State: WA Career Level: 2 Category: 15-1000 Occupation: 15
|
Skills: Performed operating system upgrades without impacting users, on all routers, switches, compute and storage, AP devices, load balancers, and other infrastructure hardware components as applicable in the computing environment.
Used and maintained SOPs and performance management procedures documents to operate and maintain the infrastructure.
Adhering to network administration requirements and policies, network systems management and troubleshooting (e.g., performance, problem, change and capacity monitoring), bandwidth management, protocol usage statistics (e.g., identify top talkers by protocol).
Procedures to ensure all services are operating as intended. Execution of network monitoring and problem management procedures, including responding to escalation thresholds that don’t comply with requirements and adhere to defined policies. Education: 2 Requirement: Title: Network Engineering Description: Experience with implementing/managing the implementation and configuration of all infrastructure components, applications, hardware, and tools including but not limited to the following:
Oversee the collocation and integration of multiple cloud platforms and ensure robust, secure connectivity between them.
Manage the procurement and provisioning of 4G LTE/5G, WAN broadband, DSL, fiber, and direct internet access circuits. Coordinate with service providers, negotiate contracts, and ensure timely installation and setup.
Design, deploy, and manage SD-WAN solutions. Monitor SD-WAN performance, ensuring optimal routing and redundancy. Configure traffic prioritization and Quality of Service. Integrate SD-WAN with multi-cloud services. Design failover strategies for SD-WAN based networks.
Experience and understanding of zero trust security model applied to SD-WAN and SASE. Experience with cloud-native security solutions, including Secure Web Gateway, Cloud Access Security Broker (CASB), and Zero Trust Network Access (ZTNA).
Ability to develop granular security policies based on user, device, location, application, and data to ensure secure access across the network.
|