Apple Macs, Cisco ASA (Adaptive Security Appliance), Communication Skills, Computer Security, Contract Management, Cross-Functional, Data Management, Data Sets, Disaster Recovery, Firewalls, Identify Issues, Legal, Network Administration/Management, Network Connectivity, Onboarding, Process Improvement, Purchase Orders, Purchasing/Procurement, Slack, Software Engineering, Tableau, Time Management, Vulnerability Scanners, WebEx
Job Title: Vendor Security Contractor/ Engineer
Location: Sunnyvale, CA (Hybrid)
Mode: Contract (6+ Months)
Role Overview
- We are seeking a Vendor Security Contractor with strong experience in third-party / vendor risk management and network security to support our Information Risk Questionnaire (IRQ) process and secure vendor connectivity across Public Border Zone (Public BZ) and Third-Party Border Zone (3rd Party BZ) environments. The contractor will partner across Product, Application, Engineering, Procurement, Legal, and Business teams - translating security requirements into practical guidance and steering stakeholders toward solutions that meet business needs without compromising the organization's security posture.
Responsibilities / Skill Sets Required
- Cross-Functional Collaboration - Partner with cross-functional teams to onboard third-party vendors and establish secure network access
- Network Solution Guidance - Guide business teams toward optimal network solutions while clearly communicating processes, requirements, and expectations
- Network Troubleshooting & Triage - Diagnose and resolve a wide range of network access issues with a structured, methodical approach
- Provisioning Error Investigation - Identify and track provisioning errors, facilitating timely and effective resolutions
- Vulnerability Assessment - Conduct vulnerability scans of supplier environments to ensure secure and compliant network connectivity
- Contract & PO Administration - Manage the intake and administration of contracts and purchase order onboarding
- Data Management - Log and maintain large datasets to support tracking purposes and ensure readiness for disaster recovery
- Firewall Rule Implementation - Review and implement firewall rules (Palo Alto, Cisco ASA, Fortinet) based on vendor connectivity requests, enforcing least-privilege access
Tools & Platforms - Proficiency Preferred
- Operating Environment: Mac user
- Productivity & Collaboration: Excel, Quip, Wrike, WebEx, Slack, BOX
- Analytics & Reporting: Tableau
- Security & Access: Qualys, Access Manager Admin, Halo