We provide IT Staff Augmentation Services!

Sr. Network Security & Fortinet Engineer Resume

4.67/5 (Submit Your Rating)

Midtown, NY

SUMMARY

  • Network and security Systems Engineer with over 10+ years of experience in design, installation, configuration, administration and troubleshooting of LAN/WAN infrastructure and security using Cisco routers/Switches/ Cisco PIX, Checkpoint Firewall.
  • Sharp skills on Windows XP, Windows NT, Novell Netware and Sun Solaris.
  • Technically proficient with multiple firewall solutions, network security, and information security practices.
  • Hands on experience with Checkpoint Firewalls. Hands on experience with configuring firewalls and managing issues.
  • Knowledge of Multi - vendor platforms such as Cisco, Checkpoint, Fortinet, F5, Bluecoat (Web/Socks proxy), McAfee Web Gateway.
  • Experience on Working in handling and installing Palo Alto Firewalls.
  • Experienced on Monitoring the Network performance based on company's Service Level Agreement (SLA).
  • Experienced on Working on SIEM for detecting malwares and threat analysis on web based url filtering
  • Experience in configuring, implementing and troubleshooting F5 load balancer in the enterprise network.
  • Worked on F5 Local Traffic managers (LTM), Global traffic manager (GTM) of series 8900, 6400, 6800, 3400, 5100 and 3600.
  • Working on configuration of F5 devices such as LTMs, GTMs, EMs, Firepass and ASM.
  • Hands on experience in configuring Cisco Catalyst 2960, 3750, 4500, 6500 and Nexus 3000, 5000, 6000, 7000 series switches and Cisco 2600, 2800, 3600 series routers, Load Balancers & Cisco Firewalls.
  • Experience with Citrix NetScaler where I configured load balancing, SSL certificate installation, monitoring the network, creating site for web interface.
  • Experience configuring Brocade devices for network monitoring and for carrier caching.
  • Extensive knowledge of IEEE 802.11 WLAN operations, designs and wireless network deployment
  • Extensive knowledge of network protocols (EIGRP, OSPF, BGP, RIP, VLAN, TCP/IP, etc.)
  • Configure, administer, and document firewall infrastructure, working with Checkpoint.
  • Extensive experience in installation & administration of Windows NT, windows 2000/2008/2008 R2 domain controllers, active directory design & architecture, file/print/database servers.
  • Experience securing a large inter network establishing and enforcing policies and monitoring access.
  • Implementation and administration of Checkpoint firewalls & network management / - implementation.
  • Designed and configuring the wan infrastructure consisting of dedicated internet connectivity, Cisco 810 series 4G routers, Cisco 2600 series router, Cisco 2900xl, Cisco 3500, switches, pix firewalls, VPN 3000 concentrator / installed 512 kb internet connectivity.
  • Extensive Knowledge in IPSEC VPN design connection and protocols, IPSEC tunnel configuration, encryption and integrity protocols on Palo Alto firewall as well as cisco ASA and checkpoint
  • Thoroughly familiar with Checkpoint models, capabilities, and architectures.
  • Extensive knowledge and troubleshooting in data communication protocols and standards including TCP/IP, UDP, IEEE 802.3, Token Ring, Cable Modem, PPPOE, ADSL, Multilayer Switching, DOD standards
  • Engineering experience designing and deploying large scale LAN/WAN networks
  • Represent the changes Confidential the weekly change review meetings and update network diagrams and all other applicable documents.
  • Worked on AWS as a part of NetBond team to activate service
  • Experienced on all system in the domain have McAfee Antivirus Protection Installed
  • Manage and implement network & policy changes, domain changes with 3rd parties, write technotes after resolving complex issues, assist in licensing issues, service delivery.
  • Management, investigating and troubleshooting traffic and user access, log management, tune devices to get utmost performance eliminating vulnerabilities and install new security patches.
  • Provided assistance to the service organization to ensure that all defined service management activities are completed to required time scales and quality checkpoint firewall.
  • Assist with technical design of security architecture / management of compliance issues for managing, coordinating and monitoring the information collection activities.
  • Designed and configured Azure Virtual Networks (VNets), subnets, Azure network settings, DHCP address blocks, DNS settings, and security policies and routing.
  • Managed and contributed to the design, implementation and administration of multiple corporate networks, overseeing all related project execution, capacity planning and system configuration functions.
  • Headed 24x7 support operation for all internet/intranet/extranet connectivity linking 50+ clients. / led major platform migrations, iOS upgrades and firewall updates/changes.

TECHNICAL SKILLS

PROTOCOLS: OSI, TCP/IP, DHCP, UDP, RIP v1, RIP v2, IGRP, EIGRP, TACACS+, RADIUS, OSPF, BGP, SSH, TFTP, FTP, SMTP, NTP, LDAP, Active Directory, Kerberos, L2F, SLA, L2TP, PPP, Frame Relay, ATM, Sonnet, Fast/Gig Ethernet, HSRP, Token Ring, ISDN, AAA, DES, 3DES, AES, and MD5, VPN (IPsec and SSL),VRRP, HSRP, DNS (BIND, DJBDNS, Infoblox), CARP, SNMP.

NETWORK MONITORING TOOLS: HP openview, Cisco Works, McAfee EPO, Netscout, Ethereal, tcpdump, netcat, Sniffer, SIEM, Snort&Snortsnarf, MRTG, AOTS.

OPERATING SYSTEMS: Windows NT/200/2003, windows 7, Juniper SEAX, Netsctt, Junos, UNIX, SPLAT (Secure Platform), Linux, RedHat, Debian, Cisco IOS

FIREWALLS: Checkpoint NGX (R65-R75), Cisco PIX 515E,Cisco PIX 535 Firewall, Cisco ASA 5510,Cisco ASA 5520,Cisco ASA 5540,Cisco ASA 5550, Cisco ASA 5580-20, Cisco FWSM, Check Point NGX R52, R54, R61, R62, R65, R 75,Nokia IP690, Nokia IP530, Checkpoint provider 1, Checkpoint Firewall 1, SPLA, Palo Alto 5000series, PA 3000 series, VM-300, ATT FW

ROUTERS: Cisco 810 series 4G router, Cisco 2811, Cisco 2921, Cisco 6509-E (Multi-layer Switch), Cisco7200, Cisco3800, Cisco 3640, and Cisco 3745.

SWITCHES: Cisco Multi-layer Switch 6500, Catalyst 4500, Catalyst3750, Catalyst2900 and Catalyst 3500XL.

VOIP: SIP H.323, MGCP, TDM, SS7, Avaya Voice gateways.

LAN/WAN TECHNOLOGIES: T1, DS3, OC3, SONNET, MPLS, DSU/CSU, Metro Ethernet Technology

NETWORK EQUIPMENT: CISCO 2950,3500,4500,6500 series Switches, CISCO 800, 1600, 2500, 2600,3700,3800,7200 series Routers, Cisco wireless access points.

HARDWARE PLATFORM: Cisco Routers, Ethernet Switches, F5 LTM, GTM

CLOUD TECHNOLOGY: ATT NetBond, Microsoft Azure, AWS EC2, VPC, IAM, S3, Route 53, ELB, EBS

PROFESSIONAL EXPERIENCE

Confidential, Midtown, NY

Sr. Network Security & Fortinet Engineer

Responsibilities:

  • Supporting day to day basis incident tickets related to Network and system infrastructure.
  • Providing Tier-2/3 support for firewall issues, network related issues and automation application support.
  • Installs/upgrades OS to CISCO switches as per CISCO recommendation to keep them up to date.
  • Daily implementing rule on checkpoint firewall as well as Azure firewall as per business user requests.
  • Implementation, Testing & Commissioning for LAN, WAN and WLAN systems based on Cisco and Fortinet.
  • Cisco Meraki Configuration: Meraki Network creation and configuration - Location, Tags, DHCP, Wired/Wireless setup, Firewall, etc. configuration Gateway/IP Access, DNS, DMARC circuits repair, cabling, DMZ switch, external switch, CLM switch
  • Fortinet Firewall administration, configuration of FortiGate 3000, 3815 series as per network diagram.
  • Investigate files in FireEye AX and Kali Linux Sandbox tested and evaluated include Sentinel One Endpoint Protection, Fortinet Forti Sandbox, Fortinet Forti Mail, Dark Trace Antigena
  • Managed firewall using FortiGate to allow or block IPs, created policies added different interfaces and VLANs. installations, design, and implementation of Cisco solutions, VPN, Fortinet, VOIP
  • Experience in implementing Next Generation Firewalls (NGFW) such as Bluecoat ProxySG and other vendors such as Palo Alto networks NGFW for URL filtering.
  • Installing Webproxy rule on BlueCoat Webproxy as per business user requests.
  • Upgrade BlueCoat Webproxy OS to latest as per Vendor suggestions.
  • Installed new Fortinet firewalls to increase security and network control setup IPS, and Application control, as well as logging for compliance
  • Configurations and troubleshooting issues on Nexus platforms like 3k/5k/7k Nexus including licensing and upgrading OS and hardware replacement.
  • Fortinet Firewall administration, configuration of FortiGate 3000, 3815 series as per network diagram.
  • Installation and administration of Checkpoint R 75.40, R80 Firewall.
  • Currently work with network engineering to design, build, and support SD- WAN site implementations. implementation and administration of Next - Generation FIREWALLS of Palo Alto (PAN-OS/Panorama 7.11 & 8), Check Point (SPLAT & GAIA R8.10), Fortinet (FortiGate FortiOS), Cisco (Firepower) and Juniper (SRX).
  • Installed Fortinet appliances for security and compliance
  • Diagnosed network errors to the DMARC/DKIM/SPF for NOC operations.
  • Checkpoint Firewall Log review and analysis and troubleshoot connectivity issues.
  • Perform live troubleshoot as per user requests related to network problems using tool such as Extrahop, Cisco ISE to check mac addresses, Tuffin.
  • Understanding various infrastructures, cable movement/management, and Meraki installment.
  • Decommissioning existing Meraki networks and license/network movement.
  • Implementation of port forwarding rules on Meraki firewalls.
  • Analyze network protocol and traffic using tool like Wireshark, Extrahop.
  • Maintained the following Cisco platforms 7600, 7500, 7200, 4500, 3600, 2600, 2500, 1600, 800, 766, AS5300, Catalyst 6000, and Catalyst 9000, 5000, 3000, 2900, and 1912.
  • Performed setup, configuration, testing and monitoring of Cisco Catalysts 6000, Catalyst 9000 and Cisco Routers
  • Managing and Support Cisco, Fortinet, Checkpoint/Kemp routers and switches, LB, Foundry, and firewalls
  • Implementation of Palo Alto, Fortinet, and SonicWALL firewalls
  • Join troubleshooting call with vendor to resolve issues and documents them for future references.
  • Configurations of Check Point, Palo Alto, Cisco, Juniper, Fortinet FortiGate and SonicWall UTMs.
  • Installed/upgrade OS on Cisco phone using Cisco Unified Communications solutions.
  • Supporting some of Automation changes for business users using platform such as Jenkins, Rundeck, Tidal, VSTS and Aveksa.

Confidential

Sr. Network and Security Engineer

Responsibilities:

