We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

3.00/5 (Submit Your Rating)

WI

PERSONAL SUMMARY

  • Highly qualified network engineer Professional with CCNA, CCNP R&S and Security Certified with over 8 years of Experience in Design, implementation, troubleshooting and managing large - scale enterprise level data networks.
  • Ability to manages, Installs, maintains and troubleshoots wired and wireless networks and infrastructure including: LAN, WAN, MAN switches, access points, wireless controllers, routers, fiber optic & UTP cabling
  • Solutions-oriented Senior Engineer with notable success directing a broad range of IT initiatives while participating in planning and implementation of Cisco systems solutions in direct support of targeted objectives
  • Expertise in Cisco Routing, Switching and Security with Cisco hardware/software (heavy Cisco shop) experience.
  • Excellent Confidential, debugging and capable of quickly learning, effectively analyzing results, implement deliver solutions as an individual and work with the Team.
  • Expert in bash shell scripting & Python for automate services on switches & routers
  • Proficient using the F5 based profiles, monitors, VIP’s, pools, pool members, iRules for virtual IP’s.
  • Expert in Juniper Fabric Architecture: Virtual Chassis Fabric, QFabric and Fusion etc.
  • Experience in Juniper SRX Firewall rule conflicts, unused rules and misconfigurations and clean up.
  • Offshore and onsite coordination. Daily and weekly reports for all network support.
  • Transition of network activities for L1 and L2.
  • Documentation and knowledge database creation, Incident problem and change Confidential .
  • Expert level knowledge with designing, deploying and troubleshooting LAN, WAN, Frame-Relay, Ether-channel, IP static and dynamic routing Protocols - (RIPV2, OSPF, EIGRP & BGP), ACL's, NAT, VLAN, STP, VTP, HSRP & GLBP and ability to interpret and resolve complex route table problems.
  • Responsible to identify root cause & solve complex issues on Fabric customer testbeds and production deployments
  • Experience in installation, configuration and troubleshooting VMware ESX & ESXi 5.5, 5.1, 5.0, 4.1, 4.0, 3.5, vSphere 5.1, 5.0. 4.1,4.0, vMotion and Virtual Center 5.1, 5.0, 4.1, 4.0
  • Administering & designing LANs, WANs internet/intranet, and voice networks. Analyzing & developing key component using methodology prescribed techniques.
  • Performed upgrade of Infoblox Grid to current version and applied current licenses
  • Experience in Network support migration for setting up new Data centers as well as the DR sites.
  • Expert in configure, maintain and design network security solutions including firewalls (Check Point and Cisco ASA), IDS/IPS, VPN, ACLs, Web Proxy, etc.
  • Resolved Wired and Wireless network issues related to Audio, Video and Wi-Fi
  • Diagnosed issues and applied fixes on Infoblox Switch Port Manager
  • Expertise intestingrouting protocols, security, firewall, proxiesand unified threat Confidential products.
  • Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2K series, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches
  • Day-to-day involve with network security infrastructure designing networks, testing software for firewalls, defect analysis and analysis to ensure our network is secure, writing standards, developing standards for these firewalls, documenting the process around managing firewalls.
  • Strong understanding of networking/telephony technologies: Cisco IOS, Cisco NXOS, OSI Model, Switching, IP Routing, IP Sub netting, TCP/IP protocol, VPN’s, DNS, Router/Firewall ACL’s, VLANs, WLANs, NAT, VoIP platforms, Contact Center Platforms.
  • Expert in F5 BigIP LTM VIP configuration with health check
  • Experience in Network sniffing using WIRESHARK, TCPDUMP, IPTRAF and other troubleshooting tool to troubleshoot network and perform binding and bonding of network cards on the same interface.
  • Very good knowledge in Python Scripting to automate auto config templates infrastructure and develop scripts to automate the iOS versions on routers and switches
  • Implemented various solutions on Check Point Firewalls, F5 Load balancers and F5 GTM
  • Good understanding of cryptographic protocols
  • Troubleshooting of possible network connectivity or infrastructure related problems
  • Experience in working with Cisco Load Balancers, Firewall rules and policies
  • Experienced working on network monitoring and analysis tools like, SOLAR WINDS, CISCO works and Wireshark.
  • Dealt with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system like Remedy Ticketing System also excellent in documentation and updating client’s network documentation using VISIO
  • Experience working with High performance data center switch like Nexus 7010, 7018, 5020, 2148, 2248 devices.
  • Strong hands on experience on PIX Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • Good knowledge in Scripting languages using bash Shell, Awk, Sed and Python
  • Upgrading and backups of Cisco router configuration files. Implementing and maintaining backup schedules.
  • Self-motivated with ability to quickly comprehend, co-ordinate, organize, analyze, troubleshoot and solve simultaneous complex technical issues.
  • Prior experience working in a 24/7 operational environment to achieve desired project targets with excellent communication, interpersonal and presentation skill

TECHNICAL SKILLS

Layer 2 Protocols: VTP, STP, RSTP, PVST, MST, VLANs, PAgP, LACP, 802.1Q,ISL, PVLAN

Routing Protocols: RIP, IGRP, EIGRP, OSPF, IS-IS, BGP, HSRP, VRRPand GLBP

Infrastructure services: DHCP, DNS, SMTP, FTP, TFTP

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure toPPP, DS1, DS3, OC3, T1 /T3 & SONET

IP Devices Routers: 2800, 3600, 3700, 3800, 4300, 7200

Switches: 2960, 3560, 3750, 4500, 6500, N5K, N7K

Network Confidential Tools: Cisco Prime, Aruba Airwave, Forti Manager, Forti Analyzer

Firewalls: ASA, Checkpoint, Palo Alto, Juniper SRX, Fortinet

PROFESSIONAL EXPERIENCE

Confidential, WI

Sr. Network Engineer

Roles & Responsibilities

  • Work on different networking concepts and routing protocols like BGP, EIGRP, OSPF and other LAN/WAN technologies
  • Configuration and troubleshooting F5 LTM, GTM series like 6600, 6800 for different applications and monitoring the availability
  • Working knowledge of multiple vendor equipment. Juniper (ERX 1400, M320, MX960, M10i, T1600, T640) & Cisco (CRS8/16, 10K, 2811, 3661, 7200, 7600)
  • Designed, implemented, managed and monitored Wired & Wireless Network across the locations
  • Implement Infoblox DNS appliance and run scripts as needed
  • Enabled to create a Positive Enforcement Model control between two networks that have different trust levels
  • Worked on NXOS, IOS and IOS-XR BXB to N7K-NXOS (MPLS) system test.
  • Implemented standard configuration template scripts in various network devices for SNMP v2, logging, and NTP
  • Experience in creating and setting up SSL Certificates.
  • Working on the project of F5 LTM and GTM code upgrade project, doing couple of them every week
  • Installation and maintenance of Switches and servers for VMWare 5.5 Environment
  • Replaced 6500 from access layer and Installed 3750s Switches.
  • Involved in Juniper Secure Analytics platform network Confidential and log event analysis
  • Cisco ASA Firewall configuration and troubleshooting
  • Racking and Stacking of Cisco 3750 Switches.
  • Responsible to develop scripts to collect all the inventory details for router, switches, firewall.
  • Experience working with different Linux Environments.
  • Install, test and support Audio and Video control systems both onsite and remotely
  • Methods, probers and monitors recreating HTTP and HTTPS redirect VIP’s to client from data servers.
  • Responsible to develop scripts to collect all the inventory details for router, switches, firewall.
  • Troubleshooting of Cisco 2800, 2900, 3900, 7200, 7600, ASR9000, CRS and GSR 12k Series routers.
  • Worked on load balancing methods, SSL certs, client/server profiles while configuring VIPs and customizing them as per the application needs
  • Bringing up new Juniper backbone router
  • Assist with Interpreting regulatory security policies, procedures and developing security Confidential SOP’s
  • Co-ordinate with the Data Network and Security team and come up with possible solution
  • Integrate NGFW with Vmware Virtual Desktop infrastructure
  • Day-to-day resolve one off application and hardware integration issues, gathering application requirements, implement standards, make best-practice recommendations and find resolutions to complex issues to and including mission critical systems resilient network connectivity within campus and organization business partners.
  • Hands-on experience with modifying Python scripts to automate a lot of network tests
  • Plan and execute of the Enterprise business information system, Public Web service upgrade and migration to data center firewall security zone.
  • Implemented and manage Cisco Firepower and Firepower Confidential console
  • Responsible for detailed evaluation of existing Voice and Data infrastructure
  • Implement automated firewall blocking & Trouble shoot in Network environment
  • Configure firewall to allow or block packet to travel from one network to another or also change the packet while forwarding them (packet forwarding and packet filtering)
  • Maintaining network related tools like Cisco prime, Aruba, Net Scout, Forti Manager and solar winds.
  • Worked on upgrading the back-up stack network from Nortel to brocade.
  • Configured brocade ICX 7750 for stack configuration and replicated the existing the Nortel configuration.
  • Worked on upgrading the Juniper MX, EX, SRX
  • Responsible for Layer I, II and III troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures
  • Minimize downtime and risks by implementing network security protocols and responding to firewall requests
  • System level monitoring on Linux and Infoblox Appliances to watch process and service statuses, like Performance Monitoring & Tuning - iostat, vmstat & netstat, nfsstat, etc.
  • Implementing and configuring F5 LTM’s for VIP’s and Virtual servers as per application and business requirements.
  • Monitored network traffic and developed capacity planning initiatives, making necessary recommendations

Environment: Checkpoint, bash Shell Script, Python 2.7, Linux/Unix, Red hat /Ubuntu, VMware servers, upgrading iOS code, monitoring traffic, Juniper MX, EX, SRX Cisco FirepowerTexas Waste

Confidential, Houston, TX

Sr. Network Engineer

Roles & Responsibilities:

  • Responsible for maintaining and ensuring the proper functioning of all network devices (i.e. Juniper routers/switches, Cisco Routers/Switches, Juniper net screen firewalls, Cisco ASA firewalls, and load balancers (LTM)).
  • Experience working with F5 LTM/GTM network load balancers for various applications depending on the requirements.
  • The design and implementation of new solutions and improving resilience of the current environment.
  • Worked on Infoblox for managing core network services like DNS, DHCP and IP address
  • Securing network systems by establishing and enforcing policies, and defining and monitoring access.
  • The support and administration of firewall environments in line with IT security policy.
  • Deploy all regions for application and database hosting within the VMWare environment
  • Provide informal training and assistance as necessary to new network engineers in operation, configuration and troubleshooting of Juniper routers and switches.
  • Implementing Access-list rules based on Organization’s security policy standard.
  • Configuring ACL’s, NAT and Routes on Cisco ASA 5505, 5540 and 5580 Firewalls.
  • Provide technical support of Cisco CUCM and voice network
  • Configuring Access rules on Palo Alto 3000 and 5000 series Firewalls
  • Design and Implement various solutions on Check Point Firewalls, F5 Load balancers and F5 GTM
  • Conduct risk and vulnerability assessment of planned and installed network systems
  • Plan, analyze, develop and enhance security policies and procedures for the enterprise network
  • Develop policies and procedures to ensure information systems reliability and accessibility as required for unauthorized access to systems, networks and data
  • Call Manager CUCM physical and Virtual with Linux OS. Hands on Server as well as Virtual VM Sphere.
  • Develop plans to anticipate, identify and evaluate risk associated with IT security vulnerabilities
  • Firewall deployment, rules migration, firewall administration and converting existing rule based on to new Palo Alto next generation firewall platforms.
  • Maintaining corporate firewalls and Analysis of firewall logs using Security Analytics
  • Knowledge of McAfee web gateways and other web filtering technologies and giving access to personal email accounts based on Organization’s security policy standard.
  • Configured NAT onto the Juniper SRX firewalls using Info box
  • Installation and configuration of Proxy server and Info box DNS, DHCP, WINS and IPAM
  • Providing technical support for service request issues, customer engagement and internal projects.
  • Performing security policy review/approval as well as documenting customer requirements for escalated security review by senior engineer
  • Performing Migration from Cisco ASA to Palo Alto Firewall
  • Expertise on Vmware Vcenter, ESX and Citrix environment
  • Working with Juniper Jun OS operating system and working on M and MX series routers
  • Experience in installation of new firewalls in new environment with no or minimum impact to traffic
  • Defined firewall rule categories and using best practices to make it precise as per the requirement
  • Responsible for configuring, monitoring and administering Web Filter for Internal user web access
  • Monitoring the network, troubleshooting network problems, implementing changes, communicating and working closely with vendors, customers, system administrators.
  • Constituted DHCP server that assisted in leasing out IP addresses from predefined set to the incoming devices
  • Generated system back-ups (Network File System) in a timely manner by using cron jobs
  • Implementing Proof of Concept for Infoblox DNS Firewall
  • Frequently use Wireshark among other tools to analyze call failures and quality issues.
  • Troubleshoot Network flow and application performance with Wireshark and net flow.
  • Install, adds moves and changes, Cisco call manager, PBX phone/voicemail systems
  • Perform basic systems testing and operational tasks (installation of patches, network connectivity testing, etc.)
  • Support multiple technical teams in 24 x 7 environment operational environments with high uptime requirements. Varied shift schedules may include day or evening hours.
  • Responsible to enhance performance and teamwork by providing training and mentorship to new security team members

Environment: Cisco ASA, Firewall rule configuration, Wireshark, ACL, NAT, Cisco call manager, Enterprise vSphere 5.5, F5 load balancer, IOS-XR and IOS, Junos, VX-LAN.

Confidential, Alexandria, VA

Network Wireless Engineer

Roles & Responsibilities:

  • Design and Implementation of Cisco catalyst 6506, 3700 & 2900 series switches.
  • Managed Wi-Fi Access Via Group Policy
  • Responsible for providing technology solutions integrating voice, video and data to make organizations more profitable and productive
  • Installed and Implemented Wi-Fi Access Points and Service
  • Used Infoblox to create and manage newly created DHCP scopes
  • Primary responsibility is to design and deploy various network security & High Availability devices(Cisco/Juniper)
  • Provided Cisco Router Configuration Support along with installation, Configured EIGRP.
  • Implemented Juniper MX240, 480 and 960 routers into the IP/MPLS core network along with EX4200 switches
  • Configuration of switches and Wi-Fi devices across all the locations
  • Configure IP-SEC, VPN and SSL-VPN (Mobile Access) on Check Point Gaia based on user traffics that needs to be encrypted using Checkpoint.
  • Analyze logs in smart view tracker to troubleshoot network traffics
  • Comprehensive understanding of networking concepts pertaining to LAN and WAN, Information security, IT communication and maintenance in multi-platform environments
  • Managed Checkpoint Firewalls from the command line interface
  • Experience in Network Intrusion detection/ Intrusion Prevention System and Firewalls
  • Signature Updates Deployment on the Confidential Components and all the Individual IPS/IDS devices
  • Configure URL filtering to enable and/or disable user traffic access to unauthorized web sites
  • Periodic policy review to ensure security policies achieves purpose
  • Responsible for service request tickets generated by the helpdesk in all phases
  • Deploy NetScaler’s MPX5500 in a load balancing role for over 50 services
  • Noc duties on performance to assist senior technical personnel to predict future issues or outages.
  • Expert level of knowledge in advanced 802.11 wireless technologies.
  • Worked along with firewall team (PALO ALTO) to write firewall rules in order to co-ordinate those rules with load balancing setup
  • Manage the day-to-day log collection activities of source devices that send log data to SIEM
  • Experience in Checkpoint firewalls and Palo Alto Firewalls
  • Migrate enterprise firewall from Juniper Networks, Screen OS to Palo Alto Networks
  • Migrate mission critical firewall from Checkpoint to Palo Alto Networks
  • Design and implement Juniper SRX firewall, WAN, VPN remote access services
  • Proven success managing multiple Information Security Systems
  • Install, configure and maintain Check Point R75- R77 Gaia and Splat
  • Worked with monitoring tools such as Solarwinds and Infoblox to manage DNS servers, assigning IP Address and implementing DHCP for security purpose of the networks
  • Implement network security for remote access. Tasks includes configuring site to site and clients to site VPN tunnels
  • Review Cisco ASA and router configurations and all wireless networks for misconfiguration and vulnerabilities
  • Attend all network change meetings and advise the network engineer of network security requirements
  • Configure and administer security rules and policies to permit and/or deny user traffics based on company security policy
  • Configure NAT and HIDE such as dynamic, static and Manual NAT policies as required for user traffics going out to the internet.
  • Configure security policy /rule review to identify and remove rules that are not needed to reduce checkpoint firewall policy lookup
  • Checkpoint Confidential server HA for fail-over for network Confidential reliability
  • Comprehensive understanding of networking concepts pertaining to LAN and WAN, Information security, IT communication and maintenance in multi-platform environments
  • Collect and review performance reports for various systems, and report trends in hardware and application
  • Core Network support (IP/Ethernet). Troubleshoot, isolate and fix IP/Ethernet troubles. Communicate with customers during and after course of troubleshooting. Support Layer 2 services (e-line, e-LAN), Internet services (DIA) (to include BGP support), and Core network.
  • Work with Fortinet Forti gate NGFW appliances 1500D, 1200D at the data center as well as Fortinet 300, 500 at regional office locations managed through Forti manager
  • Monitored remote sites using network Confidential tools, helped LAN administrator with backbone connection and connectivity issues and other responsibilities included documentation and support other teams
  • Deployed and maintained Cisco and Juniper routers, firewall
  • Mentoring and training to the junior Engineers

Environment: WAN, Wired & Wireless network devices, Cisco 7200, Juniper ACX 1000, PTX 3000, Juniper Net screen, Bluecoat Proxy, Cisco catalyst 6509, 4510, 4506, 2900 series switches, IPsec VPN, SSL VPN, Site-Site VPN, Access-Lists, Juniper SRX, J-Series Routers and firewalls, Checkpoint Gaia, Cisco ASA.

Confidential

Network Engineer

Roles & Responsibilities:

  • Analyze business requirements to develop technical network solutions and their framework.
  • Design, test, and inspect data communications systems.
  • Extensive experience configuring, maintaining and troubleshooting LANs. Particularly at layer 2 and layer 3.
  • Strong, thorough, in-depth knowledge of TCP/IP, experience with IP, TCP, UDP, IPsec, DNS, ARP, HTTP, SSL, among other protocols.
  • Improve end-user satisfaction by troubleshooting and resolving service issues related to firewall security
  • Optimize security and reliability by gathering data from compromised PCs and analyzing the information to identify bugs, viruses and malware
  • Capture network traffic data and interpret using commercial and open source tools
  • Incident Response team member of security operations center and Network operations center
  • Provide final remediation steps to security network center and network operation center
  • Consolidate and modernize of computer networking environment to improve efficiencies and maximize utilization of data space center
  • Provide solutions to Tier 1 escalated issues and tickets
  • Peer Review network designs for Infrastructure
  • Review tap installation design for visibility fabric for network Cyber security
  • Experience with Application Discovery and Dependency Mapping tools such as Riverbed.
  • Extensive experience developing and troubleshooting a SOA environment.
  • Experience with troubleshooting end to end communication between a user and a service.
  • Involved in L2/L3 switching technologies which involves creating and managing VLANs, Port security, 802.1Q Trunking, STP, Inter VLAN routing and LAN security.
  • Hands-on expertise in configuring, maintenance and troubleshooting WLAN controller and wireless access points AP105 and AP135 using GUI.
  • Also, worked on a wireless upgrade project which included upgrading the wireless access points AP70 to AP105 and AP135.
  • Experience in configuring Cisco router as IP Firewall and for NAT ting
  • Monitoring the network, troubleshooting network problems, implementing changes, communicating and working closely with vendors, customers, system administrators.
  • Troubleshooting the Juniper SRX 100 and 110 series, Juniper Net Screen routers with Site-Site VPN and firewalls
  • Upgrade F5 LTM/GTM from 9.x to 10.x based on Linux OS

Environment: WAN networks. Expertise covers all areas of maintaining medium to large networks and communication systems, Expert in handling IT Infrastructure Confidential, Port security, NAT/PAT, large 24x7 Networks / Data-center and managing multiple vendors.

Confidential

Network Engineer

Roles & Responsibilities:

  • Managed the IP address space using subnets and variable length subnet masks (VLSM).
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Performed IOS and Hardware upgrades on Core routers and field routers.
  • Worked along with the team in ticketing issues.
  • Studied and analyzed client requirements to provide solutions for network design, configuration, administration, and security
  • Real time monitoring and network Confidential using Cisco Works LMS.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 router with HSRP
  • Experience with configuring BGP, OSPF on 7609 router
  • Provided technical support on hardware and software related issues to remote production sites.
  • Created, coordinated, and implemented project plans for network changes
  • Assisted in a consultative capacity in all change control meetings, and selecting new Global Internet Access Provider
  • Worked on MPLS network with connecting the clients
  • Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
  • Provide network support during assembly, test and Launch Operations Phase
  • Install and configure new network gear to provide engineering support for troubleshooting and resolve customer reported issue
  • Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including short and long term planning, implementation, project Confidential and operations support as required.
  • Worked on Firewall up gradation and internet circuit up gradations.
  • Taking care of all type VPN tunnels and different client connectivity’s.
  • Configuring & Maintenance optimization devices like Bluecoats & alteon etc.
  • Trouble shooting network issues.
  • Planning & scheduling preventive maintenance of LAN network services and devices.

Environment: - WAN, Wired & Wireless, MPLS Network, VPN tunnels and Internet circuit, Bluecoats & alteon, L3 Network devices.

We'd love your feedback!