Sr Network Engineer (data Center & Cloud/sd-wan) Resume
New York, NY
SUMMARY:
- Results - oriented Sr. Network Engineer/Architect & Project/Program manager with 16+ years of year's extensive hands-on experience in experience in the design, implementation, OSS/BSS, deployment, configuration/troubleshooting and operation of design, testing.
- Migration of Data center, carrier class voice, data, DOCSIS, DSL, CDMA, WiMAX, LTE, UMTS, HSDPA, GSM,SONET, DWDM, ATM, Ethernet, PBT-TE & IP/MPLS networks and supporting OSS/BSS and network management systems. Provide Project Management, Design/Architecture, testing, Engineering, Implementation, QA/staging, production and support..
- By providing a dual role as Project Manager and Senior Network Engineer, I was able to maximize profits on a per project basis by minimizing need for multiple billable resources. Design, developed and supported IP backbone network, VOIP,SDN, NFV, Network Orchestration, Cloud technologies, IaaS. PaaS, SaaS,IP multicast, Frame Relay, Carrier Metro Ethernet,6LOPAN, Li-Fi, ZigBee, ZWAVE, NB-IOT,5G Millimeter wave, IPTV, HSI, VoIP, Mobile, Enterprise/Business, PSTN, Security ATM, MPLS implementation for Wireless service providers, telcos, ISPs, DOCSIS, DSL service providers and a variety of corporate infrastructures / backbones and managed RAN, Transport & Core network.
- Managed, Designed, Engineered, implemented LAN/WAN, core backbone network, internet security and intrusion detection systems utilizing multi vendor solutions .
- Ability to manage multiple projects, within time constraints, from initial planning to completion.
- Sound knowledge and experience in designing and testing networks, creating test plans and implementing security including business continuity planning and risk management.
- Very good, in-depth knowledge of IMS, 3G/UMTS/HDSPA, UMA and 4G/LTE, 5G architecture & IPV6.
TECHNICAL SKILLS:
Cisco ONS 15454, Cisco BTS 10200, Cisco GSR, VXR/UBR, Nexius 5000/7000, 6500, 12000, 7609, 7500, 7000, 5300, 4000, 3000, 2600, 2500, Terminal Servers: 2511, 2509), ASR 5000/9000, CRS. Extreme Networks Switches (Summit 24), Avici IPriori, Cisco Switches (Nexus 7010, 5020, 6500, 4507, 5000, 3500, 2900). Cisco Pix Firewalls (525, 520, 515, 506), ASR1002, FWSM, Cisco ACE, Cisco 11150/111800 load balancers, ASR9000. ASA 5550 FWSM,VPN Concentrator 3000 series, Cisco IOS Firewall feature set (IOS 12.X). NetScreen Firewalls (NS-5XP, NS-5GT, NS-500), Juniper MX240,960, J2320, J4360, J6350, T320 Series, Alcatel 7750, 7670, 7470, 5620 NM, 7450 ESS, TSS-320,DMX1850 TSS, Tellabs 8800,8830 AS, Cyclades OOB,, Cisco IOS, Checkpoint Firewall-1, Floodgate,F5 Big IP,Raptor, Gauntlet,Sonic-Wall, Net screen, Watch Guard, Cisco MARS, CSA agent, IBM Proventia, Arbor Peakflow TMS 2700/3100, Wichrous ASN GW, Samsung ASN GW, Ercisson NodeB, RNC,Tellab DACS, Sandvine DPI, Ciena 311v, Ciena 5305, Ekinops 360 DWDM, ZTE Pico cell, Huaweii BS, Samsung BS, Samsung Pico cell, Kyocera Femto cell, IEEE1588 PTP, ACME SBC, Ceterus, Dragon Wave Radios, OMA/DM Provisioning servers, Wichorous ASN GW, Cisco Aironet 12000 APs, Confidential 7750, Confidential SE100/SE600, Ceragon IP10/640, SIAE, Confidential Minilink TN, Aeroflex Racal 6402, Spirent SR3452 and Spirent Air Access, Agilent 8960 and R&S CMW 500, QXDM, QCAT, Accuver XCAL, XCAP, OpenStack, OpenDaylight, OpenSwitch, VxLan, NETCONF, YANG data model, JSON,XML,DevNet tools, including Puppet or Chef, ANSI scripts, TOSCA and YAML based file formats, HOT Template and OVF based VNF descriptors, OVS, OF-DPA, OpenFlow, BGPEVPN, TTP, ODL, ONOS, Ryu, KVM, OpenStack, ONL, Icinga2, Monasca, Nagios, Wireshark, iSCSl, Ceph, Swift, Postgres, Mysql, InfluxDB Ganglia, Zabbix,VM/Docker-Container, Ciena blue planet, Kafka, RabbitMQ, KVM, libvirt, VMWare Quagga, RouteFlow etc etc, Understanding of SDN/NFV ecosystem SDN controller, ONF, ETSI NFV, Opendaylight, ONOS, Openstack.Understanding of CloudApps & Cloud Aware software Implementation. Understanding of Cloud technologies & ecosystems - DOCKERS, MESOS, Elasticity Manager, DevOps
