- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Computer Software Resume Samples
Firewall Engineer Resume Samples
No results found
0-5 years of experience
Led team for Security Engineering and Identity Management under the Information Resources Management Support (IRMS) Contract.
- Established the “Trust Working Group” which included negotiating and leading the adoption of a 13-point common security criteria for configuring network perimeters at all eleven NASA field centers.
- Maintained 99.999% standard for service level agreements during upgrades from fiber to switched network infrastructures while introducing the first network-layer firewalls within NASA.
- Provided system administration and firewall engineering support for the U.S. Department of Justice.
- Assisted with the processing of survey results and initial data analysis for an FBI intelligence risk assessment.
0-5 years of experience
Provided Tier II Support for Checkpoint Manage Firewall clients.
- Configured, troubleshoot, and upgraded Checkpoint Firewalls for Manage clients, which included network and/or resource access, software, or hardware problems.
- Opened, resolved, or updated Tier II Support tickets for Manage Firewall clients.
- Provided Manage Firewall Clients’ with regular status reports of their trouble tickets.
0-5 years of experience
Responsible for maintaining 119 Linux servers, including firewall configurations and server upgrades.
- Responsible for the configuration and implementation of NT and Windows 2000 servers.
- Utilized Tivoli Storage Management tool to monitor and optimize storage capacity.
- Configured Proxy servers including WINS Sever configurations for 104 sites for TCP\IP leases.
- Upgraded Master Trend 3.30 to 15 sites including Europe.
- Assisted in IT security audits for clients/customers.
- Configured and supported Cisco 7500 and 4500 routers.
0-5 years of experience
Member of a 4 person team responsible for managing systems and policy changes to DLA’s
firewall infrastructure. The firewall mesh consists of approximately 80 checkpoint firewalls
running on ipso/gaia appliances, and the infrastructure to maintain them. All firewalls are
configured as high availability clusters.
- Project lead to define, consolidate and standardize documentation, standards, and policies.
- Designed system to streamline management of multiple firewalls using shell, perl, and keyed ssh.
- Streamlined and documented firewall build process, along with creating standardized dynamic
- Implemented enterprise system monitoring using nagios. Wrote many custom checkpoint
- All configurations (such as nagios) and documentation are maintained using revision control
0-5 years of experience
Managed installation, and configuration of 50+ Checkpoint Firewall-1 2000 (v41) and Checkpoint Firewall-1 NG (v50) firewalls operating on the Nokia IP series Network Appliance Platform (NAP) with Checkpoint Provider-1 with SmartCenter in corporate data centers as well as remote data centers. Nokia IP platform include 330, 440, 650 and 740 in [company name] DMZ, Extranet, and Internet zone
- Maintain High Availability and Clustered firewall environments for customers using Check Point High Availability, and Nokia VRRP. Provide on-going support.
- As one of three lead contacts in our group for firewall troubleshooting and maintenance issues, responsible for resolving the issues from company and/or vendor documented resolutions.
- Supplied data on irresolvable firewall issues to the vendor Technical Assistance Centers (TAC) and, with assistance from the vendor technicians, advanced towards full resolution of the issues and documentation of the process.
- Provide Support for [company name] vpn client Infrastructure consist of 20,000 sales force.
- Provide administration for global, regional and local DNS & DHCP servers via QIP.
- Provided ongoing administration and support for authentication service using RSA SecurID and Cisco RADIUS servers for internet-based remote access vpn solution
- Use Peregrine Service Center to track device inventory, provide support for client, vendor and generate SLA reporting.
0-5 years of experience
Member of the Firewall Team, which Designed, Configured and Maintained the Cloud Infrastructure of the [company name].
- Implemented the Policy Rules, DMZ and Multiple VDOM’s for Multiple Clients of the State on the Fortigate Firewall.
- Implemented the Inter VDOM Routing through the Fortigate Firewalls and also the Router.
- Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
- Implemented IPS, DLP and UTM features on the firewall for added security purposes.
- Deployed the Air-Magnet Survey Pro and Spectrum Analyzer to study the Heat Maps and Spectrums to perfectly position the Access points.
- Configured and Maintained Cisco Wireless Access Points (Cisco – 3500’s, 3600’s), using Cisco Wireless Controllers at the Data-Center Admin Department.
- Deployed AT&T and Verizon Carrier Vendors onto the Cloud Infrastructure.
0-5 years of experience
Charged with managing internal IT infrastructure components including Check Point Firewall-1 4.1, Netscape Proxy servers, DNS servers, and SMTP mail relays as weall as the installation, design, and support of connectivity from Arthur Andersen client engagement sites to the internal network. Operate within Security Control Center that provides 24×7 support to 85,000 global users.
- Project lead for HP-OpenView NNM and BMC Patrol implementation.
- Project lead for the redesign and upgrade of the Andersen Chicago Internet gateway and data center.
- Worked with Andersen’s Network Engineering and NOC in the ongoing configuration, maintainence and monitoring of their Cisco routers and switches.
- Instrumental in developing and mentoring junior staff members.
- Coordinated and configured multi site VPN connections and multimple mobile “War Room” VPN connections for emergency Partner meetings & client engagements.
- Increased traffic load support by building out Internet Gateway Architectures in key locations; developed complex designs to ensure high availability, load balancing, traffic sharing, dynamic routing, and fail over.
- Participated on a team responsible for the seamless transition of operational support for security devices prior to the Arthur Andersen/Accenture network split.
- Automated variety of routine system administration tasks.
- Authored policy, support documentation, and best practices for the Andersen security architecture.
0-5 years of experience
Simultaneously maintained, configured, and supported over 450 managed firewalls
- Supported Check Point 3.x, 4.x, Net Ranger IDS, Cisco Pix, HP Open View
- Configured and supported site to site virtual private networks
- Closed more firewall tickets than any technician in the history of the SOC (1000/year)
0-5 years of experience
Perform Level 3-4 troubleshooting and analysis of disaster recovery issues, security implementations, firewall configurations, vulnerability assessments, and intrusion detection and analyze, customer consultation.
- Troubleshoot firewall configurations remotely supporting all [company name] managed firewall solutions East-Coast, West-Coast, UK and Customer remotely managed Firewalls).
- Develop, implement and update security principles supporting customer migrations, configurations and implementations.
- Implement, configure and troubleshoot VPN’s and Secure Remote related issues.
- Manage 400+ Nokia Firewalls utilizing Provider-1.
0-5 years of experience
Perform Level 3-4 troubleshooting and analysis of disaster recovery issues, security implementations, firewall configurations, vulnerability assessments, and intrusion detection and analyze, customer consultation.
- Troubleshoot firewall configurations remotely supporting all [company name] managed firewall solutions East-Coast, West-Coast, UK and Customer remotely managed Firewalls).
- Develop, implement and update security principles supporting customer migrations, configurations and implementations.
- Implement, configure and troubleshoot VPN’s and Secure Remote related issues.
- Manage 400+ Nokia Firewalls utilizing Provider-1.
0-5 years of experience
Responsible for Firewall rule remediation including Checkpoint and Juniper rules
- Responsible for rule usage reporting and rule analysis pertaining to least access
- Identify unused rules and submitted to line of business (LoB) for approval to keep or disable
- Experience with FireMon rule analysis and reporting tools
- Experience with checkpoint smart domain manager
- Write, update and maintain system documentation
- Ability to investigate and analyze information and to draw conclusions
0-5 years of experience
Build Check Point firewall, and configured GUI to open/close TCP/IP ports
- Configured Checkpoint VPN to tunnel encrypted data over the public network.
- Used Nokia voyager to configure firewall static routes and ARP cache, VRRP.
- Used routing table and firewall logs to troubleshot, tcpdump to track firewall real-time data.
- Telnet into Cisco router to configure and update interface, and subnet TCP/IPv4.
- Used Visio diagram to support the verification of switches and servers in the DMZ.
0-5 years of experience
Configure, administer, and document firewall infrastructure, working with Cisco ASA, Check Point SPLAT, GAIA, Crossbeam, and Nokia platforms for Data Centers.
- Manage the firewall deployment, rules migrations, and firewall administration.
- Responsible for converting existing rule base onto new platforms.
- Deploy new equipment and work with remote site support to get devices racked and stacked as well as configured per standards and then added to Provider-1.
0-5 years of experience
- Report, coordinate, and effectively remediate McAfee IDS/IPS and Juniper/Palo Alto firewall anomalies and deficiencies under our operational control. Additionally performs detailed data/trend analysis to detect abnormalities and irregular configurations of all information systems.
- Resolves configuration management [CM] issues, monitor CM compliance with DoD, Federal and Intelligence Community [IC] regulations.
- Conducted vulnerability and Security Technical Implementation Guide (STIG) compliance scanning and auditing in support of Information Assurance Vulnerability Management (IAVM) using VMS to report compliance; Apart of team that helped increase Agency’s security posture by 16% and earned an Excellent rating.
0-5 years of experience
Joined as a Firewall Engineer in their AMS IT SMART Team.
- Duties include Firewall Design, Planning & Deployments.
- Vendors Network connectivity investigation, validation & Support in a Managed Service Environment.
- Exposure of large complex Checkpoint, Cisco ASA & Juniper firewalls in a Managed Service Environment.
- Creating objects, rules & policies on Checkpoint/HP D1, D2, and D3 Appliances.
0-5 years of experience
Escalation point for international organizations network security needs. Create and recommend network design and architecture for SonicWALL’s customers. Aid in the design and development of the SonicWALL OS firmware.
- Implementation of SonicWALL devices including analysis of client’s networks and configuration of SonicWALL to secure network including VPN IPSEC, IDS/IPS and AV.
- Configuration & troubleshooting VPN (IPSEC, SSL-VPN) with SonicWALL and other 3rd party devices, NAT and PAT translations, Filtering traffic using SonicWALL Content Filter and Firewall Access Rules.
- On call support of SonicWALL devices for government agencies.
0-5 years of experience
- Consultant for Checkpoint diamond customers (Bank of America, JP Morgan Chase, Herjavec Group)
- Deployed Check Point 61000 (flagship firewall), VSX (virtual system extension), and Provider-1 (multi-domain firewall application) for Fortune 100 customers. (VISA, AT&T, Citigroup)
- Provided Technical support for all Check Point products (Firewall, IPS, Web Filtering, Application Control)
- Layer 1-7 in-depth packet-level troubleshooting and debugging for root cause analysis (Wireshark, TCPdumps, Linux kernel and session debugging)
- Project Leader for 500+ firewall replacements from Cisco ASA/PIX to Checkpoint IPSO for JP Morgan Chase
0-5 years of experience
- Provided onsite / remote network support for multiple [company name] clients
- Supported network devices: o Routers: Cisco 7600 series, 2821
- Management software utilized: Solsoft SDM, CiscoWorks
0-5 years of experience
Managed LAN/WAN networks of this managed health care enterprise with 2000 nodes scattered in 85 offices throughout the United States, Canada and Puerto Rico.
- Responsibilities included installation, configuration and troubleshooting Cisco Routers 7507, 3640, 26xx, 25xx with EIGRP routing protocol, Catalyst Switches 6509, 3500XL, 3200, 2900XL, Access Servers AS5300, 3Com Switches, Hubs, Adtran, ATT Paradyne CSU/DSU, T3 Multiplexers using Frame-Relay, T1, PPP and ISDN circuits.
- Responsible for installing, configuring and managing various Check Point firewalls 4.0 to implement security for Internet, extranet business partners and vendors.
