We provide IT Staff Augmentation Services!

Network Engineer Resume

0/5 (Submit Your Rating)

Dallas, TexaS

SUMMARY

  • Network engineer with over 7 years of experience in routing, switching, system design, firewall technologies, implementation and troubleshooting of large complex network systems.
  • Experience in system and network administration and engineering, systems and network security, hardware evaluation, project management, incident analysis and recovery.
  • Experience in Planning, Designing, Installing, Configuring of various Cisco routers and switches as well as Juniper routers and switches.
  • Good understanding and hands on experience configuring AAA - authentication, authorization, accounting.
  • Good experience with AAA, State full Firewalls (ASA, SRX, Zone Based Firewall), ACL (standard and extended), VPN (IP security), Port Security and WAF (Web Application firewalls).
  • Cisco router configuration and change management, providing technical support for Cisco Router configurations and installation for Customer. Configuring IP RIP, EIGRP, OSPF, and BGP.
  • Good knowledge on security protocols, TACACS+ and RADIUS.
  • Good experience in configuring and troubleshooting CISCO Nexus switches like 7000, 5000 and 2000 series in Data Center Environment.
  • Experience in implementation, support and troubleshooting of VLAN’s including operational knowledge of spanning tree protocol (STP), VLAN trunking, inter VLAN routing and ISL/802.1q.
  • Experience in implementation, configuration & troubleshooting of 802.1q, ISL, IP Tunneling, DES/3DES, Access Control Lists (ACL), and Cisco IOS.
  • Experience in implementing site-to-site and remote access VPN Technologies using GRE, IPSEC & MPLS.
  • Hands on programming experience using C, C++and SQL in the projects development stage.
  • Good experience in configuring and troubleshooting Crestron control systems in a larger scale.
  • DNS, DHCP Server Configuration and Troubleshooting.
  • Experienced in Desktop, Laptop and other network device configuration and troubleshooting.
  • Aggressive Problem solver, technically precise, Analytical Thinker, Sharp troubleshooting skills, excellent written and verbal communication skills, especially with respect to technical documentation/support.
  • Proven track record as an individual contributor and as a member of a team.
  • Good understanding of ITIL in Problem, Change, Incident and Service Management.

TECHNICAL SKILLS

Network Products: Routers Cisco, L2 & L3 Switches, Juniper routers and switches, LB4M switches, Citrix Load Balancers, F5 Load Balancers, Bluecoat Proxies ASA 5505.

Switching Technologies: Virtual LAN, Inter-VLAN routing, VTP, Ether channel (Static, PAGP, LACP) Spanning Tree Protocol (Common Spanning Tree, MSTP, PVST, RSTP), first-hop redundancy protocols (HSRP, VRRP, GLBP).

Routing Technologies: Static Routing, RIPv1, RIPv2, EIGRP, OSPF, BGP, TCP/IP, UDP, Route Map, Route Filtering, Route Redistribution, Route Summarization, Access Lists.

Load Balancers: Configuring BIG-IP F5, Citrix.

Security: AAA, State full firewalls (ASA, SRX, Zone Based Firewall), ACL (Standard and extended), Port Security, WAF (Web Application Firewalls)

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Network Management: Wireshark, SNMP, Solarwinds NPM, Ethereal, EMC Smarts, HP Open view

Documentation: MS office, MS Visio

Skills: C, C++, SQL, SIMPL+, MATLAB/SIMULINK.

OS: Linux, Unix, OSX, Windows

PROFESSIONAL EXPERIENCE

Confidential, Dallas, Texas

Network Engineer

Responsibilities:

  • Experience with convert PIX rules over to the Cisco ASA solution.
  • Experience configuring Virtual Device Context in Nexus 7010
  • Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210
  • Configuration of Fabric path and connectivity between Nexus 5K and Nexus 7k.
  • Configuration and installation of Nexus 5k.
  • Worked on F series module on Nexus 7010.
  • Experience with Checkpoint Firewall policy provisioning
  • Logs and triages defects and test multiple mobile devices across multiple applications.
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP
  • Substantial lab testing & validation prior to implementation of Nexus 7K, 5K & 2K connecting to blade servers
  • Implemented L3 SVI’s and L2 VLANs, Inter VLAN Routing and HSRP configuration in Nexus on F series module.
  • Upgraded Nexus OS on Nexus5k
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed
  • Configured, installed, & managed DHCP, DNS, & WINS servers
  • Carried out performance monitoring & documentation of relevant network segments to ensure data integrity & environmental safety
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls
  • Secured network access with Cisco Secure (RADIUS/ TACACS+)
  • Configured network access servers for AAA Security
  • Enabled continuous Layer 2 monitoring with Solar Winds, so that each site can run independently until connectivity is restored
  • Implement and configured GLBP (on core switching and also for VPN redundancy), HSRP on different location of office on the switched network and managing the entire multilayer switched network
  • Used Kiwi-Cat tools to manage configurations from desktop for network devices, including routers, switches and firewalls. Generate network device configuration reports, such as port, MAC, APR and version details
  • Responsible for the Global engineering and support of existing network technologies / services and the integration of new network technologies / services
  • Responsible for managing activities, Upgrading IOS - Upgrading hardware and installing new devices, Tuning (Configuration), make standardization for the topology
  • Installation & configuration of Microsoft Proxy Server.
  • Network Redesign for branches/Campus Locations. This includes changes to both the voice and data environment.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to GetVPN.
  • Performed basic security audit of perimeter routers, identifying missing ACL’s, writing and applying ACL’s
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports
  • Provide front end on-call network support 24x7 for all network infrastructures in the co-operation.
  • Involved in iRules management like loading rules, writing iRules syntax using TCL language