Tools: GRANITE, Site Handlers, Siterra Interado, Netscout,, Netrack, Alcatel PMT tool, Spirent Abacus, Avalanche, Air Access, Smartbits, IXIA Chariot, Wireshark, Confidential -TEMS, Solarwinds, ISS, NAI TNV, Web Trends Security, ntop, HP Open View Network Node Manager, Provision Network Monitor, WhatsUp Gold, Tripwire, Tiger, SATAN, Ether Peek, Snort IDS, Cisco Works 2000, Nessus, Netcool, Cramer, OpenView IUM 4.5 mediation. JDSU CN-100, Tektronics, IXIA, Spirent, Acterna, Emprix Hammer, Agillent B9990A, E6474A Wireless Network Optimization Software, Shell Scripting, Perl Scripting, TCL/TK scripting, VB Scripting, MOSHELL, SQL server, MySQL. Cisco Transport manager, Umbrella, Cacti, Trafica, RCATS, Metasolv, Clarity, Netcracker, ICOMS, CSG, Jasper IOT,Amdocs Cramer, LHS BSCS billing platform, Tripwire, Sales Force, Remedy, Junoscope IP services manager, LAMP (RNC emulator), UBINETICS TM 100/500, Wireless Logics- XCAL, XCAP, iPerf, Fluke networks, Cisco MARS, Nessus, Wireshark, Ixia, Spirent, BroadcomOS:Windows NT . Windows XP/ME/98/95, Unix (Sun Solaris, 2.6, 2.7, 7, 8,9,10, Red Hat Linux 5.0-9.0-Fedora-Core 2-4, AIX, Cisco IOS 10-12.4. Cisco Cat OS.OS/2, Junos, Cisco NEXUS 5000,7000, Confidential 7705 CSR, ALU7750 MAD, NSN SRAL-XD,SR4, Flexi Packet Hub, Tellabs 86xx ( 60 /8630 ), 73xx, 63xx, CBX3500, Netviewer, Jasper control center, Axeda, DSC,Ayla, Cisco Model DPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA, Clearpass, Cisco NCS2K
PROFESSIONAL EXPERIENCE:
Sr Network Engineer (Data Center & Cloud/SD-WAN)
Confidential, New York, NY
Responsibilities:
- Decommissioning Cisco 6500 catalyst switches by removing GBICs and Erasing configuration.
- Upgrading Cisco IOS images to 16.6.2 on Cisco 9400 SW.
- Configure Cisco 9410 switches with VLAN, VRF, EIGRP, QoS. SNMP, PIM for Wireless access points Cisco 5508, 3500, 3800, 3900 and WLC and Cisco IP Phones 7965 and 7945 SCCP and supporting network for MSG arena and inhouse POS And Appetize application.
- Creating reports and troubleshooting network and Wifi issues on Cisco Prime 3.2.
- Creating reports and configuring WAN optimization and health monitoring on Riverbed Steelheads, Netfprofiler, Flow gateway. Maintaining CUCM, Cisco Unity, SIP trunks, POTS, adding new users, phones, configuring voice mails, Supported QoS for voice, H3232 video and data traffic optimizing, WAN traffic engineering via MPLS, BGP, EIGRP, route-maps and static configs. Configured failover via HSRP, VRRP static and dynamic routing.
- Configured IPSEC, GRE, SSL, remote VPN Client and AnyConnect..
- Creating and assigning tickets on Service now for troubleshooting.
- Migrating for Fortech to Cisco ISE and supporting BYOD security requirement for Guest Wifi users and internal staff and External vendors,
- Designed and configured Cisco ISE for EAP-TLS 802.1X, BYOD and sponsored guest services.
- Configured and supported DMVPN phase 2 connectivity, Supporting Wifi upgrade for Radio city music hall with migrating and installing, configuration of Cisco 3800 APs, WLC from Cisco 3700 Aps with integration on Cisco Prime.
- Providing Network support coverage on all network (LAN/WAN),wifi and cisco IP phones issues during Sports events/Muscial concerts events in the MSG arena. Maintainance and support of Cisco Nexus 5k, 7k, 9k, Netscaler, Cisco ASA FW, Fortech, F5 LB GTM/LTM. Managed SolarWinds Orion, BlueCat Adonis/Proteus, BlueSocket and TACACs+/WCS. Deployed and performed troubleshooting on MPLS BGP WAN, LDP, LSP, MPLS-TE, MP-BGP, PE-CE Routing, RSVP, MPLS-Multicasting., Configured OTV, vPC, LACP, HSRP, OSPF, FEX, QoS, NETFLOW, TACACS+ on Cisco Nexus SW. Performed Cisco ASA5575 and PA5020 IPSEC and Remote VPN troubleshooting and configurations Experienc o strong Python skills and the ability to communicate with APIs and bootstrapping,e with test driven development, understanding of constant integration
- Performed POC of Cisco ACI for MSG network engineering team including iWAN, ISR 4000, WAAS, DMVPN, PfR, APIC-EM for supporting with use cases Network congestion, bandwidth provisioning for on demand events and multi tier applications hosted in AWS and Azure cloud environment. Configured different MSG application policies in the ACI including Tenants, Application Network Profile (ANP), End Point Group (EPG), Contracts, Subjects and Filters and Fabric access policies, switch policies, interface policies, AEPs, Physical and External Domains and DMVPV between sites over the WAN and MPLS cloudConfigured IPSec VPN tunnel between Data center edge ASA firewall and AWS EPC and Azure VNETs hybrid cloud environment. Designed and configured Azure Virtual Networks (VNets), subnets, Azure network settings, DHCP address blocks, DNS settings, security policies and routing.
