Diligent Tec, Inc
Title
Security Engineer (Mergers & Acquisitions Team)
Location Onsite - San Jose, CA (Preferring Locals)
Duration Long Term
Position Overview We are seeking a Security Engineer to support Mergers & Acquisitions (M&A) security integration. The role will architect, deploy, and maintain cybersecurity controls for newly acquired companies, ensuring secure connectivity, policy alignment, and enterprise-standard threat mitigation. The engineer will work closely with networking, infosec, system administration, and vendor teams to ensure security readiness, business continuity, and seamless operational integration.
Required Qualifications
Education:
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, Network Engineering, or related field.
Experience:
Minimum 8+ years hands‑on security engineering and security appliance administration.
Preferred Certifications
Cisco: CCNA, CCNP Security
Checkpoint: CCSA
PaloAlto: PCNSA, PCNSE, PCCET
General: CompTIA Security+
Technical Competencies
Strong understanding of TCP/IP networking, routing, VLANs, segmentation, VPN, DNS, NAT, and packet filtering.
Deep hands‑on experience securing enterprise environments using Cisco ASA/Firepower, Check Point firewalls, and Palo Alto NGFW.
Proficiency with security monitoring, EDR, DLP, SIEM, threat intelligence, and vulnerability assessment tools (Nessus, Qualys, etc.).
Knowledge of cloud networking security and virtualization (Azure, AWS, VMware NSX preferred).
Ability to follow strict enterprise standards for security appliance design, change management, configuration, documentation, and audit readiness.
Core Responsibilities Security Architecture & Deployment
Design and implement security appliances and policy frameworks to integrate acquired company networks into the enterprise environment.
Deploy and configure perimeter and internal firewalls, including rule base design, NAT policies, threat profiles, VPN configurations, DLP controls, and logging standards.
Build bills of material (BOM) for required firewall hardware and place procurement orders.
Implement approved security exceptions while maintaining compliance with internal standards.
Configuration, Operations & Maintenance
Upgrade and patch firewall operating systems and register devices with centralized management systems.
Integrate new firewalls into enterprise security consoles (Panorama, SmartConsole, Cisco FMC, etc.).
Deploy security access controls, filtering policies, and rule sets, ensuring traceability and SOC logging requirements.
Maintain auditable logs and enforce standards for least privilege access across merged environments.
Security Assessment & Monitoring
Assess existing security posture of acquired entities using vulnerability scanners, EDR platforms, and threat intelligence tools.
Execute internal and external scans, identify vulnerabilities, and drive remediation.
Monitor firewall performance, analyze system logs, manage packet inspection, and troubleshoot traffic flow issues in partnership with network teams.
Documentation & Compliance
Create detailed technical documentation including diagrams, runbooks, configuration guides, topology maps, and change control records.
Ensure all security deployments meet internal governance requirements, compliance policies, and best practices.
Collaboration & Support
Provide hands‑on technical support for troubleshooting security issues across networking, server, and endpoint platforms.
Liaise with vendors, carriers, and service providers to maintain SLAs and optimize platform configurations.
Capacity Planning & Integration Strategy
Perform security infrastructure capacity planning to support company growth and evolving business requirements.
Develop 30‑60‑90 day security integration roadmaps for new acquisitions, including phased firewall migration plans and endpoint risk remediation strategies.
Align integration activities with enterprise security architecture and prioritize high‑risk remediation tasks.
Automation & Efficiency
Automate recurring tasks such as vulnerability scans, alert correlation, firewall rule cleanup, reporting, and security control audits (Python, PowerShell, Bash preferred).
If this is aligned with your experience and you are open to exploring the opportunity further, please reply with your latest resume and availability for a discussion.
Looking forward to hearing from you.
Seniority level Mid-Senior level
Employment type Contract
Job function Information Technology
Industries IT Services and IT Consulting
#J-18808-Ljbffr
Location Onsite - San Jose, CA (Preferring Locals)
Duration Long Term
Position Overview We are seeking a Security Engineer to support Mergers & Acquisitions (M&A) security integration. The role will architect, deploy, and maintain cybersecurity controls for newly acquired companies, ensuring secure connectivity, policy alignment, and enterprise-standard threat mitigation. The engineer will work closely with networking, infosec, system administration, and vendor teams to ensure security readiness, business continuity, and seamless operational integration.
Required Qualifications
Education:
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, Network Engineering, or related field.
Experience:
Minimum 8+ years hands‑on security engineering and security appliance administration.
Preferred Certifications
Cisco: CCNA, CCNP Security
Checkpoint: CCSA
PaloAlto: PCNSA, PCNSE, PCCET
General: CompTIA Security+
Technical Competencies
Strong understanding of TCP/IP networking, routing, VLANs, segmentation, VPN, DNS, NAT, and packet filtering.
Deep hands‑on experience securing enterprise environments using Cisco ASA/Firepower, Check Point firewalls, and Palo Alto NGFW.
Proficiency with security monitoring, EDR, DLP, SIEM, threat intelligence, and vulnerability assessment tools (Nessus, Qualys, etc.).
Knowledge of cloud networking security and virtualization (Azure, AWS, VMware NSX preferred).
Ability to follow strict enterprise standards for security appliance design, change management, configuration, documentation, and audit readiness.
Core Responsibilities Security Architecture & Deployment
Design and implement security appliances and policy frameworks to integrate acquired company networks into the enterprise environment.
Deploy and configure perimeter and internal firewalls, including rule base design, NAT policies, threat profiles, VPN configurations, DLP controls, and logging standards.
Build bills of material (BOM) for required firewall hardware and place procurement orders.
Implement approved security exceptions while maintaining compliance with internal standards.
Configuration, Operations & Maintenance
Upgrade and patch firewall operating systems and register devices with centralized management systems.
Integrate new firewalls into enterprise security consoles (Panorama, SmartConsole, Cisco FMC, etc.).
Deploy security access controls, filtering policies, and rule sets, ensuring traceability and SOC logging requirements.
Maintain auditable logs and enforce standards for least privilege access across merged environments.
Security Assessment & Monitoring
Assess existing security posture of acquired entities using vulnerability scanners, EDR platforms, and threat intelligence tools.
Execute internal and external scans, identify vulnerabilities, and drive remediation.
Monitor firewall performance, analyze system logs, manage packet inspection, and troubleshoot traffic flow issues in partnership with network teams.
Documentation & Compliance
Create detailed technical documentation including diagrams, runbooks, configuration guides, topology maps, and change control records.
Ensure all security deployments meet internal governance requirements, compliance policies, and best practices.
Collaboration & Support
Provide hands‑on technical support for troubleshooting security issues across networking, server, and endpoint platforms.
Liaise with vendors, carriers, and service providers to maintain SLAs and optimize platform configurations.
Capacity Planning & Integration Strategy
Perform security infrastructure capacity planning to support company growth and evolving business requirements.
Develop 30‑60‑90 day security integration roadmaps for new acquisitions, including phased firewall migration plans and endpoint risk remediation strategies.
Align integration activities with enterprise security architecture and prioritize high‑risk remediation tasks.
Automation & Efficiency
Automate recurring tasks such as vulnerability scans, alert correlation, firewall rule cleanup, reporting, and security control audits (Python, PowerShell, Bash preferred).
If this is aligned with your experience and you are open to exploring the opportunity further, please reply with your latest resume and availability for a discussion.
Looking forward to hearing from you.
Seniority level Mid-Senior level
Employment type Contract
Job function Information Technology
Industries IT Services and IT Consulting
#J-18808-Ljbffr