We provide IT Staff Augmentation Services!

Network Engineer, Resume

5.00/5 (Submit Your Rating)

Chicago, IL

SUMMARY:

  • Seven plus years of experience in Network Engineering and administration .
  • Three years of experience in Designing and implementing the Wireless Infrastructure using 802.1x Authentication using CISCO ACS and ISE Servers .
  • Planning, design, implementation and maintenance of Fast Ethernet based Local Area Networks (LAN’s), Wireless Networks (WLAN’s).
  • Planning designing, Installation, configuration and maintenance of 802.11a/b/g Wireless Networks and Wireless Access points.
  • Monitoring the Wireless Issues using the Prime 3.1 and troubleshooting the issues.
  • Migrated Wireless devices into MDM tool called SOTI MOBI CONTROLER
  • Hands on experience on Tools like Aruba Airwave, Cisco Prime, Hive Manager .
  • Monitoring Cisco Prime 2.1 & 3.1 Monitoring tool and Spectrum.
  • Hands - on- experience on IP addressing, sub netting, and Ping concepts.
  • Hands on Experience in wireless/RF communications with knowledge and experience in technology integration of Wireless Broadband/Convergence (IEEE 802.11, etc.).
  • Deploying and troubleshooting LAN, WAN, Frame-Relay, Ether-channel, IP Routing Protocols - (RIPV2, OSPF, EIGRP & BGP), NAT, VLAN, STP, VTP, HSRP & GLBP
  • Hands on experience in implementation of Virtual Switching System (VSS) on 6500 Switches
  • Strong working and configuration knowledge in Cisco 2800, 2500, 2400 series Routers, ASR Routers and Cisco Switch’s 6500s, 4500s, 3750, and 2900s.
  • Implementation traffic filters on Cisco routes using Standard, extended Access list.
  • Good working and configuration knowledge in Cisco NX-OS 1000,2000,3000,4000,5000,6000,7000, series switches.
  • Hands on Experience in installing, configuring, and maintaining Cisco Switches (2900, 3500, 3700 series, 6500 series).
  • Hands on experience in designing and configuring of Layer 2 / 3 networking features such as VLAN, ISL, STP, VTP, 802.1X, Port Security, L2PT and SPAN.
  • Hands on experience in Physical cabling, IP addressing and Sub netting with VLSM using QIP configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Expert level knowledge in troubleshooting Network Connectivity issues in Local Area Networks (LAN), TCP/IP, and Expert level knowledge about TCP/IP and OSI models.
  • Hands on experience in implementing and troubleshooting complex layer 2 technologies VLAN Trunks, VTP, Ether channel, STP, RSTP and MST.
  • Hands on experience in implementation of DNS and DHCP protocols.
  • Troubleshooting DNS/DHCP issues within the LAN network.
  • Involved in troubleshooting network traffic and its diagnosis using tools like ping, trace route, Wire shark, TCP dump and Linux operating system servers.
  • Hands on experience in 802.11, WEP, WAP, ATM, Frame Relay, IPv6, IPSec.
  • Has Knowledge on Palo Alto Firewall.
  • Administering the Microsoft Windows Server Environment, Managing disk space, user profile creation and user rights management Managing user profiles and system policies in Active Directory.
  • Excellent configuration practices of Dell and HP system hardware and Server Operating Systems (Windows 2003/ 2008, & Storage Servers) and maintenance of procedural documentation Efficient at use of Microsoft VISIO/Office for technical documentation and presentation tools.
  • Effective inter-personal skills, adaptive to any environment, keep abreast with the latest technologies and delivering solutions as an individual and as part of a team.

TECHNICAL SKILLS

Network Equipment: Cisco routers (2800, 2500, 2400 Series), Cisco Switches (6500s, 3750, 2960, 2950, 2924 Catalyst), Cisco 4400,5500,8500 Wireless Controllers and CISCO Access Points

Protocols: TCP/IP, RIPv1, RIPv2, OSPF, BGP, EIGRP, VLAN, VTP, Port fast, Switch Port Security, Standard and Extended ACL’s, DNS, DHCP, POP3, SMTP, FTP, TFTP, NAT, EAP, PEAP, MSHAP v2, TLS

Operating Systems: Windows XP/Vista, Windows 7, Windows 2000/2003/2008 Servers, Windows Storage Server 2003, Linux Operating Environments.

