Job Description :

Job Title : Palo Alto Network Architect
Location : San Mateo CA
Duration : Long Term
Interview Mode : Telephonic and Face to Face Must
Description :

Required Skills

5+ years’ software and Network architecture experience in hi-tech
5+ years with Cisco and PAN (Palo Alto Network) firewall.
BS degree in Computer Science required; Masters’ degree preferred
Consistent track record of either leading, or being a significant contributor to, architectural functions within fast growing companies
Experience in defining, building and leading architectural functions with Engineering or IT
Ability to lead without positional power
An innovative thinker who is deeply respected with technical community for open source contribution, white papers, and technical talks
Shown ability to make quick impact within organizations and to get things done, experience within or building startups a plus
Excellent track record in software development and highly proficient in programming, design & architectural patterns
Experience working in small, highly technical teams employing Agile/Scrum practices
Shown ability to pull a diverse group of technical engineers/architects and help moderate and influence productive discussions driving towards quick decisions and results
Well skilled with business applications needed to build network diagram, develop spreadsheet, write technical requirements and other

Work closely with the local Client Security and Network staff to review the current firewall environments.
Propose any/all recommended design changes to support the replacement of the current firewalls with Palo Alto Firewalls including Access-List rules and NAT translations, as well as site/campus/internet connections to make the environment as robust as possible
The designs will support three distinct use cases:
Internet facing firewalls (4)
Extranet firewalls (8)
Law Enforcement Head-End and IPSec Remote site connection for end-to-end traffic encryption (20)
Law Enforcement Head Design Review
Site to Site VPN migration
Review the PAN capabilities to ensure that they complement and do not conflict any existing security services for Internet, Email and other products
Design/implement Firewall health monitoring in conjunction with the existing monitoring tools
Design/implement process for traffic and threat log review natively and in conjunction with the EIM
Implement Panorama
Design/implement Panorama central management policies
Design/implement process to manage panorama and PAN-OS upgrades
Design/implement role based administrative access
Design/implement integration with the CLient''s identity platform (Okta)
Design/implement device group configurations
Design/implement Panorama configuration management versioning
Design/implement Panorama central logging and reporting
Provide complete network design documents for all deployed firewall use cases
Provide complete as-built run books for the deployed firewalls
Provide knowledge transfer to Client staff during the term of the engagement
Provide support to the Client through a transition period.