Networking Engineer Resume
Pleasanton, CA
SUMMARY
- 6+ years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and Testing of networking system on Multi - vendors
- Expert working knowledge (including the ability to setup, configure, upgrade, manage and troubleshoot Cisco routers, switches, VPN concentrators, firewalls, 802.11 wireless access points and load balancers)
- Extensive hands-on experience with complex routed LAN and WAN networks, routers and switches
- Strong hands on experience on PIX Firewalls, Palo Alto, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
- Strong knowledge of TACACS+, RADIUS implementation in Access Control Network
- Expertise in working with Cisco Nexus Switches, ASR 900 and Virtual Port Channel configuration
- Experience in configuring site-to-site and remote access VPN solutions
- Experience in configuring Wireless 5508 Controllers and Wireless WAP’s
- Experience with Juniper SRX 240 Firewalls
- Good knowledge in configuration of Voice VLAN’s (VOIP), prioritizing the voice traffic over the data traffic
- Understanding the JUNOS platform and worked with IOS upgrade of Juniper devices
- Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools
- Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration from Juniper Net screen SSG-550 toPaloAlto5000
- Experience with F5 BIG-IP local traffic manager for performing load balancing across servers in a single data center
- Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers
- Worked extensively on Juniper MX series Router and EX series Switches
- Hands-on experience with Cisco Nexus 7000, Nexus 5000 and Nexus 2000 platforms
- Experience with F5 load balancers andCiscoload balancers (CSM, ACE and GSS)
- Expert in administration of F5 Load Balancer
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
- Primary responsibilities include design and deployment of various network security & high availability products like Cisco ASA and other security products
- Design and configuring of OSPF, BGP on Juniper Routers (MX960) and SRX Firewalls(SRX240)
- Implementation ofDHCP,DNS, FTP, Cisco catalyst switches, VLANs, STP, Ipv4, Subnetting, IPv6, Network
- Migrated Check Point 680 to juniper SRX 650
- Migration with bothCheckpointand Cisco ASA VPN (CheckpointR75.30 to Gaia R77.30 GA version)
- Hands on experience in configuring and supporting site-to-site and remote access Cisco, IPsec, VPN solutions using ASA/PIX firewalls, Cisco, B2B VPN client in addition to providing TACACS+ and RADIUS services
- Configured Security policies including NAT, PAT, VPN, Route-maps and Access Control Lists
- Configuring VPN, clustering and ISP redundancy in Checkpoint firewall
- Configuring, maintaining and troubleshooting IPS and IPS-1 in Checkpoint
- Configuring, Administering and troubleshooting the Checkpoint, Palo Alto, and ASAfirewall
- Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIXsecurityappliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design
- Deployed Cisco 2500 and 5800 Series Wireless Controllers and 1xxx and 2xxx series Access Points
- Lead administrator for 14F5LTMLoadBalancers, and 4F5GTMAppliances
- Migrated Cisco ASA firewall to next generation Palo Alto firewalls
- Involved in setting up Voice VLANs on distribution switches, and configuring access switches ports for AVAYA IP PHONES
TECHNICAL SKILLS
Routers & Switches: Cisco Switches (2900, 2924, 2950, 3550, 5500, 6500, 6509, 6513), Cisco routers (2600, 2800, 3640, 3700, 3825, 7200, 7204, 7206)
Protocols: RIP, RIP-V2, PPP, OSPF, EIGRP, IS-IS, BGP, SNMP, HTTP, FTP, TFTP, DHCP, SMTP, ICMP
LAN Technologies: Ethernet, TCP/IP, CDP, STP, RSTP, VTP, VLAN, Trunks, Ethernet channel, MPLS.
WAN Technologies: Frame Relay, ISDN, PPP, ATM, MPLS, Channel & Leased lines
Load balancer: F5 Load Balancer, ACE, LTM & GTM series.
Firewalls: ASA, PIX, SRX, Watch guard, ASDM, CSM, Checkpoint
Operating Systems: Windows 2000/2003/2008 , Windows XP/7, LINUX, Red Hat, UNIX, Macintosh
Servers: Domain servers, DNS servers, WINS servers, Mail Servers, Proxy Servers, Print Servers, Application servers, FTP Servers
AAA Architecture: TACACS+, RADIUS, Cisco ACS.
