Network & Security specialist (Cisco | CheckPoint | F5)

Mám zájem

Typ

Permanent

Úvazek

Full time

Finance

90.000 - 110.000 CZK

Lokalita

Hlavní město Praha
Hybrid

ID

STQ_489_JOB


About our client

Leading international technology company specializing in the development and operation of payment systems. They rank among the most significant global providers of payment solutions — their technology and services are used daily by millions of customers and businesses across continents.

The company continuously invests in innovation, including blockchain and digital currency technologies, to ensure secure and reliable real-time transaction processing.
The Prague team manages core systems that handle payment authorization and processing. The new Network Administrator will play a key role in maintaining, securing, and further developing these mission-critical environments.

Job description

As part of the core Network & Security team, you’ll be responsible for the design, implementation, and maintenance of enterprise-grade infrastructure spanning data centers and production environments across Europe and the U.S.

Your key responsibilities:
• Administration of Cisco, CheckPoint, and F5 BIG-IP technologies (routers, switches, Wi-Fi, firewalls, load balancers).
• Management of Linux and Windows Server systems (DHCP, proxy, monitoring).
• Monitoring, troubleshooting, and incident response, including weekly on-call rotation.
• Cooperation with the Security team on upgrades, migrations, and vulnerability remediation.
• Preparing documentation and audit reports related to infrastructure compliance.
• Continuous improvement of network reliability, performance, and resilience.

You will collaborate daily with colleagues from Europe, and the U.S., supporting a 24/7 enterprise environment.

Requirements

Requirements
• Minimum 4+ years of experience as a Network Administrator or Engineer.
• Strong knowledge of network protocols, VPN, and security best practices.
• Hands-on experience with CheckPoint, Cisco, and F5 BIG-IP LTM.
• Solid Linux administration skills.
• Familiarity with network monitoring and management tools.
• Communicative English; proficiency in Czech or Slovak required.

Offer & Terms

• Annual performance bonus: up to 10 % of annual salary.
• Allowance CZK 18,000 / year for vacation, sports, or leisure activities.
• 5 weeks of vacation + 5 additional paid days off.
• Meal vouchers fully covered by employer.
• Pension contribution
• Flexible working hours and hybrid mode (up to 3 days home office per week).
• Language courses available if needed.
• Mental health care
• Online medical service
• Office refreshments and snacks provided.

More information

Interested?
Apply now and speak with a senior IT recruiter who understands both the technology and the people behind it.

Please note: This position is open only to candidates eligible to work in the EU without visa sponsorship, residing in the Czech Republic long-term, with proficiency in Czech or Slovak.

Mám zájem
Mám zájem

Podobné pozice


Network Security Engineer / Architect (NDR)

