This job requires extensive experience in network security, including working with firewalls (Checkpoint, Palo Alto, ASA) and various proxy systems, to research, investigate, and resolve threats and vulnerabilities. Additionally, it involves selecting, designing, and implementing new security tools, requiring strong technical and communication skills.