- Help draft a VOIP network in between corporate and branch offices using Cisco 3660 over T1 and Frame-Relay circuits.
- Responsible for designing and implementing company-wide TCP/IP based DHCP, DNS and WINS structure; Managing Windows NT based domain user profiles, policies and security.
- Responsible for hosting Genex web site, managing web servers, IIS; designing and publishing Intranet site.
0-5 years of experience
Firewall administration – ASA, SideWinder
- URL Filtering Websense administration
- Network Intrusion Detection (NIDS) / Network Intrusion Protection (NIPS) administration
- Workstation and server encryption
- 2 factor web and network access administration
- PKI administration
0-5 years of experience
Owns customer reported network issues and provides quick service restoration and problem resolution.
- Develops and maintains troubleshooting skills on all Check Point products and technical knowledge in industry standard technologies.
- Provides analysis of data traces from protocol analyzers and traffic generators.
- Offers planning, design, implementing and troubleshooting complex networks and advanced technologies.
- Provides design, installation, configuration, maintenance and administration of CheckPoint Firewall R71 up to R77 version, Secure Platform Installation, VPN.
- Advanced knowledge in Cisco Switches and Routers Configurations.
- Brings solid understanding of configuration and installation of IOS security features and IPS.
- Advanced knowledge in security risk analysis, attack mitigation and penetration test.
- Demonstrated experience with IPSEC VPN design connection and protocols, IPSEC tunnel configuration, encryption and integrity protocols.
- Management of proxies, firewalls and load balancers
0-5 years of experience
Management of both network and retail store firewalls utilizing Cisco Security Manager (CSM).
- Use IBM Proventia MX and Cisco ASA 5500 series firewall technologies.
- Manage and monitor over 1,300 IBM Proventia MX firewalls utilizing IBM Site-Protector.
- Use RSA envision to collect and analyze firewall logs.
- Use HP Service Manager to manage firewall tickets.
- Use SharePoint to manage and share documentation.
- Monitor security processes and controls to ensure adherence to SOX, HIPAA and GLBA laws and regulations in relation to safe-guarding information.
- Adhere to internal SLA’s.
- Adhere to Change Management and SDLC.
- Work with other stakeholder’s such as, Network Engineering, Vulnerability Management and Internal Audit.
0-5 years of experience
Administering Firewalls i.e. Cisco/Checkpoint, Evaluate firewall access control requests to ensure they conform to Company’s security standards and policies, application security reviews using vulnerability assessment tool i.e. ISS Internet Security Systems (IBM’s) for application level vulnerability assessment & Solar Winds for performance monitoring
- Hands-on experience on Checkpoint Firewall R77, Palo Alto and Cisco ASA 5520 firewalls.
- Experience on Check Point Firewalls NG, NGX R65, R70, R75, R77, NSX (VMware Network)
- Experience in creating multiple policies and pushing them in to Checkpoint Firewall (Gateways) and hands on experience in managing the Checkpoint Management Server
- Configuring BGP/OSPF routing policies and designs, worked on implementation strategies for the expansion of the MPLS VPN networks
- Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience
- Implemented VLAN, VTP domain, Trunking and Ether Channel on Cisco 5500 switches
- Configuring failover for redundancy purposes for the security devices. Implemented the stateful & serial failover for PIX/ASA firewalls, Checkpoint Clustering and load balancing features
- Install Packet Shaper as QOS system to monitor and manage network traffic
- Migrations included and not limited to Cisco to Cisco and Cisco to Checkpoint and Checkpoint to Checkpoint
0-5 years of experience
Responsible for Firewall rule placement, creation, and deletion on Checkpoint and Juniper firewalls.
- Identify rules that allow traffic over unsecure ports, as well as rules that allow traffic to or from non-existent IPAdresses; recommend those rules for remediation.
- Responsible for rule usage reporting, rule analysis pertaining to least access, Red Risk and “Comments” section baseline documentation.
