Network Specialist Resume
SUMMARY:
- 7+ years of cross - platform experience in Network Specialist, including analyzing, designing, installing, maintaining, and repairing hardware, software, peripherals, and networks.
- In-depth expertise in the implementation of analysis, optimization, troubleshooting of LAN/WAN networking systems.
- Experience in configuring, supporting and troubleshooting Fortinet devices (60D, 200D, 500D, 600C, 800C, 900D, 1500D, 3700D, FAZ, FMG, 5144C, FCTRL, FML, FG) which includes the routing protocols (static, BGP), switching (Vlans, VCP, VPLS), NAT, firewall policies, SNMP, SYSLOG, LDAP and managing all the network gear related functions
- Worked extensively on Palo Alto, Juniper Net screen, Fortinet and SRX Firewalls.
- Superior troubleshooting and technical support abilities with migrations, network connectivity, and security and database applications.
- Managed security administration services for the human resources, audit, and information technology divisions.
- Working knowledge with monitoring tools like Sonicwall, Solar Winds & network packet capture and maintaining Network security, VPN and firewall services.
- Superior knowledge and demonstrated technical proficiency in Microsoft Systems Center Configuration Manager (SCCM).
- A highly organized individual who adopts a systematic approach to problem solving, effectively analyzes results and implements solutions.
- Excellent communication skills, Enthusiastic, motivated and a team player.
- Gained more knowledge on Network Security during my Master’s from Cyber Security curriculum
- Demonstrated a high degree of competency in performing network security duties in successfully preventing breaches to the enterprise's networks, systems, corporate files and patient PHI data.
- Data center and network support for 100+ servers. Mixture of physical and virtual servers using VMware vSphere.
- Implementing Windows and VMware technologies in server storage, server management, network infrastructure, network integrity, OS deployment, OS recovery and data protection to provide best application and infrastructure support
TECHNICAL SKILLS:
Cisco & other vendor equipment s: Cisco routers (7600, 7200, 3900, 3600, 2800,2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series), Avaya, Juniper SRX210, SRX240 Ex4200 EX4300, QFX5100, MPLS, OSPF, IGRP, EIGRP, HSRP, TCP/IP, IWAN, T1, DS3Operation Switches, Layer 2 switching - VLAN, Port channel, virtual Port Channel
Operating Systems: MS Windows-XP, MS Windows Server 2003, MS Windows Server 2008,2008R2, 2012,2012R2, 2016 WINS Active Directory 2003, 2008. Windows 7, Windows Vista, RHEL 4/5/5.5/6, Ubuntu, CentOS, and Fedora
Network Management: Solar Winds, SNMP, Cisco Works, Wire shark, Sonicwall, ServiceNow
Microsoft Server Functionalities: Active Directory Domain Controller, Active Directory Domain Services, DHCP Server, DNS, File and print server, Database storage server, Windows Deployment Services (WDS), Group Policy management, Registry management, Hyper V, Schedule tasks (Backup, AD DS Backup), High Availability Features (Failover Clustering, Network Load Balancing), Troubleshoot all aspects of SCCM effectively and understand the product flow patch management, software distribution and logging in detail.
Active Directory management: Adding and configuring new workstations and setting up user accounts to provide authorizations, access rights and GPO update.
Security Access Control/Policy: Cisco Secure ACS for Windows, RSA, AAA, TACACS+, Radius, IPSec, GRE, NAT/PAT, ACLs, Juniper SA SSLVPN w/DUO, Cisco Altiga SSLVPN, VeriSign, Fortinet
Installation: Windows XP/Vista/7/8/10 Pro, Servers, Exchange servers Linux Red hat 5,6,8,9, Fedora Core 6, 9, 10, Suse Linux and SCO UNIX 7 Installation of VMware workstation and configuring dual OS, Installation of Norton Antivirus, Macintosh operating systems, MacAfee, Hardware Drivers & Service Packs, updates etc HP Printer and Scanners
Hardware: HP C7000, C3000, Dell Compellent storage centers, HP tape libraries, Compaq and IBM Desktops assemble & Installation, PC Cards like NIC, Audio, Video, PCMCIA, TV, Hard-Disk, CD, RAM, Printer & Scanners and Bios Support.