Environment: Cisco routers (7200, 3800, 2800) and Cisco switches (6500, 3700, 4900, 2900), Nexus (7K, 5K & 2K) Routing Protocols (EIGRP, OSPF, BGP), Switching protocols (VTP, STP, GLBP, HSRP), Cisco PIX (525, 535), ASA (5505, 5510) firewall.

Confidential, Baton Rouge, LA

Network Engineer/Administrator

Responsibilities:

  • A core member of networking team
  • Provided system support.
  • Involved in design, planning, review and upgrades in production network.
  • Provided Tier - - I & II network support.
  • Worked on Cisco routers and switches
  • Involved with the network infrastructure and the planning and design of enterprise local-area/wide-area network (LAN/WAN) solutions.
  • Plan, design, install and configure LAN/WAN as per organizational requirements, governed by communication protocols.
  • Handling data network issues in and around sites and providing solutions.
  • Design and configuration of Cisco C40 Telepresence Video conferencing equipment and controlling them from an IPAD using SIMPL+ and VT-PRO from the Crestron cp3n control system in Crestron Environment.
  • Basic configuration of routers, switches, hubs, modems and other networking devices.
  • Troubleshoot all networking problems to ensure minimum downtime and maximum availability of network.
  • Has good experience working with the Trouble Tickets on F5 Load balancers.
  • Installation, Maintenance, Troubleshooting Local and Wide Areas Network (ISDN, Frame relay, DDR, NAT, DHCP, TCP/IP).
  • Configured Cisco routers for MPLS VPN connectivity and VRF tables on edge routers for customer usage of the MPLS network.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to GetVPN
  • Manage office network with Cisco devices with network devices including 2500 and 3600 series routers and 3500, 2900, 1900 series switches.
  • Configured and managed networks using layer 3 protocols like OSPF, EIGRP.
  • Hands on Experience in Inter-vlan routing, redistribution, access-lists and dynamic Natting.

Environment: Cisco Routers (1700, 1800, 2500, 2600, 3200, 3600, 3700, 3800 and 7200, 7609) & Cisco L2 & L3 Switches (2900, 3560, 4500 & 6500), VLAN, VTP, SPAN Windows, UNIX, TCP/IP, virtual LAN, Cisco IOS and CATOS, Firewalls-ASA, DNS, DHCP, SMTP, F5, Bluecoat, VMware ESXi and vSphere, AWS.

Confidential, Phoenix - AZ

Network Analyst

Responsibilities:

  • Installed, configured and managed Cisco routers such as 7200 series, 3800 series, 3700 series, 2800 series and Cisco Catalyst switch series 6500, 4500, 3500 and 2900.
  • Good experience on troubleshooting and implementing JUNOS on the juniper products such as MX series routers and SRX Firewalls.
  • Performed OSPF route engineering to ensure network stability using features like OSPF summarization and SPF/LSA throttling.
  • Modified OSPF costs for links to divert traffic to reduce the delay and bandwidth consumption across the links.
  • Configured route policy for BGP and manipulated BGP attributes using route-maps, ACL, AS-Path list according to customer requirements.
  • Troubleshooting LAN/WAN related issues associated with routing and routing protocols and also used protocol analyzers and Sniffer tools like Ethereal and Sniffer Pro.
  • Configured Cisco 7600, 7200 series routers for MPLS VPN connectivity and VRF tables on edge routers for customer usage of the MPLS network.
  • Configured VLAN’s and Spanning tree within the organization network.
  • Implemented Layer 2 security by enabling STP BPDU & Root guard, locking down VLAN trunking.
  • Secured network access using Cisco Secure (RADIUS/TACACS+).
  • Configure Cisco IPsec VPN clients to have enterprise VPN connectivity and also troubleshoot issues with Cisco VPN client connectivity issues.
  • Configured pools, virtual servers, nodes on different BIG-IP F5 load balancers, Bluecoats Proxies, Riverbed WAN Optimizers and assisted in modifications of virtual server configuration on existing applications.
  • Configuring & managing around 500+ Network &Security Devices that includes Cisco Routers & Switches, Nexus Switches, Juniper and Palo Alto Firewalls, F5 Big IP Load balancers, Bluecoats Proxies and Riverbed WAN Optimizers.
  • Configuration to allow clients applications to be accessed within our company (DMZ).
  • Analyzed network problems and coordinated resolutions, Monitored network infrastructure traffic and access Logs.
  • Developed work plans and policies needed to integrate proposed solution.