- Responsible for placing risk assessment and auditing rules (high med low) based on object names, access and comments (i.e. application awareness) to determine potential impact of deletion.
- Duties include running Firewall reports and queries in Firemon, Check Point, VMINFO and Application Inventory Tool.
- Collaborate and coordinate with technology and business leads on the investigation and resolution of rules and policies out of scope.
- Responsible for submitting eConnects (problem tickets) to delete/modify rules, change control requirements, reporting status and escalating to firewall governance.
- Provide descriptive design details to the third party vendors to make rule changes to P/firewalls.
- RFC creation through Maximo and process involvement in CAB and Tollgate meetings.
- Unix, Linux, Perl, and SQL scripting in a junior level.
0-5 years of experience
ASA and Fortigate Firewalls while adhering to Federal informational guidelines.
- Acted as a security liaison to the Network Operations Center in order to be sure changes made were in compliance with internal SBA network standards as well as US government safety standards
- Lead team to implement site to site VPNs with other government entities as well as private companies after setting up a government compliance plan for them
- Worked closely with Bank of New York in order to set up private VPN access to internal SBA financial servers.
- Led a team to implement security parameters and set up VPN tunnel for the 1901 group implementation of their server polling systems for network system uptime.
- Volunteered to lead a 2 man team in order to clean up firewall rules for Checkpoint and ASA firewalls to insure network safety.
- Using CounterAct I would observe, notify and resolve any users machines that were compromised by any security risk by black listing them.
- Using Sourcefire IDS monitored the network from all external attacks including DDoS as well as port scanning.
- Held a control board meeting 2 times a week in order to be sure all agencies within SBA understood and were compliant with any firewall changes.
0-5 years of experience
Design and Troubleshoot EDS Global IP Backbone Network and Customers network devices, which includes routers, switches, load balancers, and firewalls.
- Configure/Troubleshoot static and dynamic routing on Cisco’s 2600, 3600, 7200, series routers
- Design, Configure/Troubleshoot private and public Vlans on Cisco’s Catalysts 2900, 3700, 5500, 6500 switches for customer’s requirements.
- Configure/Troubleshoot Load balancing on Cisco CSS/ create vips, services, ip redundancy as customer needs and request.
- Configure Cisco pix ACL/conduits, static NAT, and SNMP monitoring for customers request for access and denial services toward their networks.
- Investigate all customer network attacks with EDS Syslog (for all ip traffic coming in EDS network).
- Troubleshoot netscreen vpn devices for untrust, trust, and tunnel access (connections) for all customers’ networks.
- Investigate all ports and interfaces health issues for the routers and switches connectivity with customers agreed speed, duplex and bandwidth.
- On call 24×7 for all Network related issues (Cisco tac cases/bridgelines)
0-5 years of experience
Maintain and Support JWICKS network at JTF HQ (IOF). Update and maintain Cisco ASA 5540 Firewalls, configure IPS modules, failovers, firewall exception requests. Work Bluecoat configuration and CND issues.
- Configure and maintain IPS modules.
- Update IOS and configure Firewall rules, ASDM console and Command Line Interface (CLI).
- Trouble shoot issues
- Admin for Blue Coat Server
0-5 years of experience
- Maintained security posture of the BAMC’s network through engineering and daily administration of the hospital’s Cisco ASA Firewall Services Module, BlueCoat, and IronPort web proxy / filter, ultimately controlling all traffic between BAMC and other US military hospitals around the globe.
- Oversaw operations of BAMC’s Network Engineering Branch which provided networking services to Army’s premier medical facility totaling over 9,000 concurrent networked devices and over 1 million square feet.
- Provided network engineering consultation to BAMC in medically-related IT implementation & integration projects, as well as BRAC-related network expansion projects.
- Provided forensic analysis to solve wide variety of issues to include general communications issues, access issues, and security-related issues through use of logs, packet sniffers, and protocol analysis.