- Deployed Azure IaaS virtual machines (VMs) and Cloud services (PaaS role instances) into secure VNets and subnets. Leveraged VNET system routes and underlying route table that holds Local VNet Rules, On-premise Rules, Internet Rules and IP Forwarding as design basis.
- Designed User Defined Routes with custom route tables for specific cases to force tunneling to the Internet via on-premise network and control use of virtual appliances in the customer’s Azure environment.
- Configured IP Forwarding for VMs and role instances acting as virtual appliances.
- Configured BGP routes to enable ExpressRoute connections between on-premise data centers and Azure cloud.
- Associated routes with VNets via the route table per relationship constraints.
- Migrating MSG web and database application to AWS.
- ConfiguredAWSIdentity Access Management (IAM) Group and users for improved login authentication.
- Configured Elastic Load Balancers with EC2 Auto Scaling groups.
- Configured multiple VPC’s and public, private subnets as per requirement and distributed them as groups into various availability zones of the VPC. Configured NAT gateways and instances to allow communication from the private instances to the internet through bastion hosts.
- Created monitors, alarms and notifications for EC2 hosts using Cloud Watch.
- Maintained edge location to cache data with CDN using Cloud Front to deliver data with less latency.
- Used security groups, network ACL’s, internet gateways and route tables to ensure a secure zone for organization inAWSpublic cloud.
- Created and configured elastic load balancers and auto scaling groups to distribute the traffic and to have a cost efficient, fault tolerant and highly available environment.
- Wrote cloud formation templates in JSON to create custom VPC, subnets, NAT to ensure successful deployment of web applications.
- Implemented domain name service (DNS) through route 53 to have highly available and scalable applications.
- Maintained the monitoring and alerting of production and corporate servers using Cloud Watch service.
- Managing Amazon Web Services (AWS) infrastructure with automation and orchestration tools such as Chef, Puppet,
Sr Network (Data Center) Architect
Confidential, Confidential, NJ
Responsibilities:
- Managed installation, and configuration of Fortinet Firewalls 600D, 3000 and Authenticator in HA cluster Confidential and Confidential data centers.
- Migration of Checkpoint Firewall-1 NG to Fortinet Firewalls.
- Configured Nexus5k and 7K as access/TOR and distribution switches for 10 ratings application servers in different VLAN for S& Confidential .
- Configured and tested Fortinet FW 6OOD, 3700 in Transparent mode, FSSO Authentication of OU policies, HA testing for Firewall and Authenticator is remote data centers, SNMP monitoring, Syslog integration with Splunk and access rules for 10 ratings applications in North, South direction with DMZ and East-west with Web servers and DB, Mail servers
- Created Test plan document with all test cases for POC and SIM Lab and Prod QA lab and maintained a Test status tracker.
- Created SOP guide, User guide, Data center troubleshooting guide with Fortinet FWs and Runbook with training for the Data center internal teams.
- Collaborated with Fortinet Vendor and Cisco for troubleshooting, testing and Vendor documentations.
- Facilitated project meetings and provided weekly status to all stakeholders.
- Supporting the S&P Enterprise Architecture team with Overall Cloud technical strategy, architecture and design for a highly complex Enterprise Applications migration project. Analyze system requirements and ensures that systems will be securely integrated with current financial ratings applications.
- Performing POC/Pilot projects evaluating different Cloud based storage solutions using AWS, Openstack, MS Azure, Cisco ACI SDN, Viptela, Versa, Arista EOS Cloudvision, VMware Cumulus, Architecture/POC and design of EA solutions using AWS Cloud platform and its features which includes EC2, VPC, EBS, AMI, SNS, RDS, EBS, CloudWatch, Cloud Trail, Cloud Formation, AWS Config, Auto scaling, Cloud Front, IAM, S3, and Route53.
- Working with AWS professional services team to implement the solution.
- Design, Configure and testing of Cisco NCS 2K, CTS and Management of DWDM infrastructure across Confidential North and South Data centers and Camden and Stratford Campus and configure performance counters and alerts on SolarWinds. Create DWDM design doc, runbooks and troubleshooting guide. Configure Cisco ASR with BGP peering with Confidential and NJ Edge ISP, OSPF, Static routes, IPsec VPN. Configure and test Procera PL7000/1000 for Bandwidth/traffic shaping, Subscriber quota management per user per MB quota and QoS, QoE, PCC. Configure Nexus 5k/2k, Cisco 6807, 6500 VSS, 3500, 4500, ASA 5500 for North and South Data center with VPC, Aggregate ether channel/LACP, trunk and load balancing with Citrix Netscalers with integration with Infloblox and Cisco Prime.
