Sr. Network Engineer Resume
Garden Grove, CA
SUMMARY:
- 8 years of Experience in Designing, Deployment and Operations of complex enterprise and service provider networks
- In - depth experience with the following technologies: Networking Infrastructure (including TCP/IP, DHCP, DNS, GPO and WINS), Infoblox, PRTG, Windows Server 2003-2008, 2012 R2, Active Directory 2003, 2008 and 2012, Windows XP, 7 Pro and 8.1, MS SQL Server 2000/2005, Microsoft Exchange 2003, 2008 and 365, Cisco ASA Security Firewall Access Rule, Route Based and DMVPN-Site-to-Site VPN setup, IT Disaster Recovery backup / Symantec Backup Exec 10.x/11D, Cisco-7K,5K,2K,4500, 5596UP, VSS 6509, Cisco MDS, Cisco UCS interconnect, Cisco ASA 55x0 & 55xx, Checkpoint Firewall 4500-R75.40, F5 Load balancers, Cisco Routers ASR 1001, 2951XM, 3950, 4800 and SNMP and Netflow configuration and also routing protocol configurations (BGP, EIGRP, ISIS and OSPF) in CISCO ASR 9K.
- Build stable, productive and profitable operations within highly technical environment.
- Experience with MPLS technology including L2/L3 VPN and traffic engineering. Deploy IP/MPLS services covering the installations, testing, cutover, migration and handover
- Well Experienced in configuring protocols like HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, CHAP, and SNMP.
- Install, maintain, support and diagnose Intrusion Detection/Protection solutions (IDS/IPS).
- Telecommunications management Avaya, Shoretel and Nortel phone system.
- Well experienced in configuring gateway redundancy protocols like HSRP, GLBP, PPP and SNMP.
- Experience in WAN technologies like T1/T3, DS3, and Gigabit circuit types.
- Worked on Load Balancer F5 LTM, GTM series like 6400, 6800, and 8800
- Strong hands on experience in installing, configuring, and troubleshooting of Cisco 7600, 7200, 3800, 3600, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
- Experienced in various Juniper products: EX-2200,EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240
- Experienced working with Nexus 7010, 5020, 2148 and 2248 devices.
- Experienced at utilizing Network Intrusion Detection Applications, Enterprise Manager, Infoblox and NetMri.
- Experience in Information Technology includes extensive hands-on experience with Microsoft and Citrix technologies. Jim has designed, implemented and supported large distributed infrastructures utilizing Windows and Citrix NetScaler
TECHNICAL SKILLS
Experience: Cisco 3900 / 7600 Series Routers, Alcatel Lucent 7750, BRAS - Redback Edge Routers, T1s, DS3s, OC3/12/48s, IMA, GigE, Calix E5, E7, C7, Adtran (1148,1100,1248,1200,3K,5K) and UMC 1000,
Applications: Remedy Ticketing System, IPAM, Citrix XenApp, Calix CMS and IMS, SAM 5620, Secure CRT and Cirus.
Networking Protocols: RIPv1, RIPv2, BGP, OSPF, EIGRP, NAT, ACL, Frame-Relay, MPLS.
Networking Terminologies: OSI Model, ARP, ICMP, TCP/IP, VLAN’s, Spanning Tree, DNS, DHCP, SNMP, SSH, Telnet, HTTP, IPv4, IPv6, GRE Tunneling, Ethernet, ATM.
Networking: Network Design & Engineering, Operations Research, Cisco Routers (800, 2600, 2800, 3800, 4500), Switches (2950, 3560, 6500), Snort network intrusion detection systems (IDS). Network penetration testing tools like NMAP, Netfilter, IPTables, Ethereal, SONNET, MPLS, IP/MPLS migration, DSU/CSU, ASR9K and Octane Line Cards.
Routers & Switches: GSR 12000, 1900, 2900, 3900, 7200, 7600, ASR 1002. 6500, 4506, 4510, Nexus 7000
Wireless: 802.11 (a, b, g, n), 802.16/WiMax, 3GPP, LTE, GSM, Cisco CPI WiFi, UMTS, CDMA, 3G, RF.
Programming Languages: Basics of C/C++, Python, and Matlab.
Software: Microsoft Office Suite, Visio, Lucid Charts, Wireshark.
Operating System: LINUX, Windows.
PROFESSIONAL EXPERIENCE:
Confidential, Garden Grove, CASr. Network Engineer
Responsibilities:
- Demonstrated expertise and depth of understanding in Cisco network technologies, Unified Communications, LAN/WAN acceleration, Cisco products, and remote office implementation and support using MPLS technologies
- Support Panorama Centralized Management for Palo Alto firewall PA-500, PA-200 and PA3060, to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration
- Hands on experience to manage Palo Alto and check point with including set up new infrastructure, adding new route based policy, NAT, site to site VPN, Global Protect.
- Expertise to change management ip for new subnet and make changes in Palo Alto accordingly.
- Experience on moving subnet from one data center to another data center.
