Network Security Engineer Resume
DelawarE
SUMMARY
- More than 8 years of experience in Networking, including hands - on experience in IP network design, support, installation, analysis and troubleshooting.
- Expert level knowledge of troubleshooting, implementing, optimizing and testing of static &dynamic routing protocols such as EIGRP, OSPF, BGP, QoS ability to interpret and resolve complex route table problems.
- Experience with LAN/WAN architecture and IP services.
- Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Router andCisco 2900, 3500,4500, 5500, 6500 series switch and Juniper EX4550 and MX960.
- Hands-on experience with Ether Channel, Spanning Tree, MPLs,Trunking, ACLs, Syslog, NAT, VLAN, VTP, STP, RSTP, MST.
- Hands on experience with Cisco 6500, ASR1k, ASR9k, Brocade SX800 andworked with ASR 9000 series switches withIOS-XR.
- Knowledge in implementing and configuring F5 Big-IP LTMloadbalancersforload balancing and network traffic management for business applications.
- Experience in Designing and implementing Cisco UCS.
- Configuring and testing Multicast for both IPv4 and IPv6 routing in Data Center Environment.
- Implemented security policies using ACL,Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
- Familiar with Cisco firewalls PIX 515, ASA 5500 series, Juniper SRX and Netscreen Firewalls. Knowledge of Palo Alto and CheckPoint Firewalls. Installed and configured the ACE and CSM for firewall/Server Load balancing for Cisco Catalyst switches.
- Implementing the Cisco wireless security solution with (WPA2, WEP) for making the wireless users secure. Configuration of IPS and Blue-coat Proxy SG for internet proxy and content filtering
- Worked on features straddling LTE and WLAN technologies LTE-WIFI aggregation
- Use Sourcefire Next Generation Intrusion Prevention System (IPS/IDS), FireEye and Q1 Radar (SIEM) to monitor for suspicious network traffic
- Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS.
- Manage a very large DNS environment using Lucent QIP and manual management of DNS for DMZ/External servers.
- Expert knowledge on networking switches, routers, QoS, BGP, OSPF, ATM, PPP, Ethernet, Wi-Fi, Multicasting;
- Strong understanding ofVMwareNetworking concepts like creation of Switches, different types of port groups, NIC Teaming and VLAN Problem management onVMwareandVirtual Center and vMotion.
- Configured Client VPN Technologies such as Cisco’s VPN Client via IPSEC. Configured Cisco ASR, ISR 2800 & 3800 series routers with OSPF as an enterprise IGP
- Worked on LTE/UMTS AAA (Radius/Diameter Protocol)
- Worked on Router and Switch Cisco (from ), Juniper, F5, Fortigate, Checkpoint, ASA, VoIP (Cisco Call Manager), Wi-Fi, monitoring tools etc.
- Involved in Riverbed WAN optimization.
- Experience in Junos-Juniper routers and Firewalls (Netscreen& SRX).
- Worked on network devices to include Cisco routers, switches, VPNs, SSL, CheckPoint and delivery networks (CSS, Citrix Netscaler and F5 BigIP LTM and GTM 1600 and 3400 load balancers) enterprise environment
- Experience in F5, Cisco ACE 4710 Load balancers.
- Expertise in level 3 support for Cisco LAN/WAN/WLAN infrastructure, Riverbed WAN Optimization services, and NetScalar Load Balancer's in the global footprint Experience in the setup of Access-Lists, and RIP, EIGRP, and tunnel installations.
- Configured and deployed QOS and defined class of service (COS) WRED and WFQ for bandwidth management.
- Proficiency in configuration of VLAN setup on variousCiscoRouters and Switches.
- Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.
- Monitoring throughRancidtool to monitor and manage configuration changes of routers & switches.
- Experience working DNS, SMTP, and FTP, Network & Security protocols.
- Experience supporting Nexus Switching, cisco VOIP.
- Experience working with System Engineering and Linux Operating Systems.
- Knowledge of Junos, Juniper Networks.
- Excellent leadership with good written and oral communication.
- Great team player and ability to work under pressure 24x7 duty rotation.
TECHNICAL SKILLS
Cisco Platforms: Nexus 7K, 5K, 2K & 1K, Cisco routers (7600, 7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series), CSR/ASR, IOS-XR Routing Protocol (BGP, OSPF, EIGRP, IGRP, RIP), Routed Protocol TCP/IP, Multicasting.
Management tools: SNMP, Syslog, Sniffer, and Wireshark.
LAN Protocol: VLAN, VTP, Inter-vlan routing, ISL, dot1q, STP, RSTP, PVST, HSRP, GLBP, Ethernet, Port security.
