Network/voip Engineer Resume
4.00/5 (Submit Your Rating)
SUMMARY:
- 15+ years experience in the telecommunications field.
- Currently have CCNP, CCNP Voice, and CASP CE certifications.
- TS Clearance along with a BS in Computer Science from Illinois State University.
- Foundations are in Route/Switch and VoIP, but also worked for numerous medium/large sized organizations in which every network device fell within the position’s domain (Wireless, Network Management Systems, Nexus/Datacenter, DR, LAN/WAN, Firewalls, Access Security, IP Management, multiple Operating Systems, Cabling, etc.).
- 9+ years working within the Civilian/Commercial sector. Confidential 50 enterprise environments, Confidential, Consulting.
- Enterprise level positions granted the ability to specialize in a subset of technologies, therefore maximizing knowledge content along with best practices.
- Roles within the Confidential area provided a strong foundation of fundamentals at each layer, and an overall grasp of how each layer pieces together. Instrumental in capacity planning and overall design.
- Always built and maintained lasting relationships with colleagues.
- Enjoy being tasked with technologies not always fully experienced in. Strong self - researcher, combined with experience along with fundamentals, greatly reduces any learning curve.
- Very patient demeanor, not overly excitable or easily irritated.
- Able to breakdown complex technical jargon into common analogies and everyday terminology targeted at non-technical audiences.
PROFESSIONAL EXPERIENCE:
Confidential
Network/VoIP Engineer
Responsibilities:
- Responsible for configuring network devices at field offices to support the new Cisco VoIP system.
- Reviewed all CUCM configurations for each field offices. Completed around 40-50 offices.
- Supported any network or VoIP issue during the cutover and after the site was migrated.
- Field offices had 2800/3800 series routers, switches varied between 2960/3560/4500/6500.
- Some field offices had a dual router configuration utilizing HSRP and multiple WAN connections.
- Some VoIP features tested at each site were VM, MoH, Call Park, SRST, etc.
- Router configurations included QoS, SRST, SCCP, and MGCP configurations.
Confidential
WAN Engineer
Responsibilities:
- Responsible for supporting Confidential networks (NIPR/SIPR/CXI) and implementing new technologies within the WAN architecture that connects all the FOBs/enclaves throughout Afghanistan.
- Primarily responsible for supporting devices above the firewall within the TLA stacks, Tier 1, Tier ½, and Tier 1/3 routers. Our team functioned as an ISP providing connectivity between all bases and facilities of operation throughout Afghanistan and connecting them back into the global infrastructure.
- Primary focus is to control routing between all the enclaves, making sure all routing paths are efficient and implementing high availability when possible.
- Position requires in-depth knowledge of routing protocols (eBGP, iBGP, OSPF, EIGRP), traffic engineering, QoS, etc.
Confidential, Bloomington, IL
Lead Unified Communications Deployment Engineer
Responsibilities:
- Confidential offered me my position back after working overseas, which is why there are all the dates above. I have done their VoIP Migration and worked as a Tier 3 Network Engineer. I always have had a good relationship with them.
- Completed 2-year migration project from Confidential to Cisco VoIP to Operation Centers within Confidential Insurance.
- Lead Deployment Confidential for 5 US geographical zones, consisting of an estimated 150+ sites and 225,000 users.
- Responsible for mentoring other VoIP Engineers to prepare them to take sole responsibility for other areas/zones. Placed in leadership role because of prior experience working on Tier 3 Route/Switch team, which helped from understanding technical aspects and complicated change processes.
- Primary duties included configuring and implementing Cisco 2800/3800 series routers at each site to perform voice gateway functions.
- This included everything from configuring voice interfaces to bring up the new PRIs/POTs/CO/DID lines during cutover, to configuring items like local MoH, conferencing, dial-peers, SRST, etc.
- We deployed Confidential devices for analog-to-VoIP scenarios like fax machines, postage machines, PA systems, occasionally ATM machines, etc.
- Our team led cutovers with the onsite field techs and testers. We were in charge of resolving network and VoIP related configurations issues that came up through testing, whether CallManager or network related.
- We then provided for 3-day post support on the VoIP and Network side.
- Other duties included configuring QSIG trunks, providing technical documentation including site Visio's. Configuring large-scale outbound dial-plans with sites that used multiple Telco carriers with 30+ NFAS PRIs.
- After telephony deployment was completed I was offered a position on Tier 3 Route/Switch Team.
Network Engineer
Confidential
Responsibilities:
- Responsible for overall design and Level 3 support of 40,000 network devices
- Support multiple redundant Datacenters, 18,000 Agent offices, Operation Centers, Regional offices, Corporate Headquarters, Dev/Testing, and DR environments.
- Involved in the network capacity planning to support 300,000 VoIP endpoints.
- Played a key role in different POCs including Datacenter virtualization and network security.