- Demonstrated strong knowledge of data replication technologies, and developing and implementing business continuity and disaster recover practices.
- Create architecture, and implement and configure enterprise wide network systems in conformance with the Plan. Ensure that the ModernHEALTH network systems provide the user community with infrastructure that is compliant with all terms of Service Level Agreements.
- Hand's on configuration implementation and design of security protocols including: IPSEC VPN, NAT, creating firewall rules, SSL VPN, encryption protocols 3DES/AES, intrusion prevention systems, identity management systems, network access control, identity services engines, web application filtering
- Answered hotline calls, created incidents in Remedy and Service-Now.
- Provided weekly reporting for network health and updates for open projects by using Service-Now.
- Experience working in DMZ environments with good understanding of hardware load-balancing, firewalls, multi-tiered architectures.
- Participate in the creation of the organization’s Network Infrastructure Strategic Plan, and network operating policies and procedures.
- Create standards, guidelines, and related documentation for all network and telephone environments. Prepare network and telephony configuration and operational documentation in compliance with required standards, and contribute to the development of new standards and the modification of existing standards as circumstances warrant.
- Performing network monitoring, providing analysis using various tools like Wireshark, SolarWinds etc.
- Create automated network monitoring systems to provide alerts regarding latency and service disruptions. Monitor network performance, diagnose network issues and perform emergency and scheduled maintenance. Provide support to operations regarding network problems.
- Work with system administrators to maintain and enhance the storage environment in support of existing computer network systems, and provide second and third level support using incident management processes.
- Coordinate schedules for network upgrades and maintenance with user community to minimize downtime, inconvenience, and negative work flow impact during enterprise impacting upgrades, microcode changes, new equipment deployment and legacy hardware/software sun setting activities.
Sr. Network Engineer
Responsibilities:
- Dealing with clients for resolving/troubleshooting issues on LAN Inventory management.
- Datacenter migration was involved in Access, Distribution and Core layers.
- Strong Knowledge in working with F5 Load Balancers and their Implementation in various Networks.
- Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
- Configured VLAN Trucking 802.1Q, STP, and Port Security on Catalyst 6500 switches. Design and create dedicated VLANs for Voice and Data with QOS for prioritizing VOICE over the DATA on Catalyst switches and basic VOIP configurations
- Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
- Service Level Agreement (SLA) purchase request, offering state of the art encrypted virtual private network and around the clock Quality of Service (QoS) monitoring against packet loss, jitter, delay latency issues across multiple transportation mediums.
- Actively participate in the planning, design, and implementation and troubleshooting of Unified Communication systems, infrastructure and UCCE/ICM environment
- Managed a project to decommission an outdated Cisco Unified Video Conferencing (CUVC) and replace it with Cisco TelePresence, based on Cisco Collaboration System 11 framework
- Windows 2008 Active Directory, Citrix Technologies: vSphere 5 and 4.x, CitrixXenApp 6 and 6.x, XenDesktop 5 and 5.x, EMC SAN Storage, HP EVA 6400, Brocade & McData Fiber Switches, 100+ Applications.
- Practical understanding of the UCCE Deployment models
- Citrix Cloud Computing Role (XenDesktop 4.x/5.x/6.x/7.x, XenApp 4.x/6.x/7.x, NetScaler 10.x/11.x, PVS 6.x/7.x)
- Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems and also manipulating BGP attribute
- Experience in working with cisco Nexus 5000 series switches for data center.
- Involved in Configuring and implementing of Composite Network models consists of Cisco7600, 7200, 3800 series and ASR 9k, GSR 12K routers and Cisco 2950, 3500, 5000, 6500 Series switches.
- Upgrading code on Palo Alto firewalls PA5050/3020 to meet company security policy
- Configured, monitored and troubleshoot Cisco's ASA 5500/PIX 515 security appliances, failover DMZ Zoning.
- Create VM's on esxi host, apply vlans, firewall rules-ACLs, high availability, test L-2 /L-3 protocols, spinning the VM's, API testing, work with offshore team.
- Prolific in implementing and troubleshooting VLAN Trunks, STP, SNMP, Ether Channels, HSRP, and ACL's, QoS.
- Perform network protocols (HTTP, NTP, SMTP, SNMP, FTP, SFTP, NTFS, SSL), network security (LDAP, RADIUS, PKI, SSH, IPSEC)
- Configuring Client/Server, TCP/IP, DHCP and WINS/DNS to conform to Local Area Network.
Network Engineer
Responsibilities:
- Responsibilities include functions as site lead for migration of sites from ATM to Ethernet.
- Configure BGP, OSPF and ISIS routing protocols in Cisco routers 3950, 4800.
- Configuration and Provisioning on ALU 7750 routers. E-pipes building. Experience with SAM (Service Aware manager).
- Configuration and provisioning on various platforms including calix (C7, E5, E7), Adtran (1148, 1100, 1248, 1200, 3K, 5K) and UMC 1000.
- Manage over 400 servers- Wintel servers, VMware 5.1 and 5.5 and Xenserver 5.6 and 6.5 (Citrix) and HP Proliant ML and BL servers.
