Computer Technician, It Service Desk Resume
4.00/5 (Submit Your Rating)
New, YorK
TECHNICAL SKILLS
- Programming Languages: Python
- Networking Protocols: ARP, OSPF, EIGRP, RIP, IS - IS, BGP, VRRP, HSRP, GLBP, SSL, VLSM, VLAN, ICMP, NTP, STP, VTP, LDAP
- SDN Protocols: OpenConf, NETCONF
- Network Security: IDS, IPS, ACL, IPsec, Site-to-site VPN, NAT, Cisco ASA Firewall, DDoS, Tcpdump
- Internet Technologies: IPV4, IPV6, TCP/IP, DNS, DHCP, HTTP, HTTPS, FTP, VOIP
- Operating Systems: Windows, Mac OS X, Linux (Kali, Metasploit, Ubuntu)
- Cloud Technologies and tools: Openstack, EC2, S3, IAM, VPC
- Networking Tools: Wireshark, Snort, Mininet, Cisco Packet Tracer, GNS3, Nmap
- ITSM System: Team Dynamix, Kyako
PROFESSIONAL EXPERIENCE
Confidential, New York
Computer Technician, IT Service Desk
Responsibilities:
- Set up hardware; install and configure software and drivers.
- Diagnose and troubleshoot end-user desktop application issues and provide appropriate solutions.
- Responsibilities included assisting students, faculties, and staff in troubleshooting and resolving complex software, Hardware, and Networking related issues.
Confidential
Network Engineer
Responsibilities:
- Designed a network with multiple VLANs and DHCP server to enable logical grouping and reduce broadcast traffic.
- Configured Access Lists (Standard, Extended, Named) to allow users all over the company to access different applications, Inter net, and compliance with the security policy and standards
- Performed switching technology administration including VLANs, Trunking, STP, RSTP, port aggregation and link negotiation.
- Planned, designed, deployed, and maintained routed networks using static routing and dynamic routing protocols including OSPF and EIGRP.
Confidential
Network Engineer intern
Responsibilities:
- Configured numerous Cisco routers, Cisco L2-L3 switches, Cisco firewalls, Cisco access points as part of new site installations.
- Troubleshoot day to day issues related to routers, switches, access points, firewall, and cables.
- Configured VLANs with 802.1q tagging, configured trunk groups, Ether-channel, and Spanning tree for constructing access, distribution and core layer switched architecture.
- Designed and Implemented an SDN-enabled DDoS defensive system in virtual cloud networking platform.
- Using Snort tool, created a system that detects and prevent malicious attacks within a networking system Host-Based Intrusion Detection System using Snort
- Developed a Host-based Intrusion detection system using Snort IDS to monitor inbound and outbound traffic.
- Created logs to check for any suspicious activities such as IP spoofing, HTTP flooding, unauthorized access, etc. Secured Network Implementation
- Designed a network for a small bank with selective authority levels within the hierarchy of the employees.
- Implemented a secure network using ACL protocol, giving required authenticated access to employees.