Title: Security Architect-L1
Location: Warwick
Mandatory Skills: Palo Alto Networks - Firewalls.
Immediate joiners only
DETAILED JD : -
Work within an Agile team to configure firewall rules for new Landing Zones on Palo Alto NGFW.
Able to troubleshoot issues on Palo Alto firewall.
Basic understanding of Azure or any other public cloud.
Good understanding of networking concepts.
Proven experience in Configuring designing implementing managing Palo Alto Network next generation firewall at enterprise level.
Hands on experience on managing Palo Alto firewalls through Panorama.
5-6 years of experience in Managing Palo Alto firewall.
Deploy Firewall with IPS App-ID URL filtering features.
Palo Alto Network & Azure certification is a plus.
Work within an agile team to provide Firewall Buildout with Management and initial maintenance for a new Azure platform
Proven experience in Configuring designing implementing managing Firewall Palo Alto Network using (Hardware and Virtual Firewalls) and Cisco Firewalls at enterprise level
Hands on Experience on Palo Alto firewall integration with Panorama
Palo Alto Network & Azure certification is a plus
More than 10-12 years of experience in Managing Palo Alto Cisco for large client bases.
Technical sound and certified equivalent of CCNP Security
Should have managed Migration Transformation. Implementation Projects
Performing Planning designing deployment integration upgradation and monitoring of firewall devices
Manage firewall releases that include upgrade of firewall images to N or N-1 version.
Deploy Firewall with IPS Sandboxing URL filtering features
Apply emergency rules on firewalls in case of security or other incidents.
Maintenance of Firewall devices and management consoles.
Do
1. Design and develop enterprise cyber security strategy and architecture
a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses
b. Identify risks associated with business processes operations
information security programs and technology projects
c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge
d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security Zoning Integration aspects API Endpoint security Data security Compliance and regulations
f. Demonstrate experience in doing security assessment against NIST Frameworks SANS CIS etc.
g. Provide support during technical deployment configuration integration and administration of security technologies
h. Demonstrate experience around ITIL or Key process-oriented domains like incident management configuration management change management problem management etc.
i. Provide assistance for disaster recovery in the event of any security breaches attacks intrusions and unusual unauthorized or illegal activity
j. Provide solution of RFPÃÂÂs received from clients and ensure overall design assurance
i. Develop a direction to manage the portfolio of to-be-solutions including systems shared infrastructure services applications hardware related to cyber risk security in order to better match business outcome objectives
ii. Analyse technology environment enterprise specifics client requirements to set a collaboration design framework/ architecture
iii. Depending on the clientÃÂÂs need with particular standards and technology stacks create complete RFPs
iv. Provide technical leadership to the design development and implementation of custom solutions through thoughtful use of modern technology
v. Define and understand current state solutions and identify improvements options & tradeoffs to define target state solutions
vi. Clearly articulate and sell architectural targets recommendations and reusable patterns and accordingly propose investment roadmaps
vii. Evaluate and recommend solutions to integrate with overall technology ecosystem
viii. Tracks industry and application trends and relates these to planning current and future IT needs
2. Stakeholder coordination & audit assistance
a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations
b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security
c. Support audit of security best practices and implementation of security principles across the organization to meet business goals along with customer and regulatory requirements
d. Assist with the creation maintenance and delivery of cyber security awareness training to team members and customers
e. Provide training to employees on issues such as spam and unwanted or malicious emails
Deliver
No Performance Parameter Measure
1 Customer centricity Timely security breach solutioning to end users Internal stakeholders & external customers experience CSAT educating and suggesting right control to the customers.
2 Support sales team to create wins % of proposals with Quality Index >7 timely support of the proposals identifying opportunities/ leads to sell services within/ outside account (lead generation) no. of proposals led