- Create test plan, test cases for Migration of Cisco ASA 5585 FW to Palo Alto firewalls 7050, 5022 (Perimeter and Data Center Firewalls) and Panorama. Configure Panorama and Palo alto firewalls for HA peers testing, OSPF, Static routes, L2, NAT, PAT, inbound/outbound access rules and ATP testing and monitoring SNMP stats on SolarWinds and traffic alerts on Splunk server. Create VMware vsphere containers for for Virtual Palo Alto firewalls and testing workstations on VMware. Participate in the planning, implementation and maintenance of the University network including hardware, software and upgrades. Respond to escalated L3 calls, resolve assign tickets and document problem resolution
- Open tickets from service now for maintenance and troubleshooting LAN/WAN network infrastructure. Create and maintain system documentation, operational procedures, architectural documentation and hardware and software inventory. Perform penetration testing and security auditing on Firewalls. Actively participate in taking customer phone calls and analyzing logs and security rules.
- Configure BGP and static routes for voice and data traffic on CE-PE routers on the L3 MPLS network provided by Windstream for Voice and data traffic across Confidential Campus
- Configure Aruba switches, access points and writing policies for Clearpass integration with network devices and monitoring the campus Applications.
- Helping the cloud architecture with next steps on proof of concept with AWS, Openstack, MS Azure, Cisco ACI, Juniper Contrail SDN/NFV. Selecting the appropriate AWS stack (Including EC2, R53, S3, RDS, DynamoDB, SQS, IAM, and EMR), on high-availability, fault tolerance, and auto-scaling and Openstack service based on compute, data, or security requirements. Identifying appropriate use of AWS operational best practices. Estimating AWS usage costs and identifying operational cost control mechanisms. Selecting appropriate AWS, Openstack services, config management tools Chef, Puppet, Ansible, Python to design and deploy network security based on business user application requirement
Sr Cisco ACI Network Engineer
Confidential, Trenton, NJ
Responsibilities:
- Design and implementation of complex, multi-vendor, public, Iaas, PaaS, Saas cloud architectures from infrastructure up to application layers using Openstack, VMware Vsphere, vCenter, vShield manager, AWS, Docker, Hyper-V, Cisco APIC and Heat orchestration, vCloud director .
- Design, testing and prod support of Cisco ACI Data center in network centric mode and EM for customers with multitenancy using Clustered APIC controllers M1 C220 M3/M4, Nexus 9336 TOR Leaf switches and Spine 9500/9736PQ switches, fabric extenders, QSFP, SFPC, CPAC Nexus 7k, 5k, UCS servers, ASA firewalls, F5 load balancers, Cisco IDS/IPS, Citrix, IWAN, ESA automation with VMs running on VMWare ESX utilizing VXLAN VM running on Hyper-V using VLAN 802.1Q encapsulation and a physical server running a bare metal servers running Linux. create different application policies in the ACI including Tenants, Application Network Profile (ANP), End Point Group (EPG), Contracts, Subjects and Filters. create different application policies in the ACI including ACI multipod config. configuring Tenants, Application Network Profile (ANP), End Point Group (EPG), Contracts, Subjects and Filters/contracts, filters, fabric policies,MCP policies, interface policies, Switch policies.
- Custom Certificate for Cisco ACI HTTPS Access, VLAN namsepace, Bridge domain,import/export policies, pod policies, L3 routing, BGP External Routed Network,Layer 3 Outside for Tenant Networks, shared Layer 3 Out configuration, Creating the Tenant, VRF, and Bridge Domain with IPv6 Neighbor Discovery, Configuring a Route Control Protocol to Use Import and Export Controls, physical domain per tenant and for external connectivity, policy based config of acces sports,, tenant managemet configuration for inband management. Profiles, switch profiles per leaf, vpc groups, vmm domains, zero touch provisioning,AEP for virtualized servers, service graph mapping to cluster of concrete devices, ACI transit routing & route distribution with OSPF, BGP, Static routing, MP-BGP Route Reflector. outside network connectivity using VRF lite, MP-BGP, BGP EVPN, OSPF,NVGRE, Multicast configuration, External Routed Network for Management Tenant, L2 Access switching, leaf switch virtual ports, channels, interface policy groups.
- FEX VPC, traffic storm policy, EPGs, Tenants, Port groups, inbound/outbound filters, traffic quality settings, marking rules, redirection, L4-7 service device graphs, traffic inspection, NFV Service nodes/graphs. SSL offloading, Application acceleration, Load balancing. IDS/IPS, Service insertion using service graphs. VDS switch, Intra-EPG isolation, Encrypting Configuration Files Using the REST API, CoS/DSCP, FEX-CoS marking, CNA/A-FEX classification/marking Backing up, Restoring, and Rolling Back Controller Configuration. Syslog source and destination groups, integration with NFV service nodes Cisco ASA, F5, Citrix and Remote SPAN sessions, SNMP traps destination, IWAN, YANG, NetConf. Troubleshooting APIC, Leaf and Spine issues using CIMC KVM/SOL console (Inband/OOB), REST API /Postman, CLI, health monitoring, atomic counters, Prime, Syslogs, SNMP. Verifying Overlay-Underlay connections (PIM, ISIS, EIGRP, OSPF). Verifying the APIC Health, Verifying the LEAF Health and Verifying remote access to all the out of band management devices
- Configure VMware Vcenter to APIC for provisioning of VxLANs between VMs hosts and ACI leafs, VxLAN Tunnels, VTEP endpoints, NVGRE, L2 bridging, L3 routing, BGP EVPN, Vmotion between DC. Confure LLDP, CDP, COOP, inbound/SCVMM, OOB/Opflex and application network profiles. Configuration and deployment of Ubuntu/Redhat on BMS with Puppet, Chef, Python and Ansible playbook. Integration and orchestration with Openstack Neutron API (Tenant,EPG,Bridge domain, Subnet,Security groups, Bridge domain router, port, network) for use cases, Service chaining, telemetry, fabric tunnels/NVGRE, QoS(No drop usage traffic,High performance compute workload,storage, vMotion, vRealize integration) segment routing, virtual integration, service catalogue, automation on troubleshooting. APIC configuration rollback and health scores.
