We provide IT Staff Augmentation Services!

Network Engineer/ Network Specialist Resume

2.00/5 (Submit Your Rating)

Rochester, MN

SUMMARY

  • Certified Network Engineer with around 6+ years of experience in Network implementation, routing, switching, firewall technologies and troubleshooting of small, medium and large networking systems.
  • Experience in Switching/Layer protocols: TCP/IP, CDP, RSTP, VTP, HSRP Routing Protocols: OSPF, EIGRP, BGP
  • Strong hands on experience in layer - 3 Routing and layer-2 Switching. Dealt with Nexus models like 9k, 7K, 5K, 2K series, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 9500, 9300, 6800, 6500, 4500, 3750, 3500, 2900 series switches Widespread acquaintance to Network troubleshooting, maintaining Network devices, implementing and accomplishing Networking Projects under ITIL Standards.
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
  • In-depthCisco technologyexperience/knowledge in design, implementation, administration and support.
  • Experience with hardware load balancer administration and support, preferably with F5 (LTM & GTM) and CiscoACEload balancers.
  • Extensive knowledge with VLAN's, Trunking, RSTP, Ether Channels, HSRP, PortSecurity, ACL's, QoS, Traffic Policing, NX-OS, IOS/XE, VMware NSX, DHCP, Infoblox, Wireshark etc.
  • Experience in LAN networking technologies- (STP, VLAN, DTP, HSRP, VRRP and GLB) and Routing Protocols (RIPv2, EIGRP, OSPF and BGP).
  • Configured DNS, Cisco GlobalLoadBalancer(GLB), and F5 GTM
  • Widespread work proficiency in advanced TCP/IP Management, IP Addressing & Subnetting VLSM, Route Summarization, Route Redistribution and NAT/PAT.
  • Good knowledge and experience in FTP, DNS, DHCP, TFTP, LAN, LINUX and WAN environments.
  • Having advanced knowledge in Cisco ASA 5500 series and PIX installation, configuration and maintenance.
  • Proficiency in supporting Enterprise Level LAN, MAN and WAN Networks.
  • Good Knowledge in Cisco ISE profiling policies.
  • Assisted Cisco team with ISE andTrustSecdeployment at a major hospital system
  • Deployed Trustsec Security Group tags (SGT’s) across the network using policies called SGACL’s
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Strong hands on experience on ACL, Firewall, and Experience in Wan optimization.
  • Experience in skillful deployment of Layer-2 technologies like VLANS, VTP, STP, RSTP, Inter-VLAN routing, VLAN Trunking, Ether Channels, VLAN access-maps and port security.
  • Determined project installation/interconnect requirements, selected standard data and power cabling components, and interconnected subsystems/connected systems to the LAN across the DATA CENTRE. (Examples: mainframe, SAN, blade server, LAN switches, WAN routers, VoIP servers and gateways, DS-1 circuits and T1/PRI circuits).
  • Expertise in configuration & troubleshooting of routing protocols and deployment of OSPF, EIGRP, BGP, MPLS, IP Multicast.
  • Having Good knowledge in additional firewall technologies such as Cisco ASA/Firepower, Checkpoint / Juniper / Fortinet. Proficient in Implementing MPLS over OSPF, BGP and VPN for secured connection.
  • Hands on experience working with DNS Infoblox DNS server, Checkpoint Firewall Administration and Troubleshooting.
  • Implementation and Support of Nexus 7000, Nexus 5000, 6500, virtualization, ACE and Data Center Project implementation.
  • Expert in Cisco IOS and Nexus-OS upgrades, VDC, VPC/VPC+, VRFs and Fabric Path support and configuration.
  • Troubleshoot Data center network issues, Cross connectivity and WAN Backbone issues between Data centers
  • Configured, troubleshoot, and upgraded Checkpoint Firewalls for Manage clients, which included network and/or resource access, software, or hardware problems.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS) and deploying GRE Tunnel.
  • Cisco (HW/SW): Cisco Series switches- 1900, 2950, 2960, 3550, 3560, 3570, 4500, 6500 and Nexus 7k, 5k, 2k Enterprise Data Center switches.
  • Experience in switch security and network security firewalls technologies. And LAN/WAN Network Support for TCP/IP based devices
  • Experience in Internetworking with devices such as routers, firewalls and switches.
  • Experience in Layer 2 and Layer 3 protocols (i.e. TCP/IP, Ethernet etc.). Good experience in Frame Relay, MAN, MPLS, V-SAT.
  • Expert in Implementing and Configuring WAN Technologies: PPP, Frame Relay, Leased Lines and MPLS.
  • Widespread acquaintance to Network troubleshooting, maintaining Network devices, implementing and accomplishing Networking Projects under ITIL Standards.
  • Experience in Network Management Tools and sniffers like SNMP, Wire shark and Cisco works to support 24 x 7 Network Operation Center.

TECHNICAL SKILLS

LAN Technologies: Ethernet, TCP/IP, CDP, STP, RSTP, VTP, Fast Ethernet.

WAN Technologies: DSL, Frame Relay, PPP, HDLC, Leased Lines.

