Provides technical analysis in network security planning, engineering, and design.
Be the enterprise expert in cross-functional discipline of enterprise network and cyber security infrastructure.
Provides analysis for implementation techniques and tools for the most efficient solution to network security problems.
Maintains technical expertise in all areas of network and cyber security hardware and software interconnection and interfacing, such as routers, firewalls, Intrusion Detection/Intrusion Prevention devices, etc.
Coordinates third-party maintenance for network and cyber security equipment and troubleshoots problems with department users and department network administrators.
Evaluates potential networking products, technical solutions, and capacity requirements to meet business needs.
Validate enterprise-level network security design, newly released equipment software and operating system for vulnerabilities and deficiencies. Makes changes to mitigate the risk.
Develops advanced technological ideas and guides their development into a final product.
Reviews the customer's network security looking for opportunities to enhance security functionality, performance and reliability by utilizing the proven industry best-practices and architectures.
Provides specifications and detail schematics for unified network architecture of the enterprise.
Provides daily monitoring/detection of potential performance/throughput issue and develop risk mitigation solutions
Provide guidance to team members and provide status metrics to Government customer and Northrop Grumman management.
Provide third-level support and troubleshooting of network problems. Periodically provide after-hours and weekend support.
Become knowledgeable on the Continuous Diagnostics and Mitigation (CDM) technical requirements for CDM program.
Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products, including design of high level dashboards, using data feeds from different network tools.
Involved in a wide range of security issues including use of cyber security tools, whitelisting, blacklisting activities.
May prepare security reports to regulatory agencies.