WAN Technology: Frame Relay, X.25, E1/T1/DS1/DS3, MPLS VPNsLDP, L3VPN
Network Management: SNMP v2, Cisco Works, 3Com Network Analyzer, MRTG, Solar winds, TACACS, Net flow, Cacti, Rancid, and Nagios.
Network Security: Knowledge of Firewalls, Checkpoint NG, ASA, IPsec, IPS/IDS, & VPN, Juniper SRX, ACE Module and F5 Load Balancers
Application Protocols: DHCP, DNS,IPV6, FTP, TFTP.
Documentation: Confidential Office
Design Tools: HP NA, MS Visio
Programming: C++, Java, Python, SQL
Operating Systems: Cisco CATOS, IOS, IOS-XR, NX-OS, MS Windows 2007/08.
PROFESSIONAL EXPERIENCE
Confidential, Delaware
Network Security Engineer
Responsibilities:
- Working as a Network Engineer, with Confidential and maintain the Vendor/Client Network Environment.
- Involved in the Data center migration and installation.
- Worked on firewalls Cisco ASA, Checkpoint installation, configuration and troubleshooting. Worked actively in creating, editing, installing rules on Firewall.
- Modification and Removal of BGP from MPLS routers, Provide L3/L4 support and configuration for Routing & Switching.
- To secure configurations of load balancing in F5, SSL/VPN connections
- Configured and provided troubleshooting of IPSEC Site-to-Site VPN, SSL VPN, NAT, and Access Rules
- UtilizediOS,iOSXR, Managed static routing to internal and external LANs and WANs. Administered secure console and MGMT access using local and TACACS accounts.Configuration of VRF, VPC, VX LAN, VTEP on Nexus Series of routers.
- Proficient with configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
- Experience with usingInfobloxto allow dhcp access for existing and new customers.
- Configured IP access filter policies, Implementing NAT solutions on Cisco IOS routers.
- Upgrading IOS, troubleshootingnetworkoutages.
- Worked on Cisco Routers, Active /Passive Hubs, Switches.
- Maintains datacenter network environment by identifying network requirements; installing upgrades; monitoring network performance
- Work with Information Security team managing Source fire IPS in updating policy and procedure.
- Establish network specifications by conferring with users; analyzing workflow, access, information, and security requirements; designing router administration, including interface configuration and routing protocols.
- Maintain network performance issues including availability, utilization, throughput and latency; planning and executing the selection, installation, configuration, and testing of equipment; defining network policies and procedures; establishing connections and firewalls.
- Experience includes DNS, DHCP, Wi-Fi, SNMP, SMTP, IPv6, SSL, IPsec, Radius, F5.
- Work on Change Management and incident management ticket, resolve tickets and work with different network teams and vendors accordingly
Confidential, Minneapolis, Minnesota
Network Security Engineer
Responsibilities:
- Worked on Incident Management and projects
- Install and Configure Firewall Policy design & implementation to meet access requirements of various teams. Worked on Checkpoint Firewalls primarily tasks involving policy changes, policy management as per vendor/client requirements add/design policies.
- Interact with Clients directly and get the business/network requirements, discuss budget requirements with project Managers, design the network and work on various phases of implementation.
- Worked with Service providers to implement MPLS circuits in the network.
- Work on LAN/WAN protocols/technologies, like BGP, EIGRP, OSPF, RIP, ACL, QoS Involved in implementing, monitoring, troubleshooting.
- Deploying and decommission of VLANs on coreASR9K, Nexus 7K, 5K and its downstream devices.
- Worked on VLAN, VRF, VX-LAN, VTEP, VPC, on Nexus Cisco.
- Implementing security Solutions usingPaloAltoPA-5000, CheckPoint Firewalls R75, R77.20 Gaia.Configured Firewall logging, DMZs & related security policies & monitoring
- Experience with Wireless Set up, worked on projects installing Guest Wireless for various locations. Design, procurement of device, installation and Configuration of WLC, AP, Firewalls in setting up the access.
- Worked on F5 load Balancer, configured Virtual servers, pool, pool members, worked on load balancing methods for LTM.
- Well Versed with Riverbed for optimizing network.
- Experience with tools NNMI, Infoblox, e-health monitoring tools, HPNM
- Configuration of NAT on Firewall/WAN devices.
- Designed and Implemented Cisco PIX525 and ASA5550 firewall’s interfaces with FTP, DNS, HTTP servers on DMZ with different security levels.
- Experience with configuring IPSEC, SSL VPN
- Upgrade code versionson the firewalls. (Cisco)
- Checkpoint Level3 operations support with hardware operations - fixed problems & RMA’s, taking any escalations that dealt with the equipment and its connection: interfaces,VLAN’s, routes, etc.
