Network Security Consultant

Description of the role: 

The Network Security Consultant will be responsible for implementing network and information security policies across the organization. The role holder will also assess IT- and network-related threats within and outside the organization and enforce necessary corrective actions and preventive measures.


  • Implement back up and recovery procedures, and enforce security and integrity controls.
  • Facilitate proof of concept (POC) and other business-related information security and compliance testing for applications and systems.
  • Manage and maintain the firewalls and firewall clusters across geographies.
  • Set up and deploy new firewall infrastructure, manage firewall capacity, and optimize firewall rules.
  • Provide technical support on all internal/perimeter security aspects of firewall operations (e.g., VPNs, IDS/IPS, DLP, Web Filtering, Radius), and escalate security issues to vendors.
  • Ensure disk- and file-level service and system encryption execution through support teams
  • Work with business units to ensure data is classified correctly and implement gateway and endpoint DLP frameworks and continuous monitoring mechanisms.
  • Assess, test, and select new security products and technologies, prepare cost estimates, and identify integration issues.
  • Provide 24×7 on-call support and execute maintenance activities for both planned and unplanned activities to minimize disruption to the business.
  • Test information security systems, firewalls, and upgrades, such as debugging, tracking, reproduction, logging, and resolving all identified problems, according to approved quality testing scripts, procedures, and processes.
  • Troubleshoot and provide service support in diagnosing, resolving and fixing system, application, infrastructure, hardware, and software malfunctions.
  • Establish and oversee formal risk analysis and self-assessment program for various information services systems and processes.
  • Identify, investigate, and resolve security breaches through forensic analysis. Conduct physical examinations of property to ensure compliance with security policies and regulations.
  • Conduct training programs to improve the security awareness of business users to minimize breaches and carry out security drills to identify the effectiveness of the awareness sessions and take corrective actions to fix the identified gaps.
  • Coordinate with other teams to define security best practices and conduct regular audits to identify if they are adhering to the same.
  • Be up to date with new threats and attacks and take actions to mitigate them.
  • Collaborate with security consultants, organizations, vendors, suppliers, service providers, and external resources to analyze, recommend, install, and maintain infrastructure, systems, and software security applications.
  • Work with cross-functional teams to evaluate risks, and recommend remediation solutions for identified vulnerabilities and track remediation.
  • Develop knowledge and stay updated on Security monitoring tools and processes, and design and maintain technical security controls.
  • Implement, maintain and administer information security documentation, guidelines, policies and procedures, instructions, recording and detailing operational procedures and system logs


Bachelor’s degree in computer science, information technology, engineering, or a related field with relevant certifications such as Cisco CCIE Security, CCNP Security, CISA (Certified Information Systems Auditor), CISSP(Certified Information Systems and Security Professional), or CISM(Certified Information Security Manager)


5 to 6 years of relevant experience in the design and maintenance of information security programs

Related Posts

From insights to thought-leadership

View More

Post-pandemic fashion manufacturing: Essential technology for the manufacturer

In my previous blog series I discussed how fashion companies could adapt to meet the challenges of the new normal. For the most part, I focused on brands, but the same principles apply to fashion manufacturing. In this blog post, let’s focus on how manufacturers can adapt to the new normal by achieving visibility and collaboration with the right software.

Post-pandemic fashion manufacturing: Bridging the East-West divide

Twenty years ago, I started my career at an Asian apparel manufacturer. Tech-packs would come in from big brands from the US and Europe. We would gather in meeting rooms late into the night, deciphering the documents and pulling together a sample as best we could. If the sample was approved, we would confirm delivery dates to the brand six months in advance.

Is moving to the cloud the secret to a more sustainable supply chain?

Corporate sustainability is increasingly becoming a differentiator of business performance and financial success. Not only will sustainability help the planet recover from the harm that has been inflicted by aggressive industrialization, but it will also add value to your brand by attracting eco-conscious customers who demand green products.

Drive growth and digitize your supply chain with marketplace dropshipping

Fashion and luxury brands that have adopted dropshipping and e-commerce marketplaces are geared to capitalizing on the collapse of brick-and-mortar retail. In the new digitally-centered world of e-commerce, these businesses can maximize revenue, increase market share, and offer a seamless customer experience through dropshipping marketplaces. Read more in our latest blog post written in collaboration with Absolutelabs.

The Value of Data Analytics in Fashion eCommerce

The fashion industry is easily one of the biggest players in global eCommerce. Although this giant sector has had its fair share of setbacks following the effects of the pandemic, experts are expecting a stellar recovery in the coming years.

Harmonizing retail after the pandemic

Fashion retailers can maximize sales and increase customer satisfaction by establishing a harmonized retail strategy. Read how selecting the right channels, stock fluidity, adaptable software, and analytics can help in our latest blog post.