Management Protocols: HSRP, VRRP, NAT, DHCP, DNS, SNMP, NETFLOW, SYSLOG, IP SLA, SPAN, Ether-Channel.

Network Tools: Cisco prime, IP Address Management (IPAM), Stat Seeker, Wireshark, Infoblox, WhatsAppgold and ActiveDirectory, NetBrain, Solar Winds, Cisco ISE, ACI, VMware

Application Protocols: TELNET, SSH, ARP, HTTP, FTP, TFTP, IMAP, POP, NTP, SMTP, 802.1x, EAP TLS, EAP TTLS

Routing Protocols: RIPv2, OSPF, EIGRP, IS-IS, BGP.

Tunneling Protocols: L2TP, IPsec, GRE, MPLS, IEEE 802.1Q.

Wireless: WLAN Controllers, access points (APs).

Operating Systems: Linux, Windows, MAC OS, Cisco IOS.

Network Security: NAT/PAT, ASA Firewall, CheckPoint, Access Control List (ACL), DHCP Snooping, IDS/IPS, URL Filtering -Web-sense, SSL, Static, Dynamic and authentication AAA (TACACS+ & RADIUS). Cisco Trustsec

Load Balancer: F5 Load Balancer, Infoblox, F5 LTM/ GTM, Cisco ACE, Cisco GLB

PROFESSIONAL EXPERIENCE

Confidential, Rochester, MN

Network Engineer/ Network Specialist

Responsibilities:

  • Experienced in Integration, configuration and maintenance of Cisco Router, Catalyst Switches and Firewalls.
  • Datacenter upgrades from C6500s to Nexus 7k/5k/2k,
  • Participated in the implementation of Cisco Trustsec on the Confidential environment.
  • Implemented Network segmentation framework and test in Confidential lab as well in Cisco ISE
  • Worked on Various Tracks to configure Cisco Trustsec on the datacenter and WAN
  • Actively engaged/monitored Cisco and Confidential Lab
  • As a part of NS team, tagged (CTS) the unknown devices and retagged the incorrectly tagged (CTS) devices
  • During Change Window, engaging with NOC for all clear before start and close and issue open and close email.
  • Implemented L2and L3 securityto protect from internal attacks.
  • Configure and apply Trustsec security group tags to the identified segments
  • Worked on ISE 802.1X, ISE wired/wireless guest and ISETrustsecimplementations.
  • Deploy Cisco Trustsec for wired network devices in all layers. (AL, DL, CR, WAN)
  • Mentoring and Monitoring the partner technical engineer on executing ISETrustsec activation during change window.
  • Upgraded various switches (CAT 6500, 6800, CAT 4500) and routers (ISR 4300, 4400) and nexus devices (Nexus 7k and nexus 5k) to support CTS
  • Strong hands on experience in installing, configuring, and troubleshooting ofCiscoACI, Nexus 7k, 5k, 2k,Cisco7600, 7200, 3800, 3900, 2800, 2900 series Routers,CiscoCatalyst 6500, 4500, 2960 and 3750 Stack Switches.
  • Participated in Deploying SXP to carry SGT tags from remote branch to Data Center over IPSEC tunnel
  • Created CTS templates in change management of NetBrain and apply CTS on devices in time.
  • Generating a dynamic map using Netbrain and deploy the CTS on devices
  • Hands on experience in replace the routers with Catalyst 9300.
  • Installed and configured catalyst 9500 and 9300 into the enterprise network after the equipment refresh.
  • Attend customer escalation calls and provide the necessary support for troubleshooting field related issues.
  • Documenting project progress for leadership committee to review. Providing training, mentoring, and direct supervision for new recruits.

Confidential, Baltimore, MD

Senior Network Engineer

Responsibilities:

