We provide IT Staff Augmentation Services!

Network Engineer Resume

0/5 (Submit Your Rating)

Bellevue, WA

SUMMARY

  • 8 years’ experience in routing, switching, Network design, implementation and troubleshooting of complex network systems.
  • Experience testing Cisco routers and switches in laboratory scenarios and then design and deploy them on site for production.
  • Cisco Security: Telnet, SDM, NAT/ACLs, AAA, Layer 2 Security, Layer 3 Security, IPS/IDS, Cisco (ASA, PIX) 5510, Cryptography, VPN, IPsec.
  • Strong hands on experience in installing, configuring, and troubleshooting of Cisco 7600, 7200, 3800, 3600, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
  • Experience with configuring Nexus2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus5000
  • In depth understanding of implementing and configuring F5 Big - IP LTM, GTM ( 11.x, 10.x ).
  • In depth understanding of implementing and configuring A10 SLB (ACOS).
  • Implemented MPLS/VPN services for various customers.
  • Experience in Layer 3 Routing Protocol configurations: RIP, OSPF, BGP, EIGRP and MPLS.
  • Experience in Layer 2 routing Protocol Configurations: ARP, RARP, ATM/FRAME RELAY and VPN technologies: IPSec & SSL.
  • Experience in designing, implementing and Managing LAN, WAN solutions for different client setups.
  • Implemented traffic filters on CISCO routes using Standard Access List and Extended Access list.
  • Experience with installing and managing IT services such as Active directory, site replication, DNS, SSH, DHCP, DNS, NAT and Terminal service.
  • Experience working with OTV & FCOE on the nexus between the datacenters
  • Experience working with Cisco Nexus2148 Fabric Extender and Nexus5000 series to provide a Flexible Access Solution for a datacenter access architecture
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security Appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series,
  • Experience with convert PIX rules over to the Cisco ASA solution.
  • Network security including NAT/PAT, ACL, VPN Concentrator.
  • Well Experienced in configuring protocols HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, CHAP, and SNMP.
  • In depth understanding of IPV4, implementation of Subletting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
  • Moderate knowledge in configuring and troubleshooting Cisco Wireless Networks: LWAPP, WLC, WCS, Standalone APs, Roaming, Wireless Security Basics, IEEE 802.11 a/b/g, RF spectrum characteristics.
  • Provides technical leadership forproblem escalation and resolution.
  • Highly motivated with the ability to work independently or as an integral part of a team and Committed to highest levels of professional.
  • Hands on experience on Up-gradation of Cisco IOS & Firmware of different Cisco devices & modules.

TECHNICAL SKILLS

Operating Systems: Windows (98, ME, 2000, XP, Server2003/2008.Vista, Windows 7), basic Linux.

Routers: Cisco 17XX, 18XX, 26XX, 28XX, 37XX, 38XX, 39XX &72XX series.

Switches: Cisco 3550, 3750, 45XX, 65XX series.

LoadBalancers: GTM (10.x, 11.x versions) LTM, AX ADC ( 3030, 3400, Thunder series )

Routing: OSPF, EIGRP, BGP, RIP-2, PBR, IS-IS, Route Filtering, Redistribution, Summarization, Static Routing.

Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Multicast operationsLayer 3 Switches, Ether channels, Transparent Bridging.

Network security: Cisco (ASA, PIX) 5510, ACL, IPSEC, Checkpoint (R77.30, R75.40)

Load Balancer: Cisco ACE load balancer, F5 Networks (Big-IP)

LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet.

WAN: Leased lines 64k - 155Mb (PPP / HDLC), Channelized links (E1/T1/E3/T3), Fiber Optic Circuits, Frame Relay, ISDN, Load Balancing.

Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management.

AAA Architecture: TACACS+, RADIUS, Cisco ACS.

Network Management: SNMP, Cisco works LMS, HP open view, Etherenal.

Reports: Microsoft (Visio pro.), Checkpoint (Eventia reporter, Smartview)

PROFESSIONAL EXPERIENCE

Confidential, Bellevue, WA

Network Engineer

Responsibilities:

  • Design and deploy Datacenter networks utilizing industry best practices and Cisco hardware to include: Cisco enterprise level L3 switching and Nexus 7K/5K/2K platforms.
  • Plan, design and test the application migration from F5 load balancer to new A10 load balancers.
  • Requirements gathering from Application customers about the application for low latency and reliable operation.
  • Design, implement, and develop network designs for applications used in TMO.
  • Troubleshooting and testing application functionality through load balancers in both test and production environments.
  • Responsible to write, test and implementation of configurations on load balancers for different type of applications.
  • Configuring Cisco Nexus 7000, 6000, 5000 from scratch and making it ready for datacenter migration that involves all the Layer3 and Layer2 migration from Catalyst 6500 to Nexus 7000 and 5000 series routers.
  • Configuring and administering routing protocols OSPF, BGP and Static.
  • Configuring and troubleshooting VPC, VLAN, STP, Trunking, Ether/port-channel, Inter-Vlan routing, HSRP, LACP on various switches.
  • Configuring and administeringACL’s route-maps, prefix-list, distribution-list, access-list and redistribution between routing protocols.
  • Configuring and aggregating FEX (2248, 2232) switches to the Nexus aggregator switches (5596, 5548).
  • Working closely with Server team, Network appliance team to migrate the server connections andRiverbed, F5 connections from Catalyst 6500 Switches to Nexus 7000, 5000.
  • Monitor network performance and troubleshoot problem areas as needed.
  • Design and deploy managed LANs, WANs, and wireless networks, including routers, switches, firewalls and other hardware.
  • Create Low Level and High Level design documents in accordance with customer standards.
  • Oversee/perform installation, configuration, maintenance, and troubleshooting of customer managed hardware, software, and peripheral devices.
  • Conduct research on network products, services, protocols, and standards to remain abreast of developments in the networking industry.
  • Oversee/perform new and existing equipment, hardware, and software upgrades.
  • Adding and modifying Firewall rules in different CMA’s through Check point Smart domain manger R77.30

Confidential, Los Angeles, CA

Network Engineer

Responsibilities:

  • Experience with Converting Campus WAN links from point to point to MPLS and to convert encryption from IPsec/GRE to another data center
  • Experience working with Nexus 7018/7010, 5020, 5548, 2148, 2248 devices
  • Experience with configuring Nexus2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus5000
  • Experience working with OTV & FCOE on the nexus between the datacenters
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls
  • Configuring IPSEC VPN on SRX series firewalls
  • Configuration and troubleshooting on HSRP, VRRP, GLBP, RSTP, MST related issues coming in network environment
  • Configuration and extension of VLAN from one network segment to their segment between Different vendor switches (Cisco, Juniper)
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Implement and configured GLBP (on core switching and also for VPN redundancy), HSRP on different location of office on the switched network and managing the entire multilayer switched network
  • Troubleshooting and installing of CRS, ISR, GSR, ASR9000 and Nexus devices.
  • Engineering the configurations for the different branches, campus locations
  • Worked on the redistribution of connected routes on all OSPF devices so that all connected subnets are advertised via OSPF
  • Used Kiwi-Cat tools to manage configurations from desktop for network devices, including routers, switches and firewalls. Generate network device configuration reports, such as port, MAC, APR and version details
  • Worked on a migration project which involved the removal of all static routes from core devices
  • Responsible for the Global engineering and support of existing network technologies / services and the integration of new network technologies / services
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP
  • Involved in the redistribution into OSPF on the core ASA firewall.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
  • Involved in the modification and removal (wherever necessary) of BGP from the MPLS routers.
  • Worked on Orion for analysis and monitoring purposes
  • Also prepared documentation for various Vlans and Voice subnetworks and worked on Visio for the same.
  • Configuration and extension of VLAN from one network segment other segment between Different vendor switches (Cisco, Juniper)
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling
  • Replace branch hardware with new 2851 routers and 2960 switches.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed
  • Performed basic security audit of perimeter routers, identifying missing ACL’s, writing and applying ACL’s
  • Experience with convert PIX rules over to the Cisco ASA solution.
  • Responsible for Cisco ASA firewall administration across our global networks

Environment: Nexus 7K/5K, 2248/3560/5020/6509 , Cisco ASA5510, Cisco 3640/12000/ 7200/3845/3600/2800 routers, Juniper routers J2350, M10, Cisco 3750/3550/3500/2960 switches.

Confidential, Franklin Lakes, NJ

Network Engineer

Responsibilities:

  • Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
  • Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.
  • Working on Network design and support, implementation related internal projects for establishing connectivity between the various field offices and data centers.
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support
  • Designed and implemented Cisco VoIP infrastructure for a large enterprise and multi-unit office environment. Met aggressive schedule to ensure a Multi-office reconfiguration project which was successfully delivered
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Worked on commissioning and decommissioning of the MPLS circuits for various field offices.
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc)
  • Supporting EIGRP and BGP based PwC network by resolving level 2 &3 problems of internal teams & external customers of all locations.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to point site.
  • Configuring HSRP between the 3845 router pairs for Gateway redundancy for the client desktops.
  • ConfigureVRRP & GLBP andVLANTrunking802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Updated the HP open view map to reflect and changes made to any existing node/object.
  • Handled SRST and implemented and configured the Gateways, Voice Gateways.
  • Worked on a broad range of topics such as routing and switching, dedicated voice access, planning and implementation, large-scale high-visibility outages, change management coordination, proactive monitoring and maintenance, disaster recovery exercises, and core network repairs.
  • Network Cabling, dressing, labeling and troubleshooting various network drops onsite.