  • Part of ATT NetBond Cloud onboarding team.
  • Provide Tier-2 support for NetBond/Networking related issues.
  • Leading onboarding calls with customers to address all technical consideration like Network related questions, who are interested to following cloud service providers such as Microsoft Azure, Amazon Web Services, Cisco WebEx, Sales Force, Box, Blue Jeans and addressing all technical networking questions.
  • Maintain secure network infrastructure with Cisco, Brocade, and Fortinet switch.
  • Maintain current network posture with Fortinet Fortigate firewalls 300, 1000, 2000, and 3700 appliances.
  • Maintain deploy and replace Wi-Fi network using Fortinet AP’s.
  • Work with Cisco ASA Firewalls as well as Fortinet FortiGate Appliances. Manage Cisco ASA Firewalls using CLI, CSM (Cisco Security Manager).
  • Deeply explained NetBond functions to customer during service activation call.
  • Hands on experience in installing and configuring Cisco and Juniper MX series routers.
  • Configurations and troubleshooting issues on Nexus platforms like 3k/5k/7k Nexus including licensing and upgrading OS and hardware replacement.
  • Help customers to control and manipulate their routing from customers MPLS VPN to cloud service providers and from cloud service providers to customers MPLS VPN via ATT tool kit called Route Management Tool Kit (RMTK).
  • Design, configure and troubleshoot FortiAnalyzer, Fortimail, Fortiweb, Fort client, Forti DDOS, Forti sandbox, Forti SIEM, Forti authenticator and Forti ADC
  • Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.
  • Manage the companies MX and A records. Implemented DKIM and DMARC records for primary domains.
  • Maintain boundary Juniper and Fortinet firewalls, and IDS/IPS/IDPS appliances in effort.
  • Infra-structure development on AWS using various services like EC2, S3, RDS, Route 53, Cloud Front, Cloud Watch, IAM,VPC etc.
  • Protocol vulnerability analysis, hacking, verification & sandbox testing
  • Navigate customers to Azure portals and help them in creating ExpressRoute, VNet gateways and attaching VNet to ExpressRoute.
  • EC2 instances, Auto Scaling, Elastic Load Balance and AMIs. Attaching or Detaching EBS volume to AWS EC2 instance.
  • Deployed Azure IaaS virtual machines (VMs) and Cloud services (PaaS role instances) into secure VNets and subnets.
  • Lead several projects such as VPN Pilot, Riverbed, Steelheads, Juniper and Fortigate for VPN solution.
  • Designed VNets and subscriptions to conform to Azure Network Limits.
  • Exposed Virtual machines and cloud services in the VNets to the Internet using Azure External Load Balancer.
  • Configured BGP routes to enable ExpressRoute connections between on-premise data centers and Azure cloud.
  • Daily Management, Maintenance, Monitoring and Administration of FortiGate Firewalls, Forti Wi-Fi AP’s, IPsec and SSL VPN tunnels, Juniper Public/Core switches, HP Aruba switches and Mitel PBX phone system.
  • Troubleshoot issues related to Latency and MPLS advertisement.
  • Providing support to create Virtual Private Cloud (VPCs) and gateways in AWS console.
  • Working on AOTS ticketing tool.
  • Configured FortiGate, FortiManager, FortiAnalyzer, Juniper, and Cisco enterprise products.
  • Configured devices including but not limited to Juniper MX320/960, FortiGate 40/60/80/100 series on premise and FortiGate 5101C cloud firewalls, FortiManager 3000/4000, and FortiAnalyzer 4000 series.
  • Created AMI images of the critical ec2 instance as backup using AWS CLI and GUI.
  • Troubleshooting and communication with different team to resolve customers NetBond issues such as latency, route missing, ExpressRoute mismatch.

Confidential, Lake Forest, IL

Network Security Engineer

Responsibilities:

  • Monitor security events, analyze the results and escalate, when necessary, to the appropriate group for remediation.
  • Experience with Splunk Monitoring and Reporting
  • Gathering application information which are using Splunk tool and analyze their bandwidth traffic.
  • Side work includes, updating circuit ID’s, SPF, DKIM and DMARC information in master circuit documentation. Checking 100 decommissioned 2800 series routers to confirm they were wiped and clean up flash memory for final remediation.
  • Coordinate with network and security team to resolve issues on Network sides globally.
  • Check Point Unified Threat Management System, Endpoint Protection Designing
  • Check Point Firewall Deployment, Upgrade and Administration
  • Cisco ISE 2.0 Deployment and Profiling Policies
  • Investigate email phishing attacks by using malware analysis tools in the Forti sandbox environment
  • Able to write Windows/UNIX/Python scripts to automate administration
  • Develop and publish scans within vulnerability scanning tool (Scap) for remediation.
  • Ability to clearly relay technical knowledge to both technical and non-technical people, written and verbally
  • Worked on Multi-vendor platform with checkpoint, Fortinet and Cisco firewalls requesting net flow for security compliance, coding, and pushing firewall rules after approval and troubleshoot incidents as required.
  • Maintain Non-Microsoft mail gateways (SPAM Filter, Malware check), DKIM, DMARC, SPF & DNS.
  • Troubleshoot and configured FortiGate CPE 40/60/80/100 series firewalls, FortiGate cloud series 5101C firewalls, FortiAnalyzer series 4000 (logging and reporting server), FortiManager series 3000/4000 (centralized control), and Cisco FWSM.
  • Configure and maintain security policies on Fortinet firewall and manager/ Forti Analyzer
  • Experience in information gathering, planning, and execution of large and complex network security projects such as migrations and/or upgrades is an absolute requirement
  • Superior knowledge, skills and experience with Cisco routing hardware, software, protocols etc.
  • Experienced in Checkpoint Security Gateway appliances (Power-1 series)
  • Managing and Troubleshooting Checkpoint Security Management appliances (Smart-1 series)
  • TCP/IP networking and troubleshooting, protocol analysis
  • Network security fundamentals and design
  • Network management systems
  • Installed and Configured Checkpoint Firewall in Internet Edge

Confidential

Network Engineer/Administrator

Responsibilities:

  • Designed and Configuring the Cisco 819 series 4G routers for 1000+ branches and ATMs.
  • Deploy Configuration and activate 4G routers for branches in multiple states.
  • Configuring the WAN infrastructure consisting of dedicated MPLS connectivity of 50 MB to upgrade back offices.
  • Deployed Next-Generation Firewall ASA-X, SonicWALL, Palo Alto and Fortinet.
  • Configure and troubleshoot Remote access and site to site-in Checkpoint & Palo alto firewall
  • Worked on SIEM tools like solar winds, Symantec end to end point security for malware detection and threat analysis.
  • T1, T3, Fiber site to site connectivity, DKIM, DMARC and all LEC installation and management functions.
  • Configuration and maintenance experience with Fortinet FortiGate physical firewalls.
  • Worked with F5 Load balancing, IDS/IPS, Bluecoat proxy servers and Administrating.
  • Knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
  • Experience with Load Balancers for administrating and monitoring global & local traffic using F5 BIG IP LTM & GTM
  • Leveraged “Azure Automation” and PowerShell, Chef and Puppet to automate processes in the Azure Cloud.
  • Solved problems on a case-by-case basis with a deep understanding of networking/firewall concepts, particularly with Fortinet devices.
  • Assisted with migrations from CISCO to Fortinet Security platform.
  • Configuring/Managing Intrusion Prevention System (IPS): Cisco lPS/Fortinet & Checkpoint UTM.
  • Prepared capacity and architecture plan to create the Azure Cloud environment to host migrated IaaS VMs and PaaS role instances for refactored applications and databases.
  • Configured F5 load balancer and also Citrix NetScaler to monitor the network, load balancing and also GLBP, creating a site for web interface for the internal clients.
  • Configured Cisco ASA Firewall.
  • Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.
  • Implemented DKIM and DMARC (Inbound and Outbound) for O365 tenant
  • Install and configure chef server / workstation and nodes via CLI tools to AWS nodes.
  • Created AWS Route53 to route traffic between different regions.
  • Supported Infoblox appliances grid environment for DNS, DHCP and IP Address Management tools (IPv4), for the State Farm enterprise network.
  • Perform network security, administration, analysis, and problem resolution for networks, including NT 4.0, Windows 2000, UNIX (Solaris & BSD), CISCO, TCP/IP, and Checkpoint firewalls
  • Configured Cisco 7600, 7200 series routers for MPLS VPN connectivity and VRF tables on Edge routers for customer usage of the MPLS network.
  • Leveraged AWS cloud services such as EC2; auto-scaling; and VPC (Virtual Private Cloud) to build secure, highly scalable and flexible systems that handled expected and unexpected load bursts, and are able to quickly evolve during development iterations.
  • Multi-vendor switch evaluation such as Force 10, Juniper, Brocade.
  • Responsible for installation, troubleshooting of firewalls (Cisco firewalls, Checkpoint firewalls and Juniper firewalls,) and related software, and LAN/WAN protocols.
  • Work with application, Linux, storage and VMware team to provide support in VLANs, IP management and Port-channel configuration on Nexus and Catalyst switches.
  • Managed network operations, security, and Linux/Win2000 server farm infrastructure including Dell, VA Linux, Cisco, and Compaq hardware.
  • AWS Infrastructure setup Web Server, App Server and PDS Server.
  • Worked exclusively on making applications more scalable and highly available system in AWS (load balancing) with full automation.
  • Strong knowledge of email authentication - SPF, Sender ID, DKIM, DMARC.
  • Worked as a part of AWS build team and merging all developer workings copies with shared mainline server for Continuous Integration.
  • Manage data center consists of Nexus 7010, 5500 series and 2240/2100 FEXs.
  • Configured and installed SDLC connected to mainframe via SNA/SAA Server
  • Installation of Cisco ASA 5500 series firewalls, Cisco 3500, 4500, 6500 series switches.
  • Facilitated backup of servers, routers, switches, and firewall configurations in core network
  • Installation and administration of Checkpoint R 75.40 Firewall.
  • Supporting Mcafee Endpoint Security team in Mcafee EPO and antivirus components and troubleshooting operational issues
  • Responsible for all outside vendor contracts and vendor maintenance. Managed all vendor SLA agreements.
  • Created Network diagram for Cisco/ brocade switches.
  • Configured two clustered Check Point firewall appliances for remote access VPNs using two factor authentications.
  • Created AMI images of critical ec2 instances as backup using AWS CLI and GUI.
  • Installation, Configuration and Troubleshooting of Checkpoint, Juniper and Cisco ASA firewalls
  • Working with Checkpoint firewalls version R76 & R77.20.
  • Administration and configuration of Check Point (R75.40) firewall polices day-to-day network security support for external clients.
  • Provisioned and supported existing infrastructure of Cisco Voice Adds, Moves and Changes to Voice Gateways, CTI agent, Cisco Switch, T1s and call routing.
  • Worked on Infoblox for creating the DNS entries, A records and CNAMEs.
  • Configure Cisco IPsec VPN clients to have enterprise VPN connectivity and also troubleshoot issues with Cisco VPN client connectivity issues.
  • Configure LAN/WAN routers or related equipment.
  • VPC Peer configuration& troubleshooting of already installed Nexus Switches.
  • Administering multiple Firewalls, in a managed distributed environment and knowledge on SIEM tools like Qradar.
  • Firewall Log monitoring using RSA Envision and Q RADAR.
  • Manage devices through NCM, EMC NCM and Zenoss monitoring tool.
  • Directed the migration of core infrastructure from Windows 2000 to Windows 2003 Server, which include migrations to Exchange 2003.
  • Evaluate LAN/WAN performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
  • Configure IPSEC VPN tunnels between Checkpoint and other non-Checkpoint endpoint devices using IKE pre-shared keys, 3DES and MD5.
  • Ensure that all system in the domain have McAfee Antivirus Protection Installed.
  • ASA software upgrade on Failover setup.
  • Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
  • Configured Cisco 7600, 7200 series routers for MPLS VPN connectivity and VRF tables on Edge routers for customer usage of the MPLS network.
  • Provided VPN services to site-to-site and, Remote access VPNs using IPsec and GRE tunneling mechanisms.
  • Worked on SIEM tools like Symantec end to end point for threat analysis and malware detection.
  • Implemented Positive Enforcement Model with the help of Palo Alto Networks.
  • Administer Checkpoint firewalls with cluster gateways including pushing policies and processing user requests to allow access through the firewall using Smart Dashboard and identify unused rules and schedule change to mark it for permanent deletion Confidential later point of time.
  • Configuration and implementation of Check Point Firewalls, IDS/IPS, Bluecoat Proxy, CISCO ASA.
  • Checkpoint Firewall Log review and analysis and troubleshoot connectivity issues.
  • Working with Cisco Catalyst/Nexus/UCS/MDS, and F5’s including ASM’s
  • Configure Linux servers to access SAN and NFS
  • Configuring HA on checkpoint security gateways using cluster XL and VRRP.
  • Upgrading checkpoint security gateways in cluster with minimal downtime.
  • Installed and configured network monitoring system on centos to monitor wide range of workstations and server in us.
  • Worked on SIEM tools like solar winds and kiwi tools for ip address update as well as creating nodes, editing and configuring the new catalyst switches.
  • Consistently resolving critical business effective network operations issues within SLA time frames.

