Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
• Deep technical experience on F5 advanced WAF
• Identify and clean up unused or orphaned IP addresses on F5 BIG-IP load balancers to improve performance, efficiency, and manageability.
• Review, validate, and remove unused, duplicate, or obsolete firewall policies across HQ and DR data centers while maintaining security posture and compliance.
• Ensure firewall and load balancer changes are aligned with high availability (HA) and disaster recovery (DR) requirements.
Network & Security Assessment
• Perform a comprehensive assessment of all devices, applications, databases, and network components using public IP addresses.
• Analyze application, service, and security dependencies to determine the potential impact of IP, firewall, and load balancer changes.
• Classify firewall rules and DNS-related entries based on criticality, usage, activity level, and business relevance.
IP Addressing & DNS Governance
• Develop detailed cleanup and migration plans including sequencing, timelines, backups, and rollback procedures.
• Design and allocate private IP address ranges, ensuring compatibility with existing network and security architecture.
• Assess and analyze DNS records to identify unused, outdated, or invalid entries related to applications and security controls.
• Remove or update invalid, obsolete, or unnecessary DNS records while ensuring no impact on applications or end users.
Secure Execution & Validation
• Execute cleanup and migration activities in a secure, controlled, and auditable manner, ensuring uninterrupted service continuity.
• Coordinate with application, systems, SOC, and operations teams to align firewall rules, NAT, routing, DNS, and access controls.
• Perform post-change testing and validation to confirm service availability, security enforcement, and performance stability.
Governance, Review & Documentation
• Establish periodic review procedures for firewall rules, F5 configurations, IP addressing, and DNS records to ensure ongoing accuracy and security.
• Ensure cleanup activities do not negatively impact applications, services, or end users.
• Maintain comprehensive documentation for all activities, including changes implemented, issues encountered, root cause analysis, and approved remediation actions.
• Support audit, compliance, and regulatory requirements through proper documentation and change tracking.
You'll no longer be considered for this role and your application will be removed from the employer's inbox.