We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

4.00/5 (Submit Your Rating)

Saint Louis, MO

SUMMARY

  • Over 8+ years of experience in network design, implementation, troubleshooting, monitoring, testing and management of large - scale campus and Data Center networks.
  • Strong hands on experience on deployment, configuration and troubleshooting of cisco devices such as Cisco Catalyst Switches 2960, 3850, 3650, 9300,9400,9500,6800 series, Nexus 3000, 7010,7376 switches and Cisco routers 2800, 2900, 3800, 3900, 4000,ASR 1000, 9000 series and ISR 800,1000,4000 series.
  • Expert in configuration of Virtual Local Area Networks (VLANS) using Cisco routers and multi-layer Switches and supporting STP, RSTP, PVST, RPVST, MST along with trouble shooting of inter VLAN routing and VLAN trunking using 802.1q.
  • Experience in OSPF, EIGRP and BGP protocols. Configured, Designed and troubleshooting experience with routing protocols on Cisco, Juniper and Arista routers.
  • Experience in Spine Leaf Architecture, EVPN, VXLAN. Worked on software Defined Network solutions using Cisco ACI.
  • Knowledge in Akamai CDN, CDN support and deploying, Cloud flare in website caching, Server load balancing and Maintenance methods.
  • Troubleshooting connectivity issues through Blue coat as well writing and editing web policies.
  • Experience with policy routing and route redistribution, Loop Avoidance, Load Balancing, ISP circuits, LSA types, Area Types.
  • Experience with Cisco Meraki wireless managed network infrastructure.
  • Worked on Juniper MX Series Routers as Edge Routers. Worked on Juniper EX and QFX switches.
  • Experience in WAN using Leased lines, Migration from Metro Ethernet to MPLS, Hub Spoke model, VPN tunnels for remote sites. Worked on SD-WAN on Riverbed iWAN and Viptella.
  • Implemented network authentication and security using SDM, NAT/PAT, ACLs, Url Filtering, SSL Forward proxy, SSL Decryption, Zones, DMZ.
  • Knowledge on working with Wireless LAN Controller's, Cisco Meraki, Cisco AP's, Standalone AP's and Mesh AP's.
  • Strong hands on experience in configuration and troubleshooting of DHCP, DNS and IPAM services.
  • Worked on TACACS/RADIUS server for VPN user authentication and network devices authentication. Migrated from Cisco ACS to ISE.
  • Provided network administration services such as authentication, web filtering and deployment secure gateway using Bluecoat proxy.
  • Administered in implementing and configuring F5 Big-IP 6400 load balancers. Worked on Viprion Chassis from Scratch. Experience with F5 LTM, GTM, APM and ASM modules. Experience in iRule Scripting.
  • Experience in Implementing Check Point Firewalls NG, NGX, NG R55, NGX 60, NGX R65, R70, R75, R77 and Palo-Alto 200,500,3020,3060, 5020,5060, Panorama M-100, FortiGate Firewalls 7060E,7040E,7030E,5001E
  • Experience in Configuring Checkpoint Clusters with Nokia IPSO and GAIA OS.
  • Managed all network and devices to include Cisco routers, switches, VPNs, SSL, Check Point, Cisco PIX, Cisco ASA with firepower services, Cisco FWSM as well as content delivery networks enterprise environment.
  • Worked extensively on firewalls and configured FortiGate GUI and FortiGate Manager.
  • Worked on the implementation of scripts using python, Ansible and TCL.

TECHNICAL SKILLS

LAN/WAN Technologies: PPP, HDLC, MPLS, T1/T3, DS3, DS1, OC192, Ethernet, Fast-Ethernet, 10 Gb Ethernet.

Networking Protocols: OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4, IPv6, SNMP, DHCP, DNS, TCP/IP suite, NTP.

Security Protocols: IKE, IPsec, SSL, AAA, Access-lists, prefix-lists, SSL-VPN

Cisco Devices (switches and Routers): ASR1002, ASR1004, ASR1006, ASR1700, ASR9001,1700, 1800, 2500, 2600, 3600, 3800, 7200 and 7600.Blue Coat Proxy Catalyst 2900, 3560, 3750, 4500, 4900, 6500, Nexus 2K/5K/7K

Juniper Devices: EX 4300, 4200, 3300, 2300 Series, QFX 5100, 5200 Series.

Firewalls: Cisco Firewalls (ASA 5505, 5510, 5585), Palo Alto Networks (PA 220, PA820, PA-2K, PA-3K and PA-5K), Check Point Firewalls NG, NGX, NG.