PROFESSIONAL EXPERIENCE:
Confidential
Network Specialist
Responsibilities:
- Include maintaining the integrity and security of a company’s network and the systems connected.
- Monitoring district servers, website, and related hardware and supporting software (e.g. throughput, switches, patch panels, racks, etc.) for ensuring that resources and technology are available and utilized effectively.
- Support and maintain VMware vSphere 6.5 environment (180+ servers) using ESXi hosts and EMC VNX5300 SAN,DELL Compellent 19061/19062
- Configured and Managed Forti-Manager and Fortinet Firewalls.
- Utilized FortiManager, Forticlient and FortiAnalyzer to maintain and optimize Fortigate firewalls.
- Resolved 8 to 10 tickets in a day from Tufin.
- Resolved Customers request to create firewall policies for Cisco ASA, Fortigate and NX-OS.
- Experience in configuring, supporting and troubleshooting Fortinet devices (60D, 200D, 500D, 600C, 800C, 900D, 1500D, 3700D, FAZ, FMG, 5144C, FCTRL, FML, FG) which includes the routing protocols (static, BGP), switching (Vlans, VCP, VPLS), NAT, firewall policies, SNMP, SYSLOG, LDAP and managing all the network gear related functions.
- Assisting various departments to meet their needs regarding Site-to-Site and Remote Access VPN.
- Troubleshoot connectivity issues through firewalls using command line utilities and GUI on Checkpoint Security Gateways, Cisco Firewalls especially ASA 5500(5540,5580) & amp; 5585X, Fortinet running on 3700D with 5.6 FortiOS.
- Conducted POC trials of Network Security technologies including web application firewalls (Fortigate) then implemented the solutions.
- Migrated legacy Cisco ASA firewalls to Fortinet firewalls using FortiConvertor migration tool in the enterprise environment.
- Configuring, maintaining and troubleshooting with Fortinet firewall and security.
- Implement and monitor firewalls (Fortinet, Checkpoint and Cisco) security policies.
- Working on Traffic Migration from Cisco ASA firewalls to Fortigate.
- Resolving customers query over the phone as well as emails regarding the flow of traffic between different hosts and subnets to allow them to get a seamless connectivity between different networks.
- Extensive Packet level debugging and troubleshooting on Cisco ASA firewalls and Fortinet Firewalls to resolve numerous network issues.
- Performing and Executing Citrix builds to the Citrix servers
- Install, configure and provide support to all networking accessories in different workstations.
- Experience with HP enterprise-class hardware (dl360/380/585, etc.)
- Experience with HP C7000 blade systems hardware
- Experience with VMware ESXi Server (vSphere) and Virtual Center V4, v5, v6 and v6.5
- Administering networking stability and monitor all work regularly.
- Troubleshoots networks, systems, and applications to identify and correct malfunctions and other operational difficulties.
- Performs other related duties as assigned, Server update and Windows update schedule
- Monitoring and administering CISCO Meraki switches, routers, and Iron ports.
- Evaluated network performance and activities on layer 3 routing and layer 2 switching, F5 Load Balancer firewall ( Confidential ASA, Juniper & Check Point)
- Port Monitoring network security devices, audit logs and connectivity
- Monitoring and administering of all virtual servers and hosts errors related to snapshots and storage and network vSwitches and distributed switches.
- Experience with HP Virtual Connect, server profiles, network group with HP device bays.
Environment: Cisco ASA, DELL, Fortigate 60D, 200D, 500D, 600C, 800C, 900D, 1500D, 3700D, FAZ, FMG, 5144C, FCTRL, FML, FG, FortiManager 5.0, 5.2, 5.6, Fortianalyser, Cisco CSM, Tufin, Algosec, ServiceNow.
Confidential
Network & Systems Engineer
Responsibilities:
- Experience with Supporting Network infrastructure in data center environment and Campus environment, which involved with devices such as routers, switches and wireless access points
- Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
- Involved in the modification and removal (wherever necessary) of BGP from the MPLS routers.