- Design and implement Cisco ACI fabric networks with Nexus 9000 switches and APIC controller in a VMware environment using Cisco network and data center routers/switches Nexus 9000, 7000, 5000, 2000, and 1000v switches in VMware and Hyper-V environments. Develop various Inter-DC designs for internal and Edge routers to achieve failover and scalability utilizing BGP and spanning-tree, L2VPN, VPLS, OTV, VXLAN and ACI Implement data center network virtualization technologies with Nexus 1000v, AVS and ACI. Design and support Fibre Channel (FC) and Fibre Channel over Ethernet (FCoE) network utilizing Cisco Nexus, MDS switches, FCIP, multi vendor server and virtualization platforms, EMC, NetApp and other SAN Solutions (Hadoop, EMC) Implement Cisco UCS Director to automate compute, network and storage provisioning. POC integration of Cisco routers, switches with modern languages such as Node.JS, Python and Javascript, BASH, Perl and AngularJS frontend to build end to end IaaS, PaaS and SaaS platforms Automation scripts with Python COBRA.
- Design, Configuration, testing and T3 prod support for Cisco ASA FW, ASR9K, ISR 4451, 4431, Riverbed Steelhead, Netscout Pulse,PM, HP Openview, Cisco Meraki Wifi. Troubleshooting with Verizon and Confidential & Confidential service providers on the DSL, EVPL, 4G. network for State of NJ network (Superior courts and Municipal courts). Configuring Static routes, EIGRP, BGP on Cisco routers.Providing Tier 3 (escalated engineering) issue resolution and troubleshooting support for 600+ WAN sites that use a variety of connectivity (MPLS, VPLS, IP-sec VPN, Meshed VPN/ DMPVN. Implementing/configuring/troubleshooting/supporting enterprise Cisco Routers (ASR/ISR, 7200), Cisco 7200, ASA 5500 FW, ASR9K, and Cisco Nexus equipment (7K/9k). Designed and implemented a self-hosted Openstack environment comprised of iSCSI SANs; Dell switching; Cisco switching, routing and firewalling; and Fortinet, ASA, Palo Alto firewalls and version control in GitHub. Deployment and Support of OpenStack Cloud based on Linux RHEL / CentOS/Ubuntu. Managing Linux Containers using Docker and docker registry. Providing and managing network storage LUNs and LVMs using TargetCLI and iSCSI. Setting up Linux Virtualization Platform using Libvirt, KVM and VMware Esxi. Setting up continuous integration and build management environment using Jenkins, GitHub, Packer, Vagrant, docker containers and VirtualBox. Monitoring NEC DataCenter using NagiOS and Linux inbuilt utilities. Integration of Apache with Tomcat, Tomcat- Apache Clustering and Load Balancing. Configuring and Maintaining OpenStack Single node and Multi Node Cluster set-up on VMware ESXi 5.5 and Ubuntu 12.04 machines
Sr SDN/NFV Network Architect/Engineer
Confidential, Mt Laurel, NJ
Responsibilities:
- Architecture, POC, design, lab testing and prod testing to drive the development of Overlay and underlay SDN, NFV data center solution for Nokia Nuage VNS, Cisco ACI, Juniper Contrial SDN, Versa SDN and Multi vendor NFV/VNF solution for Confidential . Act as an interface between Sales/ Marketing, product engineering, OSS/BSS, Network engineering team and internal Nokia support teams and R&D teams.Drive proof-of-concepts with use case scenarios as per the requirements of the customers and their planned roadmaps and market trials for Confidential customers with multitenant cloud deployments.
- Work with product teams to gather business and technical requirements for designing data center Nuage VNS, VSP data center SDN solution. Create SD WAN design docs- LLD, HLD for the customer.
- Configure and test use case scenarios for L2VPN, L3VPN, Service chaining, Segment routing. IPv4, IPv6,Dual stack, L3 Hub and spoke, Dual NSG Uplink, Dual NSG load balancing, NSG internet breakout, Route reflector, MP-BGP,L3 Network with static routes, L2 unmanaged network, DHCP, REST APIs and Ciena blue planet network orchestration with Openstack Neutron and VSAP assurance tool.
- Interface with development and Quality Assurance teams to provide feed-back on bugs found by customers.
- Debug complex product installations and resolve complicated product problems by applying both established procedures and creative alternatives.
