We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

0/5 (Submit Your Rating)

SUMMARY:

  • Over twenty (22) years of technical and analytical expertise in the IT industry, with emphasis on system/network administration. Background in supporting various IT infrastructures in the areas of Cisco network administration, Unix system administration, software/hardware installation, software/hardware testing, documentation, and customer support. Directly responsible for assuring the integrity of large, multimillion - dollar TCP/IP systems and client/server based computer networks. Technically and functionally interact with customers and effectively maintain customer relationships.
  • Decipher and logically resolve technical issues while tactfully managing customers in a fast-paced environment. Utilize judgment and decision making to analyze problems and develop logical solutions. Take initiative to learn/apply new software and hardware technology. Acknowledged for professionalism, enthusiasm, versatility and outstanding organizational and leadership skills. Excellent oral and written communication skills.

TECHNICAL SKILLS:

Cisco: CCNA, CCNP Boot Camp, CCIE Boot Camp

Sun: Solaris 8,9, 10 System Administration I, Solaris 8, 9, 10 Advanced System Administration II, SunFire 3800/4800/6800 Server Administration, SUN Performance Suite SAM-QFS, Veritas NetBackup Unix Shell Scripting

Computer Associates: Active Directory, Access Control 8.0

JSI Telecom: VoiceBox Basic System Administration, VoiceBox Advanced System

Platform/Operating System: Sun Solaris 10, 9, 8, 7; Red Hat Linux 6.2, 7.2, 9.0; Irix 6.5; HP/AIX 11.x; Windows 3.x, 95, 98, NT; IBM PC-LAN/DOS; VAX/VMS; and IBM/MVS.

Hardware/Storage: Sun Servers, Sun Workstations Sun Storage ArrayCisco Routers, Cisco Switches, Cisco ASA Firewalls, KG-175 TACLANE, T3 Storage Array, Plasmon Jukebox, HP Jukebox, Brocade, Juniper, F5 Big IP, ..

Application Software: Veritas Volume Manager, and Sun Volume Manager, Veritas Cluster Server, HP Openview, CiscoWorks, NIS+, NFS, and FTP, DNS, Weblogic, Websphere.

Scripting Languages: Bsh, Csh, Ksh, Sed/Awk, Nawk

Database Products: Sybase, Oracle, SQL and Microsoft Access.

PROFESSIONAL EXPERIENCE:

Senior Network Engineer

Confidential

Responsibilities:

  • Responsible for the design, implementation and maintenance of an integrated legal research and business support company network.
  • Installed and configured Cisco 2500 wireless controller and Cisco Aironet 1040 Access Points (AP) providing wireless network connectivity.
  • Configured Cisco routers with HSRP failover capability to accommodate redundancy limiting the amount of downtime within the datacenter.
  • Configured Cisco 6500 Core Switches with HSRP failover capability resulting in minimal to no downtime in the event of equipment failure.
  • Configured MPLS on Cisco Router enabling the routing of voice traffic from remote offices back to the central office.
  • Installed and configured Cisco 5500 ASA firewalls within an active/active failover configuration resulting in minimal to no interruption in the event of failure.
  • Configured clientless SSL VPN on the Cisco ASA 5500 firewall implementing rules to allow/deny specific access.
  • Installed and configured RSA 250 appliance providing two-factor authentication along with the Cisco ASA 5500 firewall.
  • Configured smart-tunneling on the Cisco ASA 5500 to allow clientless SSL VPN (WebVPN) based client’s access to TCP based applications.
  • Configured routing protocols EIGRP, OSPF and BGP routing on Cisco 1800, 2600, 3800 & 7200 series routers.
  • Configured route maps and ACL’s to allow for screening and re-distribution of network traffic.
  • Configured Site-to-Site and Remote Access VPN’s allowing for encrypted highly secure remote connectivity.
  • Configured Network Access Translation (NAT) rules on the Cisco ASA 5500 appliance in routed mode for egress traffic.
  • Configured etherchannels on Cisco 6500 series switch with LACP allowing the formulation of a single logical channel.
  • Installed and configured Cisco Secure ACS (TACACS+) server for network device authentication by users.
  • Installed SSL VPN licenses on the Cisco 5500 ASA redundant pair enabling numerous SSL VPN clients to access the network.
  • Installed RSA soft/hard token licenses on the RSA 250 appliance enabling two-factor authentication for numerous users.
  • Installed and configured virtual load balancers for both web and proxy servers in DR mode to address and eliminate ARP issues.
  • Upgraded the software images of all Cisco network devices to include routers, switches and ASA firewalls.

