This is a remote position.
We are looking for a Network Engineer to provide lead/seniorlevel Palo Alto Networks networking/network security support on a parttime basis. Strong skills and experience with Palo Alto NGFW Panorama and GlobalProtect are required while experience with CyberForce Guardian or CyberForce Hero as well as PCNSE certification are preferred.
Job Title: Network Engineer
Location: REMOTE (Pacific Time)
Job Type: PartTime about 20 hours per week
Infrastructure:
- Up to 12 site locations within the greater San Francisco Bay Area
- Up to 24 Palo Alto Networks NextGeneration Firewalls (NGFWs); up to 2 Palo Alto Networks NextGeneration Firewalls (NGFWs) configured as a single logical activepassive HA pair per site
- ATP URL Filtering Advanced Wildfire DNS Security and GlobalProtect subscriptions
- Up to 2 total GlobalProtect Portals
- Up to 2 total GlobalProtect Gateways
Preliminary Tasks:
- Perform initial remediation on any systems that have a critical deviation from industry best practices
- Build documented SOPs (standard operating procedures) for NGFW tasks which are either scheduled or unscheduled
- Develop and maintain documentation for netnew/greenfield deployments including (as needed): Highlevel Designs (HLDs) LowLevel Designs (LLDs) Traffic Flow
- Diagrams Logical Diagrams Physical Diagrams / Cable Cutsheets Rack Diagrams Topology Diagrams
- Establish a preapproved regular recurring maintenance window schedule for each system
Ongoing System Configuration / Scheduled Maintenance Tasks:
- Firewall policy changes including Authentication DoS Protection NAT Security and SDWAN policies
- Firewall object changes including Addresses Address Groups Dynamic User Groups Applications Application Groups Application Filters Services Service Groups Tags HIP Objects HIP Profiles EDLs Custom Objects Security Profiles Security Profile Groups Log Forwarding Authentication SDWAN Link Management and Schedules
- Firewall network changes including Interfaces Zones Virtual Routers IPSec Tunnels DHCP DNS Proxy GlobalProtect Portals GlobalProtect Gateways GlobalProtect IPSec Crypto profiles IKE Gateways IPSec Crypto profiles IKE Crypto profiles Monitor profiles Interface Management profiles Zone Protection Profiles LLDP Profiles and SDWAN Interface Profiles
- Firewall device changes including Setup High Availability Password Profiles Administrators Admin Roles Authentication Profiles Authentication Sequences Device Quarantine VM Information Sources Certificate Management Response Pages Log Settings Server Profiles Local User Database Scheduled Log Exports Software GlobalProtect Client (software) Dynamic Updates Plugins and Licenses
- Firewall monitoring (operational) actions including Log Review Packet Capture App Scope Monitoring Session Browser Monitoring Botnet Monitoring (ondevice) Reports and ACC Monitoring
- Scheduled maintenance tasks that are part of the established maintenancewindow schedule for each system
Emergency Response / Priority Events Tasks:
- Emergency Palo Alto Networks NGFWrelated system events
- Emergency break/fix requests
- Emergency software updates
- Emergency ISP or carrier outage(s)
Palo Alto NGFW, Panorama and GlobalProtect are required CyberForce Guardian or CyberForce Hero, and PCNSE Certification are nice to have