Overview
Skills
Job Details
Position- Security Network Engineer
Location- Remote
Duration- Contract
Security Network Engineer with Extensive Cloud and Firewall Experience
JD:
Designed, deployed, and managed Palo Alto Networks security solutions including NGFWs, Panorama, and security policies across on-prem and cloud infrastructures, including Prisma Access.
Experience with setting-up/provisioning Prisma Super-Tenant including Prisma Service Connections setup/routing
Implemented advanced security features (App-ID, User-ID, Content-ID) and Zero Trust policy enforcement using Active Directory-based groups and best practices.
Integrated Palo Alto NGFW firewalls with cloud-native architectures, leveraging AWS Transit Gateway and Azure Virtual WAN for scalable, secure cloud connectivity.
Built and managed AWS networking components including VPCs, Transit Gateways, VPNs, subnets, and route tables, with a strong focus on East-West and edge security architectures.
Developed and maintained Infrastructure-as-Code (IaC) using Terraform, Ansible, and Python to automate network security deployments and configurations.
Implemented network segmentation strategies, including VLANs and micro-segmentation, to enforce least-privilege access and reduce attack surfaces.
Created custom automation scripts and tools in Python and Ansible to streamline firewall configuration, monitoring, and compliance across hybrid environments.
Collaborated with cross-functional teams to enhance security posture and ensure policy consistency across cloud and on-premise platforms.
Developed and maintained comprehensive security policy documentation to track firewall rules, access controls, and segmentation strategies; created team-facing access guides to ensure alignment with security policies and streamline access request workflows.
Collaborated with security teams to review penetration testing reports, prioritize vulnerabilities, and implement remediation across critical network devices (e.g., Cisco routers, Palo Alto firewalls, F5/AWS load balancers). Actions included disabling insecure protocols, enforcing least-privilege access, updating OS/firmware, and improving logging and alerting mechanisms.