F5 Security Engineer

Company Name:
Request Technology-Robyn Honquest
F5 Security Engineer must be willing to travel 50%, sometimes 80 - 100%. Sometimes 20% This role involcves Pre and Post Systems support. Top skills in descending order of importance: F5, Palo Alto, Check Point, Infoblox, Aruba, Juniper, plus Cisco and Arista (SDN, general high-end networking) .Candidates will join a nimble engineering team that emphasizes autonomy and results while providing the opportunities and support to grow and advance in a high-impact position at a fast-moving, independent technology company. The Network Security Engineer must have the ability to solve complex problems in a methodological manner in customer's environments relating to network and network security related issues. Engineer will have the ability to communicate well in front of customers in a pre and post sales capacity providing assessments, network architecture, configuration, design and implementation. We are also looking for the following skills: Blue Coat Systems Riverbed FireEye Bit9 Q1 RSA Requirements- B.S. Degree or equivalent work experience - Expert F5 Networks product knowledge - Direct engineering knowledge of Blue Coat, Check Point, Fortinet, Infoblox, Juniper, Aruba, RSA, Sourcefire, VMware, Cisco among others - 5 years experience with TCP/IP network equipment - 5 years experience with advanced network security systems - Understanding of the functional aspects of key infrastructure protocols - Detailed Understanding of L1-L7 - Detailed understanding of routing - Some experience teaching in a technical training environment - Robust understanding of networking and Internet technologies and experience with complex systems troubleshooting - Ability to multi-task under stressful situations - High reading comprehension - Ability to rapidly pick up new technology and self-direct study MYK62683JR

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.