We provide IT Staff Augmentation Services!

Computer Technician Resume

0/5 (Submit Your Rating)

SUMMARY:

  • More than 10 years of experience analyzing, designing, implementing, troubleshooting and supporting high available networks. Leading IT projects and solutions in collaboration with other IT organizations. Providing short/long term solutions to reduce total cost of ownership, minimizing the average time spent on each client by providing an effective solution.
  • A proven technical escalation resource for a company when dealing with cross vendor technologies. Organizing/re - organizing network infrastructures along strong documentation and planning future growth while ensuring other technical metrics i.e. security, manageability, accessibility, efficiency, performance etc.

TECHNICAL SKILLS:

Routing: Advanced Routing, policy based, dynamic routing; RIP, EIGRP, OSPF, ISIS, BGP, ODR and Static. Additionally; advanced configuration advanced metric i.e. best route selection, load balancing, path manipulation, scheduled routes, route redistributions, routes authentication etc. Support for both IPV4 and IPV6 Networks.

VPN Technologies: RA IPsec, Site to Site IPsec, Clientless, SSL, Anyconnect, DMVPM. VPN over cross vendor appliances. Working with both IKV2 and IKV1 for backward compatibility.

AAA: Dual authentication using s, RSA Token System, TACACS, RADIUS, active directory based authentication.

High Redundancy: Clustered firewalls over cross vendor appliances; active/active, active/standby, HSRP, GLBP, VRRP, VPC (Nexus), port/ether channels etc.

Layer 2 Technologies: VLANs, VTP (all versions), DTP, 802.1Q, ISL, STP, RSTP, MST, ISL, 802.1Q, Ether Channel, HSRPVRRP, GLBP, Port Security, Custom Load sharing over ether channels, DTP etc. along securing named protocols and more.

Risk Assessment / Impact Analysis: Greenbone/OpenVAS security and Qualys security penetration test against internal/external server’s environment along providing the solution to vulnerabilities. Additionally auditing implemented protocols on edge devices and provided detail reports on what vulnerabilities are associated with each protocol along the solutions.

Monitoring: SPAN, RSPAN, syslog, Solarwinds NPM/NCM, Wireshark, packet capture (cross vendor), IP SLAs, Track Objects, debug utilities depending on the scope of monitoring.

Network Security: Ensuring that the latest patch, protocol, iOS, OS version are applied across the network devices. Implementing UTM (Unified Threat Management) on cross vendor supported devices.

We'd love your feedback!