Network Management/Monitoring: Solar winds, Net flow, Fortinet Manager, Wireshark, Cisco ISE, Bluecoat Proxy.

Load Balancers: F-5 BIG-IP LTM 2000, 3900, 5000, 6400, 6800, 8900.

Programming Languages and Scripting: Python, C, TCL and Ansible.

Virtual Tools: GNS3, Virtual Box, VMware ESXi

Operating Systems: Windows XP/7/8/10, MAC OS X, Windows Server 2008/2003/2016 , Linux, IOS-XE, NX-OS

PROFESSIONAL EXPERIENCE

Confidential, Saint Louis, MO

Sr. Network Engineer

Responsibilities:

  • Design and implementation of the LAN IP infrastructure using Layer 2 / Layer 3 switching, VLAN, VPC, HSRP and trunking /channeling technologies and routing protocol EIGRP and OSPF.
  • Primary responsibilities include but not limited to implementation and troubleshooting of all LAN/WAN solutions.
  • Worked on Setting up VPC, VDC and FEX.
  • SME providing 3rd tier Mainframe Networking Support and Performed mainframe VTAM and TCP/IP tuning and buffer sizing.
  • Responsibilities included, z/OS Communications Server support for Releases 1.12 - 2.2. VTAM and TCP/IP performance and Tuning, Process improvement, Problem resolution, Documentation.
  • Worked on integrating existing Layer 2 and Layer-3 networks with ACI.
  • Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
  • Worked with Cisco Channel partners to build practices around Cisco ACI
  • Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.
  • Working knowledge with white listing webpages and blocking webpages with Blue coat Proxy SG and Blue coat reporter.
  • Installation and migration to Solarwinds and LiveAction network monitoring systems.
  • Worked on WAN connectivity between CISCO routers using T1, T3, DS1, DS3 Frame relay and troubleshooting connectivity issues.
  • Worked with multiple tools like Infloblox, NetMRI, NetQos, LiveAction to monitor and troubleshoot issues.
  • Responsible for network connections of DSO,DS1,Fractional DS1 and DS3 to the network and customer premise utilizing the DACS
  • Some familiarity with Zabbix, AWS, Git, Nginx, Ansible
  • Configure Amazon Web Services (AWS) F5 ASM to protect block chain cloud applications.
  • Responsible for the secure development lifecycle environment form NX-OS to Application Centric Infrastructure (ACI) in Data center, implemented in the lab environment.
  • Used Cisco ACI Fabric which is based on Cisco Nexus 9000 series switches and Cisco Application Virtual Switch (AVS)
  • Responsible for the operations, Maintenance, Troubleshooting, Re-integration and support of the MDC Centers (5G Network).
  • Software support for several Confidential and NON- Confidential products, including but not limited to: Session Manager, VTAM Switch, RexxTools, TADz, JOBSCAN
  • Understand customer requirements for wireless networks and explain how Cisco s will integrate with current infrastructure, as well as service future needs.
  • Configured, installed and maintained Velo-Cloud SDWAN systems at customer offices, remote offices, and data centers.
  • Integral member of Network Modernization team that re-engineered EDS Mainframe networking to utilize TCP/IP instead of SNA as the backbone transport protocol, decreasing costs and increasing reliability.
  • Developed new and updated existing CDN operator, content, and service provider administration and management documentation for this multi-tenant CDN environment.
  • Support Blue Coat Proxy in explicit mode for users trying to access the Internet from Corp Network.
  • Operate network monitoring and management tools Tools analysis software suites such as CA Spectrum, Cisco Prime LMS, NetScout, NetMRI, Cisco Prime Infrastructure, Cisco APIC EM IWAN, SevOne, NetBrain, HP Network Automation, Nagios and Orion, LiveAction to diagnose problems, restore service for network systems.
  • Troubleshooting connectivity issues through Blue coat as well writing and editing web policies.
  • As a Network Engineer I worked on the Viptela SD-WAN, designed the test automation infrastructure for the entire suite of SD-WAN features.
  • Maintained a thorough understanding of the basics behind the Internet and its workings (DNS, Security, IP Routing, HTTP, VPN, Email Routing, SPAM, etc.)
  • Implemented Cisco ACI infrastructure for supporting rapid application change by reducing complexity with a common policy framework that can automate provisioning and resource management.
  • Worked on the implementation of OSPF areas, configured route redistribution on the ASR routers and layer 3 devices.
  • Planned and migrated from ESX 2.5.1 servers to NSX 3.0 in Pulix's lab environment.
  • Setup separate ESX 3.0 environment to facilitate the migration from NSX 2.5.1
