Sr. Network Engineer Resume
Dearborn, MichigaN
SUMMARY
- CCNP certified network engineer with 8+ years of experience in IT industry which includes expertise in the areas of Routing, Switching, Firewalls management, VPN management, and Administration and troubleshooting.
- Proficient in configuration & troubleshooting of routing protocols: MP - BGP, EIGRP, OSPF, BGP and MPLS.
- Involved in configuration setup and troubleshooting of Cisco and juniper devices to perform functions at the Access, Distribution, and Core layers.
- Experience working with Nexus 7010/Nexus 7018, 5020, 2148, 2248 devices.
- Experience working with Cisco Nexus2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture.
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
- Hands on experience in troubleshooting and deploying of various IP Routing Protocols OSPF & BGP on Juniper routers.
- Implemented security policies using ACL, Firewall, IPSec, VPN, Check point, Fire eye, Confidential Security TACACS+, and Radius on different series of routers.
- Worked on Juniper devices like EX-2200, EX-4200, EX-4300, MX-80, MX-480, M Series, SRX210 and SRX240.
- Ability to manage all phases of network installation and administration.
- Excellent customer management/resolution, problem solving and debugging skills with good verbal/written communications and presentation skills.
- Experience with convert Cisco ASA rules over to the Juniper SRX based solution.
- Responsible for Cisco ASA, Juniper SRX firewall administration across customer networks.
- Excellent skills to implement VLANS, private VLANS, Voice VLANS, Port security, STP and RSTP (802.1W), standard and extended access lists for managing access based security, creating root views for administrative privileges.
- Extensive knowledge of deploying & troubleshooting TCP/IP, Implementing IPv6, Transition from IPv4 to IPv6, Multilayer Switching, UDP, Fast Ethernet, Gigabit Ethernet, Voice/Data Integration techniques.
- Experience in Network Management Tools and sniffers like SNMP, HP-Open view, SolarWinds, Splunk and Cisco works to support troubleshooting issues.
- Experience with splunk 4.X, 5.X and 6.1
- Excellent in patches and packages installation on Linux/Unix Environment.
- Years of Windows, Unix, Vax/VMS OS exposure.
- Upgrades, installs, configuration and administration security and monitoring tools on UNIX. proven experience in Linux 5.5 6.7& 7.2(RedHat & SuSE).
- Deploy and manage network infrastructure of VMware, CITRIX.
- Adept in preparing Technical Documentation, MOPS and presentations using Microsoft VISIO/Office.
- Well organized, Self-starter, Quick learner, Self-Motivated, Team player with analytical, technical and communication skills.
TECHNICAL SKILLS
Routing Protocols: RIP, IGRP, EIGRP, OSPF, IS-IS, BGP, HSRP, VRRP & GLBP Infrastructure services: DHCP, DNS, SMTP, FTP, TFTP
LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- Channel, VLANS, VTP, STP, RSTP, 802.1Q
WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP,DS1, DS3, OC3, T1 /T3 & SONET Packet Switched WAN - ATM, FRAME RELAY, MPLS VPNs
Netw ork Security: NAT/PAT, Ingress & Egress Firewall Design, VPN Configuration Internet Content Filtering, Load Balancing, IDS/IPS, Dynamic, Reflexive ACL and authentication AAA (TACACS+ & RADIUS)
Network Management: SNMP, Cisco Works, Kiwi-cat, What's-Up Gold, Ethereal
Effectively utilized operating systems: WindowXP/Vista/7/8.1/10 UNIX and LINUX(Redhat, Opens use, Fedora)
Security Technologies: Cisco FWSM/PIX/ASDM, Nokia Checkpoint NG, Juniper SRX, ACE Module and F5 Load Balancers
PROFESSIONAL EXPERIENCE
Confidential, Dearborn, Michigan
Sr. Network Engineer
Responsibilities:
- Experience with migration of datacenter switches from 6500 based data center to Nexus based data center.
- Responsible for Data center operations, monitoring and maintaining the network devices.
- Experience with communicating with different customers, IT teams in gathering the details for the project.
- Experience working with Cisco IOS-XR on the ASR9000 devices at core layer.
- Involved in Substantial lab testing & validation prior to implementation of Nexus 7K, 5K & 2K connecting to blade servers.
- Responsible for implementation and troubleshooting of Nexus 7010, 5020, 2148, 2248 devices as a part of the datacenter migration project.
