Security Network Engineer

Overview

On Site
Accepts corp to corp applications
Contract - W2
Contract - Independent

Skills

Python
documentation
Terraform
Amazon Web Services
Firewall
Active Directory
FIREWALLS
BEST PRACTICES
LOGGING
NETWORKING
PROVISIONING
CONTINUOUS INTEGRATION/DELIVERY
network security
Cisco Routers
Firmware
Remediation
Security Policies
Segmentation

Job Details

Position- Security Network Engineer

Location- Remote

Duration- Contract

Security Network Engineer with Extensive Cloud and Firewall Experience

JD:

Designed, deployed, and managed Palo Alto Networks security solutions including NGFWs, Panorama, and security policies across on-prem and cloud infrastructures, including Prisma Access.

Experience with setting-up/provisioning Prisma Super-Tenant including Prisma Service Connections setup/routing

Implemented advanced security features (App-ID, User-ID, Content-ID) and Zero Trust policy enforcement using Active Directory-based groups and best practices.

Integrated Palo Alto NGFW firewalls with cloud-native architectures, leveraging AWS Transit Gateway and Azure Virtual WAN for scalable, secure cloud connectivity.

Built and managed AWS networking components including VPCs, Transit Gateways, VPNs, subnets, and route tables, with a strong focus on East-West and edge security architectures.

Developed and maintained Infrastructure-as-Code (IaC) using Terraform, Ansible, and Python to automate network security deployments and configurations.

Implemented network segmentation strategies, including VLANs and micro-segmentation, to enforce least-privilege access and reduce attack surfaces.

Created custom automation scripts and tools in Python and Ansible to streamline firewall configuration, monitoring, and compliance across hybrid environments.

Collaborated with cross-functional teams to enhance security posture and ensure policy consistency across cloud and on-premise platforms.

Developed and maintained comprehensive security policy documentation to track firewall rules, access controls, and segmentation strategies; created team-facing access guides to ensure alignment with security policies and streamline access request workflows.

Collaborated with security teams to review penetration testing reports, prioritize vulnerabilities, and implement remediation across critical network devices (e.g., Cisco routers, Palo Alto firewalls, F5/AWS load balancers). Actions included disabling insecure protocols, enforcing least-privilege access, updating OS/firmware, and improving logging and alerting mechanisms.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.