NOV - Cedar Park, TX
posted about 2 months ago
We are seeking a skilled and versatile Network Engineer with a specialization in firewalls, wireless network technologies, and Operational Technology (OT) environments. The ideal candidate will have a broad experience with various network security products, including but not limited to Fortinet, and a deep understanding of both IT and OT network security principles. This role will involve designing, implementing, and managing our hybrid IT/OT network infrastructure to ensure the highest levels of performance, security, and reliability across all operational environments. In this position, you will be responsible for designing, implementing, and managing firewall, wireless, and OT network infrastructure, ensuring seamless integration between IT and OT environments. You will configure and maintain firewalls across multiple vendors, including Fortinet (FortiGate, FortiAnalyzer, FortiManager) and other industry-leading products such as Palo Alto Networks, Cisco ASA, and Check Point. Monitoring network performance and security across IT and OT networks will be a key part of your role, as you proactively identify and resolve issues to minimize downtime and vulnerabilities. You will also develop, enforce, and regularly review network security policies and procedures, focusing on compliance and risk management in OT environments. Conducting regular network assessments, vulnerability testing, and risk analysis, particularly in OT environments that may involve critical infrastructure, will be essential. Collaboration with cross-functional IT and OT teams to integrate security solutions, improve network performance, and support operational technologies will be a significant aspect of your work. Additionally, you will provide technical support and troubleshooting for network-related issues across both IT and OT networks, document network configurations, changes, and updates, and stay up-to-date with the latest developments in network technologies, security threats, and OT-specific vulnerabilities.