Network Security (Palo alto firewall)
Job Summary
Role Overview
The Network & Cloud Security BAU Support Engineer is responsible for business-as-usual (BAU)
operations monitoring
incident support policy administration and continuous optimization of Palo Alto Networks
security platforms
including Palo Alto NGFW Prisma Access and GlobalProtect.
The role ensures stable secure and compliant network and remote access security services
while supporting SOC
IT Operations Network teams and business stakeholders.
The Network & Cloud Security BAU Support Engineer is responsible for business-as-usual (BAU)
operations monitoring
incident support policy administration and continuous optimization of Palo Alto Networks
security platforms
including Palo Alto NGFW Prisma Access and GlobalProtect.
The role ensures stable secure and compliant network and remote access security services
while supporting SOC
IT Operations Network teams and business stakeholders.
Key Responsibilities
1. BAU Operations & Platform Administration
- Perform daily health checks and monitoring of Palo Alto firewalls and cloud security services.
- Manage user access admin roles authentication profiles and platform configurations.
- Handle BAU service requests incidents and changes within defined SLAs.
- Maintain operational documentation SOPs runbooks and configuration standards.
1. BAU Operations & Platform Administration
- Perform daily health checks and monitoring of Palo Alto firewalls and cloud security services.
- Manage user access admin roles authentication profiles and platform configurations.
- Handle BAU service requests incidents and changes within defined SLAs.
- Maintain operational documentation SOPs runbooks and configuration standards.
2. Palo Alto Networks NGFW (On-Prem / VM-Series)
- Manage and support security policies including security rules NAT application control and
URL filtering.
- Administer Threat Prevention Antivirus Anti-Spyware WildFire and File Blocking profiles.
- Perform log analysis using traffic threat and system logs to support investigations.
- Support firewall upgrades backups HA validation and rulebase optimization.
- Troubleshoot connectivity performance and policy enforcement issues.
- Manage and support security policies including security rules NAT application control and
URL filtering.
- Administer Threat Prevention Antivirus Anti-Spyware WildFire and File Blocking profiles.
- Perform log analysis using traffic threat and system logs to support investigations.
- Support firewall upgrades backups HA validation and rulebase optimization.
- Troubleshoot connectivity performance and policy enforcement issues.
3. Prisma Access (Cloud Secure Web Gateway / SASE)
- Support BAU operations of Prisma Access for mobile users and remote networks.
- Manage security policies routing service connections and bandwidth profiles.
- Monitor tunnel health user connectivity and cloud security enforcement.
- Support onboarding of new locations users and policy updates.
- Coordinate with Palo Alto TAC and internal teams for issue resolution.
- Support BAU operations of Prisma Access for mobile users and remote networks.
- Manage security policies routing service connections and bandwidth profiles.
- Monitor tunnel health user connectivity and cloud security enforcement.
- Support onboarding of new locations users and policy updates.
- Coordinate with Palo Alto TAC and internal teams for issue resolution.
4. GlobalProtect (Remote Access VPN)
- Administer GlobalProtect portals and gateways.
- Support user connectivity issues and authentication failures.
- Manage certificates client configurations split tunneling and HIP profiles.
- Support agent upgrades troubleshooting and end-user BAU requests.
- Support user connectivity issues and authentication failures.
- Manage certificates client configurations split tunneling and HIP profiles.
- Support agent upgrades troubleshooting and end-user BAU requests.
5. Incident Problem & Change Management
- Participate in security and network incident bridge calls.
- Provide firewall and VPN logs for SOC and IR teams.
- Perform root cause analysis for recurring issues.
- Support planned changes maintenance activities and post-change validation.
- Participate in security and network incident bridge calls.
- Provide firewall and VPN logs for SOC and IR teams.
- Perform root cause analysis for recurring issues.
- Support planned changes maintenance activities and post-change validation.
6. Monitoring Reporting & Compliance
- Monitor alerts tunnel status and platform health dashboards.
- Generate BAU operational and compliance reports.
- Support audit and regulatory requirements.
- Ensure configuration adherence to security and network standards.
- Monitor alerts tunnel status and platform health dashboards.
- Generate BAU operational and compliance reports.
- Support audit and regulatory requirements.
- Ensure configuration adherence to security and network standards.
Required Skills & Experience
- 3 7 years of experience in Network Security or Cybersecurity Operations.
- Hands-on BAU support experience with Palo Alto NGFW Prisma Access and GlobalProtect.
- Strong understanding of firewall concepts VPNs routing and network security.
- Experience with ITIL processes and ticketing tools (ServiceNow/Jira).
- 3 7 years of experience in Network Security or Cybersecurity Operations.
- Hands-on BAU support experience with Palo Alto NGFW Prisma Access and GlobalProtect.
- Strong understanding of firewall concepts VPNs routing and network security.
- Experience with ITIL processes and ticketing tools (ServiceNow/Jira).
Preferred Skills
- Experience with Panorama management.
- Exposure to SASE and Zero Trust architectures.
- Cloud networking knowledge (Azure AWS GCP).
- Palo Alto certifications (PCNSA PCNSE).
- Experience with Panorama management.
- Exposure to SASE and Zero Trust architectures.
- Cloud networking knowledge (Azure AWS GCP).
- Palo Alto certifications (PCNSA PCNSE).