Position: Network Infrastructure Engineer II

Report generated at: 2025-05-13 08:07:40

Analysis Method: NICE Framework Mapping

Analysis of position description: (Analysis generated using: claude)

Analysis Summary

This position is responsible for engineering, implementing, administering, and supporting an enterprise IT network infrastructure spanning on-premises and cloud components. Key responsibilities include Tier 2 support of LAN/WAN systems, collaborating with business stakeholders, ensuring network security and availability, and following IT operational excellence standards.

NICE Framework Analysis

Best Role Match

SP-NET-002 - Network Operations Specialist
Monitors and analyzes network traffic and performance to identify and respond to network issues and outages. Implements network updates and changes to ensure optimal network performance and availability.

Required Knowledge

K0001 - Knowledge of computer networking concepts and protocols, and network security methodologies
Knowledge of computer networking concepts and protocols, and network security methodologies.
Relevance: High
K0044 - Knowledge of telecommunications concepts (e
Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
Relevance: High
K0104 - Knowledge of Virtual Private Network (VPN) security
Knowledge of Virtual Private Network (VPN) security.
Relevance: High
K0332 - Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Relevance: High
K0227 - Knowledge of various types of computer architectures
Knowledge of various types of computer architectures.
Relevance: Medium

Required Skills

S0077 - Skill in securing network communications
Skill in securing network communications.
Relevance: High
S0078 - Skill in recognizing and categorizing types of vulnerabilities and associated attacks
Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
Relevance: High
S0079 - Skill in protecting a network against malware
Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
Relevance: High
S0150 - Skill in configuring and utilizing network protection components (e
Skill in configuring and utilizing network protection components (e.g., Firewalls, VPNs, network intrusion detection systems).
Relevance: High
S0162 - Skill in configuring and utilizing computer protection components (e
Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).
Relevance: High

Key Tasks

T0035 - Coordinate with systems administrators to manage and secure systems and applications
Coordinate with systems administrators to manage and secure systems and applications.
Relevance: High
T0065 - Identify potential conflicts with implementation of any network changes
Identify potential conflicts with implementation of any network changes.
Relevance: High
T0121 - Maintain network device configuration files
Maintain network device configuration files.
Relevance: High
T0125 - Monitor and maintain network infrastructure to ensure continuous network availability and integrity
Monitor and maintain network infrastructure to ensure continuous network availability and integrity.
Relevance: High
T0205 - Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance
Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.
Relevance: Medium

Original Position Description

4/9/25, 11:23 AM
Job Bulletin
1/3

Network Infrastructure Engineer II

SALARY
$94,740.00 - $146,844.00 Annually
LOCATION

JOB TYPE
Regular/Full-Time
REMOTE
EMPLOYMENT

Flexible/Hybrid

JOB NUMBER
686
DEPARTMENT
Information Technology

OPENING DATE
02/07/2025
FLSA
Exempt

BARGAINING UNIT POT NON
ANTICIPATED

$102,673 - $120,792 depending on
STARTING SALARY qualifications

Job Summ6ry

Anticipated hiring salary is between $102,673 - $120,792 depending on qualifications

This position is responsible for the engineering, implementation, administration, and support of an enterprise-class IT
network infrastructure, utilizing high-level skills with standardized network hardware and software. This role will require
partnering with other team members to promote and build significant collaboration and partnerships, including being the
backup resource for other network technologies as assigned e.g. physical security (Video, Gates etc.) and other related
Control Systems.

The IT network landscape encompasses a mix of on-premises and cloud-based components, including network routers,
switches, firewalls, VPNs, VoIP/telephony systems, and Microsoft's Active Directory, DHCP, and DNS services. This role
requires the ability to navigate through this complex architecture, adopt an Infrastructure as a Service (IaaS) approach, and
enhance the system's efficiency through software-defined solutions like SD-WAN and the principles of Infrastructure as
Code (IaC).

