Job Description :
Technical skill set:
Must have hands on experience with Juniper SRX firewalls and JUNOS.
Understanding of SRX concepts like Security Zones, Security policy ordering, Searching and Sorting Audit logs, Address Sets, negated addresses, User Roles and tables, route based policies, address-books, Application traffic control etc.
Should have knowledge on various security technologies including IDS/IPS, VPN, end point security solutions, Multi Factor Authentication products (RSA SecurID), DLP, NAC.
Experience with security policy management and firewall optimization tool such as Tufin is highly desirable
Experience in managing PKI infrastructure holds higher advantage
Experience with routing protocols
Should have good presentation skills - shall be able to participate in the review meetings and be able put across the points of concern
Should have good troubleshooting skills – ability to isolate the cause of an issue, working with various support teams to resolve day today issues
Should have Capability to conduct risk analysis, impact analysis, dependencies on customer/internal teams,
Knowledge and experience of working with ITIL Processes
Non-Technical Responsibilities:
Coordinate with other team members for availability of capable resource
Ensure quality work - review and validate the technical configuration changes
Coordinate with COE resources for resolution of technical issues/problems before escalation to OEM

Technical Responsibilities:
Configuration and management of SRX firewalls,
Juniper SRX Firewall Auditing and review access control lists and updating firewalls as needed
Manage tools and technologies that provides VPN, IDS/IPS, Endpoint, DLP, NAC, MFA, PKI solution
Articulate or highlight risks/dependencies
Adhering to high-quality standards and best practices, high performance, and scalable, repeatable processes and deliverables in accordance with applicable regulations
Analyze, troubleshoot, and investigate network security-related incident based on security platform reporting, network traffic, log files, host-based and automated security alerts
Participation in an on-call support rotation required