Network Engineer (Palo Alto Firewall)
Miami, FL (5 Days onsite)
Long Term
Looking for Local to Miami, FL Only***
Must Have Technical/Functional Skills
• Proven experience with Palo Alto Networks firewalls (PA-Series, Panorama, GlobalProtect).
• Strong understanding of network protocols (TCP/IP, DNS, DHCP, BGP, OSPF).
• Experience with Next-Generation Firewall (NGFW) features like App-ID, User-ID, and Threat Intelligence.
• Familiarity with network security best practices and incident response.
• Hands-on experience with Panorama for centralized management.
• Knowledge of cloud firewall deployments (AWS, Azure, Google Cloud Platform) is a plus.
• Palo Alto certifications (e.g., PCNSA, PCNSE) are highly desirable.
• Excellent troubleshooting and analytical skills.
• Strong communication and documentation abilities
• Experience with other firewall platforms (e.g., Cisco ASA, Fortinet) is a plus.
• Familiarity with SIEM tools and network monitoring systems. Roles & Responsibilities
• Design, deploy, and manage Palo Alto firewalls across enterprise environments.
• Configure and maintain security policies, NAT rules, VPNs, and threat prevention features.
• Monitor firewall performance and logs to identify and mitigate potential threats.
• Collaborate with network and security teams to ensure seamless integration of firewall solutions.
• Perform regular firewall audits and compliance checks.
• Respond to and resolve firewall-related incidents and service requests.
• Maintain documentation for firewall configurations, policies, and procedures.
• Stay current with emerging threats and Palo Alto product updates. Generic Managerial Skills, If any
• Ability to plan, execute, and monitor security projects (e.g., firewall upgrades, incident response plans)
• Familiarity with Agile, Scrum, or ITIL frameworks is a plus.
• Skilled in evaluating security risks and making informed decisions to mitigate threats.
• Prioritizing tasks based on business impact and urgency.
• Aligning network security initiatives with organizational goals.
• Working closely with network engineers, system admins, developers, and business units.
• Facilitating cross-functional communication during incident response or system changes.
• Coaching junior engineers on security best practices and tools (e.g., Palo Alto firewalls).
• Conducting workshops or knowledge-sharing sessions.
• Writing clear documentation, reports, and executive summaries.