Role : Network Administrator
Required Technical Skill Set : Forescout Administration
Experience : 5 to 8 years
Location : Kolkata, Kochi, Bangalore or Hyderabad.
Job Description : Must Have : -
- L2 / L3 Experience with complex, larger scale network endpoint secure connectivity and access control that spans both wired and wireless access control through Forescout.
- Experience with 802.1X / NAC, DHCP, HTTPS, TCP, Netscout, Radius, etc. and access control policy development and management and device remediation
- Experience with IOT and BYOD device access policy controls
- Very good communication skill.
5.Flexible in 24
7 client supportGood-to-Have : -
Additional certification in any network technology (CCNA, CCNP)Experience in automation, AI / ML technologiesResponsibility of / Expectations from the Role : -
Designing, configuring, and troubleshooting CounterAct.Switch Plug-in Optimization (wired) : -
Align endpoint, L2, L3 association with same CounterACT appliance and Configure Connectivity GroupRe-valuate and re-configure polling Intervals for L2 and L3 switches and routers after configuring connectivity groups.Validate and fix L2(MAC) / L3(ARP) Polling to ensure L3 devices are polled for ARP table, L2 devices only for MAC tables.Wireless Plug-in Configuration : -
Add any Wireless Controllers to the pluginAlign Wireless controllers with CounterACT appliance for polling.2.Classification Policy : -
Classification Sub-Rules creation and clean up based upon : -
Device type (Vendor, Model, OS etc.)NICMACAuthentication (MAB, dot1X etc.)Operation Technology (OT / iOT) : -
NATWindowsMobile DevicesMacintoshPrintersVOIPHeadset (HaloLens, Meta Quest etc.)CameraNetwork DevicesLinux / Unix / AIXUnclassified3.Clarification Policy creation : -
OT / iOT Clarification PolicyUnclassified Clarification PolicyValidate comments in sub-rulesRemove initial implementation troubleshooting sub-rules (Port 22 open, netbios / DNS name, etc.)Review and restructure Network Device Clarification PolicyControl Policy Optimization : -
Create catch all buckets / sub-rules in each control policy.Review and modify Exemption sub-rules in control policies.Add secondary blocking action of Virtual Firewall, i.e., via Channels ingesting Network Tap traffic.Review and re-configure recheck setting of control policy sub-rules based on Classification, Clarification and Discovery policy optimizations.4.Operating System Changes : Policy to detect if a device changes OS fingerprint from one OS to another such as Windows to non-windows.
Windows Version Changed on a managed device.5.VPN Plug-in Configuration : Configure VPN plugin to help identify and validate devices connecting via VPN.