- Created pre-filter rules, access-control polices, Intrusion policies, Malware polices on Firepower (IPS, IDS, Malware Detection)
- Built IP-Sec VPN tunnels from Cisco Firepower to SRX-220’s in remote sites using IKE pre-shared keys, AES-128, SHA and DH5.
- For ERP Project, Built IP-Sec VPN tunnel’s from FTD2130 to Cisco ASA5520 which is in other Enterprise using AES-256,SHA and DH5.
- Configured, Deployed ISR 1941 Router’s for a Specific project in the Network
- Built IP-Sec over GRE tunnel from ISR 1941 to Verizon Network Router.
- Designed and Configured Cisco Identity Services Engine (ISE v1.2) to support corporate connectivity to a new wireless environment utilizing Active Directory Authentication and Authorization with EAP-TLS client s.
- Configures Cisco ISE to perform Profiling and Posture assessment of endpoints
- Implement ISE solution for campus LAN, wireless, remote access and guest network environments
- CISCO ISE Change administration, writing and implementing client sponsored or required changes
- Cisco ISE configuration/deployment for network device access
- Implementing and supporting ISE for Wireless and guest authentication
- Configured, Maintained different IPS, IDS policies on FTD2130.
- Configured Remote Access VPN (Any Connect) on FTD2130. Also configured User based VPN, creating access-control policies directing from the AD server.
- Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.
- Tuned BGP internal and external peers with manipulation of attributes such as metric, origin and local P.
- Mid-level understanding of MS Windows server (2003, 2008, 2012), Linux RHEL v6 and v7, OEL V6 and v7 and associated software
- Experience with HP enterprise-class hardware (dl360/380/585, etc.)
- Assisted in the timely recovery of data lost due to software crash or hardware failure.
- Conducted periodic performance tests on existing servers.
- Managed and advised the deployment of new system designs.
- Attended Team meetings and provided comments on existing network and the recommendations to improve the current network Performance.
Environment: Cisco ISR 4451, ISR4331, ISR 2951, Cisco Catalyst switches, Cisco AP’s 2700, 3700, WLAN Controller, ASA 5585, Solar winds, Cabling, Fiber optics, Cisco Prime Infrastructure, VPN, AAA-Radius, Tacacs, ACS, SNMP, Infoblox, DNS, DHCP, OE294, OE594,OE694
Confidential, Michigan
IT Systems Engineer
Responsibilities:
- Supporting and Maintaining all virtualized and physical servers
- Administrated servers: Windows and servers virtualization (Hyper V, VMware); 2008, 2012 and Linux servers
- Administrated security, and sharing of resources.
- Cloud Administration
- Administration of the WAN (Wide-Area Network).
- Created servers images & configurations
- Managing Cisco Unified Communications Manager (CUCM) cluster with 500+ phones utilizing dual-homed SIP trunks
- Provide extension mobility to users using CUCM
- Configured Cisco Catalyst Switches 3560-CX, 2960-CX in LAN Campus.
- Configured Cisco Catalyst 4500-X for Core and Distribution purposes.
- Created and updated Visio diagrams for the same and stored in the Share file.
- Configured Cisco AP’s using WLAN controller.
- Hands on experience on configuring Cisco AiroNet 2700, 3700 series Access points in WLAN Controllers 5508, 8540.
- Provided voicemail, extension mobility and device profiles using CUCM for Cisco IP phones (7960, 7821)
- Hands on configuring Cisco ASA 5525 FW in the Network Remediation Project.
- Implemented QOS to conform the ACA standard.
- Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
- Participated in support (down to individual tickets assigned to users) for all ISE related applications (Any Connect, AMP) and services
- Strong hands on Network Circuit WAN upgrades, MPLS Circuit upgrades.
- Worked with ISP providers for Circuit upgrades for LAN Campuses.
- Implemented all applicable security and application patches and required configuration changes to the SCCM infrastructure.
- Device Administration/Maintenance: Maintain WAN connectivity devices (firewall appliances and routers); Audit performance of WAN devices to ensure adequate ratio of resources.
- Remote Connectivity: Maintain company’s remote client, site-to-site, and VPN connectivity; Add and adjust connectivity as necessary; Audit usage and coordinate any necessary technical support.