  • Remote infrastructure management of offices in different locations nationwide.
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Security policy review and configuration in Palo Alto and Juniper SRX Firewall in US offices and Datacenter. Troubleshooting of CISCO routers like ping, trace route and basic issues.
  • Configuring, testing, troubleshooting multiple vendor device platforms like Cisco routing and switching: Cisco ASR 4001, Catalyst Cisco 9300, 7609, 2960.
  • Ensure connectivity and communication among networks, servers and clients inside and outside department.
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls for stable VPNs.
  • Worked on Unix, Linux, Windows Platforms and also involved in capacity planning of Network maintenance.
  • Maintenance and trouble-shooting of LAN, WAN, IP Routing, and Multi layers Switching.
  • Responsible for DNS, and TCP/IP support.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling
  • Worked with variety of network devices, protocols, and tools to include: switching/routing, 802.11, WPA 2 security, Wireless Network Analyzer
  • Knowledge of all 802.11 (a, b, g, n) wireless networking, 802.1x, EAP, TTLS,TKIP, Radius, and radio frequency communication principals, including related wireless LAN technologies in the areas of site surveying, design, installation, management, security, analysis, troubleshooting, and integration with wired networks.
  • Implemented site to site VPN in Juniper SRX as per customer.
  • NetScalerDMZ design\Implementation\SSL upgrade
  • Configuring & managing around 500+ Network &Security Devices that includes Cisco Routers & Switches, Nexus Switches, Juniper and Palo Alto Firewalls, F5 BigIP (LTM, GTM)Load balancers, GLB, Blue Coat Proxies and Riverbed WAN Optimizers.
  • Implementation, and Deployment for multiple F5LoadBalancers
  • Primary duties include creation and modifications of security policies on GAIACheckpointhardware with R77.2 P1.
  • Installation, configuration and troubleshooting of cisco Catalyst 9500, 9300, 6850, 2900 switches
  • Installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800)
  • Operations and management of company LAN, WAN, and wireless networks, including routers, switches, Access Points, Firewalls and another network i.e. Riverbed, Bluecoat, F5 LTM/GTM.
  • DesigningNetScalerroll out for Citrix\ SSL Certs\Wild Card\Load balancing.
  • NetScalerupgrade from 9.0 to 10.1
  • SolarwindsAdministrator: discovering and monitoring nodes on the network, adding removing users, configuring alerts for network Devices, Servers and applications. Installing newsolar
  • Configure networks to ensure their smooth and reliable operation for fulfilling business objectives and processes.
  • Designed and deployed hosted network andsecurityinfrastructure supporting a single VSphere cloud across two geographically dispersed data centers in 10 days
  • Procured, installed, configured, and maintained Cisco switches, Cisco routers,Cluster XL ASA/PIX firewalls,CheckpointFirewalls(on Sun Solaris hardware),f5BigIP Load balancers, Nortel VPN Hardware, Avaya Firewall/VPN Hardware, and Dell Windows 2000/2003 Servers.
  • Regular upgrade and maintenance of Infrastructure including Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 LTM/GTM BIG IP, Palo Alto Firewalls, Blue Coat Proxy and Riverbed Steelhead appliances.

Confidential, NY

NOC Engineer

Responsibilities:

  • System monitoring, alerting, problem logging, and coordinate tasks effectively to troubleshoot issues for prompt resolution
  • Acknowledge and investigate faults on Network Work Nodes.
  • Preparation of reports for various areas of the Network.
  • First line support to External Departments and Network nodes.
  • Maintain a daily log of all faults experienced on the network. Perform generator and equipment routines at Main office switch site.
  • Implement, maintain, and repair routing, IP switching, firewalls, and remote access protocols.
  • Monitor systems, applications including high and low-level network wide performance monitoring
  • Monitor automated and end user incident and outage reporting, troubleshoot, and resolve problems.
  • Troubleshoot complex network issues to ensure acceptable Quality of Service.
  • Implementation and Support of Nexus 7000, Nexus 5000, 6500, virtualization, ACE and Data Center Project implementation.
  • Expert in Cisco IOS and Nexus-OS upgrades, VDC, VPC/VPC+, VRFs and Fabric Path support and configuration.
  • Troubleshoot Data center network issues, Cross connectivity and WAN Backbone issues between Data centers
  • Configured, troubleshoot, and upgraded Checkpoint Firewalls for Manage clients, which included network and/or resource access, software, or hardware problems.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS) and deploying GRE Tunnel.

Network Analyst

Confidential

Responsibilities:

  • Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
  • Manage, maintain and support 1200+ Windows 2003/2008/2012 servers within 20+ Active Directory forests in a heavily VMWare based virtualized and physical multi-site environment.
  • Build, install, configure and maintain VMware products including ESXi hosts and clusters.
  • Provide technical support to application users by handlingsystemsrelated issues, provide technical support call telephonically or remotely on the tickets created in JIRA ticketing system
  • Configuring various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters, Route-maps and route policy implementation.
  • Deployed the Nexus 7000/5000/2000 architecture into production securing competitive advantage across multiple verticals.
  • Responsible for Configuring SITE TO SITE VPN on Cisco ASA 5500 series firewall between Head office and Branch office
  • Regularly used Cisco-Works,BrocadeNetwork Advisor, and Wireshark applications
  • EnsuredQoSacross the network
  • Installation & configuration of Cisco VPN concentrator 3060for VPN tunnel with Cisco VPN hardware & software client and PIX firewall
  • Designed and implemented F5 Big IP LTM/GTM load balancers that resulted in improving application performance.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Juniper security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Converting CatOS to Cisco IOS Config Conversion on distribution layer switches
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPSec/GRE to Get VPN.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Planning, Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.
  • Installation, Configuration and Administration of VMware ESX 5.0, Virtual Center 4.0 Servers and also patching, management and troubleshooting of VMware, and ESX Servers.
  • Created User Accounts, Domain Accounts, and Distribution Groups with Active Directory.
  • Used Remedy Tool for Incident Reports/Tickets, Change Management, and Request Management in Remedy by meeting the SLA requirements.
  • Involved in Configuration of Access lists (ACL) on Juniper and Palo Alto firewall for the proper network routing for the B2Bnetwork connectivity.
  • Switching technologies like VLAN, Inter-VLAN Routing, Ether-channel, VTP, MLS, HSRP, VRRP,
  • UDLD, Spanning Tree Protocol 802.1d, 802.1s and 802.1w.
  • Experience of IP/MPLS/Optical Transmission network for access transport & back haul network to

We'd love your feedback!