Tekskills
Website:
tekskillsinc.com
Job details:
JOB DESCRIPTION
Cybersecurity professional with 5 years of experience in Security Operations and Network/Application Security, specializing in Palo Alto Firewalls and Imperva WAF, along with working knowledge of other leading OEM solutions. Experienced in implementation, monitoring, tuning, and incident response across enterprise environments.
Core Competencies
- Network Security & Perimeter Defense
- Web Application Security & WAF Management
- Threat Detection & Incident Response
- SIEM Integration & Monitoring
- Rule Optimization & Security Tuning
Technical Expertise
1. Firewall – Network & Perimeter Security
Primary OEM: Palo Alto
Exposure to: Cisco ASA/Firepower, Check Point
- Policy creation, optimization, and rulebase management
- Zone-based security architecture and segmentation
- VPN configuration (IPSec Site-to-Site & Remote Access)
- NAT configuration (Source & Destination NAT)
- Threat prevention using IPS, Anti-Malware, URL Filtering
- Log monitoring and traffic analysis for anomaly detection
- Centralized management using Palo Alto Panorama
- Firewall rule audit and performance optimization
2. Web Application Firewall (WAF) – Application Security
Primary OEM: Imperva
Exposure to: F5 ASM, Cloudflare WAF
- WAF policy configuration and application protection
- Application profiling and behavioral analysis
- Protection against OWASP Top 10 attacks (SQLi, XSS, CSRF, etc.)
- Bot mitigation and automated traffic filtering
- DDoS protection (network and application layer)
- False positive analysis and rule tuning
- SSL/TLS inspection for encrypted traffic visibility
- Integration with SIEM tools for centralized monitoring
Professional Experience
Associate Security Consultant / SOC Analyst [Duration: 5 Years]
Key Responsibilities
- Managed Palo Alto firewall operations across multiple environments
- Implemented and tuned Imperva WAF policies for critical applications
- Performed 24x7 monitoring and incident response in SOC environment
- Investigated network and web-based attacks
- Conducted log analysis, threat hunting, and RCA
- Onboarded security devices and applications into SIEM
- Supported compliance audits and reporting requirements
Click on Apply to know more.