- Managed BAMC’s “slash /17” public IP address space, its related subnets, and VLAN structure to facilitate hospital’s IT expansion projects, while ensuring maximum stability and scalability.
- IP Multicast engineer for BAMC when engineering hospital’s network to provide fully redundant multicast capability to support new Draeger patient monitoring systems (critical system).
- Proposed new network design solution & interim solution for BAMC’s network to address limitations of the hospital’s current “collapsed” Core/Distribution layer design (design has been approved by management & third party expert from Cisco).
- Lead engineer in design and integration of Cisco NAC (Network Admission Control) with BAMC’s network in wired, wireless, and VPN environments.
0-5 years of experience
Managed LAN/WAN networks of this managed health care enterprise with 2000 nodes scattered in 85 offices throughout the United States, Canada and Puerto Rico.
- Responsibilities included installation, configuration and troubleshooting Cisco Routers 7507, 3640, 26xx, 25xx with EIGRP routing protocol, Catalyst Switches 6509, 3500XL, 3200, 2900XL, Access Servers AS5300, 3Com Switches, Hubs, Adtran, ATT Paradyne CSU/DSU, T3 Multiplexers using Frame-Relay, T1, PPP and ISDN circuits.
- Responsible for installing, configuring and managing various Check Point firewalls 4.0 to implement security for Internet, extranet business partners and vendors.
- Help draft a VOIP network in between corporate and branch offices using Cisco 3660 voice gateway over T1 and Frame-Relay circuits.
6-10 years of experience
- Implement extended access lists, DAPE (deny all and permit with exception), network-objects, object-groups in support of DISA PoP and NGB Guardnet firewall implementation
- Provide tier3 support for firewall operations in a 24×7 NOC/SOC shift environment for the National Guard Bureau. Responsible for production level operations and maintenance of the 3000 node, worldwide, NGB CONUS WAN. Provide hands-on tier3 firewall, and routing and switching technical support as well as over the phone. Open remedy tickets and bring about troubleticket resolution in line with meeting NGB stipulated SLAs.
- Escalate trouble issues per SLA requirements to Firewall management group and NGB Bureau Chiefs. Perform knowledge transfer and coordination efforts between firewall group and Tiers I and II helpdesk technicians.
- Support BlueCoat transparent proxy implementation as component of overall secure web gateway DOJ TIC initiative. Responsible for integrating web gateway configuration into existing multiple DNS tree structures within DOJ.
- Support USARC/RCAS DTTP layer 2 layer 3 refresh project. Document current network layouts and equipment inventory by creating detailed visio diagrams. Perform physical on site surveys in effort to gather accurate network layout information to comprehensively create afore-mentioned diagrams.
- Participate in and provide technical input to design reviews for sites that are to be scheduled for network equipment upgrades. Update visio diagrams based on revisions and modifications that result from network diagram peer review process and site pre-design review conference calls. Perform lead network engineer role in the upgrading of sites that have been cleared through the design review process.
0-5 years of experience
- Responsible for building and implementing standard firewall configurations in a standalone and HA configuration using Checkpoint Firewall software and Stonebeat high availability software. Disaster recovery planning, testing with system maintenance and upgrades.
- Directly responsible for Market Data firewall implementation strategies involving external client connectivity for Bloomberg and Instinet trading application feeds.
- System hardware, software and network troubleshooting and problem resolution for over 200 firewalls in a 24 x 7 env including domestic and international locations.
Firewall Engineer Duties and Responsibilities
Firewall engineers are responsible for handling several daily tasks. We analyzed multiple job listings for firewall engineers and found that the following duties and responsibilities are commonly listed for this occupation:
Design Security Systems Firewall engineers review client requirements for security systems and collaborate with other engineers and developers to decide on an overall technical approach. Once they reach agreement with the client, they proceed with creating specific designs.
Install and Maintain Firewalls It’s up to firewall engineers to direct the installation of both the software and hardware components of firewalls along with other portions of security infrastructure. They also configure firewalls for usage, manage their day-to-day operations, and perform regular maintenance through upgrades and patches.