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
- Knowledge Working with Cisco ISE over Wireless setups.
- Knowledge of Configuring and managing Blue Coat Proxy Servers.
- Designed and Implemented Cisco UCS pods in Nexus 7000 and Cisco 6500 Platform
Confidential, Redmond WA
Network Engineer
Responsibilities:
- Worked on Incident Management, Change Management tasks.
- Configured theASRto use the VRF routing functions to completely split the traffic through the network.
- Deploy new solutions, augment existingwirelessnetworks and remediate Wi-Fi issues at any of the properties.
- ConfigureAruba7210 controllers for VRRP.Engineered, configured and deployed routers usingCiscoISE.
- Delivering front line, Enterprise level support toMicrosoftAzurecustomers in the management of cloud based computing issues, collaborating with engineers and support teams to identify and resolve root causes within the system
- To Provide Rogue AP detection, URL Filtering and Black list capabilities in Network Management Device (NMD) for Wi-Fi networks.
- Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
- Implemented Zone Based Firewalling and Security Rules on thePaloAltoFirewall
- Identified opportunities for implementation of network best practices, particularly F5loadbalancerimplementations.
- Successfully installedPalo AltoPA 3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls
- Experience working with Wireless packet sniffer and Network Analyzer tools Wireshark, Cisco Packet Tracer.
- Worked towards developing processes for diagnosis, intervention and restoration of LAN, WAN and Wi-Fi services.
- Provide level 3 support for Cisco LAN/WAN/WLAN infrastructure, Riverbed WAN Optimization services, andNetScalerLoad Balancer's in the global footprint.
- Worked on Cisco FWSM/PIX/ASDM, Juniper SRX platforms and Configured firewall filters, routing instances, policy options, on Juniper m320 and T6
- Assisted with support of the following systems: Cisco (ISRs, IOS,ACS), Juniper (EX switches, SRX firewalls, Space), Bluecoat ProxySG Web Filters.
- Provide technical support in the implementation, testing and configuration of Citrixloadbalancers
- Involved in the modification and removal of BGP from the MPLS routers.
- Create and testCisco router and switching operations using OSPF routing protocol.
- Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
- L3/L4 support and configuration for Routing & Switching
- Experienced in handling and installingPaloAltoFirewalls
- Configure allPaloAltoNetworksFirewallmodels (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scalefirewalldeployments.
- Responsible for CheckPoint and Juniper firewall administration across global networks
- Support customer with the configuration and maintenance of Checkpoint and ASA firewall systems
- Worked on Firewalls and configured security policies using NAT, PAT & ACLs
- Experience working with Layer 1-7 switching, TCP/IP, OSPF and load balancing (Cisco L2/L3 switches, firewalls, load balancers.
- Created interconnects, network interfaces in aNASenvironment
- Maintained and provided support for LAN/WAN infrastructure as needed. This included working on specific hardware such as switches, routers, PIX, ASA firewalls, wireless APs, VPN Concentrators, frame relay, IPsec VPN and other entities.
- Installing and configuring F5 Load balancers and firewalls with LAN/WAN configuration
- Implemented security measures using ACL and configured NAT according to the connectivity requirement.
- Configuration and Administration ofPaloAltoNetworks Firewall to manage large scale Firewall deployments.
- Configured and provided troubleshooting of IPSEC Site-to-Site VPN, SSL VPN, NAT, and Access Rules
- UtilizediOS,iOSXR, Managed static routing to internal and external LANs and WANs. Administered secure console and MGMT access using local and TACACS accounts.
- Implemented Positive Enforcement Model with the help of Palo Alto Networks
- Configuration and troubleshooting link state protocols like OSPF in multiple areas.
- Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
- Optimized performance of the WANnetworkconsisting of Cisco 3550/4500/6500 switches by configuring VLANs.
- Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Config, Assigning dhcp profiles.
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
- Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
- Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
- Conducteddisasterrecoveryrisk assessments on critical technologies withinDisasterRecoveryData Centers.
- ConfiguredInfobloxto allow dhcp access for existing and new customers
- Configured IP access filter policies.
- Installation, configuration and administration of Linux (Red Hat, Centos),
- Implementing NAT solutions on Cisco IOS routers.
- Upgrading IOS, troubleshootingnetworkoutages.
- Worked on Cisco Routers, Active /Passive Hubs, Switches.
Confidential
Network Engineer
Responsibilities:
- Worked directly in a service provider environment.
- Worked onCiscoLayer 2 switches (spanning tree, VLAN).
- Manage and maintain various firewall solutions for customers including PIX (525,520,515,506) and ASA firewall for customer.
- ASA firewall troubleshooting experience.
- Installation, Configuration of Access points for Wi-Fi Network.
