Network Operations Specialist Resume
2.00/5 (Submit Your Rating)
SKILLS:
NetScaler, Infoblox, RHEL6, Active Directory, Service Now, Splunk, Riverbed, Gigamon, Palo Alto
WORK EXPERIENCE:
Network Operations Specialist
Confidential
Responsibilities:
- Engaged in change and configuration management planning of all commission application and network system changes as a member of the Change control Board (CCB), and conducted the requisite network security risk and vulnerability assessments.
- Lead in the development and documentation of network security policies and procedures regarding network administration, maintenance, and monitoring.
- Provided enterprise network voice and security guidance to information security analysts as part of the commission Assessment and Authorization (A &A) efforts.
- Performed network log reviews and established new baseline metrics and reporting for senior management to evaluate current security posture.
Senior IPT Engineer
Confidential
Responsibilities:
- Lead weekly NOC meetings for mentorship of junior operations staff as well as QA sessions for various US Courts staff, local and remote.
- Acted as a principle point of contact during district court site telephony migrations from legacy analog circuits to new ITSP SIP digital service for more than 60,000 users.
- Served as a tier 3 NOC escalation point for all critical, high and/ or VIP incidents, outages, or service requests, resolving within service level targets.
- Conducted high - level troubleshooting of incidents and outages via packet captures of end to end call flows, protocol/codec debugs and traces (SIP/H.323/MGCP) to provide a cumulative root cause analysis for management and executives.
- Monitored and provided detailed reporting on enterprise ITSP connectivity uptime, response times, and product quality on the Cisco IOS CUBE and Oracle/ACME Packet 3820 /3900 SBC platforms via Net-Net (OCOM) and Palladion (SDM).
Network Operations, Professional
Confidential
Responsibilities:
- Spearheaded the leveraging and provisioning of Red Hat 6 server and PostgreSQL databases for Jabber IM & Presence persistent-chat, managed file transfer functionality, and chat/voice message archival integration with 3rd party applications(Donoma, Smarsh) for enterprise compliance and legal services departments.
- Participated, and at times, lead in cooperative efforts to deploy the Cisco VCS Expressway-C/E, Telepresence (DX80, MX800, MX300 G2, SX10) video conference devices, and Jabber endpoints for enterprise BYOD mobile and remote access (iPhone/iPad/Android).
- Provided technical guidance junior engineers and updates to management and senior project management staff regarding the voice project status, schedule and user acceptance testing (UAT).
- Championed and fostered new relationships with other non-IT leadership in the internal business community to develop and streamline network voice usage and FAQ documentation to boost achievement of business goals.
- Developed voice standard operational procedures (SOP), training decks, and Visio design documents for support staff, and management.
UC/Network Engineer
Confidential
Responsibilities:
- Engaged regularly in design meetings, contributing to implementation plans for the new on premise Cisco VoIP solution(CUCM, Unity Connection, UCCX, and IM & Presence) version 10.5, and 3rd party applications (RedSky E911 Manager, Donoma Voicemail/IM archiving for Jabber clients, and Infortel Select CDR reporting).
- Upgraded Cisco VoIP solution (CUCM, Unity Connection, UCCX, and IM & Presence) from version 10.5 to 11.5.
- Implemented CUBE configuration and CPE to ITSP SIP trunking, on Cisco ASR 1002 devices for new branch site telephony migrations from legacy analog circuits to new ITSP SIP digital service for more 10,000 users.
- Took ownership of all telephony inventory, and dial plan architecture, performing administrative voice MACD’s when coverage warranted.
- Assisted with actual build out of new on premise UCS environment consisting of B200 series blade servers, 6248 fabric interconnects, and Nexus 5/7k switches.
- Delivered configuration to new 4K series ISR and 300 series analog voice gateway devices.
- Integrated and supported IPC Turret phones (IQ/MAX Touch), collaborating with stock trader platform vendor (IPC) to provide escalations and reporting on overall performance and operations.
- Configured and supported Blue Coat explicit and transparent proxies.
- Administered F5 Big-IP LTM to resolve network application access issues.
- Analyzed voice network for degradation, loss, and root cause analysis using RTMT and Wireshark.
- Gave resolution to trouble tickets and service request along with planning and executing controlled changes within SERVICE NOW platform.
Unified Communications Engineer
Confidential
Responsibilities:
- Planned, deployed, and administered new Cisco suite (CUCM, UCCX, Unity Connection, and Presence) version 9.1, CUCME, 3900 series gateways (H.323, MGCP, SIP), and user endpoints (7900 and 8800 series).
- Contributed to the deployment enterprise edition of Lync server 2013.
- Deployed and administered XMedius Fax server in two cluster environment of roughly 7,500 users.
- Monitored call system health via Solar Winds and RTMT.
- Advised executive staff members on VoIP tools to increase the ease of management communication, and reporting of enterprise voice solution.
- Performed end-user training on voice applications and devices for various departmental staff.
Network Operations Engineer
Confidential
Responsibilities:
- Lead server-side voice implementations (CUCM v8.5, UCCX, CER, CME, and Unity Connection).
- Managed Cisco IOS (2900, 3500, ASA 5505), Juniper (SRX100, EX2200 series), and FortiGate (60C) devices, performing installs, MACD’s, and monitoring.
- Served as first NOC escalation for voice circuit faults, and root cause analysis.
Operations Analyst
Confidential
Responsibilities:
- Provided tier 1 support with voice applications and IP phones (7940/60/70 phones, CIPC, and Jabber).
- Executed CUCM bulk VoIP configurations using the BAT tool and MS Excel for new site turn-ups.
- Monitored network performance and threats using EMC Smarts, Nagios and Trustwave SIEM Consoles.