Lead the migration, configuration, and maintenance of Cisco ASA (Classic) and Firepower (FTD) systems
Manage a robust Palo Alto environment via Panorama
Design and manage F5 BIG-IP solutions, focusing on LTM (Local Traffic Manager) for load balancing and ASM/WAF (Application Security Manager) for protecting web applications
Implement and manage micro-segmentation policies and virtualized security services within VMware NSX (T/V) environments
Architect strategies to transition legacy Cisco ASA rulesets to Cisco Firepower or Palo Alto NGFWs without service disruption
Act as the highest escalation point for complex network outages, security breaches, or performance degradation across the global fabric
Provide exceptional customer support via the phone and ticketing system
Collaborate with Service Delivery Managers and Account Executives to build strong customer relationships
Conduct Root Cause Analysis (RCA) exercises to drive process & technology improvements
Prepare and review defined policy and process standards
Requirements
Advanced knowledge of Cisco ASA (CLI/ASDM) and Firepower Threat Defense (FTD)
Deep experience with Palo Alto NGFW features (App-ID, User-ID, SSL Decryption)
Proficiency in F5 BIG-IP, including iRules development, SSL offloading, and traffic steering
Hands-on experience with VMware NSX, specifically in configuring distributed firewalls (DFW) and edge gateways
Mastery of TCP/IP, BGP, OSPF, and deep packet inspection
Candidates must hold industry recognized certifications: Cisco Security (Primary): CCNP Security – Required. CCIE Security – Highly Preferred. Specialist certifications in Firepower or ASA are a significant plus. Palo Alto Networks (Secondary): PCNSE (Palo Alto Networks Certified Network Security Engineer) – Highly Preferred. Supplemental (Preferred): F5-CTS (Certified Technology Specialist). VCP-NV (VMware Certified Professional – Network Virtualization).