  • Configuration of Juniper SRX series firewalls for outbound traffic via blue coat proxy server.
  • Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Configured SDWAN router Viptela to connect remote sites over the Internet.
  • Deploy, scale and automate network across multiple global datacenters supporting Amazon Web Services (AWS)
  • Worked on TACACS/RADIUS server for VPN user authentication and network devices authentication using Cisco Control Access Server.
  • Troubleshoot File Transfer problems on all Platforms, working closely with our Network and Vtam Analyst.
  • Performed ongoing system maintenance, involving Mainframe Operating System upgrades, Communications product upgrades, Cisco IOS upgrades.
  • Expertise on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LAN s of network.
  • Created new CDN API reference and SNMP and Syslog monitoring guide and Involved in the deployment of Content Delivery Networks (CDN).
  • Update customer networks by configuring routers, switches, and incorporate the SDWAN into the network design.
  • Responsible for advanced enterprise wireless LAN administration and design of mesh networks, and point-to-point and point-to-multipoint topologies.
  • Worked on assigning static IP addresses to the network devices and in configuring DHCP servers in the production environment.
  • Comprehensive background in the installation, upgrades, configuration, rollout and support of HP BTO software like OM, Site Scope, Reporter, PM, NNMi.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer.
  • Working on the SD-WAN implementations at all Greenfield and Brownfield medical facilities/hospitals by deploying Viptela hardware. provide L2/L3 support handle enhancement projects for CGC Enterprise Monitoring tools like HP BSM, OMi, uCMDB, BPM, OMW, NNMi, OVPM, OVPI, xMatters
  • Deploy and configure Cisco Meraki SDWAN at 30 sites globally.
  • Worked on BGP configuration for providing redundant internet connectivity using BGP attributes, Route maps, prefix-lists on Cisco ASR/ISR routers 1001 and 9009.
  • Configuration and troubleshooting of CSM, integration with ASA devices. Experience in managing security policies with CSM, integrated with ASA 5500 devices.
  • Experience in set up, configuration Monitoring and Troubleshooting Cisco's ASA 5500 PIX firewall and ASA 5500 appliances.
  • Worked on the implementation of Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings
  • Worked with Blue Coat Proxy to actively utilized and monitor the Web Security and WAN Optimization.
  • Experience in administrating Viptela SDWAN enterprise deployment and implementations of Network and Devices for SDWAN environment.
  • Key point of contact with the Global Network Operations Center GNOC . Blue Coat Proxy, Check Point, Utilized SMART technology that enables the PC to predict the future failure of hard disk drives.
  • Implement & troubleshooting of Juniper switches, routers and Firewalls. Configuration of remote access VPN and site-site VPN on Juniper platforms.
  • Configured Cisco Router 7200 series for IP connection to Medicare mainframe system.
  • Worked with Juniper Net Screen 500/5200 and juniper SRX 650/3600. Configuration VPN, Firewall rules on SRX series firewalls.
  • Worked with Enterprise Intrusion Detection / IPS (Snort, firepower, Juniper IDP, IBM ISS).
  • Created and configured management reports and dashboards using Fortinet and FortiGate manager
  • Troubleshooting FortiGate CPE 80 series firewalls and Fortinet manager along with fore scout Counteract.
  • Monitoring of the network using network monitoring tools such as Solar Winds, Wireshark.
  • Implemented and created security policies, rules, access lists and app id using Palo alto firewalls in the production environment.
  • Serve as primary responder for all Content Delivery Network (CDN) infrastructures related issues.
  • Provided administration and support on Bluecoat Proxy and Zscaler Cloud Proxies for content filtering and internet access between site and VPN client users.
  • Knowledge of Cisco Meraki Cloud managed Switches (MS250, MS350, MS410) and SD-WAN (MX 65, MX100, MX400).
  • Configuration of Palo Alto firewalls for remote site implementation.
  • Experience in Configuring and troubleshooting Palo alto switches PAN 5060.
  • Actively involved in design & deployment of a new datacenter using Cisco Nexus 9000 platform in spine & leaf architecture utilizing VXLAN fabric & BGP-EVPN overlay technologies
  • Assist customer team with the design and placement of Palo Alto Networks devices.
  • Closely monitored the network operations with the riverbed network application management and monitoring tools.

