Note:
Active Secret clearance required
Key Responsibilities
- Administer and support Palo Alto Networks NGFWs in production environments. This includes creating maintaining and analyzing Palo Alto Networks NGFW traffic reports to support internal security analysis and operational decision-making.
- Manage centralized configuration and operations using Panorama (templates device groups policy push commits and upgrades as applicable).
- Implement blocks and directives (e.g. mandated deny policies emergency blocks and governance-driven changes) with clear validation and rollback planning.
- Build and maintain rules leveraging App-ID including application-based segmentation and least-privilege access patterns. This also includes converting legacy firewall rulesets to App-ID rulesets in order to improve visibility control modernization and effectiveness.
- Develop tune and maintain Palo Alto Networks security profiles to balance production traffic requirements with organizational risk tolerance.
- Ensure firewall configurations align with security requirements (hardening logging standards auditing and control evidence as required). Recommend/implement changes if intended requirements/security outcomes are not met.
Qualifications
- At least 5 years experience with hands-on administration Palo Alto Networks firewalls in an enterprise environment. Additional networking experience outside of Palo Alto does not count towards this requirement but additional networking experience is beneficial/preferred.
- Demonstrated experience with Panorama administration and centralized policy management.
- Strong working knowledge of App-ID and designing/enforcing application-based rules.
- Proven ability to execute rule optimization and implement/validate deny blocks and operational directives.
- Experience developing and maintaining policy-based rules aligned to security requirements and audit expectations.
- Familiarity with firewall concepts: zones routing NAT security profiles SSL decryption (if applicable) URL filtering logging/monitoring and change control.
- Ability to write clear technical documentation and communicate risk/impact to stakeholders management peers and junior staff.
- Familiarity with Oracle Cloud will elevate a candidates likelihood to receive an offer.
- A background in Agile teaming with practical Jira usage is preferred
Preferred Certifications
- Palo Alto certifications (e.g. PCNSA/PCNSE)
Note: Active Secret clearance required Key Responsibilities Administer and support Palo Alto Networks NGFWs in production environments. This includes creating maintaining and analyzing Palo Alto Networks NGFW traffic reports to support internal security analysis and operational decision-making. M...
Note:
Active Secret clearance required
Key Responsibilities
- Administer and support Palo Alto Networks NGFWs in production environments. This includes creating maintaining and analyzing Palo Alto Networks NGFW traffic reports to support internal security analysis and operational decision-making.
- Manage centralized configuration and operations using Panorama (templates device groups policy push commits and upgrades as applicable).
- Implement blocks and directives (e.g. mandated deny policies emergency blocks and governance-driven changes) with clear validation and rollback planning.
- Build and maintain rules leveraging App-ID including application-based segmentation and least-privilege access patterns. This also includes converting legacy firewall rulesets to App-ID rulesets in order to improve visibility control modernization and effectiveness.
- Develop tune and maintain Palo Alto Networks security profiles to balance production traffic requirements with organizational risk tolerance.
- Ensure firewall configurations align with security requirements (hardening logging standards auditing and control evidence as required). Recommend/implement changes if intended requirements/security outcomes are not met.
Qualifications
- At least 5 years experience with hands-on administration Palo Alto Networks firewalls in an enterprise environment. Additional networking experience outside of Palo Alto does not count towards this requirement but additional networking experience is beneficial/preferred.
- Demonstrated experience with Panorama administration and centralized policy management.
- Strong working knowledge of App-ID and designing/enforcing application-based rules.
- Proven ability to execute rule optimization and implement/validate deny blocks and operational directives.
- Experience developing and maintaining policy-based rules aligned to security requirements and audit expectations.
- Familiarity with firewall concepts: zones routing NAT security profiles SSL decryption (if applicable) URL filtering logging/monitoring and change control.
- Ability to write clear technical documentation and communicate risk/impact to stakeholders management peers and junior staff.
- Familiarity with Oracle Cloud will elevate a candidates likelihood to receive an offer.
- A background in Agile teaming with practical Jira usage is preferred
Preferred Certifications
- Palo Alto certifications (e.g. PCNSA/PCNSE)
View more
View less