HimalayasHimalayas logo
AHEADAH

Senior Technical Consultant – Cisco Security

AHEAD
India only

Stay safe on Himalayas

Never send money to companies. Jobs on Himalayas will never require payment from applicants.

We’re seeking a client-facing Senior Technical Consultant with deep, hands-on expertise in Cisco Identity Services Engine (ISE) and Cisco Firepower Threat Defense/Firepower Management Center (FTD/FMC). You will design, implement, migrate, and optimize secure network access and perimeter/segmentation controls for enterprise customers. This role blends technical leadership, delivery ownership, and trusted-advisor consulting—across discovery, architecture, build, testing, knowledge transfer, and post-deployment support

What You’ll Do (Key Responsibilities)

  • Client Delivery & Consulting
  • Lead end-to-end delivery of Cisco ISE and Firepower projects: discovery, High-level Design (HLD), Low-level Design (LLD), build, cutover, validation, documentation, and knowledge transfer.
  • Facilitate workshops to gather requirements, assess current state, and map outcomes to best practices and security frameworks (e.g., Zero Trust, NIST).
  • Create SOW inputs (scope, assumptions, milestones) and delivery artifacts (migration plans, rollback plans, test plans, runbooks).
  • Cisco ISE (Core Focus)

  • Architect and deploy ISE in standalone and distributed personas (PAN/MnT/PSN), including HA and scale considerations.
  • Design 802.1X and MAB policies for wired/wireless, RADIUS/TACACS+ services, device profiling, posture assessment, and Guest/BYOD onboarding flows.
  • Build authorization policies using security group tags (SGT/TrustSec), dACLs, and dynamic VLANs; integrate with Active Directory/LDAP, PKI, Duo, and AnyConnect posture modules.
  • Implement pxGrid integrations with ecosystem tools (e.g., SIEM, EDR, NAC partners) and guide segmentation strategies.
  • Cisco Firepower – FTD/FMC (Core Focus)

  • Design and implement FTD (physical and virtual appliances) managed by FMC (HA, clustering, multi-context where applicable).
  • Build Access Control Policies, SSL decryption, Intrusion Policies, Malware, Security Intelligence, URL Filtering, and NAT; tune policies for efficacy/performance.
  • Understanding of IPsec (remote-access and site-to-site) IKEv1/IKEv2 and SSLVPN Secure Client/AnyConnect
  • Migrate from legacy ASA to FTD with structured policy rationalization and cutover/runbook planning.
  • Integrate FMC with external tools (e.g., ISE/pxGrid SGT, SIEM) and enable flow telemetry/Health/Correlation where appropriate.
  • Networking & Ecosystem (Plus)

  • Collaborate across switching/routing (OSPF/BGP, EVPN/VXLAN), Cisco WLC/Catalyst wireless for 802.1X/WPA2‑Enterprise/PSK transitions, and SD‑WAN/VPN contexts.
  • Tie-in with other Cisco security solutions (e.g., AnyConnect/Secure Client, Duo, Secure Endpoint (AMP), Umbrella, SecureX). Experience with other vendors’ firewalls/NAC is a bonus.
  • Quality, Documentation & Enablement

  • Produce high-quality HLD/LLD, as-built documents, security policy maps, and operational runbooks.
  • Conduct formal knowledge transfer (KT) and admin training; mentor junior consultants and collaborate with PMs on timeline/risk management.
  • Contribute to internal accelerators (validated designs, automation snippets, migration checklists).
  • Post‑Delivery & Continuous Improvement

  • Provide hypercare, root cause analysis, and optimization recommendations.
  • Identify follow-on opportunities and feed delivery insights into presales, solution architecture, and packaged offerings.

What You’ll Bring (Qualifications)

  • 7+ years in network/security engineering with 3–5+ years delivering Cisco ISE and Cisco FTD/FMC in enterprise environments.
  • Proven delivery of multi‑site ISE and FTD projects (design through cutover), including HA, scale, and production operations.
  • Hands-on with:
  • ISE:802.1X/MAB, RADIUS, TACACS+,Guest/BYOD, posture, profiling, SGT/TrustSec, dACLs, AD/LDAP, certificates/PKI, pxGrid, AnyConnect posture.
  • FTD/FMC: access control, SSL decryption, intrusion policies (Snort 3), NAT, VPNs, HA/clustering, policy tuning, logging/SIEM integration.
  • Solid L2/L3 networking fundamentals (VLANs, STP, routing protocols, VRF, QoS fundamentals); Wi-Fi 802.1X concepts.
  • Strong consulting skills: discovery, requirements mapping, documentation, risk management, customer communication, and executive level updates.
  • Experience with change management (ITIL), production cutovers, and rollback plans.
  • Excellent written/verbal communication; ability to lead workshops and train admins.
  • Preferred/Bonus

  • Relevant certifications (one or more highly desired): CCNP Security, Cisco Certified Specialist – ISE/Firepower, CCIE Security (written or lab), CISSP, GIAC (e.g., GPCS, GCIA, GSEC).
  • Experience with Duo, Secure Client/AnyConnect posture, Secure Endpoint (AMP), Umbrella, ISE SGT integration with FMC, and SecureX.
  • Cross vendor exposure (Palo Alto, Fortinet, Aruba ClearPass, Check Point, Juniper) and migration experience.
  • Scripting/automation for repeatability (e.g., Python, Ansible, REST APIs for FMC/ISE), Git basics, and templating mindset.
  • Exposure to Zero Trust segmentation, identity centric access, and compliance frameworks (NIST, CIS Controls, ISO 27001).
  • SIEM/EDR/SOAR integrations and incident response collaboration experience.

Success Metrics (KPIs)

  • On‑time, on budget delivery across assigned SOWs.
  • Adoption & Stability: Post-go-live incident rate, mean time to resolution, and policy efficacy (e.g., reduced false positives).
  • Quality: Artifact completeness (HLD/LLD/as-built/runbooks), peer reviews passed, and customer satisfaction (CSAT/NPS).
  • Knowledge Transfer: Customer admin readiness and KT scoring.
  • Practice Enablement: Reusable assets contributed; mentorship feedback.
  • Utilization: Billable utilization targets met while maintaining quality.

Sample Project Types You’ll Lead

  • Enterprise 802.1X rollout with ISE (wired/wireless), posture assessment, guest/BYOD, and SGT-based segmentation.
  • ASA-to-FTD migration including policy rationalization, NAT redesign, SSL decryption strategy, and high availability.
  • ISE pxGrid integration with FMC/SIEM/EDR for adaptive policy and threat response.
  • Zero Trust network access initiative mapping identities to SGTs and enforcing via TrustSec and FMC policies.

Education

  • Bachelors in computer science, Information Systems, Cybersecurity, or equivalent experience.

About the job

Apply before

Posted on

Job type

Full Time

Experience level

Senior

Location requirements

Hiring timezones

India +/- 0 hours
Claim this profileAHEAD logoAH

AHEAD

View company profile

Similar remote jobs

Here are other jobs you might want to apply for.

View all remote jobs

61 remote jobs at AHEAD

Explore the variety of open remote roles at AHEAD, offering flexible work options across multiple disciplines and skill levels.

View all jobs at AHEAD

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan