We provide IT Staff Augmentation Services!

Tac Engineer Resume

3.00/5 (Submit Your Rating)

SUMMARY

  • Highly organized team player wif 14+ years extensive hand - on experience in network engineering
  • Deep routing, switching, wireless and security knowledge
  • Excellent network troubleshooting skill

TECHNICAL SKILLS:

TCP/IP: Ethernet/IP/TCP/UDP Packets and operation like TCP flags, TCP three way handshakes, TCP connection half close, TCP Window scaling, TCP MSS, TCP congestion control

Routing Protocols: RIP, OSPF (OSPF adjacency states, LSA database/Area types/Router types, OSPF Message packets, DR/BDR selection, OSPF Routing selection), BGP(BGP route selection and control), IS-IS

LAN technologies: Wired LAN technology like Ethernet, VLANS, VTP, STP, LACP and wireless LAN technology like channel/TX power design/mesh/wireless packets sniffer and packets decryption

Network Security: NAT/PAT, Firewall policy, firewall failover, traffic inspection like IPS/AV/web filter, IPSec VPN, ESP packets decryption, SSL VPN, 802.1X, Radius, LDAP, LAN Security FeaturesInfrastructure services: DHCP, DNS, SNMP/MIB and tools, Passive/active FTP, TFTP

Security equipment: Fortinet firewall, Cisco PIX/ASA Firewall, Cisco ACS/ISE

Router/Switch equipment: Cisco router (GSR, 7200, 3800, 3600, 2800, 2600, 2500, 1800 series); Cisco Catalyst switch (6500, 4500, 3750, 3500, 2900 series, Nexus 3K); CatOS OS 6.x, 7.x, Cisco IOS 11.x, 12.x, Fortinet/HP/Nortel/Extreme switch

Wireless equipment: Fortinet wireless controller/AP, HP MSM 710/730/750 wireless controllers and access points, Cisco 4401/4402 wireless controller and access points

Platforms and tools: Linux, Oracle server/client, VMware ESXi; Wireshark, MIB Browser, IPerf, Ostinato packet generator, Ixia/breakpoint packets generator; TCL/Python script

Documentation: MS Office, MS Visio

PROFESSIONAL EXPERIENCE

TAC engineer

Confidential

Responsibilities:

  • Reviewed those assigned tickets and called customers for further troubleshooting via goto meeting/Webex. Provided customer wif update quickly like the troubleshooting plan, progress, workaround, issue summary, bug status. Escalate important ticket (like ‘won’t fix’ hardware issue).
  • Reported bugs, followed up the bug status, escalated special bugs to weekly bug meeting.
  • Ran debug image and Shell/Python script on customer site to collect more detail information for developer to find out the root cause of bug. Set up lab to replicate bug for QA and developer if it’s necessary.
  • The various troubleshooting included security features like IPSec/IPS/AV/webfilter, failover, routing, switching, wireless, LDAP, SNMP, log, hardware issue and network design issue.
  • Tools: Break point packets generator, Shell/Python script for device monitoring and CLI log

Software QA engineer

Confidential, San Jose, CA

Responsibilities:

  • Tested Nexus platform like BIOS, image upgrade/downgrade, SFP, fan, power, traffic performance, routing features like OSPF, IS-IS and QoS features like QoS marking, WRR, ECN. Edited and ran TCL script to do automated testing especially in those platform and performance testing.
  • Wrote test plan, logged test result, reported bug, and provided related support for software and hardware developer.
  • Product and tools: Cisco Nexus 3548/3564/3048, IXIA Traffic Generator, Linux, TCL script.

Network engineer

Confidential, Minneapolis, MN

Responsibilities:

  • Secure Communications demo like DMVPN,GETVPN
  • TrustSec demo like wired/wireless network access control by MAB, 802.1X, Web Portal, guest activity tracking, role base access control by security group access
  • Secure Hosts demo like IPS signature tuning, remote access SSL VPN by Cisco AnyConnect client /802.1x /Cisco iPEP, WEB/Email gateway security by Cisco IronPort
  • Threat Defense demo like ASA failover, IPS, role-based management workflow in CSM

Network engineer

Confidential

Responsibilities:

  • Configured Router, Switch, wireless LANs controller, wireless access point, firewall, Cisco IPS and figured out network problem
  • Provided technical support for network design, network setup, and network maintenance
  • Directed and supervised group to assure successful network implementation.

Network engineer

Confidential

Responsibilities:

  • Provided senior level technical support for internal engineers and customer.
  • Set up labs to test various network scenarios wif Cisco/Nortel /HP/Extreme switch, Cisco router, Cisco ASA/ACS, Avaya phone, Mitel phone, HP MSM 710/730/750 wireless controller, Cisco wireless 4401/4402 controller, and wireless access point.
  • Maintained the GuestTek intranet and updated documentation like network structure diagram, IP subnet addressing table, equipment document, and configuration backups.

Network engineer

Confidential

Responsibilities:

  • Maintained wide range of network equipment including Cisco routers, Cisco switches, PIX firewall, ASA firewall, load balancer, ACS
  • Analyzed the network change requirement including customers lease lines change, LAN/WAN circuits migration, routing update, firewall security policy change, MPLS, IOS update, and equipment installation
  • Created related document like network diagram/action plan, configured and tested various network scenario

Project manager

Confidential

Responsibilities:

  • Led team and provided pre-sales/post-sales support for government network projects.
  • Designed network architecture utilizing router, switch, SDH/DPT/CWDM equipment, firewall, IPS, Polycom Video-conferencing device, server, and network management software. The network design included capacity plan, IP subnet addressing, routing protocol, LAN, loading balance and redundancy, MPLS VP N, IPSec VPN, and QoS.

Network engineer

Confidential

Responsibilities:

  • Deployed MPLS network wif Cisco router (GSR, 7506, 7200, 2611, 2506, 1700) and switch (Catalyst 6509, 4507, 2960) for service provider.
  • Configured WAN connections like OC-192/STM-64 DPT link, OC-64/STM-16 POS link, OC-16/STM-4 SDH/PDH link, Frame Relay/X.25/PPP link. Configured routing (RIP, EIGRP, OSPF, IS-IS, BGP), switching (STP, VLAN, PVLAN, VTP, LACP) and MPLS VPN.

We'd love your feedback!