Sr. Network Security Consultant Palo Alto, CISCO ISE, Zscaler - Cary, United States - eTeam

    eTeam
    eTeam background
    Description
    JD for PaloAlto

    Experience/trained on Panorama. Experience in managing Firewalls & gateway Firewalls cluster management in large set up.

    Experience in Upgrades and configurations on maintaining PA Firewalls support related activities.

    Experience in IPS / Vulnerabilities Protection Fine tuning identification of false positive and remediation of Vulnerabilities.

    Experience in configuring Deep Inspection on Palo Alto firewalls based on application control and intelligence.

    Experience in deploying Network Based Anti-virus, URL Filtering, DLP solution on Next generation Firewalls.


    Demonstrated work experience to deal with complex issues in areas of Network Security technologies - Next Generation Firewalls (PA Firewalls).

    Enhance competence in Design, Implementation, and Troubleshooting of complex Network Security issues involving Next generation Firewalls.

    Lead from front in resolving complex Network Security issues.

    JD for Zscaler


    Experience in designing & implementing the Zscaler Zero Trust Exchange and its services ( Zscaler Internet Access, Zscaler Private Access, Zscaler Digital Experience, Zscaler Deception).


    Understanding of the entire ecosystem of network security including well-rounded understanding of the information security domains and their inter-relations across that ecosystem.

    Proven experience in deploying, configuring, and managing Zscaler cloud security solutions.

    Hands-on expertise with zScaler, DataPower, CA Proxy and Squid Proxy.

    Experience troubleshooting network issues and familiarity with the necessary tools. (Ping, Traceroute, MTR, etc).

    Expert knowledge of protocols such as HTTP, SMTP, FTP, DNS, etc.

    JD for Cisco Client


    Network Access Control (NAC): Cisco Client enforces network access policies by allowing or denying access to devices based on user identity, device type, location, and other attributes.


    Authentication and Authorization:
    Client supports various authentication methods, including 802.1x MAB (MAC Authentication Bypass), and guest access.

    It also authorizes users and devices based on defined policies.

    Guest Access Management:
    Client enables secure guest access to the network by allowing temporary access with limited privileges and predefined restrictions.

    Device Profiling:

    Client can identify and profile network devices, such as computers, smartphones, and IoT devices, based on their characteristics and behavior.


    BYOD (Bring Your Own Device): Cisco Client facilitates secure onboarding of personal devices into the corporate network, ensuring compliance with security policies.

    #J-18808-Ljbffr