Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion; it's a place where you can grow, belong, and thrive.
Your day at NTT DATA
Dimension Data is a proud member of the NTT Group, a global IT powerhouse headquartered in Japan. As part of NTT, we deliver a wide range of IT services and solutions to clients around the world. Although the Dimension Data brand was retired in some parts of the world in 2019, it remains well-recognized in the Middle East and Africa. Join us and become part of the NTT family as we continue to provide innovative solutions that help our clients achieve their business objectives.
Day-to-Day Responsibilities:
- Configuration And Deployment Of NGFW's:
Set up, configure, and deploy Next-Gen Firewalls (NGFWs) like FTD, Palo Alto, and Fortigate based on network requirements. Implement security policies, access control lists (ACLs), and VPN configurations. - Troubleshooting And Issue Resolution:
Monitor firewall performance, investigate alerts, and address any anomalies or security incidents. Troubleshoot connectivity issues, rule misconfigurations, and security breaches. - Security Policy Management:
Regularly review and update security policies to align with evolving threats and compliance requirements. Collaborate with stakeholders to ensure policies meet business needs without compromising security. - Performance Optimization:
Optimize firewall performance by fine-tuning configurations and rules to enhance network security and efficiency. - Vendor Interaction And Evaluation:
Engage with vendors for product updates, patches, and new feature evaluations. Research and recommend improvements or new technologies to enhance network security posture. - Deployment Of Endpoint Solutions:
Deploy and manage Endpoint Protection solutions such as Symantec and TrendMicro across the organization's devices. Ensure antivirus, anti-malware, and endpoint security software are up to date and functioning correctly. - Threat Detection And Response:
Monitor endpoint security tools for threat detection, analyzing and responding to security alerts promptly. Investigate and contain security incidents on endpoints, performing root cause analysis. - Patch Management:
Coordinate and implement patches, updates, and security fixes for endpoint protection software. Maintain endpoint compliance with security standards and best practices. - Documentation And Reporting:
Maintain detailed documentation of endpoint security configurations, incidents, and resolutions. Generate regular reports on endpoint security status, threats detected, and resolved incidents for stakeholders. - User Education And Support:
Provide guidance and support to end-users on best security practices for endpoints. Conduct training sessions or create educational materials to increase awareness of endpoint security risks. - Collaboration And Integration:
Collaborate with network and system teams for seamless integration of endpoint security solutions with overall network architecture. - F5 LTM/ASM:
Occasional Responsibilities for F5 LTM/ASM and Proxy Solutions. - Support And Consultation:
Provide guidance and support to teams managing F5 LTM/ASM configurations or troubleshooting issues. Offer expertise during critical deployments or major updates involving F5 solutions. - Ad Hoc Troubleshooting:
Assist in diagnosing and resolving complex issues related to load balancing, SSL termination, or ASM policies. - Knowledge Sharing And Training:
Conduct training sessions or workshops for team members to enhance their understanding of F5 solutions. - Proxy Solutions:
Consultation and Advice. - Assistance With Policy Implementation:
Provide support in defining and implementing proxy policies aligned with security and compliance standards. - Advisory Role In Security Measures:
Offer insights into optimizing proxy security controls or advising on security best practices for proxy deployments. - On-Demand Troubleshooting:
Assist in diagnosing and resolving critical issues related to proxy performance or security incidents.
Key Skills:
- Network Security Fundamentals:
Understanding of networking protocols, TCP/IP, OSI model, and network security principles. Strong grasp of firewall technologies, VPNs, and network access control. - NGFW And Endpoint Solutions Expertise:
In-depth knowledge of NGFW platforms like Cisco FTD, Palo Alto, or Fortigate. Proficiency in deploying, configuring, and managing endpoint security solutions such as Symantec, TrendMicro, or similar products. - F5 LTM/ASM Competency:
Proficiency in configuring and managing F5 Load Balancers (LTM) and Application Security Manager (ASM). Understanding of traffic management, SSL offloading, and web application security policies. - Proxy Solutions Proficiency:
Familiarity with proxy server solutions (e.g., Squid, Blue Coat, etc.) for content filtering, caching, and security controls. Knowledge of configuring and managing proxy policies, SSL inspection, and user authentication. - Troubleshooting And Incident Response Skills:
Strong problem-solving abilities to troubleshoot network security issues, perform root cause analysis, and mitigate security incidents promptly. - Documentation And Reporting:
Ability to maintain comprehensive documentation and generate reports on security configurations, incidents, and resolutions.
Certifications:
- Cisco Certifications:
Cisco Certified Network Associate (CCNA) Security or Cisco Certified Network Professional (CCNP) Security for NGFW expertise. - Palo Alto Networks Certifications:
Palo Alto Networks Certified Network Security Engineer (PCNSE) for Palo Alto NGFW proficiency. - F5 Certifications:
F5 Certified BIG-IP Administrator (F5-CA) for managing F5 LTM. F5 Certified Technology Specialist: Application Security Manager (F5-CTS ASM) for ASM skills. - Vendor-Specific Endpoint Security Certifications:
Certifications related to Symantec Endpoint Protection or TrendMicro Endpoint Security, depending on the solutions in use. - General Security Certifications:
CompTIA Security+, Certified Ethical Hacker (CEH) for overall security knowledge and best practices. - Proxy-related Certifications (Optional):
Certifications from vendors providing proxy solutions or certifications focusing on web security and proxy technologies.
NOTE: Must be fluent in Arabic and currently residing in Saudi Arabia.
Workplace Type:
On-site Working
About NTT DATA:
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
Equal Opportunity Employer:
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.