- Monitored all relevant logs, including server, application, and security logs for anomalies and performance issues.
- Ability to manage packages, collections and assignments in the SCCM console.
- Maintained SCCM client troubleshooting skills on the Windows 7/8/10 platforms.
- WAN Connectivity: Maintain company’s Internet and point-to-point T1s. Coordinate any troubleshooting activities
- Participated in the development of company policies, procedures, and
- Supervised all network documentation related to configurations, topology, and site features (cabling, port allocation, Access Points and switches).
- Supported network planning, integration, and budgetary processes associated with long-term growth in the technical capacity, end-user systems, and remote connectivity.
- Overlook that all the services that we were receiving from the service providers were working & updated.
- Coordinated and researched the purchasing of systems, software and peripheral equipment.
- Coordinated consultations regarding the types of hardware and software that is required by the users.
- Provided Level III support to troubleshoot deployment issues, desktop software conflicts and client health issues.
- Administered backend SCCM servers.
- Domain Services, Active Directory, New User deployment in Servers, workstations
- Managing agents through LabTech and deployment of new agents, monitoring agents, Servers, OS patch, assigning new scripts through LabTech.
- Maintaining Storage Craft, Designed and Built Storage Craft server for Shadow Project
Environment: Cisco Catalyst 7509, 6500, 4500, 4000, 3750, 3850, 3560, F5 BIGIP LTMs-6900, Cisco ASA 5525 firewalls, Power Connect Switch 5548,Infoblox,MPLS,Multicast,Nexus-7k, Palo Alto 5060,PCI,SOX,OTV,VPC,Nexus-FEX,IOS,IOS-XR,NX-OS,IPSEC, OSPF, EIGRP, BGP, IS-IS, ASR 1k,9k,cryptography,L2&L3 VPN, Metro Ethernet,802.1Q,Riverbed Steelhead, Prime Infrastructure, UCS, Multicasting
Confidential, New Jersey
Network Administrator
Responsibilities:
- Designed and implemented a complex network system that use both LAN and WAN technologies
- Configured and maintained firewalls
- Microsoft patch deployment creation, troubleshooting, and compliance management
- Deployed Windows workstation patches.
- Implemented and configured Storage Area Network devices
- Designed from scratch and led migration to a new 2008 R2 domain, including migration of all users’ accounts, computer accounts, and Exchange mailboxes.
- Maintained upgrades and monitored all server and internal infrastructure equipment
- Maintained network performance on need basis
- Implemented new security protocols including forcing password standards for company users.
- Handled authorization of directory services and configuration of authentication
- Hands on experience on NAT (Network Address Translation)
- Hands on Experience testing iRules using Browser(IE), HTTP watch
- Convert Campus WAN links from point to point to MPLS and to convert encryption from IPsec /GRE to get VPN
- Implemented and configured GLBP (on core switching and also for VPN redundancy), HSRP on different location of office on the switched network and managing the entire multilayer switched network
- Hands on experience configuring Fortinet NGFW 3000 series.
- Troubleshoot and installing of CRS, ISR, GSR, ASR9000
- Configured and implemented VDC and VPC on Nexus 9K,7K,5K switches in the Datacenter
- Created documents for various platforms including Nexus 9k, ASR1k enabling successful deployment of new devices on the network
- Experience with configuring Nexus 5548 with nexus 2248 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7010.
- Perform ISSU upgrades on nexus devices with nexus OS 6.2 on nexus 7010 devices with SUP2E line card.
- Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls
- Troubleshoot software and hardware issues on the network and on each individual workstation
- Completed over 20 tickets that involved troubleshooting equipment hardware issues
- Ensured data/media recoverability by implementing a schedule of system backups and database archive operations.
- Managed daily activities to include user support and system administration tasks.
- Administer the work of servers, printers, scanners, routers, switches and smart phones and handle security updates
- Configured, implemented, and troubleshoot routers and switches with various account settings, permissions, and parameters including security firewalls.
- Configured multiple domain name services (DNS), email services (Exchange Server), web, and file transfer protocol services (FTP) for various platforms including line leasing through DHCP servers.
