What We'll BringAt TransUnion, we have a welcoming and energetic environment that encourages collaboration and innovation – we’re consistently exploring new technologies and tools to be agile. This environment gives our people the opportunity to hone current skills and build new capabilities, while discovering their genius.
Come be a part of our Information Security team – you’ll work with great people, pioneering products and cutting-edge technology. As a Network Security Engineer at TransUnion, you will be working with our Network Security team to increase our current network visibility which is key to meeting and providing the packet data capture & retention for cyber security and threat detection across our security tools.
What You'll BringProtecting the health and wellness of our associates and candidates considering a career at TransUnion is our highest priority. In supporting this vision, our recruitment and new hire experience for this role is fully virtual for the time being. Candidates interviewing will get to know our team over the phone and video, and this role will operate virtually upon hire until we return to the office. Even though we’re not physically together right now, our goal is to provide you a supportive candidate and new hire experience that will immerse you in our culture and set you up for success at TransUnion.
Experience with layer 2 & layer 3 Cisco switches.
Strong networking fundamentals with focus on VLANs, subnets, VPN concepts and packet captures "PCAP"
Experience with RSA Netwitness platform, Network TAPs, Ixia and Gigamon packet capture tools with strong troubleshooting skills. Adept at security monitoring, and investigation activities.
Experience with Microsoft Visio and the ability to read network diagram flow.
Strong knowledge of Information Security concepts, risk identification, assessment and reporting activities.
Ability to support the development of information security awareness training materials.
In-depth understanding of communication protocols (mainly TCP/IP) and routing protocols (e.g. BGP, OSPF). Expertize in networking firewall concepts and configuration
Support developing incident response plans. Ability to improve effectiveness in incident response practices. Be a champion of continuous improvement initiatives.
Install and tests new hardware and software releases. Evaluate and install patches, perform system upgrades and resolves security issues.
Good understanding of Linux or Cent OS command structure and experience creating shell scripts.
Knowledge and ability to support infrastructure, cloud security engineering & automation initiatives.
Able to conduct research and support development of information security policies, standards, procedures, and/or guidelines.
Provider tier 3 support as needed.
Ability to demonstrate technical knowledge and consultative skills.
Strong communication skills with ability to communicate to technical and non-technical audience. Able to perform parallel tasks, quick learner, and a team player.
Bachelor’s degree in Engineering, Computer Science or Information Technology.
We’d love to see:
5+ years of networking experience, including configuring, analyzing & troubleshooting complex TCP/IP networks at an enterprise level.
2+ years of working in a Security Operations Center (SOC).
2+ years of tier 3 network support experience.
2+ years of experience working on projects with agile methodologies.
2+ years of experience with cloud technologies like AWS, Azure, GCP.
Experience in automation using Ansible, Scripting or Puppet.
Basic understanding of the following network and security devices will be a plus: Cisco Nexus Switches, Cisco ASA VPN, F5 Networks LTM/GTM, Cisco Identity Service Engine, Cisco Firepower IDS/IPS and Bluecoat Proxy.
Certifications: CCNA R/S, CCNA Security, GCIA, GMON, CISSP.
Impact You'll MakeIn the first 90 days – Ramp up to project specifics and contribute to new NW deployments and troubleshooting issues by closely with technical leads.
Beyond 90 days – Effectively perform NW visibility work independently across TU regions with support from local resources. Participate in Tier 3 support activities and BAU as needed. Work with SOC as needed