Analysis Method: NICE Framework Mapping
Analysis of position description: (Analysis generated using: claude)
This position is responsible for engineering, implementing, administering, and supporting an enterprise IT network infrastructure spanning on-premises and cloud components. Key responsibilities include Tier 2 support of LAN/WAN systems, collaborating with business stakeholders, ensuring network security and availability, and following IT operational excellence standards.
4/9/25, 11:23 AM
Job Bulletin
1/3
Network Infrastructure Engineer II
SALARY
$94,740.00 - $146,844.00 Annually
LOCATION
JOB TYPE
Regular/Full-Time
REMOTE
EMPLOYMENT
Flexible/Hybrid
JOB NUMBER
686
DEPARTMENT
Information Technology
OPENING DATE
02/07/2025
FLSA
Exempt
BARGAINING UNIT POT NON
ANTICIPATED
$102,673 - $120,792 depending on
STARTING SALARY qualifications
Job Summ6ry
Anticipated hiring salary is between $102,673 - $120,792 depending on qualifications
This position is responsible for the engineering, implementation, administration, and support of an enterprise-class IT
network infrastructure, utilizing high-level skills with standardized network hardware and software. This role will require
partnering with other team members to promote and build significant collaboration and partnerships, including being the
backup resource for other network technologies as assigned e.g. physical security (Video, Gates etc.) and other related
Control Systems.
The IT network landscape encompasses a mix of on-premises and cloud-based components, including network routers,
switches, firewalls, VPNs, VoIP/telephony systems, and Microsoft's Active Directory, DHCP, and DNS services. This role
requires the ability to navigate through this complex architecture, adopt an Infrastructure as a Service (IaaS) approach, and
enhance the system's efficiency through software-defined solutions like SD-WAN and the principles of Infrastructure as
Code (IaC).
Responsibilities for the security of our infrastructure as assigned to this role and delivering and maintaining a secure
network is at the core of our culture.
Essenti6l Functions
Supports multi-protocol routers, multi-layer switches, network devices, and network management systems.
Responsible for Tier 2 level support for installation, administration, and support of local area network and wide area
network (LAN/WAN) systems at multiple sites.
Engages and collaborates with business sponsors and stewards to address network, video management system &
cameras, gates & access controls system issues, and identify, prioritize, cost management, and plan enhancement
4/9/25, 11:23 AM
Job Bulletin
2/3
opportunities, ensuring the network infrastructure meets the service availability target of 99.99% and 4 hours for
Recovery Time Objective (RTO).
Supports and maintains the network Infrastructure and is responsible for performing security hardening of the
installation, configuration, and administration of networking components; testing, and conducting hands-on
troubleshooting the security by utilizing expert-level skills with Public Key Infrastructure (PKI), Microsoft Teams (voice),
FTP, DHCP, DNS, RDS, and endpoint protection with Windows Defender and Malwarebytes.
Co-responsible for all the endpoint protection (physical & virtual devices on-premises and in the cloud) to ensure the
security settings and the periodic updates of security signature files. Provides full disk encryption support with
BitLocker.
By following IT operational excellence standards, this position will oversee and manage the technical administration
of the assigned IT Services through the development of multi-year IT Service Roadmaps and warranty/utility metrics
with the use of IT Playbooks.
Performs within established Service Level Agreements with all lines of business and their partners. The role supports
network users following ITIL Incident, Problem, Change, and Service Request practices, providing general systems,
reporting, and technical support services.
Required Education and Experience
Bachelor’s degree in computing or technology-related field is required. An additional four (4) years of relevant experience
may be substituted for a bachelor’s degree.
A minimum of four (4) years’ progressively responsible experience supporting and troubleshooting a business network is
required.
Cisco CCNP certification is required.
Microsoft 365 Certified: Teams Administrator Associate or Teams Voice Engineer Expert and SSCP - Systems Security
Certified Practitioner (ISC2) certifications are desired.
Additional Requirements
The ideal candidate will have an expert level of proficiency in supporting:
Cisco Routers and Switches
Firewall and VPN Technologies
TCP/IP/DNS
VoIP technologies
Azure Networking
PKI
As well as extensive skills with:
Wireless technologies - Point to Point, Private 5th Generation Technologies
Microsoft Windows Server and Active Directory
Microsoft Cloud Security Services
Microsoft Teams, Hybrid and Native Cloud-Based Phone System
Azure Sentinel
Security and Vulnerability Scanning
This individual must demonstrate a caring customer service attitude, a strong commitment to operational excellence, and
dedication to the organization’s core values: Integrity & Transparency; Excellence; Adaptability; Stewardship; Teamwork &
Partnerships; Health & Safety; and Diversity, Equity & Inclusion. The Port/NWSA seek candidates who will embrace and
4/9/25, 11:23 AM
Job Bulletin
3/3
model these values both internally and externally, and who understand what it means to carry out these values in their
everyday work. We value individuals who also bring an impeccable work ethic, honesty, and integrity, and who consistently
exhibit enthusiasm, energy, and a drive to succeed.
In accordance with the Immigration Control and Reform Act of 1986, all persons offered employment must provide
acceptable proof of identity and authorization to work in the United States. Proof will be required prior to employment.
The successful candidate must possess (or obtain within 30 days of employment) a valid driver's license. Candidate must
be able to successfully complete a background investigation. Candidate must also be able to obtain/maintain a
Transportation Worker Identification Credential (TWIC), which is a program managed by the Department of Homeland
Security (DHS). Information on this program can be viewed here.
.
Generated by CHRIS (Cybersecurity Human Resource Intelligence System)
Each resource is assigned a relevance score (0-1) based on:
Found 5 relevant resources with a relevance score above 0.30:
This course module covers topics in network security policies.
This module gives a brief introduction to attacks on Industrial Control Systems (ICS). It is Module 5 of the “Cybersecurity of Industrial Control Systems” course, but the module can also be used independently.
Learning Setting: Online instruction.
Target Audience: This module is intended for graduate students in information technology, computer engineering, and computer science majors. The students may have widely varying backgrounds, so adherence to the text is important. Expect many questions of a fundamental nature during lectures.
Textbook: Industrial Network Security, 2nd Edition, Eric D. Knapp, Joel T. Langill, ISBN: 978-0-12-420114-9
Prerequisite Knowledge: Students are expected to have a good understanding and previous experience with Linux, Windows, TCP/IP networking, Cybersecurity fundamentals.
Topics include:
In cybersecurity, a threat is the potential for a negative security event to occur. This module examines common attacks against critical infrastructure including hijacking, denial-of-service attacks, malicious software, SMTP spam engines, Man-in-the-Middle (MITM) attacks, and social engineering. It explores how attacks are being conducted through users, and the different kinds of attacks that target server-side and client-side applications. The module also explores some of the common attacks that are launched against networks, CI and SCADA/Control Systems, and other CI devices today. There is a discussion of how malware is designed and configured, how it works, and the current and future impact of malware on SCADA systems. An overview of how malware like Stuxnet impacts SCADA systems serves as an example.
This module focuses on the main principles in cybersecurity: confidentiality, integrity, and availability. The module also focuses on the system security principles of identificaiton, authentication, access control, accountability.
This lesson plan introduces high school students to the exciting world of cybersecurity through a Capture the Flag (CTF) competition. Students will explore secure network protocols and encryption methods while solving challenges designed to enhance their understanding of wireless security, DNSSEC, encryption techniques, and more. Each challenge presents a scenario that requires critical thinking and practical application of cybersecurity concepts.