Environment: CISCO routers and switches, Access Control Server, VLAN, Trunk Protocols, CISCO ASA, DHCP, DNS, Spanning tree, Nimsoft.

Confidential, New York

Network Administrator

Responsibilities:

  • Configured the BGP as a WAN protocol, and OSPF/EIGRP as interior routing protocol.
  • Provide technical support for clients with dial-up internet issues.
  • Configuration of Access List ACL (Std, Ext, Named) to allow users all over the company to access different applications and blocking others.
  • Used Cisco ACE load balancer between the servers inside the network and in the DMZ.
  • Responsibilities also include technical documentation of all upgrades done
  • Monitoring the NMS system for different Network Alerts
  • Ensure problems are satisfactorily resolved in a timely manner with focus on providing a high level of support for all customers.
  • Once trouble ticket has been created keep customer informed of status of ticket and estimated time to repair.
  • Installed and configured DNS and DHCP server.
  • Involved in troubleshooting of DHCP and other IP conflict problems.
  • Performed switching technology administration including VLANs, inter-VLAN routing, Trunking, STP, RSTP, port aggregation & link negotiation.
  • Designed and installed new Branch network systems. Resolved network issues, ran test scripts and prepared network documentation.
  • Checking and configuring Cisco 7613 routers at data center for remote sites’ issues.
  • Working on Cisco 6509 and 4507 series switches for LAN requirements, that includes managing VLANs, Port Security and troubleshooting LAN issues
  • Attending meetings and technical discussions related to current project.

Environment: 6500/3750/3550/3500/2950 switches, Juniper (M320, T640), Cisco 7200/3845/3600/2800 routers, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, Ether Channels.

Confidential

Network Administrator

Responsibilities:

  • Maintained redundancy on Cisco 2600, 2800 and 3600 router with HSRP and VRRP.
  • Implemented and configured routing protocols like EIGRP, OSPF.
  • Monitor the operability and reliability of the network.
  • Responsible for SNMP Monitoring and Performance Tuning software.
  • Designed WAN structure to prevent single point of failure in case of link failure.
  • Maintenance and Troubleshooting of connectivity problems using PING, traceroute.
  • Planning and Implementation of Subnetting, VLSM to conserve IP addresses.
  • Monitor the operability and reliability of the network.
  • Configured STP for loop prevention and VTP for Inter-VLAN Routing.
  • Configuration and troubleshooting of EIGRP, OSPF, BGP.
  • Configuration of Standard and Extended ACLs for Security.
  • Troubleshooting the issues related to routing protocols.
  • Managing, troubleshooting and monitoring the network using Network Monitoring tool.
  • Network Security implementation with Cisco IOS Feature Set, NAT, and Simple Network Management Protocol.
  • Provided support for troubleshooting and resolving Customer reported issues.
  • Performed IOS upgrades on Catalyst 3550, 2950, 1900 switches, and 3600, 2600 and 2500 routers.
  • Provided support for global network including T1/T3, ATM connections using HDLC and Frame Relay on 2600, 4000 series Routers.
  • Installed wireless access points (WAP) at various locations in the company.
  • Technical assistance for LAN/WAN management and complex customer issues.

Environment: Cisco Routers - 2500, 2600, 3601 series, Cisco Switches -2900, 3550, 4000.

Confidential

Jr. Network Engineer

Responsibilities:

  • Troubleshot Cisco hardware: Inspected devices, Read device LEDs, loose connections, interior IOS upgrade, switch port configuration, port monitoring, watch over Flooding Control/Network port.
  • Strategies include operating systems, virus protection, mail systems and Internet services.
  • Updated the anti-virus, spam blockers, and other security software so that the systems are always secured
  • Resolved all computer related problems, monitored and maintained system functionality and reliability by identifying ways to prevent system failures
  • Worked on configuration and installation of new desktops for users using GHOST, EZ copy and Dist-to-Disk copy
  • Installed and configured DHCP, DNS Server.
  • Identifying technical problems and debugged hardware and software related to LANs/ WANs.
  • Switching related tasks included implementing VLANS, VTP and configuring ISL trunk on Fast - Ethernet channel between switches.
  • Develop and implement strategies to support the current and future needs of the company.
  • Configured Cisco Routers 2600 series using RIP, OSPF, EIGRP.
  • Configured Cisco Switches 2900.

Environment: CISCO 2600, 2800 and 3200 series routers, CISCO 3300 and 2900 switches, DNS, DHCP.

We'd love your feedback!