Network Specialist
Listed on 2026-02-10
-
Security
Cybersecurity, Network Security
Network Specialist
Hybrid Role
Compensation: $30-$35 per hour
THE ROLE
Our client is seeking a skilled Network Specialist to serve as a Firewall Administrator, focusing on the administration and support of Palo Alto firewalls (3K and 5K series) managed by Panorama. This contract role is ideal for experienced professionals with a strong background in Palo Alto firewall management, high availability (HA) configurations, and advanced troubleshooting. You will play a key role in building and maintaining Security and NAT policies, supporting HA pairs with multiple virtual firewalls, and ensuring the security and reliability of network operations.
The position also involves working with Global Protect VPN environments, IPSEC VPN tunnels, mixed-vendor environments, and collaborating directly with Palo Alto Support to resolve platform issues. Experience with Layer 2 and 3 networking is preferred.
- Administer and maintain Palo Alto firewalls (3K and 5K series) managed by Panorama
- Build and manage Security and NAT policies to ensure robust network security
- Configure and support HA firewall active/standby and multiple virtual firewall environments
- Troubleshoot and collect performance data using CLI for effective issue resolution
- Perform PAN-OS upgrades on HA firewalls and Panorama management consoles (minimum two upgrade cycles completed)
- Administer and troubleshoot Global Protect VPN environments and IPSEC VPN tunnels to WAN and third-party vendors
- Support mixed-vendor environments, including Cisco and Cradlepoint devices
- Configure BGP for VPN tunnel setup and management
- Manage Palo Alto dedicated log collectors and utilize firewall templates and template stacks in Panorama
- Integrate User
- Active Directory and RADIUS for user authentication - Implement multi-factor authentication with Azure
- Implement and manage SSL certificates on Palo Alto firewalls, including lifecycle management
- Configure and manage External Dynamic Lists for dynamic policy enforcement
- Leverage firewall logs to inform and automate policy decisions
- Utilize TAG objects for enhanced rule management beyond documentation/identification
- Collaborate directly with Palo Alto Support to resolve platform and operational issues
- Apply Layer 2 and 3 networking knowledge as needed to support network operations
- At least 3 years of direct, hands‑on administration of Palo Alto firewalls (3K and 5K series) managed by Panorama
- Experience building and maintaining Security and NAT policies
- Proven ability to manage HA firewall active/standby configurations and support HA pairs with multiple virtual firewalls
- Strong CLI skills for troubleshooting and performance data collection
- Demonstrated experience performing PAN‑OS upgrades on HA firewalls and Panorama management consoles (minimum two upgrade cycles completed)
- Expertise in administering and troubleshooting Global Protect VPN environments and IPSEC VPN tunnels to WAN and third-party vendors
- Experience working in mixed‑vendor environments, including Cisco and Cradlepoint devices
- Working knowledge of BGP for VPN tunnel configuration
- Experience with Palo Alto dedicated log collectors
- Proficiency in using firewall templates and template stacks in Panorama
- Experience with User‑n with Active Directory and RADIUS
- Ability to implement multi‑factor authentication with Azure
- Experience with SSL certificate implementation and lifecycle management on Palo Alto firewalls
- Knowledge of External Dynamic List configuration and management
- Ability to use firewall logs to inform and automate policy decisions
- Effective use of TAG objects beyond rule documentation/identification
- Experience working directly with Palo Alto Support to resolve platform issues
- Layer 2 and 3 network experience preferred
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).