Network Engineer Resume
3.00/5 (Submit Your Rating)
SUMMARY
- IT Professional with over 6 years of experience in implementation/deployments, administration/service requests, Tier 2/3 escalation support/ticket resolution, change management, analysis, and troubleshooting various network technologies which includes proficiency in routing, routing protocols, switching, security, firewalls, load balancers, wireless and data center technologies.
TECHNICAL SKILLS
- Routing/Switching Technologies: Cisco Routers ASRs/ISRs, Cisco Catalyst/Nexus, Juniper, H3C and HP Routers & Switches, WAN, LAN, TCP/IP, Cisco IOS, Spanning Tree Protocol, BPDU, CDP, ACL, NAT, PAT, RIP, RIPv2, OSPF, OSPFv3, EIGRP, BGP, MPLS, VTP, SNMP, SMTP, ARP, TCP, UDP, Static Routing, Stub Routing, VLAN Trunking, VXLANs, Multicast routing, HSRP, SVI, CEF, Etherchannel, Portfast, VSS, VPC.
- Security/Firewalls Technologies: Cisco Security Manager Suite, Cisco ASA 5500 series firewalls, Cisco IPS/IDS, Cisco ACS, Cisco ASA 1000V cloud firewall, Juniper SRX series, Palo Alto, AAA, TACACS+, RADIUS, SSH, VPN, IPSec, SSL/IPSec, Data Loss Prevention, Data Management Zone, Internet Key Exchange Policy, Port Security, MAC Address Filtering.
- Wireless/Voice Technologies: Cisco WLC, IEEE 802.1x & 802.11, WLAN, WAP, AP, SSID, Avaya, AURA - Voice Over Internet Protocol (VoIP), VoIP/SIP, CUCM, RSTP, STP, Quality of Service (QoS), PoE
- Monitoring/Data Center Technologies/APPS; Wireshark, Netcool, Remedy, Cacti, Nagios, Solarwinds, Spectrum, Cisco Security Manager Suite, Server, Sniffer, Ethereal, F5 Big-IP LB (GTM/LTM), Cisco AnyConnect VPN mtg, Cisco Prime, Cisco IPS/IDS, SNMPv2c, SNMPv3, DNS, DHCP, FTP, Telnet, HTTP(S), SMTP, tunneling protocols, SFTP, RDP.:
- Other Technologies/Compliances; ASP.NET, C, HTML/CSS, SQL, MySQL.:
PROFESSIONAL EXPERIENCE
Confidential
Network Engineer
Responsibilities:
- Member of ITSOC Tier 3 team responsible for administration/service requests, escalation support/ticket resolution in an enterprise LAN/WAN environment for datacenters, corporate, and branch offices.
- Configuration, troubleshooting and update firewalls policies including Cisco ASA, Juniper SRX, Netscreen and Palo Alto.
- Build DMZ for F5 load balancer, build virtual server (VIP), pool, pool members, and add iRules and SSL certificates.
- Build and modify/edit Web/SSL VPN, Cisco AnyConnect, VPN site-to-site, adding users to Active Directories.
- Troubleshooting BGP, OSPF, HSRP, VRF, MPLS, MP-BGP, GRE tunnels, layer 2 & 3 VPN MPLS.
- Troubleshooting layer 2, tracking down devices using VLan, ARP and mac-address.
- Monitor and troubleshoot Versa SDWAN.
- Escalating tickets to the right team.
Confidential
Network Engineer
Responsibilities:
- Member of IT Service Operation Center ITSOC Tier 3 team responsible for administration/service requests, escalation support/ticket resolution in an enterprise LAN/WAN environment for datacenters, corporate, and branch offices.
- Configuration, troubleshooting and update firewalls policies including Cisco ASA, Juniper SRX, Netscreen and Palo Alto.
- Build DMZ for F5 load balancer, build virtual server (VIP), pool, pool members, and add iRules and SSL certificates.
- Build and modify/edit Web/SSL VPN, Cisco AnyConnect, VPN site-to-site, adding users to Active Directories.
- Troubleshooting BGP, OSPF, HSRP, VRF, MPLS, MP-BGP, GRE tunnels, layer 2 & 3 VPN MPLS.
- Monitor and troubleshoot when devices are down; make configuration changes to Cisco ASR/ISR.
Network Engineer
Confidential
Responsibilities:
- Member of a team of professionals responsible for administration/service requests, escalation support/ticket resolution in an enterprise LAN/WAN environment for datacenters, corporate, WAN links, and branch offices.
- Specific Technologies handled include but not limited to Cisco ISRs/ASRs; Cisco Catalyst/Nexus Switches Cisco ASAs; Juniper EXs; F5 Big-IP Version 11.6.0; Cisco Unified Communications Manager Express Version; Cisco Unity Express Versions; Cisco Wireless LAN Controller; Cisco Aironet 11x Access Points; Palo Alto (PAN) Firewalls, Nagios, Solar Winds Orion, Cacti, and Wireshark.
- Technologies in network environment include but not limited to routers, switches, security firewalls, voice, wireless and related technologies along with various server/application administration, system reimaging, and remote setup.
- Member of a team of professionals responsible for administration/service requests, escalation support/ticket resolution in an enterprise LAN/WAN environment for datacenters, corporate, WAN links, and branch locations.
- Technologies in network environment include but not limited to routers, switches, security firewalls, voice, wireless and related technologies along with various server/application administration, system reimaging, and remote setup.
- Implemented trunk ports to control VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets that can extend further across the network infrastructure than previous generation of switches.
- Implemented port-profiles as part of the NX-OS command structure that allows for configuration of multiple ports and port-types via inherited configurations applied to reduce errors and allows for better configuration readability.
- Implement a virtual version of Nexus1000v into VMWare to extend Nexus capabilities directly adjacent to virtual machines so that they benefit from Cisco switching capabilities and network topology consistency ensuring VMs maintain their subnet/VLAN relationships during failover.
- Implemented secure privileged administrative access to the Cisco IOS system. Enabled the encryption of system passwords to prevent unauthorized users access to passwords in the system configuration.
- Implement secure access to the console and vty ports, and set the interval that the EXEC command interpreter waits until user input is detected on the Console and vty ports. Also, configure the console and vty ports log messaging to not interfere with active device configuration.
- Implement VLAN Trunking Protocol to reduce administrative overhead. Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switchports following Layer 2 security best practices.
- Create and manage Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trunking using PAgP for layer 2 forwarding. Utilize VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays. Modify spanning-tree parameters for manual root bridge assignment. Implement ether-channels between each switch using PAgP for negotiation. Modify ether-channel load balancing method.
- Implement WAN links between sites using frame-relay point-to-point and multipoint connections to establish connectivity between each of the four sites as required. Establish frame-relay point-to-point connections three of the sites creating a full mesh. Implement hub and spoke network between three of the sites with the main office as the hub for redundant connections.