Logo
Omni Inclusive

Sr. Network Security Consultant

Omni Inclusive, Princeton, New Jersey, us, 08543


MANDATORY

- WE ARE LOOKING FOR A CANDIDATE WHO HAS EXPERIENCE WITH PALO ALTO, CISCO Client, ZSCALER - INCASE COMBINATION OF ALL 3 SKILLS IS NOT POSSIBLE, PLEASE SHARE PROFILES WITH A COMBINATION OF ATLEAST 2 SKILLS WITH KNOWLEDGE ON 3RD ONE.

JD for PaloAlto

Ø Experience/trained on Panorama. Experience in managing Firewalls & gateway Firewalls cluster management in large set up.

Ø Experience in Upgrades and configurations on maintaining PA Firewalls support related activities.

Ø Experience in IPS / Vulnerabilities Protection Fine tuning identification of false positive and remediation of Vulnerabilities.

Ø Experience in configuring Deep Inspection on Palo Alto firewalls based on application control and intelligence.

Ø Experience in deploying Network Based Anti-virus, URL Filtering, DLP solution on Next generation Firewalls.

Ø Demonstrated work experience to deal with complex issues in areas of Network Security technologies - Next Generation Firewalls (PA Firewalls).

Ø Enhance competence in Design, Implementation, and Troubleshooting of complex Network Security issues involving Next generation Firewalls.

Ø Lead from front in resolving complex Network Security issues.

JD for Zscaler

Ø Experience in designing & implementing the Zscaler Zero Trust Exchange and its services ( Zscaler Internet Access, Zscaler Private Access, Zscaler Digital Experience, Zscaler Deception).

Ø Understanding of the entire ecosystem of network security including well-rounded understanding of the information security domains and their inter-relations across that ecosystem.

Ø Proven experience in deploying, configuring, and managing Zscaler cloud security solutions.

Ø Hands-on expertise with zScaler, DataPower, CA Proxy and Squid Proxy.

Ø Experience troubleshooting network issues and familiarity with the necessary tools. (Ping, Traceroute, MTR, etc).

Ø Expert knowledge of protocols such as HTTP, SMTP, FTP, DNS, etc.

JD for Cisco Client

Ø Network Access Control (NAC): Cisco Client enforces network access policies by allowing or denying access to devices based on user identity, device type, location, and other attributes.

Ø Authentication and Authorization: Client supports various authentication methods, including 802.1x MAB (MAC Authentication Bypass), and guest access.

Ø It also authorizes users and devices based on defined policies.

Ø Guest Access Management: Client enables secure guest access to the network by allowing temporary access with limited privileges and predefined restrictions.

Ø Device Profiling: Client can identify and profile network devices, such as computers, smartphones, and IoT devices, based on their characteristics and behavior.

Ø BYOD (Bring Your Own Device): Cisco Client facilitates secure onboarding of personal devices into the corporate network, ensuring compliance with security policies.