Lead Systems Engineer

Confidential

Responsibilities:

  • Responsible for the design, implementation and testing of a satellite prototype network incorporating failover scenarios, redundancy, IPv4/IPv6 dual-stack and intrusion detection (IDS).
  • Configured MPLS on Cisco 3600 series routers to simulate ISP provider within a test lab prototype network environment.
  • Designed and tested IPv6 to IPv4 conversion via MPLS ISP cloud within a test lab environment prior to implementation.
  • Configured MPLS on current routers configuration and inserted new routing configuration for implementation into the MPLS cloud routing scheme.
  • Configured both GRE and IPSEC tunnels as a failover within the IPv6 to IPv4 conversion test lab environment.
  • Configured Cisco routers with HSRP failover capability to accommodate redundancy limiting the amount of downtime within the datacenter.
  • Configured Cisco Service Control Engine (SCE) to provide network deep packet inspection (DPI).
  • Created system design and network architecture diagrams providing Layer 2 & Layer 3 view of the network.
  • Responsible for designing the Layer 3 lab connectivity upgrade providing routing throughout the current independent lab design.
  • Configured Cisco 3500 series switches providing LAN segment connectivity within the prototype network design.
  • Configured IPv6 routing within BGP incorporating address-family to effectively route both IPv6 and IPv4 networks.
  • Configured Fortinet Firewall parameters setting up BGP, Virtual Domains, Protocols and Policies effectively providing network security and intrusion detection.
  • Configured Juniper SSG series firewall adding polices, intrusion detection, High Availability(HA) and VPN configurations.
  • Configured ServerIronXL Firewall Load Balancer (FWLB) with failover.
  • Configured F5 Big IP load balancer redundancy implementing active/passive mode for device failover, configuring controllers for both public and private ip addressing, employing SNAT for internal addressing security.
  • Lead engineer responsible for the installation, configuration, administration and design of a CISCO/SUN/Windows TCP/IP based networked environment.
  • Attended weekly meetings with government customer to provide project briefings.
  • Configured Cisco 1800 series router with NAT, DHCP, VPN access, access lists enhancing network security.
  • Implemented IPv6 addressing scheme throughout network test environment utilizing RA for dynamic address assignments.
  • Configured routing protocols EIGRP, OSPF and BGP routing on Cisco 1800, 2600, 3800 & 7200 series routers.
  • Configured and installed Cisco 6506 with Transport Lan Service (TLS), provided by Verizon, to upgrade the current frame-relay infrastructure.
  • Configured and installed Cisco 3845 router for frame-relay routing with two PVC sub-interfaces for redundancy
  • Implemented and managed QoS providing packet priority by defining traffic through class and policy maps.
  • Configured frame-relay BECN/FECN support, set CIR, Bc and Be rates within a frame-relay map class.
  • Configured Alcatel 6000 series and Extreme 450E switches as Core and Access layer switches within an enterprise configured network.
  • Ensured Information Assurance Vulnerability Alerts (IAVA’s) were adhered to by implementing the essential patches for IAVA compliance.
  • Hired as the Subject Matter Expert (SME) to engineer the successful transfer of over 300+ applications from the current SCIF to a newly constructed datacenter for the Dept of Homeland Security.
  • Responsible for determining NOC/SOC hardware compliance prior to datacenter transfer to include essential IOS and hardware (i.e. servers, routers, switches, firewall) upgrades.
  • Responsible for determining application C & A compliance prior to datacenter transfer ensuring software (i.e. Solaris, Linux, Windows) levels were current.
  • Developed system designs detailing the 3-tier architecture (i.e. Web, Application, Database) along with the hardware and applications associated with each tier.
  • Configured the Cisco ASA 5510 for VPN/firewall enhancing network security via authentication and acess-lists/rules.
  • Configured Juniper Netscreen adding and administering policies for authentication and IDS prevention.
  • Configured F5 Big IP for web server load balancing providing uninterrupted load balancing and failover capabilities.
  • Configured and administer network routing protocols BGP, EIGRP, OSPF, TLS over a multicast traffic TCP/IP network.
  • Configured and installed the Cisco WRT54G wireless-G broadband router to allow controlled wireless access to internal employees.
  • Configured and installed Cisco phones on the network via Cisco PoE switches administered via Cisco Call Manager.
  • Configured and installed Bluecoat packeteer wan optimization and web filtering tool to provide efficient bandwidth performance and prevent malware threats.
  • Provided a detailed stenciled diagram of the current network displaying rack and associated equipment per rack.
  • Configured and administered the TACACS server for both user and network node authentication.
  • Utilize Solarwinds network monitoring tool for proactive warning of any issues with network nodes.
  • Work extremely close with ISP providers, Verizon, AT&T, in resolving WAN network connectivity issues.