Environment: Cisco Routers 7600, 7200, 3800, 3700, 2800; Cisco Catalyst switches 6500, 4500, 3500, 2900; Cisco PIX Firewalls 535, 525; Cisco ASA 5550, 5520, Juniper SRX Series, VTP, VLAN and 802.1Q trunking; OSPF, BGP; Sniffer tools: Ethereal and Sniffer Pro; Big-IP F5 Load Balancer, Bluecoat, Wireshark, MS Visio.

Confidential

Network Analyst

Responsibilities:

  • Working on Network outline and help, usage related inner activities for creating integration between the different field business locales and server farms.
  • Worked on Nexus models like 7K, 5K, 2K series, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches.
  • Extensive design, implementation and use of load balancers F5 and BIG-IP to manipulate, optimize and control network traffic.
  • Involved in setting up and maintaining F5 load balancers.
  • The project involved the decommissioning of older Cisco equipment and replacing them with the Nexus platform. These include the Nexus 2048's, 5596 and 56128 platforms
  • Performance monitoring of various applications and web servers to maintain quality of service and network stability.
  • Experience on supporting the infrastructure across the entire corporate: VMware ESXi and vSphere, AWS, Network & Infrastructure, AV & Video Conferencing, user systems support, Linux & Windows server support, Storage Appliance, application support (Google Apps, Drop Box, JIRA, Confluence, GitHub, Slack, etc.)
  • Involved in L2/L3 Switching Technology Administration including making
  • Developed and presented LAN/WAN/WLAN network engineering design packages.
  • Responsible for executing the implementation and service around critical corporate network(s) (LAN and WLAN).
  • Responsible for administration appeal tickets produced by the helpdesk in all stages, for example, investigating, support, updates, patches and fixes with all around specialized backing.
  • Involved in Installing and maintaining ASA and Checkpoint firewalls.
  • Configured ASA Firewalls 5500 series in the data center.
  • Completed administration demands (i.e. - IP readdressing, data transmission overhauls, IOS/stage redesigns, and so forth).
  • Supporting EIGRP and BGP based PwC arrange by determining level 2 &3 issues of inner groups & outside clients of all areas.
  • Updated the HP open perspective guide to reflect and changes made to any current hub/object.
  • Applied access lists and NAT configurations based on implementation guidelines.
  • Attended group gatherings and gave remarks on existing system and the suggestion to enhance the current system execution.

Environment: Cisco Catalyst 6500, 4500, 3750, 3500, 2900 series switches, OSPF, BGP, RIPv2, MPLS, IPsec, GRE, VLAN 802.1q load balancers F5, EIGRP and BGP, Windows 2008.

Confidential

Network Engineer

Responsibilities:

  • Configuration and Administration of Cisco and Juniper Routers and Switches.
  • Configuring OSPF, EIGRP BGP, MPLS, QOS, ATM and Frame Relay.
  • Administration and diagnostics of LAN and WAN with in-depth knowledge of TCP/IP, NAT, PPP, ISDN and associates network protocols and services.
  • Configuring VLANs and implementing inter VLAN routing.
  • Upgrading and troubleshooting Cisco IOS to the Cisco Switches and routers.
  • Configure and troubleshoot Juniper EX series switches and routers.
  • Configuring Site to Site to VPN connectivity.
  • Configuring and troubleshooting Dell, HP servers in Data Center.
  • Involved in configuring Cisco Net flow for network performance and monitoring.
  • Involved in configuration of Cisco 6500 switches.
  • Configuring IPSLA monitor to track the different IP route when disaster occurs.
  • Involved in Implementing, planning and preparing disaster recovery.
  • Involved in configuring Juniper routers.
  • Involved in configuring Cisco pix firewall.
  • Involved in configuring checkpoint firewall.
  • Involved smart view tracker to check the firewall traffic Troubleshooting hardware and network related problems.
  • Configuration and Installation of Cisco firewalls Pixand ASA (PIX 510, 515E, 525 and ASA 5520, 5540).
  • Configuration and Installation of Firewall Service Module in 6500switches.
  • Implement firewall policy changes after the appropriate review and approval process has been completed.
  • Create end-user VPN account with appropriate access after appropriate approval has been issued.
  • Monitor traffic and access logs in order to troubleshoot network access issues;
  • Upgrade firewalls in accordance with change management procedures.
  • Gather information for specific technologies as to function and deployment configurations.
  • Write technical documents describing implemented technologies and architecture.
  • Configuring & managing Network &Security Devices that includes Cisco Routers & Switches, Nexus Switches, Juniper and Palo Alto Firewalls, F5 Big IP Load balancers, Bluecoats Proxies and Riverbed WAN Optimizers.
  • Create suggested solutions for technical problems or Make all changes in accordance with change management procedures.

Environment: Cisco and Juniper Routers and Switches, Juniper EX series switches and routers, Cisco firewalls Pixand ASA (PIX 510, 515E, 525 and ASA 5520, 5540), IPSLA, VTP, VLAN, OSPF, EIGRP, BGP, MPLS, QOS, Bluecoat, ATM.

We'd love your feedback!