Jack Young

Senior Enterprise Network Consultant

Table of Contents

Jack's Bio

I have fifteen-years of experience working with many vendors of firewall security appliances including Cisco, Fortinet and Palo Alto, but also Check Point, Juniper and others. I have a good understanding of not only networking but also security, having worked for many clients who required a high-level of security, such as Financial Institutions and Government Agencies.

Personal Summary

I love to learn and have a continuous desire to improve myself through acquired knowledge. Currently, I am preparing for the CCIE Security Lab. My favorite firewall is the Palo Alto. It is not only the most secure, but also has the most up-to-date GUI interfaces that is easier to configure than other vendors' firewalls.

Degrees and Certifications



  • DeVry University - MBA in Information Security
  • DeVry University - BS in Telecommunications Management
  • GCU - Graduate Studies in Research Methodologies


  • Palo Alto - PCNSC (Palo Alto Certified Network Security Consultant)
  • Cisco - CCNP Enterprise
  • Cisco - CCNP Security
  • Cisco - Data Center Operations Specialist
  • Fortinet - NSE4 (Network Security Engineer)
  • Cisco - CCIE Security Written (Lab Scheduled for March 20, 2024)
  • Palo Alto - PSE-SASE (Palo Alto Systems Engineer - Secure Access Service Edge - Professional)
  • ISC2 - CISSP (Certified Information Systems Security Professional)
  • Meraki - Black Belt Deployment Stage 3

Technology Skills


  • Cisco ASA
  • Cisco FirePower
  • Check Point
  • Cradlepoint
  • Fortinet FortiGate
  • Juniper
  • Palo Alto Firewalls
  • Palo Alto Prisma
  • Sonic Wall


  • Cisco ACS/ISE
  • Cisco DUO MFA
  • Cisco StealthWatch
  • Cisco WSA
  • F5 WAF
  • ForeScout
  • Tenable
  • Tipping Point
  • Kali Linux
  • NIST 800-53
  • NIST 800-171


  • Cisco IOS Routers and Switches
  • Cisco Wireless
  • Aruba Switches
  • Dell Switches
  • HPE Switches
  • Telco Circuits
  • MPLS
  • Ekahau
  • Nexus Data Center
  • Meraki MS, MX


  • ArcSight
  • Cattools
  • NetBrain/NetBox
  • Panorama
  • Prime-LMS
  • Solarwinds
  • Syslog
  • Wireshark

Technical Engagements

Medium (1000) Hospital/Medical Provider

Provide Analysis, Advice and Assistance regarding Network & Firewall planning and troubleshooting. Documented all sites (30) for a new acquisition composed of a lot of old equipment that was beyond EOL. Redesigned and upgraded one large office site with an intermediate Fortinet solution, due to being unable to get Cisco switches, to enable a VoIP project to be rolled out. Installed a Perimeter & Core solution in a Data Center as well as a new Dell compute environment composed of a Dell switch stack, (6) Host Servers and a SAN. Provided itemized refresh plans (BOM & SOW) for Cisco network equipment and Palo Alto firewalls.

Large (5000) Medical Insurance Management

Refreshed a PA3050 HA to PA3260. Performed an Audit of their DC FW security policy with over (900) rules - added tags, organized by tag, locked down rules to increase security and reduced the number of rules to a manageable level. Also, found (7) of (20) zones no longer used or never implemented and removed them after removing all associated configuration. Work with ISE, Meraki, NetBrain and Umbrella to troubleshoot firewall related issues. Used Expedition to edit their Palo config to make it more manageable, secure, and reliable, then used “load config partial” to transfer it to device groups & templates in a new Panorama HA.

Enterprise (22,000) Hospitality

Performed a Wireless site survey of their HQ. Created a procedure on how to use an iPad with an Ekahau device to perform wireless site surveys and sync the data to the cloud.

Medium (1000) Financial Services

Upgraded a Check Point MDS environment with four 23500 gateways, two MDS & two MLS devices running on VMware to R80. Built Custom Security Reports using Check Point SmartEvent & scheduled them to be sent via email to management of IT Security each morning. Compiled procedures for upgrading Cisco, Check Point & Fortinet firewalls. Performed a security evaluation of all firewall policies & recommended improvements. Wrote a procedure to create & approve changes through proper change control. Managed firewall changes from planning & design to approval & implementation.

Performed complex troubleshooting of firewall related issues. Used ForeScout & Solarwinds to gather information about devices on the network. Used AlgoSec for Firewall Policy Management & Analysis. Evaluated F5 WAF policies & performed web security tuning. Also, I was on the Security Governance Committee & responsible for Tenable scans of the corporate infrastructure, Vulnerability Management and Revised their Corporate Security Policies.

Enterprise (240,000) Financial Services

Performed upgrades of Check Point & Palo Alto firewalls. Performed Tier 3 troubleshooting of firewall related issues.

Enterprise (11,000) Supply Chain Logistics

Responsible for dual network (secure & non-secure) government zones composed of Cisco 4451 ISR routers & twenty-one Cisco 2960x-48p switch stacks of eight, Fortinet 300D firewalls, Nexus 7k & 9k devices, as well as twenty-six Cisco Catalyst WAPs. Managed NIST 800-171 compliance. Analyzed Fortinet logs using ArcSight. Led daily calls with IT Operations to carefully implement security policy in a secure production environment.

Enterprise (115,000) Government Agency

On a team who upgraded their entire firewall infrastructure from PIX to ASA devices over a period of two years. Was relied upon as an expert for my Team on the complexities of this customer.

Enterprise (40,000) Reinsurance Provider

Performed engineering of network projects, documented & submitted plans for upgrades and for new sites. Assisted with a Data Center upgrade from a Cisco 6500-based one to a Nexus 7018/5596 with 2232 FEX and Cisco 4500 switches.

Medium (1000) Financial Services

Created a detailed network diagram of a complex secure network for a global financial services company containing two large data centers, two control centres and five environments. Implemented firewall changes and upgrades of Cisco, Check Point, Fortinet, Juniper Microsoft, and Palo Alto devices. Preformed audits of network devices and submitted monthly reports to the ISM. Preformed troubleshooting of complex network issues. Created clear & concise procedures and trained junior team members.

Medium (2000) Restoration

Authored a Change Advisory Board (CAB) Charter with associated Policy and Process documents & created a step-by-step Change Procedure for a new ticketing system. Documented their entire network infrastructure of both the HQ office (Perimeter, Core, DMZ, MDF & IDFs) and all twenty-three branch offices using 37-tabs in one Visio. Redesigned the Perimeter to add full redundancy by adding two Perimeter switches. Removed eighteen VLANs in HQ that were not being used and pruned those that were being used to only the switches where they were needed.

Renamed the HQ VLANs to better correspond with their actual function and renumbered the Port Channels between the switches for easier troubleshooting. Managed all Dell S-series switches at HQ and an assortment of different switches at the branch offices including Dell, HP, NetGear & 3Com. Managed all Palo Alto PA-820 & PA-220 firewalls. Managed all VeloCloud Edge-840 & Edge-540 SDWAN devices.

Led the network team in meetings twice a week. Supervised a Junior Network Administrator who configured NetBox. Created a plan to upgrade the outdated branch office switches to one switch model going forward that will become the standard for all branch offices. Migrated a vendor’s S2S Tunnel endpoints from the HQ Palo Alto to the VeloCloud due to a NAT issue that caused intermittent connectivity issues.