Consultant II - Palo Alto Networks

  • Full-time
  • Travel Required: 30 - 39%

Company Description

At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest growing companies in a truly essential industry.

In your role at Optiv, you’ll be inspired by a team of the brightest business and technical minds in cyber security. We are passionate champions for our clients, and know from experience that the best solutions for our clients’ needs come from working hard together. As part of our team, your voice matters, and you will do important work that has impact, on people, businesses and nations. Our industry and our company move fast, and you can be sure that you will always have room to learn and grow. We’re proud of our team and the important work we do to build confidence for a more connected world.

Job Description

Our consultants are skilled technical and consultative resources expected to be strong in both technical and soft skills. A Consultant must be a proven self-starter with the ability to problem-solve, communicate, participate in diverse project teams from a technical perspective, and interface effectively with customers, vendor partners, and colleagues. Establish & maintain productive and respectful relationships with the delivery team, practice management, and client management team.

You will actively contribute to improving operational efficiency on projects and internal initiatives. Deliver timely engagements and works closely with Practice Directors to drive training and education, career development, performance development, and collaboration across the team.

In line with Optiv’s commitment to quality, you will confirm that work is of the highest quality as per Optiv’s quality standards, by reviewing the work provided by other members.

Essential Functions of the Job:

  • Participate and occasionally lead in capacity planning and HW specification recommendation efforts.
  • Participate in all Technology deployment activities, connector configuration, custom rule development, workflow configuration and development, and third-party system integration.
  • Participate in User Acceptance Testing and bug-related engineering efforts and occasionally leads the efforts.
  • Design and implement on specific technology build processes, code migration, and source control use of both small and large projects.
  • Successfully provide knowledge transfer and post production support activities as necessary.
  • Effective team communicator.
  • Mentors less experienced consultants
  • Maintain professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; participating in professional associations such as ISSA.
  • Obtain and maintain top tier vendor certification.
  • Complete administrative project tasks like time and expense entry, status reporting, and project completion reporting.

Qualifications

Knowledge and Skills Requirements:

  • Bachelor's degree and approximately 2-5 years of related work experience.
  • Approximately 2-5 years of technical architecture experience
  • Expertise with one or more of our core Technologies.
  • Thorough understanding of large scale environments
  • Knowledge of at least 2 security concepts and methods such as vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures and governance.
  • Strong presentation and verbal communication skills
  • Process-oriented individual with strong attention to detail, and strong organizational skills
  • Excellent, detailed writing skills
  • Expert knowledge of using Microsoft Office.
  • Ability to build relationships with and influence other functional areas
  • Well-developed negotiation skills.
  • Basic understanding of Services organization and key areas of focus.
  • Ability to build consensus.
  • Ability to manage multiple tasks in parallel.
  • Valid driver's license in the US
  • The successful candidate must hold or be willing to pursue related professional certifications such as the CISSP, CISM, and/or CISA.

Additional Information

All your information will be kept confidential according to EEO guidelines.

Privacy Policy