- Networking protocols worked with included but not limited to TCP/IP, DNS, WINS, DHCP, VPN, Terminal Services, Routing and Remote Access, Network Design, wiring and cabling.
- Trouble shooting System Hardware and software Installations
- Implementing & configuring Active directory services on Windows 2000 and 2003 server, SCCM.
- Experiences with the use of technology in a business environment, including exposure to Help Desk Support, networks, and application environments (servers and desktop).
- Utilized VMware and virtualization for application compatibility issues.
- Maintained large enterprise environment of Servers and their applications.
- Utilized SCCM to deploy OSD and packages to clients. (SCCM Admin)
- Extensive Imaging experience (Ghost)
- Creating & managing Organization Units, Sites and Group policies.
- Providing login permissions and NTFS permissions
Environment: Checkpoint-R65,R70,NGX,VPN,Solar Winds, IP, IPSEC, AAA-Radius, Tac-acs, ACS, SNMP, Infoblox, DNS, DHCP, OSPF Troubleshooting, Bigip, F5-LTM-1600, 3600, GTM, Viprion, Active Directory, OSPF, EIGRP, Out-look servers,Nexus-9k,7k,5kCisco Routers-7600, 7200, 3800, Cisco Switches-2950, 3500, 5000, 6500,HSRP,GLBP,ACE-GSS-4400,VM-ware-ESXi-6,Vsphere,Vcenter,UCS
Confidential
Network Administrator
Responsibilities:
- Experience with Supporting Network infrastructure in data center environment and Campus environment, which involved with devices such as routers, switches and wireless access points.
- Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wireshark
- Co-ordination with Hardware vendors, software vendors and service Providers.
- Assisted in backup, restoring and upgrading the Router and switch IOS.
- Developed a deep understanding of the prospective customer purchase process and assist with pre-sales activities
- Troubleshoot and installed CRS, ISR, GSR, ASR9000 and Nexus devices
- Ensure Network, system and data availability and integrity through preventive maintenance and upgrade
- Supported EIGRP and BGP based network by resolving level 2 &3 problems of internal teams & external customers of all locations
- Handled all the Firewall Migrations from Cisco ASA to Fortinet on a Global Scale.
- Worked on the migration to new Checkpoint R75 firewalls from Juniper firewalls
- Firewall Policy implementation on Checkpoint NGX R52 and R54.
- Provided daily network support for national wide area network consisting of MPLS, VPN and point-to point site
- Worked on different Cisco & Juniper devices of access, distribution and core
- Experienced with Juniper: EX-2200, EX-4300, EX-4500, MX-480 and SRX550 trouble shooting
- Having hands on experience with f5 Local and Global Traffic Managers (LTM >M)
- Installed, optimized and configured new servers and application upgrades in existing network environment as per requirements.
- Installed and configured secured environments, VPN Internet connectivity of virtualized server environment and clients
- Managed and administered Windows/Linux systems - Performed periodic maintenance, provided technical support and executed systems engineering.
- Maintained the timely back-up of important data and management resources.
- Assisted in the timely recovery of data lost due to software crash or hardware failure.
- Conducted periodic performance tests on existing servers.
- Managed and advised the deployment of new system designs.
- Attended Team meetings and provided comments on existing network and the recommendations to improve the current network Performance.
Environment: Cisco Catalyst 7509, 6500, 4500, 4000, 3750, 3850, 3560, F5 BIGIP LTMs-6900,Cisco ASA 5525 firewalls, Power Connect Switch 5548,Infoblox,MPLS,Multicast,Nexus-9k,7k,5k Palo Alto 5060,PCI,SOX,OTV,VPC,Nexus-FEX,IOS,IOS-XR,NX-OS,IPSEC,Frame Relay, OSPF, EIGRP, BGP, IS-IS, ASR 1k,9k,cryptography,L2&L3 VPN, Metro Ethernet,802.1Q.
Confidential
Network Support engineer
Responsibilities:
- Designed, installed, and maintained various WAN technologies and applications connecting remote sites to corporate headquarters.
