Network Security Engineer

ApTask

  • Hackensack, NJ
  • $135,000 per year
  • Permanent
  • Full-time
  • 2 months ago
About Client:
The Client is a full-service law firm providing legal services across various practice areas. The firm is known for its comprehensive legal support to a diverse clientele, including businesses, individuals, financial institutions, and real estate developers. The firm serves a diverse client base, ranging from small businesses to large corporations, offering tailored legal solutions to meet the unique needs of each client.
The client is comprised of a team of attorneys with expertise in various legal disciplines. Like many law firms, it may be involved in community outreach and pro bono work, contributing to charitable causes and community development.Salary: $135K/AnnumJob Description:
  • Responsible for administration, monitoring and maintenance of the enterprise network environment including, but not limited to:
  • Ensuring the stability, availability, performance and security of the enterprise network; including, but not limited to, internal/external network security, vulnerability scanning, patching and remediation, software/firmware updates, server class operating systems, managing cloud services and other duties as assigned.
  • Planning and scheduling periodic maintenance of all networking hardware and software systems, creation of and maintenance of detailed network design drawings and configuration best practices.
Managing technologies, vendors, and products, such as:
  • Servers/Networks: Dell servers, Netapp storage, VMware, Veeam, Zerto, Cisco, co-located data centers, Microsoft Azure IaaS and Azure AD, Active Directory, VDI/Azure Virtual Desktop
  • Security tools: Microsoft 365 E5 Suite, Tenable/Nessus vulnerability management, a SIEM, Logmonitor
  • Online services: Exchange, SharePoint, Teams, OneDrive, Mimecast
  • Connectivity: WAN, VPNs, Palo Alto firewalls
  • Management tools: Intune, Configuration Manager, Citrix
  • Legal-specific software: iManage, Intapp, Litera, Elite
Responsibilities:
Network and Software Systems
  • Ensuring all “network hardware” and all end-user hardware not managed by the Firm’s Help Desk is configured, updated, and regularly maintained for optimal security and operational uptime
  • Responsible for performing semi-annual inventory of server software, hardware, firmware, creation of inventory reports, and end of life (“EoL”) or end of support (“EoS”) dates that impact yearly budgets and hardware refreshes
  • Escalation point for Help Desk and escalated support tickets
  • Responsible for diagramming entire network including internal/external IP address spaces, subnets/vlans, and networking gear Security
  • Subject matter expert (“SME”) for performing monthly internal and external vulnerability scanning; reports to Directors and CIO on any emerging threats and critical alerts/vulnerabilities. Researches and plans remediation procedures for vulnerabilities
  • Responsible for fine tuning alerting systems, such as iManage Threat Manager, Crowdstrike, Microsoft Defender for Identity and all other firm security systems
  • Responsible for auditing monitoring systems to ensure proper configuration and functionality
  • Schedules and coordinates monthly security meetings with the Firm’s Engineering team to address vulnerabilities, assign patching/remediation and follow up on post-remediation scans
  • Responsible for reviewing daily security alerts and ensuring all alerts are acted on timely and properly. Also responsible for documenting processes followed for different alert types to ensure the Firm’s Engineering team can assess and act upon alerts independently
  • Recommends policies and procedures to ensure maximum security of firm resources while maintaining end user ‘ease of use’
  • Ensures compliance of departmental policies and procedures as established within the department, including, but not limited to, change control management policies, network security policies, systems maintenance procedural policies, disaster recovery and business continuity procedural policies and system documentation policies
  • Ensures the security of the Firm’s applications, as directed by the Chief Information Officer, is properly administered throughout the enterprise
  • Responsible for managing the configuration, maintenance and testing of the applications in the Firm’s office facilities, datacenter facilities and cloud-hosted environments to ensure maximum availability
  • Schedule and coordinate with the Director of Technology Services for the timely procurement of the necessary server and network hardware components. Responsible for ensuring all faulty equipment is sent for repairs when necessary and the requisite follow-through is timely
  • Coordinates with the Directors, Managers and Staff to ensure that projects are completed efficiently
  • Provides quality customer service to all of the Firm’s staff and clients including direct end-user support from the Firm’s technical support department.
  • Contribute ideas, vision and expertise to management on any activity (current or future) that has impact to the Firm’s enterprise application systems and technology advancements. Stay current on all technology advancements in respect to their application within the Firm
  • Contribute ideas, vision and expertise to management on any activity (current or future) that has impact to the Firm’s enterprise application systems and technology advancements. Stay current on all technology advancements in respect to their application within the Firm
Non Essential Functions:
  • Responsible for communication, coordination and back up of other members of the Information Technology Department as required to service the Firm and its clients
  • Exempt position, expected to work additional hours, weekends and holidays, as required in performance of duties.
  • This position is considered essential to the function of the Firm. Therefore, attendance during Firm administrative leave and closings may be required.
  • Perform such other and/or additional duties as may be assigned from time to time
  • Support and monitor Firm policies and procedures as pertains to the Information Technology Department.
Qualification:
  • To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
  • The requirements listed below are representative of the knowledge, skill and/or ability required.
  • Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education and Experience:
  • Minimum 5 years’ experience in management, design, and implementation of network infrastructure in a heterogeneous operating system environment with hands-on experience in maintaining mission critical enterprise applications at a high level of availability.
  • Requires broad knowledge of the specialized and technical field of computer science, and business/management acumen equivalent to a complete college or university education; includes thorough skills knowledge.
  • 4-year college degree preferred, equivalent experience considered.
Technical Skills/Requirements:
  • Minimum of 5 years’ experience in the management, design and implementation of Windows computer systems.
  • Experience administering and maintaining Microsoft SQL, Microsoft Exchange, Office 365/Azure and MS Active Directory is desirable.
  • Experience with iManage document management administration, Client 3E finance management systems and Foundations system administration preferred. Proven experience supporting large number (200 or more) of end users.
General Knowledge and Abilities:
  • Previous employment managing information technology in a legal environment helpful. Ability to function as a project manager, planning and coordinating the activities of internal and external resources. Requires a high degree of diplomacy and the ability to deal with and influence persons in all types of positions relative to inside and outside contacts
  • Previous employment managing information technology in a legal environment helpful. Ability to function as a project manager, planning and coordinating the activities of internal and external resources.
  • Requires a high degree of diplomacy and the ability to deal with and influence persons in all types of positions relative to inside and outside contacts
Certifications,Licenses and Registrations:
  • Microsoft and independent security certifications preferred, but not required.
About ApTask:
Join ApTask, a global leader in workforce solutions and talent acquisition services, as we shape the future of work. We offer a comprehensive suite of offerings, including staffing and recruitment services, managed services, IT consulting, and project management, providing unparalleled opportunities for professional growth and development. As a member of our dynamic team, you'll have the chance to connect businesses with top-tier professionals, optimize workforce performance, and drive success for our clients across diverse industries. If you are passionate about excellence, collaboration, and innovation, and aspire to make a meaningful impact in the world of work, come join us at ApTask and be a part of our mission to empower organizations to thrive.Applicants may be required to attend interviews in person or by video conference. In addition, candidates may be required to present their current state or government issued ID during each interview.Candidate Data Collection Disclaimer:
At ApTask, we prioritize safeguarding your privacy. As part of our recruitment process, certain Personally Identifiable Information (PII) may be requested by our clients for verification and application purposes. Rest assured, we strictly adhere to confidentiality standards and comply with all relevant data protection laws. Please note that we only collect the necessary information as specified by each client and do not request sensitive details during the initial stages of recruitment.If you have any concerns or queries about your personal information, please feel free to contact our compliance team at .

ApTask