Logo
IL Corn

Marketing Associate

IL Corn, Chicago, Illinois, United States, 60290


Years of Exp : 12+

The following information provides an overview of the skills, qualities, and qualifications needed for this role.

This role will be a part of Acquired Entity Security Integration Team who is responsible for Integrating the Business partners with Network securely.

Provide consulting and auditing services for identifying the Security postures of the BP.

Advise remediation plan accordingly.

Deploy and configure

Palo alto Firewalls

as per prescribed guidelines and blueprints.

Responsible for Integrating the Business partners remote sites and Data Centers securely as per the Security guidelines and policies defined.

Working with BP to understand their environment and consulting them with identifying and documenting the Traffic flows.

Review the Security posture of the BP through examining the Security Policies configured on their FWs.

Flagging the high risks flows and advising BP to remediate them.

Driving the Trusted/ Untrusted Integration activities for BP's remote site and DCs.

Deploying and configuring Palo Alto Firewalls the connect BP network .

Building the Firewalls dedicated to provide Internet connectivity and hosting services for the BP.

Troubleshooting any incidents or issues related to Palo Alto firewalls.

Support the cutover and address any Firewall related issues that may arise. Upgrade the PAN OS on Palo alto FWs and Panoramas.

(1.) To clearly understand the client's cybersecurity environment and respective product.

(2.) To monitor, configure, and troubleshoot cybersecurity issues and related monitoring tools

(3.) To analyse and validate cybersecurity incidents in-detail and help the L3 team with RCAordata or logs collection

(4.) To enable knowledge transferortrainings through creationor maintenance of configuration documents, test plans, operational manuals and provide operational training to L1 team.

(5.) To analyse and fine-tune cybersecurity policies, participate in cybersecurity review calls pertaining to change requests and recommendations on cybersecurity policy changes.

(6.) To implement changes, monitor security device performance and implements performance tuning when necessary.

(7.) To prepare analyses and reports to highlight the project progressorchallenges and ensure quality and accuracy to the client

#J-18808-Ljbffr