Posted: 11/24/2021

Job Description


  • Participates in analyses of the tools, technology, and procedures required to protect the enterprise in all ways.
  • Tools, procedures, data, monitoring, and technology are preserved and streamlined, and performance criteria are established for their successful use.
  • Deploys applications, policies, documents, and technology, and sets performance requirements for their good use.
  • Works on cybersecurity issues that can be extremely nuanced and broad, with a specific focus on defense operations.
  • Selects tools and approaches to define and advocate appropriate alternatives for defense.
  • Specializes in one or more fields of security operations, including network, host, database, device, event management, cloud, authentication, identity, and other new technologies.


** Candidates must be W2 and US Citizen is required: Attach in resume or supplier notes. If not included, the candidate will be declined.

Essential Requirements:

  • Have Bachelor’s degree in Information Technology, Information Security or related major; or equivalent professional experience in a similar role
  • Having more than 8 years of experience with Network Security technologies such as VPN/Firewall/Proxy (implementing, monitoring, and configuring) o Palo Alto - must have recent experience with implementation/upgrades/conversions/configuration
  • Experience in SonicWall and McAfee Gateways is preferred
  • Having more than 8 years of practical experience in the area of cybersecurity
  • Excellent understanding of IT and Cybersecurity technologies
  • Expertise in networking such as TCP/IP, DNS, SSL
  • Good experience integrating with Splunk
  • Experience with security processes and documentation

Preferable Requirements:

  • Have certifications relevant to the role such as PCNSE, CISSP, CCNP/CCIE, SNSA/SNSP

Pre-Screening questions - require to be included in the resume:

  • Summarize your latest role maintaining or implementing Palo Alto firewalls and what is your role in the project?


  • Tools, protocols, data, monitoring and technology are retained and streamlined and performance metrics are established for their successful use.
  • Participates in analyses of the tools, technology and processes required to protect the enterprise in all ways
  • Acts as the bridge in cybersecurity activities discussions between professional and non-technical contributors
  • Usually, the boss offers the concern and a high-level approach for more complex issues
  • Create and preserve comprehensive documents to endorse systems for cybersecurity
  • Works on medium difficulty cybersecurity issues, with special focus on protection operations
  • Selects approaches and strategies to define and advocate successful security solutions

alarm_on Work arrangement

Site: Remote - Texas, United States

Location: Remote - Texas, United States

Cybersecurity Engineering
Austin, USA
MagRabbit USA

Contact details

Thank you very much for visiting our website. Please give us your name and email and our team will contact you as soon as possible. We are HARE cheaper and much faster than our competitors.