Monitoring Tools: Wireshark, Fiddler, Microsoft Network Monitor, solar winds and some sniffers
Cloud Technologies: Amazon Web Services (AWS)
PROFESSIONAL EXPERIENCE
Confidential, Pleasanton, CA
Networking Engineer
Responsibilities:
- Responsible for support of network security and network devices such as routers, and wireless access points
- Experience working with Nexus 7018/7010, 5020, 5548, 2148, 2248 devices
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
- Adopt to cloud technologies unifying the networking products, services and Infrastructure
- Worked on SDN to automatically reconfigure the network to new workloads and business requirements in multi-vendor environment like Cisco, IBM, Juinper while maintaining the security of the networks
- Worked on multi-technology, multivendor environment providing security, scalability and agility
- Hands on experience testing iRules using browser (IE), HTTP watch on F5 load balancers
- Working on the F5 LTM and GTM code upgrade project, doing couple of them every week
- Responsible for everyday tasks related toJuniperSRX Firewalls, Space Changes, and Iron Port Proxy Traffic
- Worked on Migration of Juniper SRX firewalls for isolation of network segments and VPN's, ASR
- Worked on Talos threat intelligence and Incident response helping in recovering networks from data breaches and network attacks
- Build plans to identify attacker, root cause, data, systems and services that are compromised, scope of the attack and design strategies
- Responsible for NAT traffic flow in theJuniperSRX 3600 and supportJuniperSpace
- Design and implement Cisco wireless network. Troubleshoot RF WLAN system networks
- Design and implement the security application ASA and SonicWall for the Site to Site; any connect, SSL and Remote access VPN of many clients
- Installed and configured four PIX 525 and two ASA 5505 in customer locations. In addition to that, two PIX firewall configured for the Guest access
- Worked on Instruction Prevention System (IPS) & Incidence Response Platform (IRP)
- Knowledge on AMP for endpoints with Cisco CTA architecture
- Configure Palo Alto Network Firewall Modules (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scalefirewalldeployments
- Convert campus WAN links from point to point to MPLS and to convert encryption from IPSec/GRE to GET VPN
- Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
- Juniper ContrailSDNdeployment assistance to the senior engineering team
- Juniper ContrailSDNsolution provisioning in test labs
- Replacement of Cisco ASAFirewallwith new Checkpoint R75Firewalls
- Research into multiple 802.11standards for possible vulnerabilities within security and research security protocols to find possible vulnerabilities in design
- Technical Knowledge on Cisco PIX/ASA series,JuniperNet screen/SRX firewall gateways
- Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation
- Configured WIFI APs connected in LAN to reduce cable costing by creating AP, worked on Cisco SP Wi-Fi, troubleshoot in Cisco Aironet 3700, 1700 and 600 series
- Configuring AAA on cisco ASA, configuring Authentication, authorization, radius attributes, TACACS+ AV Pairs, configuring accounting
- Implementing, administering and troubleshooting network infrastructure devices like routers, switches, Wireless access points and controllers
- Juniper ContrailSDNCloud Computing Open Networking Open flow/ODL
- Troubleshooting of all wireless network devices and infrastructure including routing protocols and switch configuration
- Administrator of Cisco ACS 5.x /ISE2.0, integrate them with Windows Active Directory and implement accounting and per command authorization
- Worked on multiple projects related to Branch networks, Campus networks, extranet clients and Data Center Environments involving in data center migrations from one data center to another
Confidential, Stamford, CT
Network Security Engineer
Responsibilities:
- Actively participated and completed many projects based on MPLS VPN, Internet Solutions for corporate customers
- Actively participated implementation and customization of customer network
- Hands on experience working on Cisco 7600, 12K, ASR routers & Juniper MX series routers
- Designing, Provisioning and Installation of the customer sites in IPSA for MPLS Backbone
- Design, deployment and maintenance of enterprise networks and datacenters
- Performed wireless network design, site surveys, as well as Troubleshooting and repairing any issues that occurred on site
- Hands-on experience withJuniperSRX -JuniperSSL VPN
- Responsible for Check Point andJuniperSRX firewall administration across our global networks
- Installed wireless access points (WAP) at various locations in the company
- Implementing Cisco Wireless access points using LEAP and Cisco Radius for authentication, greatly increasing Wireless security
- Responsible for Cisco ASA firewall administration across our global networks
