£575 Per day
Outside
Onsite
England
PLEASE ONLY APPLY IF YOU HOLD ACTIVE SC CLEARANCE
iO Associates have partnered with a defence consultancy on the search for an SC Cleared Network Architect to start with them ASAP. This role would be a part-time role working 3 days a week with a occasional travel to Andover.
Duration: 6 Months
Location: Remote with occasional travel onsite in Andover
Day Rate: 550- 575 per day Outside IR35
ESSENTIALS
- Experience in Network Architecture
- Experience in the development of technical user requirements
- Understanding of Architecture Solution Design, Pattern expertise within architectural principles, protocols and codex.
- An understanding of Network Protective Monitoring (NPM) and relevant architecture (NB - NPM Lead covered in another role)
- SC Clearance
- With Hybrid working, mainly WFH with occasional visits to Andover.
Work will include:
- Network infrastructure details: Gather information about the network infrastructure that will be monitored. This includes details such as network topology, devices (routers, switches, firewalls), servers, applications, and their interconnections.
- Management Information (MI): Determine the performance metrics that are important for monitoring the network. This may include metrics like bandwidth utilization, latency, packet loss, error rates, throughput, response time, and availability.
- Alerting and notification requirements: Identify the criteria and thresholds for generating alerts and notifications. Determine the urgency, severity levels, and the preferred notification methods (email, SMS, dashboard, etc.) for different types of network events or anomalies.
- Logging and reporting requirements: Determine the logging and reporting needs, such as the types of logs to be captured, the level of detail required, and the frequency and format of reports. Consider compliance and regulatory requirements if applicable.
- User interface and accessibility requirements: Understand the user interface preferences, ease of use requirements, and accessibility needs of the network monitoring system users. Consider factors like the level of technical expertise of the users and their preferred methods of interacting with the system.