Confidential, NH

Network Engineer

Responsibilities:

  • Designed and Configuring the WAN infrastructure consisting of dedicated Internet connectivity 1.54 MB to NY office, Cisco 2600 series router, Cisco 2900xl, Cisco 3500, Switches, PIX firewalls, VPN 3000 Concentrator
  • Worked on security tools and software such as CISCO WSA, Qualys, Splunk, Solar winds, Source fire, SIEM
  • Performed Fortinet Firewall OS upgrades via Fortinet Manager.
  • Configuration, installation and maintenance for Cisco Routers & Switches for Cisco Metro Ethernet Network
  • Email Security and brand protection Implementation using SPF, DKIM and DMARC standards working closely with the customers Information Security teams and participate in threat mitigation activities within the customers O365 tenant.
  • Using Cisco switches Catalyst 3750, router 2600, Riverbed, Load balancing, VOIP, Gateway 3900, IP phone 7940, CUCM, and Wi-Fi Catalyst 6500 Series (WISM) Wireless Services Module and Cisco Nexus 7000, 5500
  • Convert/Migrate Juniper SSG to Fortigate 1500D firewalls.
  • Deploy Fortigate VPN, content filter and data leak protection.
  • Configuring VPN both B2B and remote access SSL and centralized policy administration using FortiManager, building Fortigate High Availability using Fortigate Clustering Protocol (FGCP).
  • Experience with convert Cisco ASA VPN rules over to the Palo Alto solution. Migration with both Cisco ASA and Palo Alto VPN experience
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Worked on SIEM tool for IPS/IDS and for detecting the malwares and threat analysis.
  • Created multiple policies and pushed them in to Checkpoint Firewall (Gateways) and the Checkpoint Management Server with SPLAT operating system.
  • Configuration and troubleshooting of Site to Site as well as Remote Access VPN on Cisco ASA and CheckPoint firewalls.
  • Manage and configure Juniper SSG, Palo Alto, and Barracuda series firewalls/Web Filter and Blue Coat Enterprise Proxy appliances.
  • Troubleshooting packet flow through firewall using command line utilities such as TCP DUMP.
  • Researched, designed, and replaced aging Cisco ASA firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Agari Enterprise Connect management for DMARC aggregate reporting and analysis. Work with the customers information security architecture team for analyzing
  • Experience with deploying Fabric Path using Nexus 7000 Devices
  • Worked on network analyzing tools such as SIEM, Solar winds and Source fire.
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • SSL VPN configuration on F5 Firepass 4300
  • ASA software upgrade on Failover setup.
  • PIX to ASA Migration.
  • Installed and configured network monitoring system on centos to monitor wide range of workstations and server in us.
  • Implementation and administration of check point firewalls & network management.
  • Fault management and rectification across the Infrastructure to agreed SLA/KPI's.
  • Facilitated backup of servers, routers, switches, and firewall configurations in core network
  • Developed and maintained VPN tunnels with Cisco PIX and ASA firewalls spanning 50+ sites
  • Directed the migration of core infrastructure from Windows 2000 to Windows 2003 Server, which include migrations to Exchange 2003.

We'd love your feedback!