- Responsible for implementation of Cisco Nexus 2148 Fabric Extender and Nexus 5000series to provide a flexible Access Solution for datacenter access architecture.
- Experience in working with installing Nexus 7010 NX-OS upgrade.
- Installation and Configuration of Cisco switches 3850 stack wise seriesswitches in the access layer.
- Experience configuringOSPF and BGPon branch routers with Access Control lists implemented as per Network Design Document. Established redundancy at critical sites for high availability.
- Automated network implementations and tasks and designed monitoring tools using python scripting.
- Configuring Cisco ASA firewalls in single and multiple context mode firewalls.
- Experience with F5 load balancers - LTM, GTM series like 5800,7200-V for the corporate applications and their availability.
- Implementation, configuration & troubleshooting the issues related to Virtual Servers, pools, nodes & certificates on F5 Load Balancer.
- Configured Cisco ASA 5585 Firewall to establish logical separation between legacy network & lab environment.
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/SRX security appliance Failover, DMZ zoning, & Configuring VLANs NATing with the firewalls as per the design.
- Configuration and extension of VLAN from one network segment to other network segment between different vendor switches (Cisco, Juniper)
- Automated network implementations and tasks and designed monitoring tools using python scripting.
- Responsible Configuring OSPF and BGP on Juniper MX series Routers.
- Switching tasks include VTP, ISL/ 802.1q, IPSec and GRE Tunneling, VLANs, EtherChannel, Trunking, Port Security, STP and RSTP.
- Network security including NAT/PAT, ACL, on ASA and SRX Firewalls.
- Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
- Experience in installing and configuring DNS, DHCP services on CENTOS Servers.
- Involved in iRule management like loading rules, writing iRule syntax using TCL language.
- Involved in design and deploying various network security & High availability products like Cisco ASA and other security products.
- Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with Juniper SRX 550 Firewalls.
- Configured network access servers for Confidential Security.
- Enabled continuous Layer 2 monitoring with SolarWinds, so that each site can run independently until connectivity is restored.
- Used SPLUNK to monitor traffic flow, and to confirm connectivity.
- Responsible for managing activities, Upgrading IOS - Upgrading hardware and installing new devices, tuning (Configuration), make standardization for the topology.
- Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling.
- Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data environment.
- Replace branch hardware with new 2900/3900/MX-80 routers and 3850 switches.
- Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports.
- Excellent skills in Linux/Unix System Management concepts, Volume Manager and file system organization, allocation and maintenance, backup/restore strategies, implementation, management and troubleshooting.
- Install and configured software/hardware products on UNIX, and Windows platforms at customer’s sites.
- Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
- Followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches.
- Implement and configured GLBP (on core switching and for VPN redundancy), HSRP on different location of office on the switched network and managing the entire multilayer switched network.
Confidential, Eden Prairie, MN
Network Security Admin
Responsibilities:
- Involved in design and implementation ofdata center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.
- Build and maintain servers in a data center environment, while troubleshooting a wide range of hardware.
- Responsible for Configuration of Cisco Catalyst switches 6500, 4500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
- Managing health check of Network devices this is involves upgrading IOS on every quarter after checking the vulnerability of IOS and reviewing the configuration.
- Installation, Configuration and Administration of ADS, DNS, DHCP and Web proxy(ISA)server.
- Router/ Microsoft VPN Server to access certain limited network resources from customer locations.
- Installed and configured ASA 5520 in customer locations for the Guest access.
- Knowledge in installing and using splunk on both Windows and Unix.
- Implemented Splunk for better syslog indexing, searching & troubleshooting.
- Created engineering configuration, Security Standards, documenting processes and Network documentation using Microsoft Visio.
- Experience with F5 load balancers to provide Land Balancing towards Access layer from core layer and configuring F5 LTM both by GUI and TMSH/CLI and Cisco load balancers (CSM, ACE and GSS).
- Has a good experience working with the Trouble Tickets on F5 Load balancers.
- Implementation and configuration of F5 Big-IP LTM-6400 load balancers.
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
- Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500 security appliance, Failover DMZ zoning & configuring VLANs / Routing / NATing with the firewalls as per the design. Primary responsibility is to design and deploy various Network Security & High Availability products like Cisco ASA and other Security Products.
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
- Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K.
- Experience configuring Virtual Device Context in Nexus 7010.
- Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches.
- Manage Cisco Routers and troubleshoot layer1, layer2 and layer3 technologies for customer escalations.
- Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
- Design, Implement & troubleshooting of Juniper switches, routers, and Firewalls.
- Experience working with Network management software NSM.
- Configuration and extension of VLAN from one network segment to other network segment between different vendor switches (Cisco, Juniper).
- Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.
- Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.
- Installation, Configuration and troubleshooting Cisco switches and Firewall on multi-mode context based environments.
- Managing a TACACS server for VPN user authentication and network devices authentication
- Handled Corporate and Review Audits from the perspective of IT Security for Network Devices and Servers under our control.
- This includes Artifacts for regular Health Checks, IP and System Integrity, Change management, Problem management, Logical Access Controls, Network Connectivity, Service Registration, and Performance Management.
- Installed and configured the Cisco routers 2800 in two different customer locations. It includes coordinating with Verizon and AT&T to bring the serial interface up for T3 link. Also, configuration includes BGP and VPN tunnel on GRE.
- VLAN Configurations, troubleshooting and Firewall ACLs and Object-Groups configuration and support.
- Configured IPsec site-to-site VPN connection between Cisco VPN 3000 Concentrator and Cisco 3800.
Confidential, California City, CA
Network Engineer
Responsibilities:
- Responsible for Configuring SITE TO SITE VPN on Cisco ASA 5500 series firewall between Head office and Branch office.
- Installation & configuration of Cisco VPN concentrator 3060for VPN tunnel with Cisco VPN hardware & software client.
- Working on Network design and support, implementation related internal projects for establishing connectivity between the various field offices anddata centers.
- Configure, test, and implement dedicated network and security environment in thedata center.
- Maintain documentation of all servers, applications and networkcomponents at thedata centers to include IP address, physical connections, physical and logical data flows and work flows.
- Configured Firewall logging, DMZs& related security policies & monitoring.
- Planning and configuring the routing protocols such as OSPF, EIGRP and Static Routing on the routers.
- Performed and technically documented various test results on the lab tests conducted.
- Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series.
- Worked onCiscoLayer 2 switches (spanning tree, VLAN).
- WAN Infrastructure running OSPF & BGP as core routing protocol.
- Support various Routers like 2600/3600/7200 series routers.
- Tested authentication in OSPF and BGP.
- Configured and troubleshoot OSPF and EIGRP.
- Hands on Experience working with security issue like applying ACL’s, configuring NAT and VPN.
- Documenting and Log analyzing the Cisco ASA 5500 series firewall.
- Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security.
- Work on different connection medium like Fiber and Copper Connectivity.
- In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
- Managed Linux, Windows servers and desktops; VMware, Citrix XenServer setups and clusters, Cisco ASA.
- Working knowledge of the UNIXand CLI based command to implement the networking tools.
- Installed and supported UNIXservers at 20+ departments.
- Planning and configuring the entire IP addressing plan for the clients'network.
- Assist the certification team and perform configuration of LAN\WAN technologies such as Ethernet, Fast Ethernet, and Gigabit Ethernet.
Confidential
Jr. Network Engineer
Responsibilities:
- Responsible for the installation, configuration, maintenance and troubleshooting of the company network. Duties included monitoring network performance using various network tools to ensure the availability, integrity and confidentiality of application and equipment.
- Assisted system administrators in their task of maintaining the company's Unix servers and work stations.
- Experience in System Administration, System Builds, Server Builds, Installs, Upgrades, Patches, Migration, Troubleshooting, Security, Backup, Disaster Recovery, Performance Monitoring and Fine-tuning on Red Hat Linux.
- Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
- Administration/Configuration of Linux/windows print server/client in network.
- Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security Settings of the networking devices (Cisco Router, switches) co-coordinating with the system/Network administrator during any major changes and implementation.
- Other responsibilities included documentation and change control.
- Worked on Cisco routers 7200, 3800, 2800 and Cisco switches 4900, 2900
- Routing protocols OSPF, RIP & BGP.
- Configured BGP for CE to PE route advertisement inside the lab environment.
- Spearheaded meetings & discussions with team members regarding network optimization and regardingBGP issues.
- Responsible for configuring GLBP between multilayered switch networks.
- Administration of Cisco 11.x and 12.1 versions and higher.
- Monitored all Cisco equipment using Cisco Works.
- Upgrades and backups of Cisco router configuration files to a TFTP server.
- Implementing and maintaining backup schedules as per the company policy.