Cisco Prime: Cisco Prime 2.x and 3.x

Wireless Equipment: Cisco Wireless LAN Controllers 2500, 5500, 8500, Cisco AirNet Wireless Access Points (1200, 3500, 3600 & 3700, 3800Series).Aero hive Access points AP 230 &AP122

Network Tools: CISCO Prime Management 2.x and 3.x Microsoft Monitoring Tool-Network Analyzer, Wire Shark, Packet Sniffer, Air Check, Giga Store, Aruba, Airwave.

Security: CISCO ACS, CISCO ISE, Check Point Firewall,AAA Rules

Applications: MS Office 2003/2007-Word Excel, Power Point, MS Outlook, Outlook Express, windows Live Mail, VNC PC Anywhere, Team Viewer, LAN Guard Network Scanner, Real VNC

Infrastructure Services: DHCP

Documentation: MS office, MS VISIO, power point.

PROFESSIONAL EXPERIENCE:

Confidential

Network Engineer,

Responsibilities:

  • Upgrading the End of Life Network Devices and updating the existing infrastructure in MS VISIO.
  • Configured and performed software upgrades on Hive Manager Controllers for Wireless Network Access .
  • Performed Software updates on MDM Tool called (SOTI MOBILE CONTROLER) . Created an integrated SSID for the wireless devices like Intermec bar code scanners to join in the production Network.
  • Tested the Aero Hive AP230 and Ap122 by broadcasting it with different test SSIDS, before deploying it in to the productions.
  • Configured VLANS on all the sites .
  • Co-ordinates with all 160 Site administrators and provided technical support while migrating Wireless devices into SOTI MOBI CONTROLLER.
  • Created network profiles and polices for the Aero Hive access points and Wireless Bar code Scanners and printers in the MDM Tool Called (SOTI MOBI CONTROLER).
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server.
  • Managing all the Network Devices through Prime Infrastructure and Pushing the Necessary configuration basing on client requirement.
  • Created Floor Maps using the prime for locating the Access points
  • Used AirMagnet Wi-Fi Analyzer to solve end-user issues.
  • Used Air Magnet for detecting Wi-Fi signal strength, security threats and wireless network vulnerabilities .
  • Co-ordinate with Cisco TAC Engineering and provided the assistance to trouble the tickets
  • Configured access points at 160 sites and added wireless devices into the production network
  • Provided User access to the user in the Active directory.
  • Co-ordinate with Aero hive engineers and provided the assistance to trouble the tickets
  • Monitoring Health of the Network Devices through prime and managing.
  • Troubleshooting, Analyzing network connectivity and Application and URL filtering using Smart track viewer and Smart track monitor.
  • Troubleshoot issue as VLAN, Trunk, STP, HSRP, GLBP
  • Troubleshoot routing protocols EIGRP, OSPF and BGP
  • Worked extensively on upgrades of Cisco Catalyst Switch 3750s, 3850s, 6500s.
  • Performed IOS Software upgrades on switches 6500, 3750 and 4500s and Cisco ASR for compatibility with Cisco ISE 1.3/1.4 setup.
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Experience with Project documentation tools & implementing and maintaining network monitoring systems and experience with developing network design documentation and presentations using VISIO Coordinated with engineering teams on operational system expansion.
  • Extensively utilized Microsoft’s Visio 2007 for design analysis and project planning.

Confidential

Network Engineer

Responsibilities:

  • Upgrading the End of Life Network Devices and updating the existing infrastructure in MS VISIO.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 and 8500 for Wireless Network Access Control integration with Cisco ISE.
  • Configured CISCO Prime Infrastructure 2.1 and 3.1 and integrated network Devices like WLC’s, Switches and Routers, Creating Heat Maps in Prime and Defining complete network infrastructure through Prime.
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server.
  • Managing all the Network Devices through Prime Infrastructure and Pushing the Necessary configuration basing on client requirement.
  • Used AirMagnet Wi-Fi Analyzer to solve end-user issues.
  • Used Air Magnet for detecting Wi-Fi signal strength, security threats and wireless network vulnerabilities .
  • Co-ordinate with Cisco TAC Engineering and provided the assistance to trouble the tickets
  • Monitoring Health of the Network Devices through prime and managing.
  • Configuring and Maintenance of Checkpoint UTM 1040,1070 and 2200 Next Generation with R70/R75/R80 Series
  • Troubleshooting, Analyzing network connectivity and Application and URL filtering using Smart track viewer and Smart track monitor.
  • Designed & Deployed Cisco ISE 1.2/1.3 for Enterprise RADIUS Authentication with Active Directory,
  • Working Knowledge on RSA Secured, Proxy Radius Services to Cisco ACS, Juniper Steel Belted Radius and Radiator Radius.
  • Configuration & Maintenance of Cisco ISE for Certificate based authentication for BYOD and Corporate Mobile Device Authentication using Xenmobile MDM
  • Worked extensively on data center upgrades of Cisco Catalyst Switch 3750s, 3850s, 6500s.
  • Worked on upgrading Cisco ISE 1.2, 1.3 .
  • Worked with OLT, ONTs, splitters and fiber optics on a campus LAN.
  • IOS upgrade in Nexus 7010 through ISSU (In service software upgrade).
  • Performed IOS Software upgrades on switches 6500, 3750 and 4500s and Cisco ASR for compatibility with Cisco ISE 1.3/1.4 setup.
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed
  • Deployed VXLAN on the Nexus 9000 to map the physical VLANs to the Virtual Overlay VLANs.
  • Experience in working with Nexus 7010, 5548, 5020, 2148, 2248 devices .
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Experience with Project documentation tools & implementing and maintaining network monitoring systems and experience with developing network design documentation and presentations using VISIO Coordinated with engineering teams on operational system expansion.
  • Coordinated with Off-shore during post validation of the devices.
  • Provided technical assistance to third-party and client operational staff
  • Extensively utilized Microsoft’s Visio 2007 for design analysis and project planning.

Confidential

Wi-Fi Network Engineer

Responsibilities:

  • Created different Secured Authentications and Encryptions basing on the client requirement.
  • Involved in installation and configuration of 5500 WLCs implementation.
  • Involved in the IOS upgrades of 5055 series access points.
  • Tested the Access points by broadcasting it with different test SSIDS, before deploying it in to the productions.
  • Created separate VLANS for Wi-Fi traffic.
  • Installed and configured 3600 series access points across the campus.
  • Managing all the Network Devices through Prime Infrastructure and Pushing the Necessary configuration basing on client requirement.
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server.
  • Designed & Deployed Cisco ISE 1.2/1.3 for Enterprise RADIUS Authentication with Active Directory, RSA SecurID, Proxy Radius Services to Cisco ACS, Juniper Steel Belted Radius and Radiator Radius.
  • Created the Maps in Cisco Prime and added the access points to trace the location of the access points.
  • Involved in Configuring and implementing of Composite Network models consists of Cisco7600, 7200, 3800 series and Cisco 2950, 3500, 5500, 6500 Series switches.
  • Provided management and troubleshooting of all networks Bluecoat proxy devices.
  • Replace branch hardware with new 2851 routers and 2960 switches.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Involved in the Installation and configured the Cisco routers 2800 in two different customer locations. It includes coordinating with Verizon and AT&T in order to bring the serial interface up for T3 link. Also, configuration includes frame relay, BGP and VPN tunnel on GRE.
  • Involved in configuration and troubleshooting of Cisco ASR 1001, 2500, 2600, 3000, 7500, 7200 Series routers.
  • Configuring IP, RIP, EIGRP, OSPF and BGP in routers
  • Involved in the migration projects, by migration from 6500 series devices to 4500 Series switches in Campus deployments at Core, Distribution and Access Layers.
  • Used DHCP to automatically assign reusable IP addresses to DHCP clients.
  • Configuration and extension of VLAN from one network segment to other network segment between different vendor switches
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trucking, deployed port security when possible for user ports
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN.

Confidential

Network Engineer

Responsibilities:

  • Worked as a short term contractor for upgrading the Confidential Wireless Infrastructure.
  • Involved in the designing and deploying the Wireless Networks with Different Secured Authentications and Encryptions basing on the Client Requirement.
  • Integrated network Devices like WLC’s, Switches into the Cisco Prime 2.1
  • Creating Heat Maps in Prime and Defining complete network infrastructure through Prime.
  • Managing all the Network Devices through Prime Infrastructure and Pushing the Necessary configuration basing on client requirement.
  • Monitoring Health of the Network Devices through prime and managing.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 2504, 4404, 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Worked on the CISSO Access Points both Autonomous and Controller based and converting in to controller based by upgrading the IOS.
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server.
  • Designed & Deployed Cisco ISE 1.2/1.3 for Enterprise RADIUS Authentication with Active Directory, RSA SecurID, Proxy Radius Services to Cisco ACS, RADIUS and TACACS.
  • Configuration & Maintenance of Cisco ISE for Certificate based authentication for BYOD, Guest authentication and Corporate Mobile Device Authentication using Xenmobile MDM
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server.
  • Designed & Deployed Cisco ISE 1.2/1.3 for Enterprise RADIUS Authentication with Active Directory, RSA SecurID, Proxy Radius Services to Cisco ACS, Juniper Steel Belted Radius and Radiator Radius.
  • Configuration & Maintenance of Cisco ISE for Certificate based authentication for BYOD and Corporate Mobile Device Authentication using Xenmobile MDM