Responsibilities for the security of our infrastructure as assigned to this role and delivering and maintaining a secure
network is at the core of our culture.

Essenti6l Functions

Supports multi-protocol routers, multi-layer switches, network devices, and network management systems.
Responsible for Tier 2 level support for installation, administration, and support of local area network and wide area
network (LAN/WAN) systems at multiple sites.
Engages and collaborates with business sponsors and stewards to address network, video management system &
cameras, gates & access controls system issues, and identify, prioritize, cost management, and plan enhancement
4/9/25, 11:23 AM
Job Bulletin
2/3

opportunities, ensuring the network infrastructure meets the service availability target of 99.99% and 4 hours for
Recovery Time Objective (RTO).
Supports and maintains the network Infrastructure and is responsible for performing security hardening of the
installation, configuration, and administration of networking components; testing, and conducting hands-on
troubleshooting the security by utilizing expert-level skills with Public Key Infrastructure (PKI), Microsoft Teams (voice),
FTP, DHCP, DNS, RDS, and endpoint protection with Windows Defender and Malwarebytes.
Co-responsible for all the endpoint protection (physical & virtual devices on-premises and in the cloud) to ensure the
security settings and the periodic updates of security signature files. Provides full disk encryption support with
BitLocker.
By following IT operational excellence standards, this position will oversee and manage the technical administration
of the assigned IT Services through the development of multi-year IT Service Roadmaps and warranty/utility metrics
with the use of IT Playbooks.
Performs within established Service Level Agreements with all lines of business and their partners. The role supports
network users following ITIL Incident, Problem, Change, and Service Request practices, providing general systems,
reporting, and technical support services.

Required Education and Experience

Bachelor’s degree in computing or technology-related field is required. An additional four (4) years of relevant experience
may be substituted for a bachelor’s degree.

A minimum of four (4) years’ progressively responsible experience supporting and troubleshooting a business network is
required.

Cisco CCNP certification is required.

Microsoft 365 Certified: Teams Administrator Associate or Teams Voice Engineer Expert and SSCP - Systems Security
Certified Practitioner (ISC2) certifications are desired.

Additional Requirements
The ideal candidate will have an expert level of proficiency in supporting:
Cisco Routers and Switches
Firewall and VPN Technologies
TCP/IP/DNS
VoIP technologies
Azure Networking
PKI
As well as extensive skills with:

Wireless technologies - Point to Point, Private 5th Generation Technologies
Microsoft Windows Server and Active Directory
Microsoft Cloud Security Services
Microsoft Teams, Hybrid and Native Cloud-Based Phone System
Azure Sentinel
Security and Vulnerability Scanning

This individual must demonstrate a caring customer service attitude, a strong commitment to operational excellence, and
dedication to the organization’s core values: Integrity & Transparency; Excellence; Adaptability; Stewardship; Teamwork &
Partnerships; Health & Safety; and Diversity, Equity & Inclusion. The Port/NWSA seek candidates who will embrace and
4/9/25, 11:23 AM
Job Bulletin
3/3

model these values both internally and externally, and who understand what it means to carry out these values in their
everyday work. We value individuals who also bring an impeccable work ethic, honesty, and integrity, and who consistently
exhibit enthusiasm, energy, and a drive to succeed.

In accordance with the Immigration Control and Reform Act of 1986, all persons offered employment must provide
acceptable proof of identity and authorization to work in the United States. Proof will be required prior to employment.

The successful candidate must possess (or obtain within 30 days of employment) a valid driver's license. Candidate must
be able to successfully complete a background investigation. Candidate must also be able to obtain/maintain a
Transportation Worker Identification Credential (TWIC), which is a program managed by the Department of Homeland
Security (DHS). Information on this program can be viewed here.

.

Generated by CHRIS (Cybersecurity Human Resource Intelligence System)

Relevant Clark Center Resources

Relevance Score System Explanation

Each resource is assigned a relevance score (0-1) based on:

Found 5 relevant resources with a relevance score above 0.30:

Security policy and threats

This course module covers topics in network security policies.