Lokalita

Hlavní město Praha
Hybrid

Typ

Permanent
Contract

Obor

Networks / Security

Finance

90.000-140.000 CZK

Česká technologická společnost specializovaná na kybernetickou bezpečnost, která více než deset let poskytuje služby v oblasti bezpečnostního monitoringu, detekce hrozeb a provozu SOC. Pokrývá celý cyklus bezpečnostních řešení – od architektonického návrhu a implementace, přes migrace a integrace, až po dlouhodobý provoz, konzultační podporu a rozvoj bezpečnostních služeb. Tým odborníků pracuje napříč doménami SIEM, SOAR, EDR/XDR, NDR, Data Security, network visibility, threat hunting a vulnerability & patch managementu. Technologicky staví na širokém portfoliu platforem, například IBM QRadar, Palo Alto XSIAM/XDR ekosystému, Fortinet SecOps, SentinelOne, Greycortex nebo Flowmon, doplněných o vlastní nástroje a interní know-how. Přístup společnosti je postavený na kombinaci Threat Intelligence, Purple Teamingu a proaktivního vyhledávání hrozeb. Projekty probíhají v prostředí velkých enterprise organizací i subjektů kritické infrastruktury, s důrazem na odbornou kvalitu, technologickou nezávislost a úzkou spolupráci se zákazníky.• Praktická zkušenost s návrhem, implementací nebo provozem řešení typu NDR / Network Detection & Response. • Silná orientace v síťových technologiích – TCP/IP, routing, switching, VLAN, VPN, firewalling, DNS, proxy, load balancers. • Schopnost analyzovat síťový provoz (PCAP, NetFlow/IPFIX, metadata, TLS handshake, DNS anomálie). • Zkušenost s některou z NDR platforem (např. Darktrace, Vectra, ExtraHop, Corelight, Cisco Secure Network Analytics nebo obdobné řešení). • Schopnost navrhovat architekturu sběru síťových dat (SPAN/TAP, flow export, cloud traffic mirroring). • Tvorba a ladění detekční logiky nad síťovou telemetrií (anomálie, laterální pohyb, C2 komunikace, exfiltrace dat). • Orientace v MITRE ATT&CK a schopnost mapovat síťové indikátory na konkrétní techniky útoku. • Zkušenost s integrací NDR do SIEM / XDR ekosystému a definice korelačních scénářů. • Schopnost vést technickou diskusi se zákazníkem – návrh detekční strategie, umístění senzorů, optimalizace viditelnosti. • Zkušenost s incident analysis na síťové vrstvě (threat hunting, forenzní analýza komunikace). • Přehled v oblasti šifrování a jeho dopadu na viditelnost (TLS inspection, JA3 fingerprinting, metadata-based detection). • Schopnost pracovat samostatně a nést odpovědnost za rozvoj NDR kompetence. • Angličtina pro technickou komunikaci.Náplň práce • Návrh a rozvoj řešení v oblasti Network Detection & Response (NDR) a network visibility, včetně posouzení vhodnosti technologií (např. Flowmon, Greycortex a další) a jejich integrace do širší bezpečnostní architektury. • Architektonický návrh monitoringu síťové komunikace – segmentace, sběr flow dat (NetFlow/IPFIX), analýza anomálií a laterálního pohybu. • Konzultační podpora zákazníků při návrhu síťové detekční strategie a optimalizaci stávajících bezpečnostních opatření. • Odborné vedení projektů zaměřených na implementaci NDR řešení, integraci do SIEM/XDR ekosystému a rozvoj detekčních use-case scénářů. • Tvorba a validace detekční logiky nad síťovými toky a metadaty, návrh korelačních scénářů napříč síťovou a aplikační vrstvou. • Zapojení do threat hunting aktivit zaměřených na síťové anomálie a pokročilé útoky. • Spolupráce s týmy infrastruktury (network, firewall, proxy, IDS/IPS) při návrhu bezpečnostní architektury. • Integrace NDR výstupů do SIEM a SOAR workflow pro automatizaci reakce. • Podíl na rozvoji Network Detection kompetence v rámci společnosti – technologický směr, metodika, přenos know-how.Pozice je vhodná pro technicky zaměřené specialisty, konzultanty i architekty. Otevřená je zkušeným mediorům i seniorům, kteří mají přehled napříč moderními bezpečnostními technologiemi. Pozice je nabraná přímo s vedením společnosti a technickými experty, takže dostanete přesné informace o reálném fungování týmu i používaných technologiích. Zaujalo? Ozvěte se! Výběrovým procesem vás provede seniorní IT recruiter s reálnou technickou a doménovou zkušeností – žádné obecné fráze, ale věcná a profesionální debata. This opportunity is open only to candidates based in the Czech Republic with valid EU work authorization and a registered EU freelance/business license (B2B). No visa sponsorship is available.

