• Consultant - Security and Networking

    Location IL-Raanana
    Posting date 2 weeks ago(10/3/2018 7:24 AM)
    Job ID
    65478
    Category
    Consulting, Information Technology, Quality Engineering, Solution Architecture, Systems Engineering
  • Company Description

    At Red Hat, we connect an innovative community of customers, partners, and contributors to deliver an open source stack of trusted, high-performing solutions. We offer cloud, Linux, middleware, storage, and virtualization technologies, together with award-winning global customer support, consulting, and implementation services. Red Hat is a rapidly growing company supporting more than 90% of Fortune 500 companies.

    Job summary

    The Red Hat Consulting team is looking for a Consultant of Security and Networking to join us in Ra'anana, Israel. In this role, you will promote the adoption of Red Hat's solutions in our key enterprise accounts, government agencies, and service provider partners. Through a series of interactions both in person and remotely, you'll win the trust and confidence of customers' engineering, development, and operations teams by aligning their requirements and use cases with the functional capabilities of Red Hat's solutions. As a Consultant, you'll discuss all the security aspects of Red Hat's infrastructure solutions and matching them to customers' needs.. We'll need you to have a thorough working knowledge of and direct experience with cloud architectures and their security requirements.

    Primary job responsibilities

    • Assume a key role in developing and refining the information risk and security strategy for cloud environments based on Red Hat technologies
    • Routinely assess the design of Red Hat‘s core offerings, e.g., Red Hat Enterprise Linux (RHEL), Red Hat OpenStack Platform, Red Hat Virtualization, Red Hat Satellite, cloud computing and continuous delivery (Ansible, Puppet, Foreman, etc.)
    • Serve as a subject matter expert at the client site, addressing the technical, developmental, or strategic IT needs
    • Manage problem identification, system architecture definition, software specification, and design, testing, and deployment of complex open source solutions
    • Adapt to changing customer requirements
    • Respond to incidents, escalations, and exceptions in a professional manner
    • Develop and maintain strategic relationships with stakeholders, both internal and external
    • Use an extensive knowledge of the security landscape and threat intelligence to inform the information security program
    • Consult on architectural and technical solutions for security controls to meet security requirements
    • Participate in architectural reviews of solutions and provide concrete feedback and specific recommendations for technical security controls
    • Ensure professional growth through participation in professional organizations, seminars, user groups, and industry events
    • Educate technical subject matter experts on the implementation of security controls from both a technical and business perspective
    • Display pragmatism in balancing the implementation of security controls with time-to-market taking into account business risk

    Required skills

    • 5+ years of experience in the information security field, with a minimum of 2+ years of experience in security architecture, risk assessment, threat intelligence
    • Excellent communication and interpersonal skills, including the ability to communicate with a variety of project stakeholders
    • Experience developing reusable solutions to meet the requirements of specific information security and data protection requirements
    • In-depth understanding of enterprise and cloud security technologies
    • Ability to constantly learn about new technologies and apply these concepts to customer needs
    • Ability to design and build lab environments
    • Willingness to travel to customer sites
    • Comfortable working with highly distributed teams
    • Good language skills in English
    • Motivated and engaged professional with enterprise risk and security background

    The following is considered a plus:

    • Certified Information System Security Professional (CISSP), Certified Information Privacy Professional (CIPP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CSIRC) or similar credentials
    • Experience in securing cloud environments like Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP)
    • Knowledge of either cloud networking (SDN) or storage (object and block) disciplines and DevOps models and technologies
    • Classification


    Red Hat is proud to be an equal opportunity workplace and an affirmative action employer. We review applications for employment without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, ancestry, citizenship, age, veteran status, genetic information, physical or mental disability, medical condition, marital status, or any other basis prohibited by law.


    Red Hat does not seek or accept unsolicited resumes or CVs from recruitment agencies. We are not responsible for, and will not pay, any fees, commissions, or any other payment related to unsolicited resumes or CVs except as required in a written contract between Red Hat and the recruitment agency or party requesting payment of a fee.

     

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed