We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

2.00/5 (Submit Your Rating)

Il

SUMMARY:

  • CCNP and CCNA certified with over 6 years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and testing of networking system on both Cisco and Juniper Networks.
  • Experience with the escalation problems & point - of-contact for Routing, Switching and WAN connectivity issues using ticketing system Remedy.
  • Technical responsibilities included, but were not limited to system performance and troubleshooting virtual and physical environments of various LAN/WAN technologies, server and enterprise applications and desktop technologies.
  • Strong hands-on experience on Palo Alto (5060, 3060), Checkpoint Firewall R77, juniper and Cisco ASA 5585 firewall.
  • Working on Load balancer F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Worked extensively on Service now. Created all the changes and incidents for the RBAC implementation.
  • Worked on Cisco 7200, 3800, 3600, 2900, 2800, 2600, 1800 series Router and Cisco 2900, 3500, 4500, 5500, 6500 series switch.
  • Proficient hands on experience in configuration Cisco Catalyst 2900, 2960, 3560, 3750, 4500, 4900, 6500 series switches, troubleshooting and monitoring Cisco PIX ASA Firewalls, Routers and Palo Alto Firewalls.
  • Designed and configured the commands for QoS and Access lists for Nexus 9K, 7K and 5K.
  • Experience of routing protocols like EIGRP, OSPF, RIP, and BGP and setup of Access-Lists, and RIP, EIGRP, and tunnel installations.
  • Extensively worked on different flow feeds like Cisco Netflow and Juniper Jflow.
  • Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.
  • Installed and configured Meraki (MS250, MS210) and MR84, MR250.
  • Hands-on expertise with routers 2600, 2900, 3600, 3900, 7200, 7600, ASR-901, ASR-903, ASR 5500, ASR-9010 and Juniper ACX, E, M, MX960 series.
  • Migration of firewall rules from Cisco ASA, Checkpoint to Palo Alto firewalls using migration tool from PAN.
  • Experience in monitoring and analyzing the load balancing of network traffic using Wireshark and Solar Winds, NMAP, Ethereal, Turin Secure Track and Splunk.
  • Experience in physical infrastructure like structured cabling, IP address management, Racking, Stacking, UCS management Experience in F5, Cisco ACE 4710 Load balancers.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.
  • Managed entire RBAC project as a project lead by conducting daily status meetings. Interviewing RTMs and assigning the application to the Business analysts. Ability to be flexible and adapt to any given situation.
  • Well experienced in configuring gateway redundancy protocols like HSRP, GLBP, and VRRP.
  • Sound knowledge in CISCO firewalls, CISCO PIX, ASA 5500 series and CISCO ASA as well as encryption techniques.
  • Working extensively on Data Center Palo Alto firewalls and F5 BIG-IP LTM.
  • Worked with Cisco Nexus, Catalyst and Aruba wireless devices
  • Worked with SCCM and MDT to create Packages, Advertisements, Collections, and deploy the application on Windows 7 Environment.
  • Designing and implementing F5 BIG-IP load balancer and MPLS/VPN service for various customers.
  • Experience with the implementation of multicast/MPLS/l2vpn.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
  • Deployed applications using SCCM and MDT by creating the application profiles using both Task sequence and Microsoft Build Manager.
  • Ability to deliver Role Based Access Models (RBAC), entitlement review and certifications process.
  • Experience in physical cabling, IP addressing and Subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Experience Palo Alto, Network Security, Juniper Firewalls, SSL VPN, Checkpoint, RSA, Cisco Nexus, Cisco ACE, Cisco Wireless.
  • Experience with firewall Administration, Rule Analysis and Rule Modification.
  • Strong knowledge on migration of DDoS attacks, IPsec & SSL implementation on Cisco and Palo Alto firewalls.
  • Experience Configuring Virtual Device Context in Nexus 7k, 5k and 2k.
  • Access control server configuration for RADIUS & TACAS+.
  • Expertise with 802.11x wireless technology.
  • Creating SCCM build document and SCCM Client migration document for DSM SCCM Environment.
  • Experience in configuring and Troubleshooting BIG-IP F-5 load balancer LTM.
  • Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.
  • Provided infrastructure and design guidance for setting up and maintaining SCCM 2012 environments.
  • Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (2232, 2248)
  • Configured RIP, OSPF and Static routing on Juniper M and MX series Routers.
  • Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
  • Good Knowledge on Juniper SRX configurations on various platforms of Junos.
  • Installed and configured firewalls, IPS, IPSec, VPNs and various screens for intrusion prevention on Juniper SRX equipment.
  • Working with High performance data center switch like Nexus 7000 series.
  • Initialize familiarization with the management of Palo Alto Next Generation Firewalls as well as F5 load balancers.
  • Installed checkpoint and F5 load balancers in Vmware workstation and Vsphere.
  • Responsible for check point and Cisco ASA firewall administration across global networks.
  • Experience with Windows Server patching solutions like SCCM
  • Juniper hardware support of MX960e, MX480e, M10, M120, M320, T1600, T640, and Tellabs 8860.
  • Managed Datacenter of F5 load balancers, Cisco 4500, Juniper M120 and Extreme switches
  • Support for Juniper M120 & J series, Cisco 3745, 6500, Extreme Summit, GPRS CGSN, and Memotec switch.
  • P rovided Risk Assessment and remediation guidance for SCCM infrastructures.
  • Devised and Implemented procedures for configuration and management of up to 400 Juniper Ex3300 access switches, including planning and development of a standard configuration template.
  • Upgrade network equipment, software and hardware components and system configuration.
  • Maintain technical detailed documentation of LAN and WAN systems and applications.
  • Deployed and maintained IS-IS on Cisco and Juniper routers.
  • Supported clients with establishing high availability applications with load distribution by F5 Big- IP LTM/GTM.
  • Experience in Administering and Maintaining SCCM 2007/2012/CB 1702/CB 1706/CB 1710 infrastructure.
  • Expertise on Cisco IOS, Cisco IOS-XR, Cisco CatOS, Cisco NX-OS, JUNOS.
  • Experience in installation and analysis for a broad range of LAN/WAN/MAN communication systems.
  • Good troubleshooting skills in TCP/IP networks along with protocols like BGP and OSPF.
  • Extensive exposure in OpenStack Command Line interface to create instances, images, volumes, flavors, containers and tenants.
  • Expertise with monitoring tools like Solar Winds & network packet capture tools like Wire-shark

TECHNICAL SKILLS:

Operating Systems: Microsoft Windows 2003, 2000, NT 4.0 Server, Windows XP, 2000, NT 4.0 /95/98, IIS Server, SQL 2000 Server, DHCP, DNS, WINS Server, Microsoft Exchange 5.5.

NAS/SAN: Dell/EMC Powervault 770N.

Network Management: Cisco works 2000, SMS 2003, SMS 2.0, Fluke Optiview, Microsoft SMS and User Manager 32, Cisco Works LMS 3.1, Netflow Analyzer, Cisco Security Manager(CSM)

Scanner tools: Harris Stat Vulnerability Scanner, ISS Internet Scanner.

Intrusion Detection Tools: Real Secure IDS (versions 7.0, 6.5, 6.0), Cisco IPS/IDS, CS-MARS

Web monitoring: Web Sense, Surf Control and St.Bernard Iprism

Access Control: ACS server, Access control lists, and filters.

Firewalls: Cisco PIX firewall (525,520,515,501, 506), ASA 5510

VPN: Cisco PIX.

Application Networking: Cisco Content Services Switch(CSS), Local Director, Distributed Director

Protocols: Routing Protocols: OSPF, RIP, IGRP, EIGRP and BGP

VPN Protocols: AH, ESP, 3DES, DES, IKE, IPSEC, TACACS+, and RADIUS.

Layer 2 Protocols: VTP, Spanning tree, and VLAN.

Redundancy Protocols: HSRP, and VRRP.

Software applications: Microsoft Office, Visio, and Kiwi syslog tools, Citrix Metaframe Presentation Server 4.0, Octel Unified Messenger 4.0

Hardware: Cisco Routers (7200, 3640, 4000, 2500, 2600, 2800ISRs and 3800 ISRs), Cisco Catalyst Switches (8540, 6509, 5500, 4506, 4507, 2948, 3550, 2950, 5000, 2900XL), DELL 2650, 775N, 2450, 2550, 6300, 700 series servers. Dell Optiplex, Dimension, Precision, Latitude workstation systems.

PROFESSIONAL EXPERIENCE:

Confidential, IL.

Senior Network Engineer

  • Perform routine and emergency maintenance of all network related equipment, primarily routers, firewalls, LAN switches, CSU/DSU’s, etc.
  • Monitor, measure and report network availability, reliability and response time service levels.
  • Provide network capacity planning and testing for the LAN/WAN environments.
  • Design, install and troubleshoot IP based LANs/WANs and IP- based routing solutions. Implemented network with OSPF, BGP, EIGRP and RIP.
  • Initialize familiarization with the management of Palo Alto Next Generation Firewalls as well as F5 load balancers.
  • Administered security and NAT policies, fulfilling project requirements on Palo Alto 3050 & 5050 next-generation firewalls using PAN-OS 6.1. Set up VLANs and access ports connecting virtual machines using the NX-OS CLI on a Cisco Nexus 1000v virtual machine and VMWare vSphere Client networking.
  • Design, install and troubleshoot security systems, including firewall (NAT, port filtering/forwarding, web proxy), content management (DNS and IP based solutions), VPN (site to site, remote access) and IDS.
  • Develop and recommend strategies for network growth, security, and enhancements by maximizing functionality of network equipment such as routers, switches, firewalls, etc.
  • Interface with vendors and suppliers to ensure adequate delivery and maintenance of equipment and services.
  • Working extensively with Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches
  • Initialize familiarization with the management of Palo Alto Next Generation Firewalls as well as F5 load balancers.
  • Switches Nexus 2K/5K/7K, 9K. Cisco Catalyst 2900, 3500, 3700, 6500, 4500, 3850, 3560, 3750, 2960, Meraki MS-350
  • Responsible for Cisco ASA firewall administration across our global networks.
  • Maintain library of associated materials for all equipment, processes, and procedures, including network diagrams, device configurations, network topology information, etc.
  • Introduced Network Redundancy in the whole Carey Network to completely remove Single Point of Failures to coincide with Mission Critical Application Centralization
  • Actively involved in switching technology Administration including creating and managing VLANS, Port security - 802.1x, Trunking 802.1Q, RPVST+, Inter-VLAN routing, and LAN security on Cisco Catalyst Switches 4507R+E, 6509-E and Cisco Nexus Switches 2232, 5596, 7009.
  • Migrated Frame-Relay WAN to MPLS IPFR network and designed and implemented QoS to provide efficiency for centralized applications, migrated routing protocol from EIGRP to BGP
  • Implemented various management and monitoring tools like NetFlow Analyzer, Cisco Works to monitor network traffic and took appropriate steps for better usage of resources
  • Supported clients with establishing high availability applications with load distribution by F5 Big- IP LTM/GTM.
  • Experience with Checkpoint Firewall policy provisioning and modification of Palo Alto PA-500, PA-2k, PA-3k, and PA-5 k.
  • Upgraded the software images of all Cisco network devices to include routers, switches and ASA firewalls.
  • Provided fault isolation and rootcause analysis for threat related issues.
  • Working on migrating AIX to RedHat Linux 6 and 7.
  • Administer OpenStack networking environment and supporting hardware switches and firewalls.
  • Extensive experience in configuring Layers routing and layer2/3 switching of Cisco based nexus 7K,5K,2K& 800lSR series Switches & routers.
  • Configure Juniper SSL VPN and Cisco IPSEC
  • Implemented Cisco Content Services Switch for providing High Availability to all business applications
  • Designed and implemented an automated VPN failover for remote sites
  • Configured load balancing on F5 and Cisco ACE load balancers to allow traffic going to the Bluecoat proxies to be optimized and load balanced.
  • Administered security and NAT policies, fulfilling project requirements on Palo Alto 3050 & 5050 next-generation firewalls using PAN-OS 6.1. Set up VLANs and access ports connecting virtual machines using the NX-OS CLI on a Cisco Nexus 1000v virtual machine and VMWare vSphere Client networking.
  • Deployed and maintained routing protocols such as OSPF, EIGRP, BGP, GRE, MPLS/VPN, HSRP and static routes on Cisco routers and switches and Juniper routers
  • Implemented fail-free VPN for remote access for users and integrated with Cisco ACS and LDAP
  • Implemented Wireless WAN backup for all remote sites to account for multiple failures over WAN
  • Implemented Cisco IPS/IDS, NAC(Network Access Control), CS-MARS, CSM and CSA
  • Managed all network and devices to include Cisco routers, switches, VPNs, SSL, Check Point, Cisco PIX, Cisco ASA, Cisco FWSM as well as content delivery networks (CSS, Citrix Netscaler and F5 BigIP LTM and GTM 1600 and 3400 load balancers) enterprise environment.
  • Good experience and knowledge of Cisco Routers, Switches and load balancers- Cisco CRS12K, ASR9K/1K, ISR3925e, 2951, 6880 Series, Nexus9k/7k/5k/2k, VPC/vDC, Cisco 7600 Series, Cisco 6500 Series, cisco 4500 series, 3650, 3750 series, 2960 series and F5, and Juniper MX960.
  • Designing, Implementing LAN/WAN configurations on Cisco Nexus 9k, 7k, 5k, Catalyst 6500 switch.
  • Implemented Cisco ACE for better application availability and performance improvement
  • Currently working on getting the network certified for PCI for data in motion and rest
  • Worked on Juniper MX240 and MX480.
  • Documented and Analyzed log of Cisco PIX series firewall.