Environment: Cisco Nexus 5148,7376 and 7010, VPC, VDC, F5- LTM, GTM load balancer, STP, VLANS, VTP, EtherChannel, Port channel, Access Points,CDN,Switch Stacking, OSPF,AWS, Meraki, BGP,HTTP,VLAN/Trunking, Spanning Tree (FHRP/HSRP/VRRP), TELNET, TCP/IP, DHCP, Palo Alto Firewall.

Confidential, Philadelphia, PA

Sr. Network Engineer

Responsibilities:

  • Strong experience in Networking, including hands-on experience in providing network support, installation and analysis for a broad range of LAN/WAN communication systems.
  • Configure Cisco ISE node with the Monitoring persona functions as the log collector and stores log messages from all the Administration and Policy Service nodes in a network.
  • Involved in the Team of Data Center Operations to perform duties like administration and monitoring of Cisco Routers and Switches according to the organization requirements.
  • Experience in administrating Viptela SDWAN enterprise deployment and implementations of Network and Devices for sEIGRP environment.
  • Provides all the configuration, authentication, and policy capabilities that are required for network model, and the secondary Cisco ISE node functions in a backup role.
  • Through understanding LTE Users, UMTS users. Good understanding on 4G, LTE, 5G Networks layers.
  • Installed, Administrated, Upgraded, and Deployed the Blue Coat Proxy servers, content filtering, and policy including the BCAAA (Blue Coat Authentication Agent) Servers.
  • I mplementing couple of HTEMS, RTEMS, Data warehouse etc as a part of support and migration.
  • Centralized authentication, authorization, and accounting (AAA) operations between clients and the primary Cisco ISE node are performed using the RADIUS protocol.
  • Worked extensively with multiple wireless hardware vendors including Cisco, Cisco Meraki.
  • Configuring and implementing Remote Access Solution: IPsec VPN, AnyConnect, SSL VPN.
  • Provided technical support services for DNS and IPAM services.
  • Proficient in design, implementation, management and troubleshooting of Check point firewalls, Cisco PIX, NetScreen Firewalls, Check point Provider-1 / VSX, Nokia VPN, Palo alto IDS, Foundry / F5 Load Balancers, and Blue Coat Packet Shaper systems.
  • Ability to split the load in this way directly reduces the stress on each Cisco ISE node in the system
  • Experience installing, configuring and troubleshooting one or more of the following Cisco security technologies: Cisco ISE, IPS/SourceFire, ASA, CSM, VPN, ACS, FTD, ACI, Trustsec, StealthWatch, Cisco Umbrella architectural Experience on Migration from SourceFire to FireAmp.
  • Worked with tools team during Network monitoring tools migration. Moved from Solarwinds to HP NNMi and also Worked with tools team in discovering nodes in HP NNMi.
  • Learned and used new monitoring tools like Liveaction, EM7, CSPrime, IPControl etc worked with server team and helped in server moves at datacenter.
  • Experience with the architecture, deployment, and operations of Cisco ISE
  • Troubleshot and provided troubleshooting instructions for communication issues between NNMi and the NPS. Specifically ISPI Performance for Metrics and iSPI
  • Configured architectural call center switch “line-side digital” for IVR Integrating Avaya & Cisco IP Telephony
  • Configured CA-Explore Performance Management for VTAM to provide online and batch facilities to monitor VTAM and network activity.
  • Experience installing, configuring and troubleshooting one or more of the following Cisco security technologies: Cisco ISE, IPS/SourceFire, ASA, CSM, VPN, ACS, FTD, ACI, Trustsec, StealthWatch
  • Troubleshoot DS1, Fast Ethernet, Gigabit Ethernet, DS3, and OC/Sonet/DWDM OC12-OC192 circuits and Perform remote testing on Wireless DS3/DS1circuits.
  • Cisco ISE node—A Cisco ISE node can assume any or all of the following personas: Administration, Policy Service, Monitoring, or pxGrid
  • Designed and implemented end-to-end QoS (Quality of Service) according to the Diffserv Model to support Cisco IP telephony applications.
  • Manage 5G Core based on Openstack, bring up services, and bring down services.
  • Manage 5G RAN platform, bring up services, bring down services, make configuration changes per customer requirements, collect test data etc.
  • Setup separate ESX 3.0 environment to facilitate the migration from NSX 2.5.1
  • Implemented VMWare's NSX-T management software Virtual Center 2.0 to manage the new environment
  • Managed and maintained Vmware NSX hosting environment
  • NSX and Virtual Palo Alto’s
  • Developed System Documentation for Cisco IP Telephony and Cisco Contact Center and Designed, installed, configured and deployed enterprise-wide Cisco IP Telephony platform.
  • Provided troubleshooting system support for switching modules such as DS1- DS3 switching network interface modules (NIMs), Port shelf controller (PSC), and Ring Switch module (RSM), OC3, OC12, and OC48.
  • Coordinated acquisition of System One\'s first IBM Mainframe; two Mainframe replacements; purchase and configuration of over 30 Cisco Routers and ancillary communication equipment for corporate and customer sites.
  • Perform daily review of Blue Coat Web proxy and Performs daily support of multiple clients' proxy platforms, including Blue Coat and Websense Proxy and other proxy solutions as required by clients.
  • Had a role in maintaining and monitoring the security of the IMF through various security tools such as Checkpoint and Cisco ASA Firewalls with fire power services and IPS/IDS instruments.