- Designed and Implemented Firewalls DMZ's, F5VI priondeployments to Front end and DMZ customers.
- Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
- Configure IPSEC tunnels between Checkpoint and other non-Checkpoint endpoint devices
- Experience in with Virtualization technologies like installing, configuring,VMwarevSphere. Creation, management, administration and maintenance of virtual servers and clients.
- WAN Infrastructure running OSPF & BGP as core routing protocol.
- Support various Routers like 2600/3600/7200 series routers.
- Tested authentication in OSPF and BGP.
- Installed high availability Big IP F5 LTM and GTMloadbalancersto provide uninterrupted service to customers.
- Configuring rules & MaintainingPaloAltoFirewalls & Analysis of firewall logs using various tools.
- Performed implementation ofSAN/NASwith VNX and NetApp Sub-Systems, created Storage groups, assigned LUNs to Hosts using ECC.
- Analyze and resolve EMCSAN/NASrelated errors and reported problems. Coordinate fixes with hardware vendors and customers.
- Supports Enterprise WLAN and/or Service Provider Wi-Fi accounts in the Cisco ServicesWireless/Wi-Fi.
- Configured, Verified and troubleshoot issues in Wi-Fi 802.11a/b/g/n/ac Testing along with WPA/WPA2/WPS, Wi-Fi Direct, Miracast.
- Installing and configuring DNS, DHCP server (Solaris,Infoblox), network monitoring systems (Nagios, Solar Wind Orion), and system logs, Configuration Backup, bluecoat.
- Configuration of IPS and Blue-coat Proxy SG for internet proxy and content filtering.
- Configured and maintained IPsec and SSL VPN's onPaloAltoFirewalls.
- Implemented Positive Enforcement Model with the help ofPaloAltoNetworks.
- Proficient in design, implementation, management and troubleshooting of CheckPoint firewalls, CheckPoint Provider-1 / VSX, Palo Alto IDS/IPS modules, Data Center Migration, Foundry/F5Load Balancers, and Blue Coat Packet Shaper systems.
- Experience with CISCO IOS - XR, ASR migrations.
- Negotiate VPN tunnels using IPsec encryption standards and also configured and implemented site-to-site VPN, Remote VPN usingjuniperSSG 140
- Troubleshooting and installing of CRS, ISR, GSR, ASR9000 and Nexus devices
- Planning and configuring the routing protocols such as OSPF, RIP, and Static Routing on the routers.
- Provided application level redundancy and availability by deploying F5loadbalancersLTM.
- Physically deployed new Cisco Nexus devices, Catalyst and Nexus replacement blades, FWSMs, Cisco ASAs, Citrix NetScaler MPX and SDX chassis
- Administering, troubleshooting and designing campusWLANinfrastructure using Radio and Service Profiles and appropriate SSID for data and voice users from Juniper and Aruba.
- Implemented successful recovery byVMwareSRM 5.0 (Planned Migration, Disaster Recovery) and eliminated the complexity of managing and testing recovery plans.
- Assigned DNS namespace to proper subnets usingInfoblox, Proteus, and Nslookup
- Installed and supported an ArubaWLANat corporate and remote sites using 3 controllers and 30 remote AP’s.
- Support various Series ofCiscoRouters like 7200/7600 and 0 Series Switches.
- NetworkMonitoring-using tools likeCiscoWorks 2000.
- Involved in service provider core networking (ATT), including troubleshooting and implementing network.
Confidential
Network Engineer
Responsibilities:
- Worked alongside a SP (service provider) backbone environment.
- Designed and implemented remote dial up solution for clients
- Installed and configured workstations for IP based LAN’s
- Implemented F5 hardware refresh of older 3600 hardware
- Develop, implement and maintain DR strategies forloadbalancer, firewall, switch and optical solutions
- Configured and managed networks using L3 protocols like RIPv2.
- UpgradingIOS- Upgrading hardware and installing new devices, Tuning (Configuration), make standardization for the topology
- Configured VLANs, Private VLANs, VTP and Trunking on switches.
- Configured L2 and L3 security features on devices
- LAN cable making, L2 & L3 configurations. Desktop engineering, troubleshooting LAN, WAN networks.
- Configured and maintained IPSEC and SSL VPN's onPaloAltoFirewalls.
- Successfully installedPaloAltoPA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
- Perform capacity and performance assessment at least once a month for all managedload balancer, firewall, and switch secure configurations ofloadbalancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures
- Hands on Experience in Inter-vlan routing, redistribution, access-lists and dynamic NAT
- Efficient in cabling as per co-location contracts with loop-back testing, including all DS1, DS3, T1, T3,CAT 6 and CAT 5 connections as per defined cabling procedures