Network Engineer (security) Resume
SUMMARY
- To attain a position with a large - scale company to gain knowledge and experience to develop my career as an IT professional.
- I’m experienced with implementing/configuring Cisco Platforms - including (Nexus 7k, 6k, 5k & 2k’s 10gig networks working with UCS chassis environments) and admin support setting up VIP/Pools with load balancers (F5’s LTM/GTM’s & Cisco CSM/ACE).
- I’m also experienced with firewall technologies setting up access policy and troubleshooting issues with captures on (Cisco ASA 5500’s, Checkpoint 4000, 12000 enterprise series CPFW’s) and experienced with security tools like IPS/IDS/SIEM with Hp, ArborNetworks & Cisco to analyze data from events. Also,
- I’m experienced using netflow analyzer tools like (Riverbed Cascade/OPNET, CA eHealth & Solarwinds NPM).
TECHNICAL SKILLS
Firewalls: Cisco ASA - 5500’s & Checkpoint (Gaia - r75.xx).
IPS/IDS support: HP Tipping Point IPS 5100N (LSM) & Arbor Networks Peak flow SP (TMS).
SIEM tools: Cisco VMS 2.3 & Hp Archsight ESM/Logger.
Wireless: WLC/vWLC 5508’s admin/deployment for 3501i’s, 2602e’s & 1142n’s.
Nexus Platform: 7k, 5k, 2k with NXOS for 1/10 gig networks for Hyper-V chassis.Load Balancer Configuration F5’s (LTM & GTM) & Cisco CSM/ACE.:
Linux/UNIX OS: Server - HP-UX, Solaris 5.7, FreeBSD, RedHat 7, Ubuntu14.04.
Windows OS: Server - (Win2003-Win2012) Client - (Win2k-Win8).
PROFESSIONAL EXPERIENCE
Confidential
Network Engineer (Security)
Responsibilities:
- Experience in network design & implementation with Cisco WAN/LAN technologies.
- Experience with WAN Backbone technologies (MPLS and Metro - E).
- Experience with Cisco 3800 series with GRE tunnel with IPsec for GWAN connections.
- Experience working with telecom carrier’s (AT&T & Verizon).
- Experience with trending & monitoring tools (Solarwinds Orion & NPM).
- Experience working with DNS, DHCP & IPv4 IPAM tools (Solarwinds).
- Experience working with routing protocols (EIGRP & BGP).
- Experience working with Checkpoint Provider-1/Gaia 75.47 doing MACD for 12 CMA’s AME/EMA/APA and Global Policy for Member firms for Prod/Dev/QA policy access rules.
- Experience admin support with F5 creating/scripting VIPs/pools in LTM.
- Experience with Cisco Nexus (N7k’s, N5k’s & N2k’s) setting up VMware & Hyper-V UCS chassis.
- Experience troubleshooting with traffic flows with Checkpoint/f5’s performing packet captures.
- Experience working with f5 Big-IP Edge Gateway (APM) for SSL VPN for Dev/QA groups.
- Engineering technical escalation for GNOC’s daytime AME & night time EMA/APA networks.
- Experience supporting data centers for Confidential (Atlanta, Hermitage & London Park Royal).
Confidential
Network Operations Engineer III (Security)
Responsibilities:
- Experience with WAN Backbone technologies (OC-48, DS-3, Frame-Relay, MPLS and Metro - E).
- Experience working with telecom carrier’s (AT&T, Sprint, TWTC & Verizon).
- Experience with trending & monitoring tools (CA eHealth, Solarwinds NPM, Riverbed/OPNET).
- Experience working with DNS, DHCP & IPv4 - IPAM tools (Infoblox & Proteus).
- Experience working with routing protocols (EIGRP, OSPF, iBGP & eBGP).
- Experience configuring MPLS (Client & B2B) with Japan, China, Europe & Australian DC’s.
- Experience working with Cisco ASA/Checkpoint MACD for DMZ/Internal/External firewalls access.
- Experience with Cisco ACL’s for NDC & SDC host access for Linux host for PaaS Lab.
- Experience with analysis tools (Wireshark/OPNET) for troubleshooting traffic flows with CPFW/f5.
- Experience working with Checkpoint 4800/12000 models running Provider-1/Gaia r75.46 with 8 CMA’s set-up policy (North America, Australia, China, Japan, Korea) and with CDE enclave for PCI.
- Experience working with Cisco Nexus (N7k’s, N6k’s & N5k’s VSS 6509-E) VSS core switches setting up vPC for VM’s in Cisco 6248 FI UCS chassis.
- Experience support with Big-IP F5 (LTM, GTM) creating DNS records with GTM & VIPs with LTM.