Security Operations Engineer – SIEM & Platform

Lokalita

Hlavní město Praha
Remote

Typ

Permanent

Obor

Networks / Security

Finance

90.000 - 130.000

Our client is a global technology and professional services company with a Cyber Center in Prague. The team serves enterprise clients across multiple industries and operates as a mature, production-grade security operation — not a lab, not a pilot. The Prague team is around 270 professionals. The security operations unit has ~80 people, including roughly 27 engineers who own the technical layer — SIEM platforms, detection pipelines, incident response tooling. English is the language of client-facing work; Czech is day-to-day inside the team. Why This Role Exists Now: The security operations team is expanding. Two new engineers are joining — this is one of two roles being filled at the same time. The other role goes deeper on cloud SIEM (separate ad). The team has experienced engineers who know the detection architecture well, and now is a good moment to join — the knowledge transfer opportunity is real and accessible from day one. If you've been in an MSSP environment where detection ownership stays with the vendor or a central content team — this role is built differently. Most MSSP setups give you the SIEM. This one gives you the rules.What Matters Most: We're not looking for someone who ticked every checkbox on a certification list. Three things actually matter: — SIEM hands-on time — you've worked with Splunk (SPL queries, correlation searches) or Microsoft Sentinel (KQL, analytics rules) for at least 2 years in a production environment — Linux system knowledge — you understand how logs are generated, how syslog works, what endpoint telemetry looks like — Detection thinking — you can write a correlation rule from scratch, explain why it's tuned the way it is, and recognize when a low-severity alert is worth investigating English needs to be solid for reading technical documentation and writing client-facing reports. If your background is primarily QRadar or ArcSight — that's a valid starting point. We care more about your engineering instincts than the vendor logo. Nice to Have: — Experience with Chronicle/Google SecOps — YARA-L rules, UDM data model — Familiarity with QRadar or ArcSight from client or previous employer environments — Security certifications: GCIA, CEH, CompTIA Security+, Microsoft SC-200, or Splunk Core Certified — Scripting for automation — Python, PowerShell, or bash for log parsing or playbook triggers Don't let the nice-to-haves stop you. If you have the three core things, the rest can be learned.Role / Mission: Your job is to keep the SIEM infrastructure healthy and make sure the detections it runs actually catch things worth catching. Day-to-day: monitoring and triaging alerts, maintaining log source pipelines, tuning correlation rules, and working with analysts when something escalates. You'll also write and maintain playbooks so the team doesn't reinvent the wheel during incidents. Tech context: the team runs Splunk and Microsoft Sentinel as primary platforms. QRadar and ArcSight in the mix from legacy clients. Chronicle/Google SecOps is present in some environments — knowledge there is a plus. Success in 12 months: you own your detection playbooks, you've added at least one meaningful improvement to the ingestion or detection layer, and when someone has a question about platform behavior, they come to you first. Key Responsibilities: — Monitor, triage, and investigate alerts across SIEM platforms (primarily Splunk and Microsoft Sentinel) — Build, tune, and maintain detection rules and correlation logic — SPL, KQL, or both — Maintain SIEM infrastructure: log sources, ingestion pipelines, platform health, onboarding new data feeds — Write and update incident response playbooks; support L1/L2 analysts during active investigations — Participate in on-call rotation; contribute to post-incident documentation and lessons learned What This Role Is NOT: — Not a pure L1 analyst position — you're here to engineer and improve, not just watch dashboards — Not a client-facing sales or advisory role — this is delivery, inside the engine room — Not a solo build-from-scratch project — you're joining an existing team with live infrastructure Operating Model: Standard working hours, no shift work. On-call is a shared rotation across the engineering team. Hybrid setup in Prague or fully remote is also possible. Reports to: Head of Security Engineering. English for client documentation; Czech for internal team communication. Travel is minimal.Interested? Let's Talk If this sounds like your kind of challenge, apply now — let's build something great together. Throughout the process, you'll be guided by a senior recruiter with hands-on IT experience. Straightforward, technically grounded, without unnecessary recruitment overhead. Send your CV or LinkedIn profile to or reach out via linkedin.com/in/jirisoljak Interview process: — Intro call with SITEQ recruiter — 30 minutes, we'll explain the role and client context — First interview with the team lead — get to know each other, talk about the team and day-to-day — Technical interview with a senior engineer from the security operations team — hands-on discussion, no trick questions — Offer Please note: this position is open only to candidates eligible to work in the EU without visa sponsorship, able to reside and work in the Czech Republic.

Práce v IT