  • Responsible for log-mining/troubleshooting/replication and problem resolution within a large-scale global Linux based CDN environment.
  • Working on network monitoring systems like HP NNMi, HP NPS for Netflow tools, ELK for log search.
  • Engaged in cross functional, technical discussions to define SW infrastructure / architecture for 5G factory algorithms and products.
  • Extensive experience in Cisco IP Telephony network construction and handling and Outstanding grasp of Cisco IP Telephony network configuration, support, debugging and troubleshooting.
  • Configured Cisco Router 7200 series for DLSW and DLSW+ connection to Medicare mainframe system.
  • Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired VLAN’s of network Integrated NNMi into OMW for Layer2 & 3 monitoring
  • Define enterprise 5G strategy and product roadmap and identify priority use cases and industry verticals
  • Proficient in Checkpoint, Cisco, Juniper, Lucent, Fortinet and Blue Coat technologies.
  • Sourcefire firepower line of appliances were designed for advanced malware protection and for efficient build for Next generation intrusions prevention system familiar with blue coat proxy servers and blue coat web sense.
  • Experience working with Cisco ASA 5585-X with firepower firewalls with Firewall rules, IPSEC VPN, NAT, Active-Standby Failover, OSPF and Any Connect VPN technologies
  • Strong hands on experience and knowledge on Software Defined WAN (SDWAN) and its architecture including the vendors SilverPeak and Cisco Viptela.
  • Integrated Palo Alto next-gen firewalls with overlay VMware NSX SDN network and evaluated Cisco ACI, VMware NSX, and Arista CVX SDN solutions
  • Play a key role in the company’s direction towards Cloud Computing platforms by creating a strategy for transition plans. Azure AD and AWS, Office 365.
  • Designed, configured, implemented site-site VPN on cisco ASA 5585-X firewall with firepower services.
  • Worked on bluecoat proxy to optimize WAN Performance by analyze and scan malwares to protect the infrastructure and URL filtering.
  • Install, troubleshoot, perform software update on a cloud based 5G RAN system.
  • Prepared Functional/Performance 5G modem validation test plans for IP bring-up (Throughput, Stability, Carrier Aggregation, Mobility, IRAT, cDRX)
  • Accountable for coordinating solutions with vendors on chronic equipment or operating system issues that impact the CDN platform.
  • Install and configure 5G Wireless RAN (DU and RUs) and configure 5G wireless CPE and RSIP. Perform upgrade and make configuration change on CPE as per customer requirement.
  • Worked on Checkpoint Firewalls, Juniper (SRX, SSG/ISG), Blue coat proxies, Palo Alto firewalls. Installed, configured Checkpoint via GAIA, R55 and NGX R60, R75, R77.3, 77.2.
  • Installation and Configuration of routing protocols OSPF and BGP on Juniper MX series routers. Experience with Juniper EX and QFX series switches.
  • Migrated SAP based applications from old Cisco ACE load balancers to new VMware NSX edges.
  • Installed and maintained routers and switches in various network configurations supported VLANs, QoS, VoIP, Call Manager and advanced access-lists.
  • Troubleshooting connectivity issues through Blue coat as well writing and editing web policies.
  • Worked as F5 load balancer engineer involving complete support day in and out work on the F5 load balancers LTMs, GTMs, ASM, and Firepass in Datacenter and remote functions.
  • Performed upgrading of load balancers from Citrix to F5 BigIP load balancer to improved functionality, reliability and scalability in the system.
  • Assisted on URL web filtering migration from Blue Coat and Websense to Palo Alto firewalls. Problem resolution of leveraged and dedicated SIEM Environment.
  • Work on escalations and activates new turn up for new clients and also advance troubleshooting for the SDWAN deployment in both ISP and network infrastructure on both versa and Cisco viptela SDWAN Solutions. quality installation guides, standards documents, diagrams, run books and other engineering documentations.
  • Strong hands on experience on PIX Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL.
  • Configured IP Printway in both basic and extended mode to support CICS and JES2 printing from the mainframe to network printers. Setup and used Infoprint Central as well as PIDU commands in conjunction with
  • Participated in the design and implementation of the next generation NS X SD-WAN product portfolio.
  • Experience working with Cisco ASA 5585-X with firepower firewalls with Firewall rules, IPSEC VPN, NAT, Active-Standby Failover, OSPF and Any Connect VPN technologies
  • Designed, configured, implemented site-site VPN on cisco ASA 5585-X firewall.
  • Troubleshoot and Worked with Security issues related to Cisco ASA, and IDS/IPS firewalls.
  • Configured, managed and troubleshooting of remote Cisco routers, switches and ARUBA access points.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Configuring and deployed Site-to-site VPNs using Palo Alto firewalls for remote site implementation, web filtering and application control.
  • Involved & handled s environment built out of Cisco 7K/5K/2K.
  • Worked on Palo Alto PA-3000 Series to manage network traffic flows using dedicated processing.
  • Configuration, Installation and troubleshooting of juniper devices like PTX5000, PTX3000, T4000, MX960.
  • Configuring & managing around 500+ Network &Security Devices that includes Juniper SRX Firewalls 1400, 3400, 3600, 4000 Firewalls, F5 BIGIP Load balancers and Nexus Devices.
  • Implemented MPLS VPN (RFC 2547) Mechanisms on Cisco IOS and JUNOS.