Senior Systems Engineer

Confidential

Responsibilities:

  • Set up Router VPN tunnels to allow encrypted traffic to flow across the CENTRIXS systems utilizing SIPR tunnels being routed to remote via KG-175 Taclane.
  • Set up BGP, EIGRP and OSPF routing on Cisco 2600, 3800 & 7200 series routers.
  • Troubleshot routing errors to ensure network statements properly reflected correct autonomous system numbers and backbone area 0 as well as routing statements and ACL’s.
  • Performed network traffic analysis i.e ip sniffer applications, Cisco NAPA application performance monitoring tool with alerts to detect application performance issues.
  • Configured HSRP on Cisco routers setting the standby ip, preempt and priority to provide failover capability.
  • Installed and configured Cisco 2950, 3550, 3560 and 3750 switches for data and voice VLAN on both SIPR (secure) and NIPR (non-secure).
  • Installed SSH, Trunking ports, Spanning-Tree Protocol(STP), TACACS authentication, SNMP and VTP information on over 600+ Cisco switches which enabled connectivity to 1000+ military customers.
  • Set up Router VPN tunnels to allow encrypted traffic to flow between SIPR and NIPR systems before being routed to remote sytems utilizing the KG-175 Taclane.
  • Set up etherchannels on Cisco 6509 Core Switch enabling multiple port traffic to flow through a single channel thereby reserving bandwidth.
  • Configured and installed approved Alcatel 1100 and 7470 series switches to connect independent divisions onto the theatre network.
  • Successfully migrated a tactical network consisting of multiple trunked switches allowing a single point of failure to a redundant fiber ring consisting of two Cisco 6509 MCN’s, 6 Cisco 6509 ADN’s’ and numerous independent EUB’s comprising Cisco 3560 and 3750 switches.
  • Set up point-to-point interfaces within the newly migrated network allowing MCN to ADN connectivity which formed the fiber ring redundancy.
  • Configured Routers to support ISDN line configuration as well as frame relay configuration.
  • Utilized Cisco Works to automate and administer maintenance to the numerous routers and switches performing tasks to include upgrading IOS, configurations, and monitoring of system.
  • Set up OSPF routing protocol for both internal and external router to router connectivity establishing communication within the local site and between remote sites.
  • Configured Hot Standby Routing Protocol (HSRP) to provide network redundancy and failover capability to Cisco gateway routers.
  • Successfully configured a redundant ring of Cisco 3750 switches, utilizing stacked technology, to host a Server Farm which housed 200 Dell servers.
  • Re-configured the Centrixs, consisting of Cisco switches and KG-175 Taclanes, to allow the expansion of users via re-iping and subnetting.
  • Configured 7200 series router for point-to-point interface to allow connectivity with distant end site to allow the routing of data and voice traffic.
  • Performed the IOS upgrade of over 600 switches which encompassed the NIPR and SIPR network.
  • Installed and configured over 1000 Cisco 7940 and 7960 VOIP phones utilizing the Cisco Call Manager utility.
  • Configured Quality of Service (QoS) on Cisco routers providing VOIP priority.
  • Monitored all router interfaces configured for ATM, Point-to-Point and Frame Relay to ensure interface connectivity and uptime status.
  • Used network tools Solarwinds, WhatsUpGold and Cisco Works to provide continuous monitoring, update and administering of the theater network which incorporated over 6000 routers, switches.
  • Created network diagrams which allowed for trouble-free understanding of the network topology and swift resolutions when troubleshooting.
  • Resolve tickets issued through the Remedy Change Management Request system used to fix system anomalies and perform upgrades
  • Created NIPR & SIPR user accounts utilizing Microsoft Active Directory to include mailbox creation.
  • Successfully transferred user accounts and mailboxes between OU’s within theater.
  • Responsible for performing daily backups of all Centirixs Windows servers throughout theater .

