Job Description

We’re seeking a client-facing Senior Technical Consultant with deep, hands-on expertise in Cisco Identity Services Engine (ISE) and Cisco Firepower Threat Defense/Firepower Management Center (FTD/FMC). You will design, implement, migrate, and optimize secure network access and perimeter/segmentation controls for enterprise customers. This role blends technical leadership, delivery ownership, and trusted-advisor consulting—across discovery, architecture, build, testing, knowledge transfer, and post-deployment support

What You’ll Do (Key Responsibilities)

  • Client Delivery & Consulting
  • Lead end-to-end delivery of Cisco ISE and Firepower projects: discovery, High-level Design (HLD), Low-level Design (LLD), build, cutover, validation, documentation, and knowledge transfer.
  • Facilitate workshops to gather requirements, assess current state, and map outcomes to best practices and security frameworks (, Zero Trust, NIST).
  • Create SOW inputs (scope, assumptions, milestones) and delivery artifacts (migration plans, rollback plans, test plans, runbooks).
  • Cisco ISE (Core Focus)
  • Architect and deploy ISE in standalone and distributed personas (PAN/MnT/PSN), including HA and scale considerations.
  • Design and MAB policies for wired/wireless, RADIUS/TACACS+ services, device profiling, posture assessment, and Guest/BYOD onboarding flows.
  • Build authorization policies using security group tags (SGT/TrustSec), dACLs, and dynamic VLANs; integrate with Active Directory/LDAP, PKI, Duo, and AnyConnect posture modules.
  • Implement pxGrid integrations with ecosystem tools (, SIEM, EDR, NAC partners) and guide segmentation strategies.
  • Cisco Firepower – FTD/FMC (Core Focus)
  • Design and implement FTD (physical and virtual appliances) managed by FMC (HA, clustering, multi-context where applicable).
  • Build Access Control Policies, SSL decryption, Intrusion Policies, Malware, Security Intelligence, URL Filtering, and NAT; tune policies for efficacy/performance.
  • Understanding of IPsec (remote-access and site-to-site) IKEv1/IKEv2 and SSLVPN Secure Client/AnyConnect
  • Migrate from legacy ASA to FTD with structured policy rationalization and cutover/runbook planning.
  • Integrate FMC with external tools (, ISE/pxGrid SGT, SIEM) and enable flow telemetry/Health/Correlation where appropriate.
  • Networking & Ecosystem (Plus)
  • Collaborate across switching/routing (OSPF/BGP, EVPN/VXLAN), Cisco WLC/Catalyst wireless for ‑Enterprise/PSK transitions, and SD‑WAN/VPN contexts.
  • Tie-in with other Cisco security solutions (, AnyConnect/Secure Client, Duo, Secure Endpoint (AMP), Umbrella, SecureX). Experience with other vendors’ firewalls/NAC is a bonus.
  • Quality, Documentation & Enablement
  • Produce high-quality HLD/LLD, as-built documents, security policy maps, and operational runbooks.
  • Conduct formal knowledge transfer (KT) and admin training; mentor junior consultants and collaborate with PMs on timeline/risk management.
  • Contribute to internal accelerators (validated designs, automation snippets, migration checklists).
  • Post‑Delivery & Continuous Improvement
  • Provide hypercare, root cause analysis, and optimization recommendations.
  • Identify follow-on opportunities and feed delivery insights into presales, solution architecture, and packaged offerings.
  • What You’ll Bring (Qualifications)

  • 7+ years in network/security engineering with 3–5+ years delivering Cisco ISE and Cisco FTD/FMC in enterprise environments.
  • Proven delivery of multi‑site ISE and FTD projects (design through cutover), including HA, scale, and production operations.
  • Hands-on with:
  • ISE: , RADIUS, TACACS+,Guest/BYOD, posture, profiling, SGT/TrustSec, dACLs, AD/LDAP, certificates/PKI, pxGrid, AnyConnect posture.
  • FTD/FMC: access control, SSL decryption, intrusion policies (Snort 3), NAT, VPNs, HA/clustering, policy tuning, logging/SIEM integration.
  • Solid L2/L3 networking fundamentals (VLANs, STP, routing protocols, VRF, QoS fundamentals); Wi-Fi concepts.
  • Strong consulting skills: discovery, requirements mapping, documentation, risk management, customer communication, and executive level updates.
  • Experience with change management (ITIL), production cutovers, and rollback plans.
  • Excellent written/verbal communication; ability to lead workshops and train admins.
  • Preferred/Bonus
  • Relevant certifications (one or more highly desired): CCNP Security, Cisco Certified Specialist – ISE/Firepower, CCIE Security (written or lab), CISSP, GIAC (, GPCS, GCIA, GSEC).
  • Experience with Duo, Secure Client/AnyConnect posture, Secure Endpoint (AMP), Umbrella, ISE SGT integration with FMC, and SecureX.
  • Cross vendor exposure (Palo Alto, Fortinet, Aruba ClearPass, Check Point, Juniper) and migration experience.
  • Scripting/automation for repeatability (, Python, Ansible, REST APIs for FMC/ISE), Git basics, and templating mindset.
  • Exposure to Zero Trust segmentation, identity centric access, and compliance frameworks (NIST, CIS Controls, ISO 27001).
  • SIEM/EDR/SOAR integrations and incident response collaboration experience.
  • Success Metrics (KPIs)

  • On‑time, on budget delivery across assigned SOWs.
  • Adoption & Stability: Post-go-live incident rate, mean time to resolution, and policy efficacy (, reduced false positives).
  • Quality: Artifact completeness (HLD/LLD/as-built/runbooks), peer reviews passed, and customer satisfaction (CSAT/NPS).
  • Knowledge Transfer: Customer admin readiness and KT scoring.
  • Practice Enablement: Reusable assets contributed; mentorship feedback.
  • Utilization: Billable utilization targets met while maintaining quality.
  • Sample Project Types You’ll Lead

  • Enterprise rollout with ISE (wired/wireless), posture assessment, guest/BYOD, and SGT-based segmentation.
  • ASA-to-FTD migration including policy rationalization, NAT redesign, SSL decryption strategy, and high availability.
  • ISE pxGrid integration with FMC/SIEM/EDR for adaptive policy and threat response.
  • Zero Trust network access initiative mapping identities to SGTs and enforcing via TrustSec and FMC policies.
  • Education

  • Bachelors in computer science, Information Systems, Cybersecurity, or equivalent experience.
  • Apply for this Position

    Ready to join ? Click the button below to submit your application.

    Submit Application