Peraton
Minimum Requirements: :
TESA Experience Requirements:
Bachelor’s in Computer Science, Cybersecurity, or related field and 8 years of relevant experience, or an Associate’s and 10+ years’ relevant experience, CASP+ certification, or HS and 12+ years’ relevant experience.
Education & Experience (8140 DCWF Code 441): Certifications: DCWF: 441 - B.S. or CASP+, CCNP Security, CCSP, GCIA, GCED, GCIH, AND ONE of the following:
Network Firewall, IDS, F5-CA, F5-CTS, F5-CSE, BCCPA, CCNA, CCNP Security, CCIE Security, Cisco CyberOps Professional.
Hands-On Expertise: Minimum of 5 years designing and administering Cisco ISE in large-scale environments.
Deep understanding of 802.1X, RADIUS, TACACS+, TrustSec, Software-Defined Access.
Strong command of Cisco routing/switching, firewalls (ASA/FW-A), remote-access VPNs, IPS/IDS, F5 Big-IP, Blue Coat proxy.
Familiarity with PKI, certificate lifecycle management, and AAA integrations.
Soft Skills & Clearance: Demonstrated analytical, troubleshooting, and communication experience and capabilities.
Demonstrated ability to thrive in fast-paced, mission-critical settings.
U.S. citizenship required. Active DoD Secret security clearance.
Peraton is currently seeking an experienced Network Security Identity Engineer to join our team in Wiesbaden, Germany. Location: Wiesbaden, Germany; On-site. In this role, as the Network Security Identity Engineer, you will be joining and working with the U.S. Army Europe Regional Cyber Center (RCC-E). You will perform: Cisco ISE Platform Management: Design, deploy, configure, and maintain the Cisco Identity Services Engine (ISE) solution across a continent-wide Army Top-Level Architecture (ATLA) network. Network Access Control: Implement and enforce 802.1X authentication for wired and wireless users; develop posture-assessment policies and TrustSec segmentation strategies. AAA Services Administration: Configure and administer TACACS+ and RADIUS services for device authentication and authorization. Systems Integration: Integrate ISE with Active Directory, PKI/certificate authorities, RAVPN, and other technologies Operational Support & Troubleshooting: Provide Tier-3 technical support for identity and access incidents; troubleshoot complex authentication/authorization failures. Monitoring & Reporting: Use enterprise tools to monitor ISE health, generate detailed security-audit/compliance reports, and deliver operational intelligence to stakeholders. Documentation & Change Management: Maintain up-to-date architecture diagrams, runbooks, and standard operating procedures; participate in formal change-control processes. Collaboration & Training: Work closely with network operations personnel to resolve anomalies, share best practices, and train junior engineers on ISE essentials. #RCC-E
#J-18808-Ljbffr
Education & Experience (8140 DCWF Code 441): Certifications: DCWF: 441 - B.S. or CASP+, CCNP Security, CCSP, GCIA, GCED, GCIH, AND ONE of the following:
Network Firewall, IDS, F5-CA, F5-CTS, F5-CSE, BCCPA, CCNA, CCNP Security, CCIE Security, Cisco CyberOps Professional.
Hands-On Expertise: Minimum of 5 years designing and administering Cisco ISE in large-scale environments.
Deep understanding of 802.1X, RADIUS, TACACS+, TrustSec, Software-Defined Access.
Strong command of Cisco routing/switching, firewalls (ASA/FW-A), remote-access VPNs, IPS/IDS, F5 Big-IP, Blue Coat proxy.
Familiarity with PKI, certificate lifecycle management, and AAA integrations.
Soft Skills & Clearance: Demonstrated analytical, troubleshooting, and communication experience and capabilities.
Demonstrated ability to thrive in fast-paced, mission-critical settings.
U.S. citizenship required. Active DoD Secret security clearance.
Peraton is currently seeking an experienced Network Security Identity Engineer to join our team in Wiesbaden, Germany. Location: Wiesbaden, Germany; On-site. In this role, as the Network Security Identity Engineer, you will be joining and working with the U.S. Army Europe Regional Cyber Center (RCC-E). You will perform: Cisco ISE Platform Management: Design, deploy, configure, and maintain the Cisco Identity Services Engine (ISE) solution across a continent-wide Army Top-Level Architecture (ATLA) network. Network Access Control: Implement and enforce 802.1X authentication for wired and wireless users; develop posture-assessment policies and TrustSec segmentation strategies. AAA Services Administration: Configure and administer TACACS+ and RADIUS services for device authentication and authorization. Systems Integration: Integrate ISE with Active Directory, PKI/certificate authorities, RAVPN, and other technologies Operational Support & Troubleshooting: Provide Tier-3 technical support for identity and access incidents; troubleshoot complex authentication/authorization failures. Monitoring & Reporting: Use enterprise tools to monitor ISE health, generate detailed security-audit/compliance reports, and deliver operational intelligence to stakeholders. Documentation & Change Management: Maintain up-to-date architecture diagrams, runbooks, and standard operating procedures; participate in formal change-control processes. Collaboration & Training: Work closely with network operations personnel to resolve anomalies, share best practices, and train junior engineers on ISE essentials. #RCC-E
#J-18808-Ljbffr