Why this is relevant:
  • Strong match with NICE knowledge K0001
  • Moderate match with NICE skill S0150
  • Moderate match with NICE knowledge K0104
  • Moderate match with position description
Relevance Score: 0.48
Position Similarity
0.34
NICE Element Similarity
0.54
Combined score: 0.479 (Position: 0.338 × 0.3, NICE: 0.540 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
Attacks on Industrial Control Networks

This module gives a brief introduction to attacks on Industrial Control Systems (ICS). It is Module 5 of the “Cybersecurity of Industrial Control Systems” course, but the module can also be used independently. 

Learning Setting: Online instruction.

Target Audience: This module is intended for graduate students in information technology, computer engineering, and computer science majors. The students may have widely varying backgrounds, so adherence to the text is important. Expect many questions of a fundamental nature during lectures.

Textbook: Industrial Network Security, 2nd Edition, Eric D. Knapp, Joel T. Langill, ISBN: 978-0-12-420114-9

Prerequisite Knowledge: Students are expected to have a good understanding and previous experience with Linux, Windows, TCP/IP networking, Cybersecurity fundamentals.

Topics include:

Why this is relevant:
  • Strong match with NICE knowledge K0001
  • Moderate match with NICE skill S0150
  • Moderate match with NICE skill S0078
  • Moderate match with position description
Relevance Score: 0.47
Position Similarity
0.40
NICE Element Similarity
0.50
Combined score: 0.466 (Position: 0.398 × 0.3, NICE: 0.495 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
Mod 5: Threats

In cybersecurity, a threat is the potential for a negative security event to occur. This module examines common attacks against critical infrastructure including hijacking, denial-of-service attacks, malicious software, SMTP spam engines, Man-in-the-Middle (MITM) attacks, and social engineering. It explores how attacks are being conducted through users, and the different kinds of attacks that target server-side and client-side applications. The module also explores some of the common attacks that are launched against networks, CI and SCADA/Control Systems, and other CI devices today. There is a discussion of how malware is designed and configured, how it works, and the current and future impact of malware on SCADA systems. An overview of how malware like Stuxnet impacts SCADA systems serves as an example. 

Why this is relevant:
  • Strong match with NICE skill S0078
  • Moderate match with NICE skill S0079
  • Moderate match with NICE knowledge K0001
  • Moderate match with position description
Relevance Score: 0.46
Position Similarity
0.36
NICE Element Similarity
0.51
Combined score: 0.463 (Position: 0.364 × 0.3, NICE: 0.505 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
Cybersecurity Basics

This module focuses on the main principles in cybersecurity: confidentiality, integrity, and availability. The module also focuses on the system security principles of identificaiton, authentication, access control, accountability.  

Why this is relevant:
  • Strong match with NICE knowledge K0001
  • Moderate match with NICE skill S0162
  • Moderate match with NICE skill S0078
  • Moderate match with position description
Relevance Score: 0.46
Position Similarity
0.34
NICE Element Similarity
0.51
Combined score: 0.461 (Position: 0.338 × 0.3, NICE: 0.514 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
Classroom CTF - Exploring Secure Network Protocols

This lesson plan introduces high school students to the exciting world of cybersecurity through a Capture the Flag (CTF) competition. Students will explore secure network protocols and encryption methods while solving challenges designed to enhance their understanding of wireless security, DNSSEC, encryption techniques, and more. Each challenge presents a scenario that requires critical thinking and practical application of cybersecurity concepts.

Why this is relevant:
  • Moderate match with NICE knowledge K0001
  • Moderate match with NICE skill S0077
  • Moderate match with NICE skill S0150
  • Moderate match with position description
Relevance Score: 0.45
Position Similarity
0.34
NICE Element Similarity
0.49
Combined score: 0.445 (Position: 0.343 × 0.3, NICE: 0.489 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →