<p>Our client is looking for a skilled <strong>Network Engineer </strong>to join our team in Davenport or Burlington, Iowa. In this role, you will be responsible for ensuring the stability, security, and efficiency of our IT infrastructure. This position offers an opportunity to apply your technical expertise to optimize network operations and support a wide range of critical systems. Email your resume directly to Shania Lewis - Technology Recruiting Manager at Robert Half (email information is on LinkedIn). Let's talk!!</p><p><br></p><p><strong>Responsibilities:</strong></p><ul><li>Troubleshoot complex network issues to ensure smooth operations</li><li>Design and implement networking hardware and services</li><li>Monitor network performance and address disruptions proactively</li><li>Maintain strong security protocols (firewalls, encryption, etc.)</li><li>Keep network documentation up to date</li><li>Communicate project updates and network status to stakeholders</li><li>Collaborate with teams to resolve technical challenges</li><li>Manage systems like Microsoft 365, Active Directory, and servers</li><li>Configure and maintain routers, switches, and other devices</li><li>Optimize backup and disaster recovery strategies</li></ul>
<p>We are looking for a skilled Technical Project Manager to oversee network-related initiatives and ensure their successful execution by bridging the gap between technical teams and client-facing operations. This role involves managing project scope, timelines, and deliverables while fostering collaboration between technical teams and clients. Based in Davenport, Iowa, this position requires expertise in IT project management and a strong understanding of network technologies. To learn more, APPLY now, call 319-362-8606, or email your resume direct to: Shawn M Troy - Technology Practice Director with Robert Half (email information is on LinkedIn).</p><p><br></p><p>Responsibilities:</p><p><br></p><p>• Define project scope, deliverables, and timelines for network-related initiatives such as infrastructure upgrades and firewall deployments.</p><p>• Develop comprehensive project plans and coordinate resources across multiple clients.</p><p>• Facilitate clear communication between technical teams and clients, translating technical requirements into business terms.</p><p>• Provide regular updates to stakeholders, ensuring alignment with project goals and client expectations.</p><p>• Collaborate with network engineers to review designs, implementation plans, and testing outcomes.</p><p>• Identify potential risks and develop strategies to mitigate downtime, security vulnerabilities, or other issues.</p><p>• Coordinate resources, including personnel and tools, to ensure adherence to SLAs and KPIs across concurrent projects.</p><p>• Maintain detailed project documentation, including network diagrams, change logs, and post-implementation reviews.</p><p>• Monitor project budgets and performance metrics, reporting outcomes to clients and internal stakeholders.</p>
<p>This role supports the daily operations of an established Information Security Program, focusing on compliance, risk identification, vulnerability remediation, and strengthening security controls. The analyst will lead security-focused initiatives and collaborate across departments to enhance the organization’s overall security posture.</p><p>Key Responsibilities:</p><ul><li>Analyze security alerts from SIEM, EDR, and other tools to identify threats and escalate incidents.</li><li>Investigate phishing attempts and coordinate remediation efforts.</li><li>Conduct threat intelligence analysis and proactive threat hunting.</li><li>Collaborate with IT, Fraud, and Risk teams to improve security practices.</li><li>Support vulnerability management and remediation efforts.</li><li>Contribute to the development and refinement of security policies and procedures.</li><li>Evaluate security controls against internal standards and regulatory frameworks (e.g., GLBA, FFIEC, PCI-DSS, NIST CSF).</li><li>Act as a subject matter expert for one or more security applications.</li><li>Participate in third-party assessments and internal projects to ensure security requirements are met.</li><li>Provide technical expertise to strengthen the Information Security Program.</li></ul><p>Collaboration & Communication:</p><ul><li>Work with technical and non-technical stakeholders to explain security concepts and manage risks.</li><li>Engage in incident response efforts with IT and business teams.</li><li>Promote security awareness across departments.</li><li>Coordinate with vendors and third parties for tool management and risk evaluations.</li></ul><p>Decision-Making:</p><ul><li>Exercise analytical judgment and problem-solving in daily operations.</li><li>Escalate complex or strategic decisions to management.</li></ul><p>Required Experience & Skills:</p><ul><li>Bachelor’s degree in Information Security, Computer Science, or related field; or equivalent experience.</li><li>Minimum 3 years in IT, InfoSec, Audit, Risk, or Compliance (related fields like law enforcement or finance may be considered).</li><li>Proficiency in Microsoft Windows and Office applications.</li><li>Experience in regulated environments; knowledge of financial industry frameworks preferred.</li><li>Subject matter expertise in at least one InfoSec domain (e.g., SIEM, endpoint protection, risk analysis).</li><li>Understanding of system hardening, patching, malware defense, networking fundamentals.</li><li>Strong communication skills for audit and compliance interactions.</li><li>Foundational security certifications preferred (e.g., Security+, CySA+, CISA, CISM).</li></ul><p><br></p>
• Someone who can install Linux operating systems, understands how to use Linux and BASH commands<br>• VM experience – creating virtual machines using VM Ware or Hyper-V <br>• Azure Cloud – VMs on Azure Cloud, Administering Azure Cloud <br>• Light bash scripting, would be nice<br>• MySQL – from the perspective of configuration (not developing or anything) set it up, configuring it, how to manage the disks for it, how to monitor it how to back it up<br>• Tomcat web server - from the perspective of configuration (not developing or anything) set it up, configuring it, how to manage the disks for it, how to monitor it how to back it up<br>• Doesn’t want people who have just set up users and passwords