We provide IT Staff Augmentation Services!

Network Security Engineer Resume

5.00/5 (Submit Your Rating)

Olympia, WA

SUMMARY

Detail - oriented Subject Matter Expert across multiple platforms for international and domestic organizations. Passionate about protecting corporate resources and serving customers. Adept communicator, assisting customers with new and additional availability to products and services, ensuring external and internal access conforms to company standards and customer requirements. Collaborative and dependable team player, while troubleshooting issues for swift resolution.

TECHNICAL SKILLS

Juniper - SSG - (ScreenOS): Cli ScreenOS, Web UI, NSM GUI management, VPNs, hosts, object groups, security policies, group policies, policy management, static routes, security zones, routing, NAT/PAT, packet captures/debug, fail over testing, VRRP SSGs

Cisco - Switching/Routing: IOS/GUI, NX-OS, Access ports, trunks, lags/port channels, VLANs L2/L3, STP, VTP, BGP/OSPF, Dynamic/static routing, SVIs, port security, DHCP Snooping, DAI, Source Guard, Storm Control, ACLs, MACsec, vACLs, pACLs, Pvt VLANs, DHCP, NTP, IPv4, IPv6, IP sub netting/VLSM

Checkpoint: Smart Console GUI, web UI, hosts, object groups, security polices, group policies, policy management, NAT/PAT, routes, VPNs, backup, failover

BIG IPF5: GUI management, nodes, pools, virtual servers, SSL certificates

Brocade: Cli configuration, nodes, pools, virtual servers, static routes, ACLs

Splunk: Logging, monitoring and troubleshooting tool

Solarwinds: Network/device/system monitoring, alerting and trouble shooting

Cisco ASA: Cli IOS, ASDM GUI, ACLs, hosts, object groups, zones, NAT/PAT, stand-alone/multi-mode contexts ASA, VPNs ASA, security zones, port channels, trunking, ASA active/ stand by, failover testing, upgrades ASA, packet captures, troubleshooting

Juniper - SRX - (JunOS): Cli JunOS, VPNs, hosts, object groups, security policies, group policies, static routes, security zones, policy management, GUI VPNs, routing, NAT/PAT, packet captures, fail over testing.

IPv4/IPv6/TCP/UDP: Strong working knowledge - IPv4, TCP/UDP, HTTP, HTTPS, DNS, DHCP processes and troubleshooting using Wireshark, tcpdump, and other tools also good working knowledge of IPv6.

Wireless: Fundamental working knowledge topologies, Ad Hoc mode, BSS, IBSS, Infrastructure Mode - APs, BSA, SSID, DS, WLC, ESS, IEEE Standards, 802.11x, Path Loss, Scattering, Reflection, Fade (up/down), Noise, RSSI, SNR, and inSSIDer.

PROFESSIONAL EXPERIENCE

Confidential,Olympia, WA

Network Security Engineer

Responsibilities:

  • Used Juniper's NSM Express and 3000 to manage SSGs for site-to-site IPSec VPNs and ACLs with ScreenOS to trouble shoot issues and JunOS to configure, maintained and resolved SRXs VPNs included, creating new customer access.
  • Configured, upgraded, maintained, and troubleshot ASAs, employing combination of Cisco’s ASDM and CLI clustered stand- alone/multimode contexts.
  • Collaborated with team, installing, migrating, and upgrading older FWSMs to newer ASA 5580 platform, as well as new versions of IOS, moving from version 8.2 to 8.3 and higher as recommended by Cisco on standalone clustered ASAs.
  • Worked in Remedy platform, tracking, creating, assigning, executing, and completing tasks for projects, supporting multiple application platforms for telephony / cell industry, including SS7, SMS / MMS, and applications specific to company sold as a service.
  • Monitored and troubleshot via system logs, using Splunk and Solarwinds, keeping company aware of network issues.
  • Use system packet captures, verifying, monitoring, and troubleshooting access and issues on SRXs and ASAs via cli for JunOS and IOS.

Confidential, Tacoma, WA

Network Security Engineer

Responsibilities:

  • Configured and maintained BigIP F5 load balancers, Checkpoint Firewalls ( Confidential -IPSO and Splat), and Blue Coat Proxy server platforms, securing access for internal and external users to company resources.
  • Supported, created, and updated VeriSign SSL certificates for various external customers by keeping SSL certificates current and from expiring.

Confidential, Bellevue, WA

Network Engineer

Responsibilities:

  • Set up and supported BigIP F5 load balancers, Checkpoint ( Confidential -IPSO) Firewalls, and Cisco routers and switches platforms, enabling new customer access to company’s national cellar network.

Confidential, Lakewood, WA

Network Engineer

Responsibilities:

  • Responsible for and part of a team for all vendor relationships concerning planning, design, support, contracts, maintenance for all network and server-based devices.
  • Responsible for all support, installation, configuration, maintenance, and troubleshooting of all Cisco products (network/security), Microsoft Server (NT4.0/Win2K/Win2003) and associated server applications (Exchange 2000/2003, System Center Virtual Machine Manager (SCVMM)), and Juniper security devices (Netscreen SA1000).
  • Was an integral part of a team for the migration of the processing system in Designing, installing and maintaining a cell based multi-processor server environment - ES7000/600 Unisys - six cells, 24 - 64bit Intel Xeon processors.
  • Configured and maintained an EMC series CX700 SAN with a DSI LTO3 tape library with ComVault’s Simpana v7.0.0 as the backup solution.
  • Supported and maintained a VoIP and SIP gateways for two offices using Cisco’s Call Manager Express.

We'd love your feedback!