Confidential (Chicago, IL)

Network Engineer

Responsibilities:

  • Involved in designing, configuring, implementing, maintenance and troubleshooting issues relating to routers and switches in LAN, WLAN and WAN.
  • Performed IOS Software upgrades on switches 6500, 3750 and 4500s
  • Designed and deployed networks as per the company’s requirement. Handled different tasks such as network address assignment, assignment of routing protocols, etc.
  • Worked on NX-OS series 2000,3000,4000,5000,6000,7000 switches by configuring and upgrading in data centers
  • Handling the network infrastructure of NOC LAN/WAN, migration & configuration of network client workstations. Addressing performance bottlenecks & ensuring maximum network efficiency and uptime.
  • Planning designing, Installation, configuration and maintenance of 802.11a/b/g Wireless Networks and Wireless Access points.
  • Implemented, Monitored and troubleshoot the protocols EIGRP, OSPF and Static Routes.
  • Configuration and Installation of ASA 5520 firewalls.
  • NAT, VPN and Traffic filter implementation in Cisco Firewall.
  • Implemented traffic filters using Standard and Extended Access Control lists. Handled Route-map, Re-distribution list & access-list configurations.
  • Access distribution and core layer switching architecture, created VLANS, Firewall Services Module (FWSM) and STP configuration.
  • Deployed unified communication solutions for the corporation with Cisco 2900, 3900, 3900E routers.
  • Hands on experience with voice protocols like MGCP, H323 and SIP.
  • Good working and understanding knowledge with Net screens and NSM and SRX .
  • Addressing issues like routing problems, route announcements/advertisements, and security access issues.
  • Used tools WireShark, Packet Sniffer and Microsoft Network Analyzer for monitoring Local Area Network connections (LAN’s) and Wide Area Network Connections (WAN) for Network connection and failure issues.
  • Administrative responsibilities including the installations, additions, updates and changes to Microsoft Windows 2003 and Windows 2008 servers.
  • Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series.
  • Worked for converting PIX rules over to the Cisco ASA solution.
  • Experience in Configuring, upgrading and verifying the NX-OS operation system.
  • Configuring IP, RIP, EIGRP, OSPF and BGP in routers
  • Administering the Microsoft Windows Servers and managing disk space, user profile creation and user rights management.
  • Maintain and create user accounts and policies within Active Directory, Configure/maintain Internet filtering and security on public access pc’s.
  • Configuration and maintenance of DNS & DHCP servers.
  • Maintained accurate network documentation for moves, adds, changes, and deletes. Properly documentation of problem situations and resolutions.

Confidential

Title Network Engineer,

Responsibilities:

  • Work internally with a team of technical personnel in the configuration, installation and maintenance of
  • Corporate LAN, WAN, Wireless and virtualized network environments.
  • Configured T1 interface and Channelized T1 interfaces between Cisco 2800, 2400 and 2500 series routers. Cisco IOS upgrades on routers.
  • Create end-user VPN accounts with appropriate access. Installed and configured for VPN IPSEC and VPN Dial-up connections for remote users.
  • Installation, Maintenance and Troubleshoot DNS, DHCP Servers and System issues. Managed and maintained DNS, DHCP protocols and Active- Directory Infrastructure.
  • Configuration and installation of wireless networks using access points, and Wireless LAN cards of Wi LAN, Dlink, Linksys, and Cisco AG APs.
  • Installation, Configuration and maintenance of Network Printers.
  • Troubleshoot routing protocols EIGRP, OSPF and BGP
  • Troubleshoot issue as VLAN, Trunk, STP, HSRP, GLBP
  • Worked on ASA firewalls and F5 load balancers
  • Verify and Troubleshoot VTP and RSTP Configuration issues within the corporate network
  • Firewall review, router rule base and validation for company employees
  • Set up TFTP server to backup, and restored configuration and IOS image files for the PIX firewalls, Cisco routers, Catalyst switches
  • Maintain WAN Circuits T1, T3.
  • Troubleshoot configuration issues Cisco Campus Switch Network

We'd love your feedback!