- Prepare reports on problems encountered and methods of resolution applied, ensuring overall system integrity and reliability.Integrate Nuage SDN, Cisco ACI and multi vendor NFV solutions into existing network infrastructures to help automate network operations
- Supporting the Xfinity Mobile team with 4G/LTE/5G uses cases and roaming requirements with with other carriers and Wifi, hotspots and Wholesale carriers cell site ethernet aggregation backhaul routers and Pico cells. RFI/RFP with OEM vendors Confidential, Samasung, Nokia, ZTE, Cisco.
- Actively engaging in SDN and NFV and related OpenSource initiatives such as OpenStack, OpenDaylight, OpenSwitch, VxLan, NETCONF, YANG data model, JSON,XML,DevNet tools, including Puppet or Chef, ANSI scripts, TOSCA and YAML based file formats, HOT Template and OVF based VNF descriptors, OVS, OF-DPA, OpenFlow, TTP, ODL, ONOS, Ryu, KVM, OpenStack, ONL, Icinga2, Monasca, Nagios, Wireshark, iSCSl, Ceph, Swift, Postgres, Mysql, InfluxDB Ganglia, Zabbix,VM/Docker-Container, Ciena blue planet, Kafka, RabbitMQ, KVM, libvirt, VMWare Quagga, RouteFlow etc etc, Understanding of SDN/NFV ecosystem SDN controller, ONF, ETSI NFV, Opendaylight, Openstack.Understanding of CloudApps & Cloud Aware software Implementation.
- Understanding of Cloud technologies & ecosystems - DOCKERS, MESOS, Elasticity Manager, DevOps & Agile Software Engineering Process.Very good understanding of Software Defined Network and Network Virtualization concepts.
- OpenStack CLI commands and administration,Linux/Unix scripting especially for TCP/IP stack, Firewalls (iptables), DNS, VPNs, Python, Java scripts, SOAP, Ruby, PHP.
- Expert knowledge of OpenFlow, OpenvSwitch, VMware, Xen Cloudstack, Openstack, Cisco/Juniper Enterprise products as Cisco 1K, Nexus, SRX etc. or any Firewall, NAT, Load Balancers and scripting languages such as JavaScript (JSON/XML), PERL, TCL, Python COBRA, Experience with OpenStack (Nova, Swift, Glance, Keystone, Neutron, Melange, Entropy), XenServer, XenClassic, VirtualBox, Vagrant, some LXC, some KVM, some VMware. MySQL, PostgreSQL and Microsoft SQL Servers: planning and deployment database servers and databases themselves.
- Extensive knowledge of creating and maintaining databases, backups, recovery, replication (master-slave, master-master) and MySQL Cluster/NDB database clusters.
Sr Network Design engineer
Confidential, Overland Park, KS
Responsibilities:
- Working as a Sr IP core network design engineer supporting Confidential Core Development team on the Confidential Network vision project for Confidential Core network.
- Create NV Core S/P GW, MME roadmap, network development features as per 3GPP specs, network design, architecture, testing and rollout/deployment for MME, SGW, PGW, Gx/PCRF and Gy interfaces/OCS/OFCS on Confidential 7750 SP GW, Cisco ASR5500, Samsung SP GW.
- Create System requirement design (SRD) and Detail requirement design document (DRD), HLA/HLD for the customer, schedule meeting and review design docs with all stakeholders.
- Provide design integration with Confidential RAN, eHRPD, CSFB,VoLTE, IPv6, MVNOs, RF and OSS Service Layer networks.
- Define and develop Confidential EPC network architecture and design for MVNO customer including redirection, whitelisting and static/dynamic PCC rules. Develop Core Development Lab test strategy, schedule, and test cases, plan for testing- NRT and FIT.
- Develop Network Readiness test strategy, schedule, and test cases, plan for testing prior to Field introduction. Develop Confidential Core capacity plans, roadmaps, and scalability designs.
- Capacity engineering support through characterizing the specific hardware and software features impacts based on factors such as performance, capacity, call modeling, and actual usage information. Provide Core design support for IT requirements, systems, and related products/services.
- Development support for Core OMs, Alarms, and NRM requirements.
- Create OMRT template for testing OSS, BSS and provisioning interfaces.
- Provide regular reporting for gateway performance, call model KPI/KCI and implementing, and executing verification tests for 3G (CDMA/EVDO) and 4G (LTE) mobile devices during the integration and validation phases of the product lifecycle. Coordinate and facilitate meetings with all customer stakeholders including Network Development, Network Engineering, Device Management, Product Management, Information Technology (IT), operations, and Program Management teams for businesses requirements, create future network vision GW roadmaps by analyzing 3GPP specs for R10, R11 and work with OEM vendors for new Core network features specifications.
- Create Proof of concept, conduct trials, automate provisioning with performance monitoring, IoT/M2M,provisioning,mobile service management, real-time engagement, support diagnostics, billing and business automation for SDN/NFV, IOT for Confidential Nuage networks, Cisco ACI, Jasper control center, Axeda, DSC, Ayla cloud IOT platform, Juniper contrail, HP SDN controller.
- Engage with technology leaders within Verizon’s customers to understand their technical needs, deliver technology presentations on 4G/5G Confidential anexecutivelevel, and design use casestobe tested.
Sr Network Engineer
Confidential, Parsippany, NJ
Responsibilities:
- Configured Nexus 7010 core switches and Nexus 5010 and 2148 server access switches.
- Configured 7010’s with multiple distribution VDC’s running OSPF for route propagation between them. create vpc domain, design singlesided vPC, design double sided vPC,design vPC peer-keepalive,vPC peer- link,vPC member port,
- Configure singleand dual home fex, NX-OS codes for7018 and 5020 via TFTP for both active and standby SUP, configure VSANs, Vfc.,Providing technical support onNexus 2000/5000 switches and operatingsystems (NX-OS),Netflow configuration on Nexus
- Configured LISP,OTC and multicast MDT on Nexus 7010.Configured ASA5585 for firewall services.
- Configured (BFD) on Cisco Nexus 7000 Series Switches for fast failure detection and In-Service Software Upgrade feature, Assist customer introubleshooting Layer 2 & Layer 3hardware and software related issues, Provide peer review to othernetwork engineers to validate proposedconfigurations and designs. Architected & coordinatedresources for the implementation of bpduguard accross all switches withinour client's data center.
- Configured Cisco B200 M1 and M2 Blade Servers, Cisco UCS 6140 Fabric Interconnects, Cisco 5100 blade chassis, VMware vSphere Hypervisor, Vmotion, Cisco Nexus 1000V distributed switching platform to automate data center operations with network security policies and to support a unified fabric for delivering Fibre Channel over Ethernet (FCoE) with 10Gbps networking . The UCS servers were partitioned into 120 virtual machines running a comprehensive range of applications and services including Microsoft Exchange, SQL, and SharePoint. The storage elements include Cisco MDS 9509 Series Multilayer Director and EMC CLARiiON CX4-480 Series Storage Arrays with ACE4710 LBs and F5 LTM/GTMs. Provisioed multiple service offerings with VMware ESXi Hypervisor clusters and Cisco Nexus 1000V distributed virtual switching platform. The network architecture design comprised of 22 Cisco Nexus 2000 Series Fabric Extenders, 10 Cisco Nexus 5000 Series Switches, and 12 Cisco Nexus 7000 Series Switch
- Responsible for building, installing operating systems and business as usual troubleshooting and support/administration of Sun and IBM UNIX systems. Hardware support included Sun E220, E420, E450 and Sunfire V240, V440 and V480 systems as well as IBM H70, B80, M80, S80 and eServer P650, P690 and P590/595 systems, EMC SAN with Symmetrix and CLARiiON storage with virtualization
- Designed and Implemented Cisco UCS pods in Nexus 7000 and Cisco 6500 Platform.Configured UCS Fabric Interconnects 20.Configure UCS Manager by defining Service Profile Template, Policies & Pools for Production Servers and DR Servers.Design and Configure the vNIC & vHBA Fabric/Templates based on Application bandwidth requirement. Designed and configured eBGP routing, communities for Confidential MPLS network connectivity. Wrote core and remote router configurations and automated scripts
- Configured DMZ infrastructure for support of new eAgent application. Infrastructure included F5 Load Balancers with SSL termination, FWSM, Cisco PIX535 firewalls, Cisco 6509 switches and Checkpoint Firewalls. Configured advanced URI based load balancing and SSL termination pools on F5 GTM/LTM. Configured CheckPoint firewall ACL’s and NAT tables.
Sr Network Test Lead
Confidential, NJ
Responsibilities:
- Create test plan, test cases including: Pre-Integration, Integration, Production Environment Testing, User Acceptance Testing and Performance/Capacity Testing for the Call Center solution which includes Genesys Call Center/Contact center applications, Avaya IPT infrastructure, ACME session border controller, NICE Call recording & monitoring, Redsky E911, Nexidia, eWFM and Outsourcers applications.
- Project management and coordination with telephony program team and end-to-end ownership of Solution testing, Contact /call center, data center testing, migration, deployment for customer Confidential .
- Communicating project status, gates/milestones and reports determined in the communications plan to customer, Confidential, and collaboratively determine resolution of project scope change requests and coordinate with vendor partners for test cases.
- Collaborate with Confidential to complete the Test plan document deliverable.
- Interface with 3rd party vendors/partners on testing activities.
- Create testing plan, migration plan, training plan, QA/ Readiness test plan and ensure the alignment with Program/Project key milestones and objectives
- Identify testing to be performed in each test phase (primary and regression) -- Pre-Integration, Full Solution Integration, PET, UAT.
- Cordinate testing activities on the MPLS network with redundant circuits from redundant carriers to each contact center and three outsourced vendors (ACS, GCS, and Stream) in six physical locations prioritizing/ QoS voice traffic for SIP, RTP traffic.
Confidential, Mt Laurel, NJ
Enterprise Architect consultant
Responsibilities:
- Created Service delivery and Service assurance architecture document for ECES program, supporting Metro Ethernet deployment for Commercial Business customers.
- Created Tactical and Strategic Service delivery, Service Assurance and Provisioning system architecture for Metro Ethernet over DOCSIS, Type 2 and Carrier Wholesale projects.
- Working on current and target Architecture enhancements for Cramer-TTS interface Cramer- Century interface and Cramer/CMDB Interface:
- Gathered business requirements/PRD from the business teams and created Scope/Architecture documents, Technical Requirement Design document to support end to end System Architecture for the deployment of Metro Ethernet over DOCSIS, Type 2
- Review, approve, coordinate and implement major scheduled maintenance projects. Develop architectural network design, validate OSS/BSS requirements for Residential and Business services for Carrier Metro Ethernet over HFC/DOCSIS, Type 2, Cell Backhaul, Carrier Wholesale infrastructure to meet customer requirements. Contribute to the development of next generation architectural guidelines to introduce new service, products and technologies in Confidential backbone infrastructure.