Troubleshoot Issues Firewall engineers constantly monitor security devices and applications for performance problems and provide troubleshooting support for clients. When issues arise, they must analyze the root cause and resolve them promptly or else escalate them to another department while updating clients all throughout.
Write Documentation Aside from preparing status reports for clients, firewall engineers write extensive documentation on procedures, device statuses, firewall block lists, and other important technical areas. They also create diagrams of network topologies and record details of troubleshooting processes.
Ensure Compliance Standards and policies are extremely important when it comes to network security, and firewall engineers should be aware of these, keeping abreast of changes and defining processes for compliance. In addition, they enforce quality control and ensure that all output meets project requirements.
Firewall Engineer Skills and Qualifications
Firewall engineers are problem-solvers with a strong technical aptitude. They communicate well with clients and other members of their team, and they hold their work to high standards, optimizing performance and resolving all errors. In addition to a bachelor’s degree in computer engineering, computer science, or a related field, employers look for firewall engineers with the following skills:
- Expertise in computer security – firewall engineers must have advanced knowledge of computer security and networking. They’re familiar with the underlying theories and can diagnose issues, build infrastructure, and work with related software
- Problem-solving skills – this role requires much problem-solving, since firewall engineers must be able to apply their technical expertise across various client environments and solve any obstacles that arise
- Customer service – firewall engineers interact with clients during all phases of the project, from planning to maintenance. In particular, they must be mindful of client needs and clearly communicate complex information
- Attention to detail – as with most other jobs that involve working with technology, firewall engineers must be meticulous and detail oriented, examining every aspect of the system to guarantee security and spot computer bugs or anomalous activity while they’re still minor
- Time management – it’s common for firewall engineers to multitask, as they often take on several projects at the same time while debugging problems reported by customers and coordinating with other team members
Firewall Engineer Education and Training
Most firewall engineers have a bachelor’s degree in computer engineering, information technology, computer science, or a related field. Because this position relies heavily on hard skills, significant technical training is necessary, and employers typically look for security and networking certifications from organizations such as Cisco and AXELOS. It’s also preferable for candidates to have at least four years of previous experience in computer networking, especially with firewall technologies.
Firewall Engineer Salary and Outlook
PayScale reports that firewall engineers have a median annual salary of around $84,000. Those in the bottom 10 percent of the income range earn less than $54,000 per year, while those in the highest 10 percent earn significantly more, with salaries going beyond $140,000. The Bureau of Labor Statistics (BLS) projects a job outlook of 6 percent growth for network and computer systems administrators, a sector that includes firewall engineers. The increasing use of information technology is a major driver, but cloud computing may bolster productivity and cut down work for network administrators.
Helpful Resources
If you’re interested in a career as a firewall engineer, there are many resources available. Browse through this curated list for books, communities, and learning opportunities:
Network World – this website is a comprehensive source of news and in-depth information about the networking industry. It publishes blog posts, slideshows, insider tips, and tutorials on a regular basis, and compiles white papers from different organizations
Defensive Security Handbook: Best Practices for Securing Infrastructure – written by two security experts, this book takes readers through all of the processes needed for a robust information security program, complete with code snippets, walkthroughs, and practical examples
Cisco Networking Academy – for firewall engineers planning to obtain Cisco certification, this website is an invaluable source of industry information and study materials tailored per track. As a community dedicated to social learning, it encourages members to find study groups and join online discussions
Applied Network Security Monitoring: Collection, Detection, and Analysis – this thorough guide is well suited for experienced firewall engineers who want to improve their network monitoring capabilities. It presents multiple analysis frameworks and breaks down the process into the three stages of collection, detection, and analysis
Information Systems Security Association International – ISSA is a worldwide community that caters to cybersecurity professionals. Members can avail of conferences and seminars as well as access to publications, online forums, and certification training programs