- Configure vPC and ether channel- LACP and pAgP and create the vlan interfaces with HSRP.
- Responsible for Deployment of UCCE solutions in Ford Credit to replicate the Preproduction System and handling the role of a SME and providing the required solutions on UCCE Environment.
- Develop, Implement Unified Communications collaboration platforms that enable collaborations and connectivity of associates and external business via voice, video, Instant Messaging and Cisco "cloud based "WebEx conferencing solutions
- Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
- Configuration of Palo-Alto PA 5000 series firewalls for outbound traffic via blue coat proxy server.
- Configuring Switches with Port Security, Spanning-Tree Protocol, VOIP, VLAN, Port Span, Ether channel, and Channel group. Working with ACS Radius, and Tacacs+ Server
- Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
- Configuring IPSEC VPN on SRX series firewalls.
- Configuring Juniper Netscreen 5200 for security Appliance, NS-5200 for VPN/firewall.
- Worked on different firewall & security appliance such as, Checkpoint 4400, 4600, 4800, 21700, Palo-Alto 200, 500, 3020, 3060, 5020, 5060, Panorama Juniper SRX 240, 650, 1400, 3400. Junos Space, Cisco Sourcefire, FireEye, Imperva (WAF)
- Configured SNMP with HPNA, Solarwinds on Cisco, F5, Bluecoat, Aruba
- Implemented Positive Enforcement Model with the help of Palo Alto Networks
- Worked on Cisco 5500 wireless controller, Cisco Prime and Cisco WAPs.
- Deploying and decommissioning the VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.
- Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K.
Network Engineer
Responsibilities:
- Configure the layer 2 and layer 3 on Cisco Nexus 7K, 5K, 6509, 9710, 5596UP, 4500, 3850, 3950, ASR and 2960.
- Experience in working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a flexible Access Solution for datacenter access architecture.
- Design and implement campus switch network with Cisco Layer 3 switches (3750, 4500, and 6500) in multi VLANs environment and inter-VLAN routing, HSRP, ISL trunk, ether channel.
- Involved in Configuring and implementing of Composite Network models consists of Cisco7600, 7200, 3800 series and ASR 9k, GSR 12K routers and Cisco 2950, 3500, 5000, 6500 Series switches.
- Hands on experience installing Sup720 for Cisco 6509-E series and its Gigabit Ethernet port deployment in the core network.
- Experience with SAN & NFS storage Technologies.
- Experience in configuring routing protocols like EIGRP,RIP v2, OSPF & BGP and Cisco ACS protocols like RADIUS and TACACS
- Migration of network devices (Palo Alto, F5, Juniper, Aruba, Riverbed, Routers& switches) from one zone to other. Changing the management IP address.
- Handling network devices such as Switches (Cisco Catalyst 2900, 3500, 6500 series), Routers (Cisco 2600, 2800 and 7200 series), Firewalls, Load balancers etc.
- Experience configuring Virtual Device Context in Nexus 7010.
- Work and oversea India team (NOC) for the network support and on call
- Services monitored and delivered include, but are not limited to SIM, IDS/IPS , Firewall, Web Content Filtering, Proxy and Security Event Correlation and Reporting to appropriate Tier 2 incident handling staff or relevant sources to determine increased risk to client
- Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series.
- Setup Cisco Routers (frame-relay, Isdn, PPP) and Switches (IOS, CATOS) for VLAN, ISL, STP, Port Security, IDS, ACL), Firewall, Cisco IOS Firewall, Pix 500, ASA 5500, NAS (network access server), Tacacs+ server, and Radius server
- Experience in migration of Solarwinds where upgraded NCM, NPM older version to newer version by using SNMP and ICMP to add this devices.
- Experience with converting PIX rules over to the Cisco ASA solution.
Network Operations Engineer
Responsibilities:
- Responsible for designing and implementation of customers network infrastructure
- Help negotiate hardware, software, and circuit contracts for customers
- Redesign customers office copper and fiber cable plant for scalability
- Implement Cisco IOS Firewall IDS using 2600 series router
- Configuring RIP, OSPF and BGP Static Routing on Juniper M and MX series Routers.
- Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
- Configured and debugged policy based routing for special traffic, route filtering with route maps, route redistribution.
- Purchasing equipment and systems requirement with a third parties CDW, Tech DATA;
- Designing, testing, installing and monitoring new systems and client IT network infrastructure;
- Configured VLAN Trucking 802.1Q, STP, and Port Security on Catalyst 6500 switches.
- Performed OSPF, BGP routing protocol administration.
- Overseeing any technical issue and supporting all hardware and software installation;
- Reconfiguring all firewalls and switches and flashing the firmware with a new updated version.
- Managing all hardware equipment and its warranty.
- Supervising the wire management team and cable pullers.
- Ensuring all cable nodes terminated within specification on CAT 5 and CAT 6;
- Clarifying a client’s VMware and Windows Server 2003/2008R2 specifications, understanding their work practices and the nature of their business.
- Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support.