Lead the migration, configuration, and maintenance of Cisco ASA (Classic) and Firepower (FTD) systems
Manage a robust Palo Alto environment via Panorama
Design and manage F5 BIG-IP solutions, focusing on LTM (Local Traffic Manager) for load balancing and ASM/WAF (Application Security Manager) for protecting web applications
Implement and manage micro-segmentation policies and virtualized security services within VMware NSX (T/V) environments
Architect strategies to transition legacy Cisco ASA rulesets to Cisco Firepower or Palo Alto NGFWs without service disruption
Act as the highest escalation point for complex network outages, security breaches, or performance degradation across the global fabric
Provide exceptional customer support via the phone and ticketing system
Collaborate with Service Delivery Managers and Account Executives to build strong customer relationships
Participate in Root Cause Analysis (RCA) exercises to drive process & technology improvements
Prepare and review defined policy and process standards
Communicate effectively, both verbally and in writing, with customers as well as internal stakeholders
Requirements
Advanced knowledge of Cisco ASA (CLI/ASDM) and Firepower Threat Defense (FTD)
Deep experience with Palo Alto NGFW features (App-ID, User-ID, SSL Decryption)
Proficiency in F5 BIG-IP, including iRules development, SSL offloading, and traffic steering
Hands-on experience with VMware NSX, specifically in configuring distributed firewalls (DFW) and edge gateways
Mastery of TCP/IP, BGP, OSPF, and deep packet inspection
CCNP Security – Required
CCIE Security – Highly Preferred
Specialist certifications in Firepower or ASA are a significant plus