Environment: Cisco ASA 5540,5520, Nexus 7010,5548,2248, VPC, VDC, AX2500 load balancer, STP, VLANS, VTP, Ether Channel,CDN, Port channel, Cisco Catalyst 6500, 4500, 3750, 3500, 2960 switches, Cisco 2800, 3600, 3800, 7200, 7600 and ASR 1000, 2000.3000,7000,9000. Checkpoint Firewalls NG, NGX, NG R55, NGX 60.

Confidential, Watsonville, CA

Sr. Network Engineer

Responsibilities:

  • Responsible for reviewing current and planned network designs, particularly F5 load balancer implementations. Identified opportunities for implementation of network best practices.
  • Implemented Quality of Service (QOS), Policy Maps, Class-maps, Policy Routing in the network infrastructure throughout all the different sites.
  • Worked with Cisco Layer 3 switches 3560, 3750, 4500, 6500; Cisco Nexus 5000 and 7000 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, ether channel. bKey contributions include troubleshooting of complex LAN /WAN infrastructure that include routing protocols EIGRP, OSPF & BGP. established peering relationships with external ISPs, transit providers and partner networks at national Internet exchanges.
  • Performed route filtering and route manipulation by applying distribute-lists, route-maps & offset lists respectively.
  • Played a key role in developing graphics engine and integrated the freetype fonts. Ported the framework from the windows version to the Integrity RTOS and then again to RTEMS operating system.
  • Creation of situations for the process, services, applications & log monitoring in ITM-HTEMS depending on the monitoring requirements.
  • Installed, configured and performed troubleshooting of NSX SDN.
  • Responsible for Check Point, Cisco ASA and Palo-Alto firewalls configuration and administration across global networks for providing IPS/IDS.
  • Upgraded the Cisco ASA devices to firepower services and monitored the intrusions in the network.
  • Operated Firepower GUI and created security policies for the network Environment.
  • Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.
  • Analyzed integrating Mainframe, Unix and Winnt4 systems in Token-Ring, Ethernet, Decnet SNA/IP environment for design the New Data Center projects.
  • Utilized Riverbed monitoring tools for troubleshooting and management of network operations.
  • Configured and deployed BIG-IP LTM 8900 for providing application redundancy and load balancing.
  • Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location of office on the switched network
  • Identify opportunities and solutions for improving efficiencies with emerging technologies, including Cisco routers/switches and wireless systems.

Environment: Cisco ASA 5540, BIG-IP LTM 8900, QOS, Policy-maps, Class-maps, Nexus, Volans, STP, RSTP, PVSTP, VTP, HSRP, EtherChannel, BGP, OSPF, EIGRP, MPLS, PPP, HDLC. SNMP, DNS, IPAM, DHCP, Basics of WLA.

We'd love your feedback!