Home

Network Security ANALYST NO H1B Local to NJ NY at Remote, Remote, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=2296812&uid=

From:

Sonali,

Kpg99

[email protected]

Reply to:   [email protected]

Job Title: Network Security ANALYST

Duration: 3+ months - extendable

Location: Essex County, NJ (Hybrid)

We are seeking a network-savvy professional to manage and review network access requests, ensuring compliance with security policies and best practices. This individual will act as a bridge between application teams and network security, evaluating requests for validity, security risks, and technical feasibility. The role does not require deep network engineering expertise but does require a strong understanding of networking fundamentals, common ports and protocols, and the ability to assess risk in firewall change requests.

Key Responsibilities:

Review and validate network access requests from application owners, developers, and other teams.

Engage with requestors to clarify their needs and ensure requests are specific, reasonable, and adhere to security policies.

Identify high-risk or overly broad requests (e.g., requests for /8 network access, "any-any" firewall rules) and push back with more appropriate alternatives.

Collaborate with the network security team to document approved exceptions and maintain records of security exceptions.

Assist requestors in finding alternative solutions, such as leveraging proxies instead of direct firewall openings.

Ensure that request approvals do not become a bottleneck by efficiently processing and escalating as needed.

Work closely with Subject Matter Experts (SMEs) for escalations when needed.

Provide guidance to teams unfamiliar with network security policies and best practices.

Ideal Candidate Background:

Networking Knowledge: A solid grasp of common networking principles, including subnets, firewalls, routing, and protocols like HTTP, HTTPS, SSH, and RDP.

Security Awareness: Understanding of security best practices, including the principle of least privilege, network segmentation, and firewall rule implementation.

Communication Skills: Ability to engage with non-technical requestors and explain why certain requests are denied or need modification.

Problem-Solving: Capable of assessing alternative approaches to network access issues (e.g., using proxies instead of opening firewall rules).

Attention to Detail: Ability to document requests and maintain organized records of approved exceptions.

Team Collaboration: Comfortable working with network engineers, security teams, and application owners.

Common Request Scenarios:

Overly Broad Requests: A developer requests /8 access from a development network to production. This should be rejected, and a more precise access request should be recommended.

Unnecessary Firewall Changes: A team requests an outbound firewall rule to communicate with an external service when a proxy solution would work. The candidate should recognize this and suggest the proxy alternative.

Cross-Security Zone Access: A lower-security zone is requesting access to a higher-security zone (e.g., dev network to a production network with PII). This must be carefully evaluated.

Undefined Requests: A team submits a vague request without clear justification or technical details. The candidate should engage with the requestor to refine the request.

Additional Notes:

This is not a pure networking role but rather one that sits at the intersection of networking and security policy enforcement. The right candidate does not need to be a senior network engineer but should have enough knowledge to recognize bad practices and steer teams toward secure and efficient solutions.

The initial engagement is expected to last through the end of June, with potential for extension based on need and performance.

This role is really about network security governancereviewing firewall requests, pushing back on overly broad or risky changes, and helping teams refine their requests to align with security best practices.

Refining the Ideal Background

Given the responsibilities you've outlined, the right person should have:

1. Networking & Security Fundamentals

             Understanding of common ports & protocols (e.g., TCP/UDP, HTTP/S, SSH, RDP, DNS, SMB).

             Familiarity with firewall rules & access controlscan spot unnecessary any/any requests and push back.

             Knowledge of proxies & alternative solutions (e.g., "You dont need a firewall rule for that; just use the proxy").

             Network segmentation awarenessknows how to prevent low-security zones from accessing high-security ones.

2. Strong Communication & Problem-Solving Skills

             Can translate technical network concepts to application teams who dont understand networking.

             Will challenge vague or risky requests and help refine them ("What are you really trying to do").

             Works well as a liaison between dev teams and network/security teamsnot just a rubber stamp for firewall requests.

3. Ideal Professional Background

             Network Engineer (Security-Focused) Someone who has worked with firewalls, ACLs, routing, and proxies.

             Security Engineer (With Network Experience) Experience assessing firewall requests and enforcing security policies.

             IT Risk Analyst (With Networking Knowledge) Can review access control requests, enforce security policies, and document exceptions.

             Infrastructure Engineer (With Security Awareness) Someone from a sysadmin or cloud background who understands network traffic flows and security risks.

Thanks & Regards

Sonali Kumari             

Technical Recruiter

KPG99, INC

Keywords: information technology New Jersey
Network Security ANALYST NO H1B Local to NJ NY
[email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=2296812&uid=
[email protected]
View All
07:47 PM 28-Mar-25


To remove this job post send "job_kill 2296812" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 39

Location: , New Jersey