- Deployed security hardening templates to 18,000 Cisco 2811 routers.
- Developed IOS code-testing templates based on business areas.
- Migrated Operation Centers from point-to-point DS3’s to an MPLS WAN via BGP
- Designed and implemented multiple vendor datacenter connections via VPN and BGP.
- Provided network configuration and support for implementing an Confidential IPT solution at various Operation Centers.
- Continually developing detailed network configurations for Level 2 deployment team.
- Responsible for network documentation including Network Diagrams, Knowledge Item procedures (KIs), and configuration templates based on hardware model and business area.
Confidential
Network Engineer
Responsibilities:
- Small Cisco infrastructure consisting of an estimated 200 Cisco devices.
- Infrastructure includes Cisco 2950, 3550, 3750 series switches, Cisco 2800, 3800 series routers, Cisco 1200-1300 Series LWAPs managed by Cisco Wireless LAN Controller Appliance (WLC), Cisco NAC, Cisco CME. IPSwitch’s What’s Up Gold, Bluecoat, iDirect VSAT modems.
- Small team requires flexibility between each member, one day might require designing and implementing new security level network access, the next day might require working with a customer on connecting to the Wi-Fi environment.
- MoraleNet infrastructure also provides encrypted transport for the Department of State OpenNet Network.
- Provide Cisco VoIP services using Cisco CUCME, utilizing both Cisco IP Phones and analog endpoints via FXS ports.
Confidential
Network/Voice Engineer
Responsibilities:
- Team Lead over Confidential Network/Systems.
- Responsible for all Network/VoSIP Tier 3 TNOSC support.
- Implemented C2 System (Critical Applications) failover solution utilizing VRFs/OSPF/BGP.
- Managed around 10 remote sites over multiple WAN technologies, E1, MPLS, DSL, OC-3.
- Managed around 400 Cisco switches/routers 3700/2800/4500/6500/7200.
- Implemented Nexus architecture using 5010 switches with FEX 2000 series.
- Managed all Tier 2 CLASSFIED IPT running CUCM version 7.X.
- CiscoWorks, IBM Tivoli Netview, CiscoSecure ACS, TACLANES, IPSEC, GRE, DMVPN.
Confidential
Team Lead Network
Responsibilities:
- Provide leadership and guidance to a team of 9 Network/Security/Voice Engineers composed of both US contractors and Iraqi Local Nationals hired by the Iraqi Ministry of Defense (MoD).
- Provide senior level knowledge in the area of IP Telephony and Internetworking.
- Redesigned and documented entire NOC infrastructure to secure, simplifies, and condenses the Iraqi Defense Network ( Confidential ) to aid in the transition to the inexperienced Iraqi engineers. This mainly comprised of redesigning and segmenting the WAN DMVPN block to allow for tighter security and scalability, while eliminating single points of failure. Also, allowing for the addition of advanced technologies such as Cisco WAAS, MARS, and Video Conferencing.
- Allocated over 60% of my resources in training the Iraqis on all Internetworking/Voice/Security aspects of the Confidential . This included classroom lectures/labs and then an eventual transition to an Internship program in which I assigned tickets and gradually introduced the Iraqis to the more complex areas of the production network.
- Redesigned and deployed NMS platforms such as Solarwinds Orion, ManageEngine NetFlow Analyzer, and CiscoWorks2000.
Confidential
Network Engineer & Instructor
Responsibilities:
- Responsible for the LAN/WAN/IP telephony design, configuration, and support of the first Iraqi Defense Network ( Confidential ) being installed throughout Iraqi military bases in Iraq.
- Based out of the Network Operations Center (NOC) in Baghdad, daily duties include high-level network/IP telephony design, configuration of equipment, and support to over 28 remote sites/2000 users including the NOC and Iraq Ministry of Defense.
- Other job duties include occasional on-site installs/site surveys/maintenance, which involves traveling to remote sites to install Confidential infrastructure.
- Designed and implemented multiple redundant DMVPN designs over three separate WAN infrastructures (Internet VSATs/Private VSAT) utilizing Cisco 2851 routers.
- Designed and implemented failover Internet connectivity utilizing HSRP/Enhanced Object tracking when BGP was not available through ISPs.
- Created and deployed the baseline end-to-end QoS configuration template utilizing the Diffserv Model, which takes advantage of such features as NBAR, LLQ, CBWFQ, WRED, traffic classification/marking, traffic policing/shaping, AutoQoS. These templates are deployed to 130+ network devices consisting of Cisco 2800 series routers and Cisco 4500, 2950, 2960, and 3560 series switches.
- Created the baseline wireless bridge configuration template which is deployed on 60+ Cisco 1310 outdoor wireless bridges distributed throughout the Confidential network.
