Epicareer Might not Working Properly
Learn More

Network Engineer (PAN Services)

Salary undisclosed

Apply on


Original
Simplified
This is a remote position.

We are looking for a Network Engineer to provide lead/senior-level Palo Alto Networks networking/network security support on a part-time basis. Strong skills and experience with Palo Alto NGFW, Panorama and GlobalProtect are required, while experience with CyberForce Guardian or CyberForce Hero, as well as PCNSE certification, are preferred.

Job Title: Network Engineer

Location: REMOTE (Pacific Time)

Job Type: Part-Time, about 20 hours per week

Infrastructure:

  • Up to 12 site locations within the greater San Francisco Bay Area
  • Up to 24 Palo Alto Networks Next-Generation Firewalls (NGFWs); up to 2 Palo Alto Networks Next-Generation Firewalls (NGFWs) configured as a single logical active-passive HA pair per site
  • ATP, URL Filtering, Advanced Wildfire, DNS Security, and GlobalProtect subscriptions
  • Up to 2 total GlobalProtect Portals
  • Up to 2 total GlobalProtect Gateways

Preliminary Tasks:

  • Perform initial remediation on any systems that have a critical deviation from industry best practices
  • Build documented SOPs (standard operating procedures) for NGFW tasks which are either scheduled or unscheduled
  • Develop and maintain documentation for net-new/greenfield deployments including (as needed): High-level Designs (HLDs), Low-Level Designs (LLDs), Traffic Flow
  • Diagrams, Logical Diagrams, Physical Diagrams / Cable Cutsheets, Rack Diagrams, Topology Diagrams
  • Establish a pre-approved, regular, recurring maintenance window schedule for each system

Ongoing System Configuration / Scheduled Maintenance Tasks:

  • Firewall policy changes including Authentication, DoS Protection, NAT, Security, and SD-WAN policies
  • Firewall object changes including Addresses, Address Groups, Dynamic User Groups, Applications, Application Groups, Application Filters, Services, Service Groups, Tags, HIP Objects, HIP Profiles, EDLs, Custom Objects, Security Profiles, Security Profile Groups, Log Forwarding, Authentication, SD-WAN Link Management, and Schedules
  • Firewall network changes including Interfaces, Zones, Virtual Routers, IPSec Tunnels, DHCP, DNS Proxy, GlobalProtect Portals, GlobalProtect Gateways, GlobalProtect IPSec Crypto profiles, IKE Gateways, IPSec Crypto profiles, IKE Crypto profiles, Monitor profiles, Interface Management profiles, Zone Protection Profiles, LLDP Profiles, and SD-WAN Interface Profiles
  • Firewall device changes including Setup, High Availability, Password Profiles, Administrators, Admin Roles, Authentication Profiles, Authentication Sequences, Device Quarantine, VM Information Sources, Certificate Management, Response Pages, Log Settings, Server Profiles, Local User Database, Scheduled Log Exports, Software, GlobalProtect Client (software), Dynamic Updates, Plugins, and Licenses
  • Firewall monitoring (operational) actions including Log Review, Packet Capture, App Scope Monitoring, Session Browser Monitoring, Botnet Monitoring, (on-device) Reports, and ACC Monitoring
  • Scheduled maintenance tasks that are part of the established maintenance-window schedule for each system

Emergency Response / Priority Events Tasks:

  • Emergency Palo Alto Networks NGFW-related system events
  • Emergency break/fix requests
  • Emergency software updates
  • Emergency ISP or carrier outage(s)