- Experience with Cisco Platforms - Routers/Switches (Cisco WAR - 7609-S, 6500, 4500, 3900 & 3800 series), L2 switches (3750E&X, 3560E&X, 2960&50 series).
- Experience with Cisco Ironport web proxy admin work for white/blacklisted sites for call centers.
- Experience with Cisco 5508’s & CPI setting up Cisco AP’s (AIR-CAPA3602-A-K9, and AIR-LAP1142N).
- Experience working revising Microsoft Visio diagrams for NEWcorp Data Centers/Call Centers.
- Experience support over 12 DCs and 7 TLC in regions in (US, APAC, Europe & Australia).
- Engineering Escalation point for critical issues that occur with network and security related issues.
Confidential
VoIP Support Lead (UC Engineer I)
Responsibilities:
- Experience with Admin support for MAC’s with Cisco CUCM v6.1 & v8.5 for IP phones, Cisco CTIOS agents associated to PG’s and support for SVM Brands.
- Experience troubleshooting ESXi virtual host with VMWare client support with CUCM v8.5.
- Experience working with Telco’s (AT&T & Verizon) SIP/PRI trunk circuits for VoIP related issues.
- Experience with modify/set-up call flow scripts Cisco UCCE/IPCC ICM v7 queues for TMX, TRG.
- Familiar with voice signaling protocols (MGCP, SCCP, H.323 and SIP).
- Familiar with voice codec (g.711, g.729, g7.11ulaw, g7.11alaw).
- Experience with Admin support for Windows03/08 UCCE/UCCX servers.
- Lead support and supervisor for UC Associates as escalation point & support.
- Experience configuring Cisco Routers 2600, 2800 & 2900 routers and Cisco 3560 PoE’s switches for VoIP support and with setting up SIP/PRI Trunk to CUCM. Also, routing DID’s in AT&T Route IT.
- Familiar with ITIL process with change request for change mgmt.
Confidential
Sr. Engineering Specialist (Implementation)
Responsibilities:
- Experience with support WAN backbones (OC - 192, OC-48, and Metro-E/DWDM/POS).
- Experience with Telco carriers (Verizon/AT&T/Sprint MPLS, T-1, DS3, Metro-E and PRI/ISDN).
- Experience with performance trending tools (NetQoS, NetVoyance, StatSeeker and MRTG.)
- Experience with WAN Routing Protocols (EIGRP, OSPF, BGP).
- Experiencing working with end users supporting and setting up new accounts with 7900 series VoIP phones for (FedEx Express & Office) configuring CUC & CUCM version 6x, 7 xs.
- Experience working with Cisco Wireless standalone AP s (350 & 1242AG s) & Wireless IEEE Standards 802.11a/b/g/n for troubleshooting 802.1x authentication issues with supplicants.
- Experience configuring and building customer facing POD s for Symmetrix SAN for test/dev VM s ESXi with Nexus 7ks, 5ks, 6500-E, 490010GE, 3750-E&X, 3560-E&X, 2950&60 switches.
- Experience implementing load balancing L7/L4 configuration for ACE/CSM support for SAC to assist in new Linux Apache servers setting up HTTP request for FedEx.com & FedExship.
- Working TTU s for MPLS bandwidth upgrades from 3meg Multilink PPP upgrades. Also, facilitating T-1/3meg backup circuits upgrades (Verizon/Sprint) MPLS setting up BGP configuration and QoS.
- Project Lead working on EOL/EOS equipment replacement for FedEx Datacenters.
- Create Visio for FedEx POD Builds for current FedEx infrastructure with MS Visio & Cisco Stencils.
- Upgrading older edge routers for EOL/EOS project replacing our Cisco 7200VXR NPE cards from 400 to G2 s and replacing edge routers from 7200VXR s with ASR1006 chassis.
Confidential
Information Security Analyst
Responsibilities:
- Experience working with Cisco PIX 500 series & ASA 5500 series appliances and Cisco FWSM 2.1, 2.2 Firewalls adding FW rules/policy/NAT translation.
- Experience working with Checkpoint (Check Point Provider-1 /NGX) using crossbeam platform.
- Experience working on routers 3600’s and 1841’s adding secured ACL’s in place for new turn-ups.
- Knowledge and experience working with Hp ArcSight ESM for monitoring security events.
- Knowledge and experience working with Cisco MARs to evaluate and monitor security threats.
- Knowledge and experience working with Snort Sourcefire IDS sensors monitoring security threats.
- Knowledge and experience working with IPS solution ArborNetworks Peakflow SP for data flow analysis and DDoS attack detection (Threat Management System).
- Knowledge and experience working with McAfee web-shield e-500 appliance for proxy for HSIA project for in-house management.