a timely manner, meet customer response time SLAs

● Work with customers as needed to resolve technical issues and provide guidance for how to proceed with a connection request

● Work with proxy, network, and firewall engineering teams to resolve technical issues and develop solutions for new use cases or connection patterns

● Support exception remediation activities

● Follow documented processes and procedures for processing requests and interacting with customers

 

Preferred Skills

● 2+ years working with networking concepts including HTTPS, TLS, CIDR notation, RFC 1918 address space

● 2+ years of experience with internet proxy platforms such as Broadcom / Symantec and Sophos

● 2+ years of experience with firewall platforms such as Checkpoint and Palo Alto

● 1+ years of experience with cloudbased network security services such as AWS Security Groups, AWS VPC, Azure Network Security Groups, Azure VNET

● 1+ years of experience with firewall audit and compliance tools such as Tufin

● Professional certifications (AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP), CompTIA Security +, ISACA  CISM)





Yamini

Technical Recruiter

Email: yam...@transcendit.io

A:  25663 Smotherman Rd, Suite 302, Frisco, TX, 75033.

www.transcendit.io


     


Confidentiality Notice and Disclaimer: The information contained in this e-mail may contain privileged and/or confidential information intended only for the use of the individual or entity named above. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. Although this e-mail and any attachments are believed to be free of any virus or other defect that might affect any computer system into which it is received, it is the responsibility of the recipient to ensure it is virus free and no responsibility is accepted by Transcend IT Solutions for any loss or damage in any way from its use.




Reply all
Reply to author
Forward
0 new messages