Confidential, TX

Senior Network Engineer

  • Manage network security including PIX firewalls, IDS, VPN, and web monitoring.
  • Oversee VPN security and ensure that security requirements are met by configuring the Cisco PIX for VPN Remote access and site-to-site VPN tunnels using 3DES and either MD5 or SHA.
  • Coordinate with NAVCIRT to resolve security-related incidents.
  • Configure, maintain, troubleshoot and provide solutions for load balancing on F5, ACE, and CSM load balancers.
  • Configured routes on Palo Alto firewalls 3060, 5060, 7050.
  • SolarWinds Network Performance Monitor, Network Configuration Manager, Network Traffic Analyzer (NetFlow) and IP Address Manager.
  • Monitor operation and performance of OpenStack clouds to proactively identify maintenance issues.
  • Monitoring LAN/WAN network environments including routers, switches, Security Appliances, and software applications.
  • Worked on ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • Deploying of VLANs, port and IP allocations and planning on ASR Mk, Nexus '9k, 7k, 5k, Mk and its downstream devices.
  • Configured EIGRP, RIP, OSPF and Static routing on Juniper M and MX series Routers for Lab Environment.
  • Ensure that workstations meet DoD Security standards and DITSCAP requirements using the Real Secure ISS scanner and Harris Stat Scanner to run scans based on DoD requirements.
  • Configure Cisco 3750G/3620 perimeter router access lists; configure and maintain Cisco 3620, 4000 and 2500 series routers, Cisco Catalyst 5500, 2950, 3750, 6509 Switches; Access Server AS 5300; perform LAN/WAN troubleshooting; and monitor the network using Cisco Works and Network Monitor.
  • Implement and administer SMS for the entire NMRC site, Windows NOS administration and troubleshooting, and assist in disaster recovery planning.
  • Experience with enterprise-class security products such as web proxy, reverse proxy, load balancing, IDS/IPS, DLP, Firewall, IPsec/SSL VPN, WAN/LAN, wireless and remote connectivity.
  • Maintain Intranet and Internet for NMRC
  • Evaluate existing QoS configurations across all Cisco platforms, Catalyst and Nexus, and provide recommendations to improve performance and consistency in the delivery of latency sensitive applications: voice, video, critical applications
  • Have configured ACI for remote Authentication in the respective organization, manage project task to migrate from Cisco ASA firewalls to Checkpoint firewalls.
  • Design and Implement Backup Strategy for NMRC NAS and other servers using Veritas Backup Exec 9.1
  • Manage Exchange Server 5.5 and Octel Unified Messenger Server for Voice Mail
  • Design and Implement Remote Access using Citrix Metaframe Presentation Server 4.0
  • Experience Palo Alto, Network Security, Juniper Firewalls, SSL VPN, Checkpoint, RSA, Cisco Nexus, Cisco ACE, Cisco Wireless.
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Doing Prep Work for migration to Active Directory for NMRC
  • NMRC/WRAIR LAN Re-Design: Upgrading the network from a central core design to a collapsed core network allowing for a 10GB backbone and replacing the existing CAT 8540 switches with highly redundant 6500 series switches.
  • Responsible for the administration and support of Cisco ACE and CSS load balancers.
  • Replacing the 5500 access layer switches with GB/VoIP capable 4506 series switches.
  • Planning for the future implementation of Cisco VoIP.
  • Implementing OSPF as the routing protocol of choice and
  • Implementing VRRP as the standby protocol replacing HSRP.
  • Worked on Checkpoint Platform including Provider Smart Domain Manager. Worked on configuring, managing supporting Checkpoint Gateways.
  • Good knowledge on Riverbed Virtual Services Platform (VSP) and Big-IP F5 Load balancers.
  • Redesigning the VLAN architecture to make better use of the IP address space.