- Migrated VLANS from ASA (perimeter firewalls) to FWSM’s for better security management
- Providing daily network support for national wide area network consisting of MPLS, VPN and point-to point site
- Negotiate VPN tunnels using IPsec encryption standards and configure and implement site-to-site VPN, Remote VPN
- Worked on F series module on Nexus 7010, Upgraded Nexus OS on Nexus 5k
- Provide Tier III Level Load Balancer expertise on F5 Big-IP Local Traffic Managers (LTM). Designing F5 solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 Big-IP Load Balancers
- Worked on configuring and managing wireless access points of multiple vendors like Cisco, Avaya and Aruba
- Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design
- Monitoring the NMS system for different Network Alerts
- Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design
- Worked on multiple projects related to Branch networks, Campus networks, extranet clients and Data Center Environments involving in data center migrations from one data center to another
- Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network
- Implemented and configured Citrix NetScaler and F5 load balancers
- Worked extensively on firewalls and configuration of Cisco (AAA) ACS server, RADIUS and TACACS+ for VPN users and implementation of secured VPN on Cisco routers, PIX and VPN concentrator appliances
- Testing with traffic generators: IXIA suites, JDSU, N2X, SmartBits, LightWave
Confidential
Network Engineer
Responsibilities:
- Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls
- Configured Cisco routers for OSPF, RIP, RIPv2, IGRP, EIGRP, static and default route
- Configured IPSEC VPN on SRX series firewalls
- Configured Cisco ASA 5510 for VPN Network Access Control integration with CiscoISE(Inline PEPs)
- Worked on Network design and support, implementation related internal projects for establishing connectivity between the various field offices and data centers
- Worked on commissioning and decommissioning of the MPLS circuits for various field offices
- Configured all the required devices and equipment for the remote vendors at various sites and plants
- Deploying and decommissioning the VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices
- Responsible for the secure development lifecycle environment form NX-OS to Application Centric Infrastructure (ACI) in Data center, implemented in the lab environment
- Administration and Operation support for TACACS and RADIUS Appliances
- Real time monitoring and network management using Cisco Works LMS
- Application Load Balancing with F5BigIPLTM and GTM devices, Cisco ACE, and Cisco CSS appliances
- Upgraded load balancers from Radware to F5 Big-IP v9 which improved functionality and scalability in the enterprise. Managed the F5 Big-IP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs
- Monitoring Memory/CPU on various low-end routers in a network
- Maintained redundancy on Cisco 2600, 2800, and 3600 routers with HSRP
- Provided technical support on hardware and software related issues to remote production sites
- Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications
Confidential
Network Administrator
Responsibilities:
- Experience in working with Nexus 7010, 5548, 2148, 2248 devices
- Experience with migrating the partner IPSEC VPN tunnels from one datacenter to another datacenter
- Connecting multiple locations through MPLS with tunneling & ISIS configurations
- Experience with deploying the Layer 3 MPLS VPN in all Branches and campus locations
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card(module) for the Nexus 5000
- Designing and involved in developing strategy to plan and implement new technology like Networking, Virtualization, Cloud, Application and Monitoring in core Datacenter and LAB
- Design, execution of installation and configuration of VPN/IVPN, LAN/WAN as per organizational requirements
- Implementing and maintaining Network Management tools (OPAS, Solar Winds, Cisco Works)
- Knowledge in implementing and configuring F5 Big-IP LTM-6400loadbalancers
- Installed high availability Big IP F5 LTM and GTMloadbalancersto provide uninterrupted service to customers
- Configuring ISIS in L3 switches to support MPLS
- Configured differentloadbalancing methods on F5 LTM & GTM and worked on one-connect profiles and HTTP compression and several persistence profiles
- Member of application networking team focused on Network Performance Prediction, WAN optimization
- Planning and Implementing New Infrastructure in the Data Center
- Deployment of datacenter LAN using Cisco Nexus 7k, 5k, 2k switches
- Worked on Juniper J series j2330, M320 routers and EX 3200 switches
- Enable STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed
- Analysis and troubleshooting of network system that include LAN, WAN, Global Datacenter, F5 firewall & DNS/DHCP