Senior Information Technology Specialist

Confidential, Baltimore, MD

Responsibilities:

  • Secure Unix servers utilizing Computer associates product suite of eTrust Access Control 8.0, Patchlink, Policy Control Management (PCM).
  • Utilized the Swiftsurf proxy cache to enable page filtering and authentication.
  • Administer user accounts utilizing CA Active Directory software.
  • Develop and maintain Unix bourne shell scripts to support security functions within the Solaris Unix Intranet/Internet environments.
  • Support Federal Reserve Bank (FRB) utility utilized by Social Security Administration (SSA).
  • Attend security meetings and apply essential patches required to keep Solaris Unix servers in compliance with SSA security policy.
  • Installed and administer eTrust Access Control 8.0 and Policy Management Database (PMDB) for numerous functional groups across 62 SUN servers housing Solaris 8,9, and 10..
  • Resolve all user access problems utilitilizing the Policy Management Database (PMDB).
  • Performed daily, weekly and monthly system backups utilizing Veritas Netbackup

Senior Systems Engineer

Confidential, East Rutherford, NJ.

Responsibilities:

  • Administer 120 data center SunFire servers configured with trusted Solaris 8, 9 and 10 encompassing SunFire 280R, Netra T1, V480, 4800, 4900, 6800, 6900 and E25K.
  • Troubleshoot VCS clustering issues which involved restarting nodeagents and clones on Sunfire 4800 application server.
  • Administered the LT100 SAN tape library via GUI interface to perform daily, weekly and monthly backups.
  • Installed and configured Red Hat Enterprise Linux 3.0 onto a Windows Server to include formatting disks, partitioning disk space,
  • Administered the Linux environment to add, modify and delete users, starting stopping services, monitoring.
  • Configured and administered Juniper routers and switches utilizing both NAT and VRRP.
  • Monitored Linux server utilizing commands i.e pstree, lsof, dstat, chkconfig.
  • Administer the Sun Clustered environment requiring the start, stop and occasional freezing of service groups.
  • Setup, enable and disable IP addresses on the F5 Big IP to allow successful load balancing/failover for applications; set up NAT addressing to create undetectable internal-to-external IP addresses.
  • Created a pool of instances grouping together devices for a selected method of F5 load balancing i.e. round-robin.
  • Configured an F5 virtual server ip address and service association for an SSL Proxy.
  • Tested the F5 application instance failover success by disabling one instance
  • Configure Cisco 7506 border router to enable NAT for broadcasting an external IP address consisting of a pool of internal addresses.
  • In corporate Webserver applications (i.e. Websphere, Weblogic) start/stop scripts within the /etc/init.d startup directory.
  • Perform software upgrade and builds to ensure system is in compliance with recommended patches and software level.
  • Interface with Oracle DBA’s to ensure proper configuration of database objects.
