Network Security,Firewall & Security ConceptsFirewall Rules & Policies :: Raleigh, NC Cary, NC at Raleigh, North Carolina, USA |
Email: ashutosh.m@twsol.com |
UID: ee16371e991841f89e30676e59bb45b7 Role name: Network Security,Firewall & Security ConceptsFirewall Rules & Policies Role Description:Define PoC Objectives & ScopeIdentify Business & Security Requirements What are the key use cases (e.g., perimeter security, threat detection, Zero Trust, VPN, etc.) Are there specific compliance needs (e.g., ISO 27001, GDPR, NIST, PCI DSS) Will the firewall be on-prem, cloud, or hybridChoose Evaluation Criteria (Align with customer needs Select Firewall Vendors PoC Lab SetupA. Lab Setup & Testing Virtualized Firewall Deployment Using VMware, VirtualBox, or cloud labs. Traffic Simulation Using tools like Wireshark, iPerf, or custom scripts to test rules. Penetration Testing Using Kali Linux, Nmap, or Metasploit to validate firewall effectiveness. B. Documentation & Reporting Test Plan Creation Define PoC objectives, test cases, and success criteria. Benchmarking & Performance Testing Comparing different firewall solutions. Risk Analysis & Compliance Mapping Ensuring alignment with regulations (ISO 27001, NIST, GDPR). C. Vendor & Stakeholder Communication Understanding Business Requirements Mapping firewall features to security needs. Engaging with Vendors Getting demo licenses, configuring PoC environments. Presenting Findings Summarizing results for technical and non-technical stakeholders. Competencies:Network Security, Cyber Security - MSS - Infrastructure Security Experience (Years):4-6 Essential Skills:Firewall a Security Concepts Types of Firewalls Stateful, Stateless, NGFW (Next-Gen Firewalls), Proxy, WAF (Web Application Firewall). Firewall Rules & Policies Configuring allow/deny rules, security zones, ACLs (Access Control Lists). Deep Packet Inspection (DPI) & Threat Prevention How firewalls analyze and block malicious traffic. VPN Configuration Site-to-Site & Remote Access VPNs using IPSec or SSLHands-on Experience with Firewall Tools Vendor-Specific Experience Palo Alto, Fortinet, Check Point, Cisco ASA, Sophos, Juniper, etc.Policy Creation & Management Writing rules, setting up security profiles, URL filtering.Logging & Monitoring Understanding firewall logs, event correlation with SIEM tool Desirable Skills:Networking Fundamentals (TCP/IP, Subnetting, VLANs, Routing & Switching)OSI Model Country:United States Branch | City | Location:TCS - Raleigh, NC Cary, NC -- Ashutosh Mishra | Network M: D : +1 2143909326 | E: Ashutosh.m @twsol.com www.teamwaresolutions.net Teamware Solutions INDIA | NORTH AMERICA | MIDDLE EAST Teamware Solutions does not encourage acceptance of any fees, payments, gifts, or other benefits in cash or in kind from any potential candidates seeking employment with the organization. Knowledge of such instances should be immediately communicated to compliance@twsol.com 2838 E. Long Lake Road Suite 210, Troy, MI 48085 D : +1 2143909326, ashutosh.m @twsol.com www.teamwaresolutions.net Disclaimer This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to which they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited. -- Keywords: information technology Michigan North Carolina Network Security,Firewall & Security ConceptsFirewall Rules & Policies :: Raleigh, NC Cary, NC ashutosh.m@twsol.com |
ashutosh.m@twsol.com View All |
09:48 PM 24-Mar-25 |