Gulf Power Alliance logo
Gulf Power Alliance Careers

Gulf Power Alliance

Gulf Power Alliance

Job Description:We are seeking a highly skilled and experienced Senior Network Security Engineer with deep expertise in Fortinet security solutions to lead and enhance our cybersecurity infrastructure. This role involves designing, implementing, and maintaining advanced security systems, mentoring junior engineers, and ensuring the highest standards of network protection in a dynamic Telco environment. Key Responsibilities:Lead the design, deployment, and optimization of Fortinet security solutions including FortiGate, FortiAnalyzer, FortiManager, FortiMail, FortiNAC, FortiAI, FortiSandbox, and FortiWeb including NDR, AntiDDOS technology.Architect and manage complex firewall environments with VDOMs, HA, SD-WAN, NAT, and VPN technologies (Dialup, IPsec, Remote IPsec, SSL VPN).Oversee network monitoring and reporting using FortiAnalyzer and FortiManager; deliver actionable insights and executive-level reports.Perform and supervise firmware upgrades, patches, and backups across Fortinet devices.Conduct advanced troubleshooting and root cause analysis for network security incidents, including packet-level diagnostics using Wireshark.Configure and manage dynamic routing protocols such as BGP, including route maps and ACLs.Implement Zero Trust Network Access (ZTNA) strategies and web application security profiles.Design and manage proxy and reverse proxy architectures for secure web traffic.Utilize network sniffing and traffic analysis tools for proactive threat detection and response.Integrate and operate NDR for behavioral analytics and threat intelligence.Ensure compliance with internal security policies and external regulatory standards.Maintain and review detailed documentation for configurations, incidents, audits, and infrastructure changes.Stay abreast of emerging cybersecurity threats, technologies, and best practices.Interpret and contribute to High-Level and Low-Level Designs (HLD/LLD) for enterprise infrastructure.Mentor junior engineers and contribute to team knowledge sharing and skill development.

Posted 8 months ago

Real-Time “eyes on glass” Monitoring security alerts from SIEM tools and log management systems, identifying potential threats and anomalies.Conduct initial triage on security incidents, gathering relevant information to assess the severity and potential impact.Performing triage of incoming alerts (initial assessing the priority of the event, initial qualification of incident to determine risk and damage)Document incidents and responses in a detailed manner, creating a clear record of events for future analysis and reporting.Collaborate with L2 and L3 analysts to escalate incidents that require advanced investigation or specialized expertise.Perform regular vulnerability assessments, scanning systems and networks to identify weaknesses and recommend remediation steps.Stay updated on the latest cybersecurity threats and trends, sharing insights with the team to enhance overall security posture.Assist in the development and maintenance of incident response plans, ensuring readiness for potential security breaches.Participate in security training and awareness programs, educating end-users on best practices to prevent security incidents.Utilize threat intelligence feeds to enrich alerts and enhance the detection of emerging threats.Support compliance and auditing efforts by ensuring security measures align with industry standards and regulatory requirements.Provide remediation/countermeasure recommendations, if applicableAdjust alert prioritization options based on security incident criticalityShould be able to work in shifts 24x7

Posted a year ago

Real-Time “eyes on glass” Monitoring security alerts from SIEM tools and log management systems, identifying potential threats and anomalies.Conduct initial triage on security incidents, gathering relevant information to assess the severity and potential impact.Performing triage of incoming alerts (initial assessing the priority of the event, initial qualification of incident to determine risk and damage)Document incidents and responses in a detailed manner, creating a clear record of events for future analysis and reporting.Collaborate with L2 and L3 analysts to escalate incidents that require advanced investigation or specialized expertise.Perform regular vulnerability assessments, scanning systems and networks to identify weaknesses and recommend remediation steps.Stay updated on the latest cybersecurity threats and trends, sharing insights with the team to enhance overall security posture.Assist in the development and maintenance of incident response plans, ensuring readiness for potential security breaches.Participate in security training and awareness programs, educating end-users on best practices to prevent security incidents.Utilize threat intelligence feeds to enrich alerts and enhance the detection of emerging threats.Support compliance and auditing efforts by ensuring security measures align with industry standards and regulatory requirements.Provide remediation/countermeasure recommendations, if applicableAdjust alert prioritization options based on security incident criticalityShould be able to work in shifts 24x7

Posted a year ago

Posted 2 years ago

Description:The Cyber Security Center Operation Manager has direct technical responsibility of the Cyber Security Center operations. The objective is to monitor and continually improve the service quality and achieve and exceed the quality and timeliness metrics. The Cyber Security Center Operations Lead coordinates and leads the response with client response groups. Cyber Security Center operations manager evaluates the provided SecOps services, monitoring, detection and response services through the development of periodic reports and dashboard. Supervisory responsibilities include monitoring performance, coaching for improvement, and providing feedback to CSC team members. Cyber Security Operations manager adheres to policies and procedures and creates strategies to enhance cyber security status and drive quality and performanceResponsibilities:• Lead the Cyber Security Center services and capabilities• Lead the escalation and response of security incidents• Lead the escalation and response of SecOps performance and availability incidents• Drive the request fulfilment and change management process for SecOps• Drive the response procedures in order to minimize the impact of identified threats and align them with deployed use cases• Oversee the activities of the provided service, ensuring that activities of the SecOps and CSC are performed in according to defined scope, and security best practices.• Provide information and tactical guidance during incidents• Evaluate existing technical capabilities and systems and identify opportunities for improvement• Manage and deliver reports, dashboards, metrics, SLAs, KPI’sQualification:• Excellent people-management skills• Ability to work in a high stress environment• Previous experience in managing SOC environment• Knowledge of SIEM, SOAR and TIP• Understanding of service-related performance metrics• Strong analytical and problem-solving skills• Effective verbal and written communication skillsExperience:• Between 8 to 15 (6-10 Experience on SOC Manager Role)

Posted 2 years ago