Confidential, Columbia, MD

Network Engineer

  • Monitor, evaluate & report on health of both Wide & Local Area (WAN/LAN) Networks.
  • Implementing and troubleshooting WAN technologies like Frame - Relay, PPP, ATM, ISDN, T1, DS3, OC3 and SDLC
  • Configured VPN to allow remote users access to corporate network. Configured Client VPN technologies including Cisco’s VPN client via IPSEC.
  • Implement changes on switches, routers, load balancer (F5 and CSS), firewalls, wireless devices per engineer’s instructions and troubleshooting any related issues.
  • Has done the Configuration on BIG IP (F5) Load balancers and monitored the Packet Flow in the load balancers.
  • Worked with Palo Alto firewalls PA3060, PA5060 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.
  • Designed, configured, and implemented distribution and access layers network infrastructure for a new building using Cisco Nexus 7009s and using VPCs to floor switches (Catalyst 4510s)
  • Configured and maintained Switches & Routers
  • Optimized performance of the WAN network consisting of Cisco 4500/5500 switches by configuring VLAN’s for web traffic management and load balancing.
  • Implementing and troubleshooting firewall rules in Cisco ASA 5525, 5580, Checkpoint R77.20 Gaia and VSX as per the business requirements.
  • Working on different modules of Checkpoint Next Generation firewall R77.30 such as IPS.
  • Used F-5Load balancers to increase capacity (concurrent users) and reliability of applications.
  • Performed switching technology administration including VLANs, inter-VLAN routing, trunking, port aggregation & link negotiation. Enabled STP Enhancements to speed up the network convergence. Handled STP, VTP, VLAN related issues and tasks. Hands-on experience in Catalyst 2900, 1900 series switches.
  • Designed and Configuring the WAN infrastructure, consisting of multiple T1 and T3 lines, Cisco routers, Cisco switches, Load balancers, Dell and Sun servers.
  • Proficient with F5 LTM and Cisco CSM load balancer in-between the servers inside the server farm and DMZ. Dealt with F5 load balancing of web traffic and data center environment failover for HA servers.
  • Configured OSPF, BGP and EIGRP routing protocol.
  • Extensive experience on network cabling for both Fiber and UTP cabling for network building
  • Re-design of Internet connectivity infrastructure for meeting bandwidth requirements. This involved negotiating with ISPs, switching from T1 to Flexible T3 lines and configuring/replacing existing Cisco 1605 series routers with Cisco 3640 routers.
  • Re-engineered BGP routing (Route Maps, AS-Path prepend, MED, Local Preference) to load balance traffic across multiple ISP links.
  • Configured and deployed various Cisco routers, Cisco Nexus Switches and Cisco ASA firewalls in the data center environment.
  • Implemented load balancing between Cisco L3 switch by HSRP and GLBP.
  • Worked with customers to define, plan and execute technology solutions that are specific to their needs. Deployment and configuration of F5 BIG IP load balancer (LTM, GTM, ASM, and APM Modules).
  • Financial Management during the project to ensure timely use of project budget.
  • To interact with Global account managers, technical presale team to understand the solutions which has been offered to our global customers and deliver the solution.
  • Install and configure the Cisco routers for MPLS (IP VPN QoS), internet and Ethernet private lines.
  • Assist in configuring routing protocol: Static routes, RIP, IGRP, EIGRP, OSPF, and BGP.
  • Integrate Avaya setup.
  • Primary responsibility is to design and deploy various network security & High Availability products like Checkpoint, Cisco ASA other security products
  • Experience with enterprise-class security products such as web proxy, reverse proxy, load balancing, IDS/IPS, DLP, Firewall, IPsec/SSL VPN, WAN/LAN, wireless and remote connectivity.

Confidential

Jr. Network Engineer

  • Provided Level 1 Support for Broadband Connection to Virgin Media customer
  • Worked As a Technical Support Executive under Virgin Media.
  • Received inbound calls of technical nature, independently resolved customer complaints, concerns and inquiries regarding their Internet connection.
  • Managed LAN and Wireless Network and performed troubleshooting On LAN, WLAN, Customer Modems (NTL 250, TERAYON, and MOTOROLA) And CPE Router (Cisco-Linksys, Belkin, D-LINK and Dynamode).
  • Set up Home Network and provided troubleshooting and full support on virgin- media security Software (PC-guard).
  • Troubleshoot a wide range of technical support issues and connectivity problems such as authentication, connection speed, e-mail configuration, and loss of synchronization.
  • IOS upgrades on catalyst series switches like 2900, 3560, 3750.
  • Troubleshoot TCP/IP problems and connectivity issues in multi-protocol Ethernet environment.
  • Implemented trunking protocols like 802.1q on 3750 switches.
  • Configured ACLs to provide accessibility and restrict unauthorized users.
  • Involved in maintaining STP, RSTP and PVST+ for the catalyst switches I worked on.
  • Configured and maintained RIP, OSPF and routing protocols on 2600 and 3600 series Cisco routers.
  • Maintaining and troubleshooting of connectivity problems using Ping, Traceroute.
  • Assisted in racking and stacking.
  • Technical assistance for LAN/WAN management and customer issues.
  • Other responsibilities also included documentation.

We'd love your feedback!