- Created network/IP telephony documentation templates that are used for all sites “As-Built” documents including the NOC. This also includes network design templates utilizing Microsoft Visio.
- Responsible for all high-level IP telephony design and configuration utilizing Cisco CallManager 4.1, Cisco 2800 and 1700 series gateways, and Cisco 7900 series IP phones.
- Provide IP telephony support to an environment consisting of 1200+ phones spanning over 28 sites.
- Consolidated two major CallManager clusters into one to centralize all telephony configurations and support with the Iraq Ministry of Defense and the Iraq Defense Network.
- Designed and implemented IP telephony features such as SRST, hardware/software conferencing/transcoding resources, Extension Mobility, MLPP, CDR reporting/analysis, etc.
Confidential, BLOOMINGTON, IL
IT Consultant
Responsibilities:
- Implemented NetQoS ReportAnalyzer appliance to utilize Netflow and SNMP statistics from critical network devices.
- Assisted on a network infrastructure project that involved revamping client network. Project consisted of a routing/switching/security infrastructure redesign utilizing Cisco 6500 series switches with integrated FWSM and IDSM modules.
- Designed and implemented a DMVPN design utilizing Cisco 800 and 2800 series routers to interconnect four regional IL offices along with two telecommuters.
- Designed and implemented end-to-end QoS (Quality of Service) according to the Diffserv Model to support Cisco IP telephony applications.
- Implemented VPN point-to-point tunnels to other remote sites utilizing IPSEC/GRE/OSPF over Cisco 2600 series routers.
- Designed and implemented failover external connectivity utilizing HSRP with Enhanced Object Tracking.
- Designed and implemented end-to-end QoS according to the Diffserv Model to support IP telephony applications.
Confidential, WESTCHESTER, IL
Senior Network Engineer
Responsibilities:
- Sole Engineer responsible for the design/support of LAN/WAN environment (100+ devices), which includes 10 remote US/Canada locations.
- Found a major mistake within the first 3 weeks of my employment involving a project that was ironically brought to my attention in a somewhat gloating manner during my interview process while meeting the Systems manager. He told me about how he suggested replacing P2P circuits with VPN tunnels using each sites ISP connection. The network wasn’t being proactively monitored, however they had purchased CiscoWorks2000 prior to my arrival so I installed it right away, turned on SNMP/Syslog, and noticed every branch WAN router was saturated and the CPUs were running at 100%, the log file showed this had been going on for over a year. I brought it to my manager and the Systems Manager and explained that the consulting team they hired installed the VPN-AIM card in the 2620 routers but didn’t enable them in the CLI (back then you had to). Once I enabled it my phone rang off the hook with field engineers asking if we upgraded the WAN because it was so much faster. My new company was refunded for that project since it went so long unnoticed and they handled all network matters.
- We actually never had to use a consulting firm while I was there, even during a major wireless deployment, load-balancing traffic between ISPs using BGP instead of the prior method which was active/failover.
- Sole Engineer responsible for design/support of large campus network composing of Corporate Headquarters and a 300 acre/50+ building manufacturing plant.
- Sole Engineer responsible for the design/support/deployment of point-to-point VPN connectivity to international and external vendor locations utilizing BGP/iBGP.
- Sole Engineer responsible for the configuration and maintenance of all Cisco Pix Firewalls and Cisco AAA security utilizing CiscoSecure ACS.
- Designed/configured/deployed wireless solution at Corporate Headquarters consisting of 13 Cisco 1100 Series Access Points utilizing PEAP authentication, Microsoft Active Directory, WDS, WLSE, and CiscoSecure ACS.
- Deployed CiscoWorks (LMS, RWAN) for US/Canada locations.
- Lead Engineer responsible for the product specification/configuration/deployment of new LAN environments for 9 remote sites.
- Developed detailed Visio documentation of entire enterprise infrastructure including core and access layer architecture for each location, EIGRP AS topology, BGP AS design, Campus network VLAN and Spanning-Tree design, and all IPSEC/GRE connectivity.
Confidential, BLOOMINGTON, IL
Network Engineer
Responsibilities:
- Monitor and maintain WAN links to each remote office. These technologies include T1, DS3, Frame-Relay, and IPSEC Tunnels.
- Responsible for LAN support at each site. This includes design, configuration, and maintenance of entire switched internetwork consisting of Cisco switches and routers.
- Instrumental in all network planning and equipment recommendations.
- Documented entire network using Microsoft Visio and published designs onto corporate intranet.
- Deployed and maintained CiscoWorks 2000.
- Designed and implemented VLANs at 9 sites averaging 400+ end users per site.
- Planned and deployed a corporate remote access solution utilizing Cisco VPN concentrators.
- Designed and deployed a link failover method at each site utilizing VPN concentrators/Pix firewalls and IPSEC Tunnels.
- Instrumental in the enterprise migration from EIGRP to OSPF.