  • Resolve tickets issued through the Remedy Change Management Request system used to fix system anomalies and perform upgrades.
  • Perform daily system maintenance to ensure disk utilization is at a minimum by monitoring and cleaning large files contributing to high disk space count.
  • Acknowledged for timeliness recovery of numerous servers within the production environment, ensuring successful transfer of funds from financial institutions worldwide.
  • Performed daily, weekly and monthly system backups utilizing Veritas Netbackup.
  • Installed and configured Solaris 2.7, 2.8 and 2.9, NIS and PKI security keys on Sun 6800, V880, V480, V240, and V210 servers, supporting 1000+ users.
  • Configured Cisco 7000-series switch ports to allow Sun server network connectivity via fiber optic cable and Ethernet (CAT-5) cable.
  • Connected fiber optic cabling to Sun V210 servers utilizing AT-FS201 fiber/Ethernet converter box.
  • Installed SSH on Sun server platforms allowing secure access to Sun 6800, V880, V480, V240, and V210 servers.
  • Installed and configured automount /autofs file system management allowing users to automatically mount file systems based on automount maps.
  • Administer disk storage utilizing Veritas Volume manager to create, extend, remove, mirror and grow volumes.
  • Administer High Availability data storage and access via Veritas Cluster configuration.
  • Administered SUN T3 storage devices to include setting up Lun Masking, Zone hardening, and Aliases on Brocade FC switch.

Senior Information Systems Administrator

Confidential, Rockville, MD

Responsibilities:

  • Administer JSI Telecom monitoring software that is resident on Windows NT servers and workstations operating with Plasmon Jukebox storage devices for over 1000 users throughout geographically disparately separate locations nationwide for the Department of Justice.
  • Install and configure JSI Telecom software across Windows NT platform, setup user accounts, setup ISDN line connectivity, and configure interface to service provider switches.
  • Install and configure Sun V880 Solaris servers and HP/Unix workstations, which included installing software, applying patches and setting up user accounts.
  • Setup input lines on a 456-line input monitoring system configured via 4 T1 trunks, setup Cisco 2500 switches for workstation connectivity, 7200 routers for T1 connectivity, 7000-series switches for VLAN network connectivity.
  • Performed SAN storage administration utilizing the Brocade Fibre-Channel switch for FC zoning.
  • Perform database maintenance, update records, perform queries for a 1,000-user Sybase database.
  • Train incoming system administrators on system administration and networking for Sun Solaris and Windows NT systems.
  • Recognized for ability to perform system troubleshooting and restoration of system problems. System restoration was accomplished with a minimal amount of downtime.
  • Installed and configure Red Hat

Senior Technical Manager

Confidential, Columbia, MD

Responsibilities:

  • Installed/configured SAM-QFS on SunFire 4800/6800 servers and setup T3/T3+ storage array SAN for test and development systems used by software engineers for software development and testing.
  • Installed/configured SunFire 4800/6800 servers and associated peripherals (T3 storage array) used as a production system. Responsible for the daily administration and troubleshooting of any problems which may occur.
  • Installed and configured Veritas Cluster Server (VCS), Volume Manager and Oracle Enterprise Agent.
  • Installed and configured the SunFire E25K server loading Solaris 8 and 9 platforms across several domains assigning resources to support application processing.
  • Configured Brocade Fibre Channel Switch setting up zones utilizing WWN’s for SAM-QFS SAN configuration.
  • Configured Unix kernel parameters to interact with Oracle 9i on SunFire 4800/6800 (Solaris 8) and Sun V880 servers (Solaris 9); configured DNS on V880 server which houses 1000+ IP addresses.
  • Traveled the nation and successfully installed/troubleshot SunFire 3800/4800/6800 servers, T3/T3+ storage arrays, KG-175 TACLANE’s, 7206 Cisco Routers, and 7200 Catalyst Cisco Switches. Dynamically reconfigured server hardware, repaired corrupt SAM-QFS and Unix file systems.
  • Utilized Unix Shell scripting to automate daily tasks and make test, development and production systems more user friendly; installed J Builder, Clearcase and C++ compilers.
  • Compiled SOP’s on setup, configuration, maintenance and repair of SunFire 3800/4800/6800 servers and SAM-QFS and Unix file systems.
  • Built DNS Server (BIND 9 version) which incorporated constructing under /var/named directory master forward and reverse lookup zone files, etc/resolv.conf file, SOA records, NS records, root cache and boot file, primary and secondary DNS servers, configure etc/nsswitch.conf file and starting the DNS daemon.
  • Setup system security on the Juniper firewall ensuring authorized access to both trusted and untrusted users.
  • Configured and installed 10 TACLANE KG-175’s which allowed 1000+ users to communicate over Niprnet/Siprnet message traffic lines via Cisco Router tunnels.
  • Installed ACL’s on the Cisco 7206 Siprnet (secure) and Cisco 4500 Niprnet (unsecure) to restrict/allow untrusted/trusted networks and users.
  • Recovered Cisco 7206 Siprnet router from a deleted ACL which caused a total outage for 3000+ customers in minimal time; recovered Cisco 4500 router fm a total NVRAM and Flash loss due to a power outage which caused a total island-wide communication loss.
  • Troubleshot DNS sendmail non-deliverance server errors providing a timely resolution for 3000+ customers.
  • Verified system integrity of Sun platforms by conducting regularly scheduled system backups, implementing system security, and performing filesystem housekeeping and overall system health monitoring on a TCP/IP fiber optic network.
  • Installed/upgraded Solaris 2.x, install/remove patches, installed COTS software, administered/setup IP addresses, administered system users, and performed daily, weekly and monthly backups.
  • Administered high availability storage utilizing Sun Volume Manager creating volumes, resizing filesystems, replacing VM disk within a diskgroup.
  • Oversaw and verified operational readiness of the Sun RAID arrays and performed troubleshooting procedures to recover from failures.
  • Developed standard operating procedures used for the installation, configuration, and administration of Sun Platforms.
  • Analyzed and performed troubleshooting for a variety of Sun platforms and associated networking components (routers, hubs, and switches).
  • Recognized for ability to perform system troubleshooting and restoration of system problems which resulted from unexpected power outages. System restoration was accomplished with a minimal amount of downtime.

Cryptologic Technician

Confidential, Washington, D.C

Responsibilities:

  • Configuration manager responsible for the building and baselining of SunOS based systems within the test, development and production environments.

Unix System Administrator

Confidential, Fort Meade, MD

Responsibilities:

  • Administered and managed 24X7, 2000-user, Sun Solaris systems.
  • Maintained Sun Workstations and associated peripherals, performed daily/weekly system backups, and administered users.
  • Installed, configured and tested newly released software and hardware.
  • Interfaced with users and analyzed user requirements for system implementation.
  • Prepared and presented system-related briefings to upper-echelon chain-of-command.
  • Recognized for ability to tactfully manage customers in a fast-paced environment.

Configuration Manager/Unix System Administrator

Confidential

Responsibilities:

  • Administered and managed 24X7, 2000-user, Sun Solaris systems.
  • Maintained Sun, IBM/MVS, and VMS/VAX Platforms, including associated peripherals.
  • Performed daily/weekly system backups, administered users, and maintained system configuration logs.
  • Installed, configured and tested newly released software and hardware
  • Prepared and presented system-related briefings to chain-of-command.

We'd love your feedback!