Network Engineer/VPN Security Clearance
Job in
Rochester, Monroe County, New York, 14602, USA
Listed on 2026-02-12
Listing for:
ClearanceJobs
Full Time
position Listed on 2026-02-12
Job specializations:
-
IT/Tech
Cybersecurity, Systems Engineer, Network Security, Security Manager
Job Description & How to Apply Below
Secure Overlay / VPN Engineer
(Zero-Trust, NAT-Traversing Secure Connectivity) is currently seeking a Secure Overlay/VPN Engineer in Rochester, NY, Clifton, NJ, Columbia, MD Sunrise, FL ,San Diego. The Secure Overlay / VPN Engineer designs, implements, and operates identity-based, encrypted network overlays that function reliably across NAT-restricted, mobile, and unreliable transport environments. This role focuses on secure peer discovery, tunnel establishment, and resilient traffic protection across radios, edge devices, and cloud gateways.
This position treats network security as software, not as traditional firewall rule administration.
If you would like the opportunity to build systems that automatically form, maintain, and recover secure connectivity in dynamic, distributed environments, then we want to speak to you! Please apply! Core Responsibilities
Design, implement, and maintain VPN gateways and peer-to-peer secure overlay networks
Support NAT traversal, VPN hole punching, and decentralized peer discovery mechanisms
Optimize encrypted tunnels for latency, jitter, packet loss, and intermittent connectivity
Manage cryptographic identities, including key generation, rotation, and certificate life cycles
Ensure multicast and control-plane traffic can traverse encrypted overlays when required
Collaborate with SDN, routing, and platform teams to align overlay behavior with network and security policy Troubleshoot complex overlay networking issues across heterogeneous transports and endpoints
Required Technical Expertise
VPN & Overlay Technologies
Wire Guard (preferred)
Strong Swan / IPsec
Familiarity with Zero Tier / Tailscale architectural concepts
NAT Traversal & Connectivity
STUN / TURN / ICE fundamentals
UDP/TCP hole punching strategies
Experience operating across carrier-grade NAT, mobile networks, and constrained links
Security Fundamentals
Public key cryptography
Certificate-based authentication
Secure key management and automated rotation
Linux Networking
Network interface configuration and management
Routing behavior and policy-based routing
Understanding of firewall interactions with encrypted tunnels
Distributed Systems Thinking
Peer discovery and membership management
Failure detection and recovery
Autonomous reconnection and self-healing behaviors
Ideal Background
Secure communications platforms
Peer-to-peer or overlay networking systems
Telecommunications security engineering
Defense, government, or other regulated environments
What Success Looks Like
Secure overlays form automatically with minimal manual intervention
Connectivity survives NAT, mobility, and unstable transports
Cryptographic identity and trust are enforced consistently across the network
Overlay behavior aligns cleanly with routing, SDN, and security policy
No fields configured
Please contact your admin to configure this card
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×