- Configured, implemented, and troubleshoot routers and switches with various account settings, permissions, and parameters including security firewalls.
- Installed various network hardware including concentrators, bridges, and hubs to establish communication connections with remote locations.
- Configured and troubleshooting of EIGRP, OSPF, BGP, LACP
- Configuration of Standard and Extended ACLs for Security
- Technical assistance for LAN/WAN management and complex customer issues
- Troubleshoot the issues related to routing protocols
- Have hands on experience on Nexus 9k,7k,5k/ACI network in Datacenter
- Managing, troubleshooting and monitoring the network using Network Monitoring tool
- Network Security implementation with Cisco IOS Feature Set, NAT, and Simple Network Management Protocol
- Provided support for troubleshooting and resolving Customer reported issues
- Performed IOS upgrades on Catalyst 3550, 2950, 1900 switches, and 3600, 2600 and 2500 routers
- Provided support for global network including T1/T3, ATM connections using HDLC and Frame Relay on 2600, 4000 series Routers
- Installed wireless access points (WAP) at various locations in the company
- Configured multiple domain name services (DNS), email services (Exchange Server), web, and file transfer protocol services (FTP) for various platforms including line leasing through DHCP servers.
- Networking protocols worked with included but not limited to TCP/IP, DNS, WINS, DHCP, VPN, Terminal Services, Routing and Remote Access, Network Design, wiring and cabling.
- Performed hands-on administration, monitoring, and troubleshooting of Local Area network (LAN), resulting in optimum performance and minimum downtime.
- Created proactive procedures for problem preventions and resolutions, interfaced with software developers, analyzed issues, and designed solutions.
- Responsible for hardware and software applications for workstations, servers, and network data communications. Collaborated with executive management and department leaders to assess network capacity needs.
- Administered all local and remote server backups with VERITAS Backup Exec.
Environment: Cabling, OSPF, ASA, IP, DNS, IP addressing DHCP, VLAN, VTP, Confidential , HTTP, HTTPS, Access Control Lists, Standard and Exrended Access lists, Vmware
Confidential
Jr. Network Administrator
Responsibilities:
- Analysis of the specifications provided by the clients.
- Design and Development of the schemas and capacity planning.
- Document all database maintenance steps.
- Configured HSRP between VLANs, Configuring Ether-Channels, and Port Channel on 6500 catalyst
- Switches Replaced branch hardware with new 2851 routers and 2960 switches
- Implemented WLAN Aruba Wireless Access Points and its Controllers at various corporate sites fort
- 802.11n Infrastructure and its legacy technologies
- Experience in working with Cisco Nexus 5000 series switches for data center
- Configured OSPF on CISCO devices with multiple routing processes and redistributed them. Tested and hands on experience in multi area OSPF topologies
- Configured, managed and troubleshoot networks using routing protocols like RIP, EIGRP and OSPF (Single Area and Multi Area)
- Assisted with troubleshooting all network issues with routers and switches when necessary and consulted with on Call tech as needed for client
- Monitor, troubleshoot, test and resolve Frame Relay, ATM, MLPPP, PPP, and Dial-up
- Configured/Troubleshoot issues with the following types of routers Cisco (7200, 6500, 4500, 1700,
- 2600 and 3500 Series to include bridging, switching, routing, Ethernet, NAT, and DHCP
- Experience in supporting and troubleshooting network issues
- Management of network and providing support / L1
- Local Area Network hardware and software administration, design, installation and configuration
- Hands on experience in designing, implementation & troubleshooting various switching technologies
- Help Desk, end-user Local Area Network Hardware and Software support
- Backup Exec, Arc Serve network backup software
- DSL troubleshooting
- Experienced on taking back-up and Restoring of Cisco IOS and Configuration
- Troubleshooting queries related to CISCO, BELKIN and NETGEAR routers.
- Troubleshooting queries related to ROKU device.
- Hands on experience in designing, implementation & troubleshooting various switching technologies
Environment: Cabling, OSPF, ASA, IP, DNS, IP addressing DHCP, VLAN, VTP, Confidential , HTTP, HTTPS, Access Control Lists, Standard and Exrended Access lists, Vmware