Network Security Consultant
Pay Rate: Not Specified
Job type: contractor
Location: Dallas, TX
Note:- Please share senior resource with min 10+ years of experience.
Technical skill set
· Must have hands on experience with Cisco ASA, FXOS, Palo Alto firewalls and Panorama.
· Full understanding of Palo Alto Firewall concepts like Security Zones, Security policy ordering, Searching and Sorting Audit logs, Address Sets, negated addresses, User Roles and tables, route-based policies, address-books, Application traffic control etc.
· Must have hand on Cisco Client for VPN authentication, AAA, policy creation.
· Understanding and experience with routing protocols
· Handson Skill on handling Security Incidents and plan mitigation.
· Good understanding of Symantec DLP
· Understanding of F5 load balancers.
· Should have good presentation skills - shall be able to participate the review meetings and be able put across the points of concern
· Should have Capability to conduct risk analysis, impact analysis, dependencies on customer/internal teams,
· Knowledge and experience of working with ITIL (Information Technical Infrastructure Library) Processes
Non-Technical Responsibilities
· Coordinate with other team members for availability of capable resource
· Ensure quality work - review and validate the technical configuration changes
· Coordinate with COE (Centers Of Excellence) resources for resolution of technical issues/problems before escalation to OEM (Original Equipment Manufacturers)
Technical Responsibilities
· Configuration of Cisco and Palo Alto Firewalls
· Articulate or highlight risks/dependencies
· Participation in an on-call support rotation required
· Firewall Auditing and review access control lists and updating firewalls as needed
· Interacting with various teams in managing the log management solution.
· Adhering to high-quality standards and best practices, high performance, and scalable, repeatable processes and deliverables in accordance with applicable regulations
· Analyze, troubleshoot, and investigate network security-related incident based on security platform reporting, network traffic, log files, host-based and automated security alerts
· Evaluate systems using vulnerability scanners and manual techniques to verify system security settings and configurations