- Work with RAD team, Application teams to get the OOMs for required development efforts, SRND docs, creating JIRA tickets and updating requirements/sequence digrams in DOORS
- Create and maintain service models for CBH and ME services in Telcordia Service Director based on NEs supported in MECBH EPL, EVPL, EDI & ENS service. Created Cramer interface/adapter specs for upstream and downstream Service delivery and assurance systems. Created Capacity planning and resource naming document for MECBH
- Created KPIs and KQIs for DOCSIS - HFC network for Metro Ethernet over DOCSIS
- Created Focus on Architecture (FOA) artifacts templates for Network architecture, Ops- High Availability/Disaster recovery Architecture, Application & Services Architecture, Security Architecture and Database Architecture, facilitated meetings with stakeholders and updated template and status report for all Pre-sales, Service delivery/fulfillment and Assurance applications including SFDC, Century, CPQ, CCOM, Workbench, Metasolv, Cramer, TTS, Sevone, Spectrum, NetScout, Watchtower, BEDROCK provisioning, BACC RDU/DPE, Telcordia Service Director and Grandslam,
- Created a roadmap for full implementation of end-to-end multi-layer OAM(fault and performance) management for the MECBH services
- Create/Update requirements, conceptual/functional architectures and impacted systems analysis documents for Y.1731/802.1ag based OAM (fault and performance) Management for Confidential networks environment supporting MECBH.
- Create OAM management requirements for network inventory and configuration to support Y.1731/802.1ag MEPs, MIPs and Maintenance Domains (creating the requirements for Cramer Resource Manager to support Y.1731 MEPs, MIPs and Maintenance Domains in MECBH to support OAM Management). Created OAM management requirements document for supporting OAM Interworking between Ethernet (Y.1731), MPLS/VPLS (Y.1710 and Y.1711) and WDM; 10G and Type II (E-NNI) networks
Confidential, Pleasanton, CA
Sr. Network engineer
Responsibilities:
- Maintained the company’s Core, Distribution and Access Network solutions, including Multihomed BGP, OSPF, EIGRP, ISIS for clients internet and phone services.
- Configured and maintained IPprotocols EIGRP and BGP on Cisco routers (3800, 7200).Implemented VLAN, VTP, STP and 802.1q trunking on layer 2 switches (6500, 4500, 3560).
- Maintained high availability of resources by load balancing of network traffic with 5 BIG-IP load balancer. Designed and implemented a MPLS Core switched Network solutions for the companys Video on Demand and VoIP deployment. Designed, Configured and deployed New Cisco GSR 12000 routers throughout Wide Open West infrastructure.
- Configured different vendor switches (Juniper, Cisco, Extreme and Juniper) and route between them.
- Troubleshoot various network issues Confidential customers site and getting them resolved. Designed and configured various IP services like NTP, DNS, SNMP, HSRP, VRRP and IP SLA on customer network switches and routers to aide network administration and management. Worked with the packet core team to provide MPBN solution to various customers.
- Implemented full network connectivity link/node redundancy for OSS installation Confidential customers premise. Integrated Packet Core nodes like MME, HSS and DNS into customer networks.
- Performed Acceptance Test Procedures with various customers to ascertain the states for devices services running on them and network connectivity before handing over to customer.
Confidential, Plano, TX
Sr. Network (Transport/Backhaul) Engineer
Responsibilities:
- Design and optimization of 3G UMTS Packet Core and Switches Network architecture. Analyzing and troubleshooting UMTS transport layer 2 switching and layer 3 IP routing network and performance issues, troubleshooting ATM, IP and Transport connectivity such as WCDMA/GSM/TDMA, Microwave, Radio Access Network, IP Backbone, Service Layers and IP convergence T1, DS3, OC3, OC12 and OC48.
- Configure Inverse ATM ckt parameters (IMA group) per VPI/VCI for MSN ATM switch facing DACS on channelized T1s (STS-1/VT channels) and RNC facing for unchannelized STM/STS-3cs, configure traffic, QoS parameters (UBR/CBR), static IP routes, OSPF, MPLS RSVP, LDP global configuration, Class maps for working and protection (APS) SONET ports Cisco 7609 routers, Tellabs 8600/8800, Alcatel 7670-RSP-TE, 5620.
- Create scripts based on Alcatel, Tellabs, and Cisco MSN boxes for various rehome/rebalance/reconfiguration and template change activities for UMTS NODE B integration networks. Execute and run scripts during night maintenance window, troubleshoot end to end connectivity issues between NodeB, MSN, ATM OAM routers and RNC, supporting customer Confidential & Confidential Mobility.
- Create MOPs for pre-execution. post execution and backout procedures. Implemented all Cisco, Tellabs router and switches IOS upgrades, installs and configuration changes. Responsible for troubleshooting all circuit problems and various routing issues .Provided Visio drawings and network documentation to client, Confidential for customer Confidential & Confidential Mobility.