We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

5.00/5 (Submit Your Rating)

CA

SUMMARY

  • Experienced, collaborative - minded and enthusiastic Network Engineer professional with 7+ years of technical and organizational experience in network engineering, network administration, customer service and logistics management.
  • I readily accept new responsibilities and maintain a focus on customer satisfaction while fostering a collaborative productive environment in a continually changing and growing industry.
  • Looking for challenging duties in an expert environment that makes use of my analytical, problem-solving abilities, expertise and specialized information, for the mutual development of my career and the business.
  • Design, Build, and Implement various solutions on Check Point Firewalls, Blue Coat Proxies, F5 Load balancers and F5 Global Traffic Managers.
  • Design Build and implemented various solutions on F5 LTMs and GTMs.
  • Designed 10 gigabit networks using Confidential Nexus 7000 series switches, Checkpoint NGX.
  • Strong hands on experience on PIX Firewalls, Palo Alto, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Experience configuring and troubleshooting on Citrix NetScalar Load Balancer.
  • Designed and architected a global MPLS Network for network stability.
  • Provide technical assistance to Fortinet’s wireless infrastructure products.
  • Experience in configuring F5 objects, components and provisioning various modules like LTM. GTM, ASM, APM.
  • Understanding the JUNOS platform and worked with IOS upgrade of Juniper devices.
  • Hands-on experience in configuration of Confidential NEXUS Datacenter infrastructure with 5000 and 7000 series switches (5548, 7010) including Confidential NEXUS Fabric Extender (2232, 2248).
  • Hands on experience in configuring and supporting site-to-site and remote access Confidential, IPsec, VPN solutions using ASA/PIX firewalls, Confidential, B2B VPN client in addition to providing TACACS+ and RADIUS services.
  • Hands on experience on VMware VSphere 6.5 which is the next generation infrastructure for next generation apps introduces features that elevates experience to an entirely new level.
  • Familiarity with network management tools such as Confidential Prime, CSM, Riverbed Profiler, Cacti, Confidential ISE & Panorama
  • Worked on JNCIS which Designed for experienced networking professionals with beginner to intermediate knowledge of routing and switching implementations in Junos
  • Experience in working with Confidential Nexus 9k, 7k, 5k, 2k Switches and Virtual Port Channel configuration.
  • Having strong experience in designing and deploying Zscaler environments.
  • Responsible for implementation of network architecture, designs, Audit and Automation for all DOCSIS teams
  • Perform Check point and PIX firewall/IDS design, integration and implementation for Cyber Trap client networks.
  • A deep technical understanding of Blue Coat Application Delivery Network technology pillars including Visibility, Acceleration, and Security solutions.
  • Configuring, maintaining and troubleshooting with Fortinet firewall and security.
  • Expert level of understanding and experienced in creating with IPSEC VPN(s) tunnels in multiple platforms (Virtual firewalls, Open source firewalls, Fortinet, Check point etc).
  • Design and deployment of MPLS QOS, MPLS Multicasting per company standards.
  • Troubleshoot and worked with security related issue of Confidential ASA/PIX, Checkpoint, IDS/IPS and Juniper Net-screen firewalls.
  • Handled tickets for troubleshooting Confidential Unity, Call Manager, F5/NetScaler load balancers, Routers, Switches, FortiGate Firewalls, Aruba wireless equipment as well as some server issues.
  • Experienced with Confidential CRS-X, CRS-3, CRS-1, ASR 9K, ASR 1K, 12K, 10K, 7500, 7200, 3900, and 3800 routers
  • Migrated from various vendors' routers, switches and firewalls in various parts of the network to Confidential equipment.
  • Deployed Confidential FireSight, ISE using certificate authority signed certs with pxGrid remediation module.
  • Worked on Extensively on Confidential Firewalls, ASA 5500(5510/5540) & Confidential PIX (506E/515E/525/) Series.
  • Automated the cloud deployments using Puppet, Python and AWS Cloud Formation Templates.

TECHNICAL SKILLS

Confidential Platforms: Nexus 7K, 5K, 2K, 1K

Confidential Routers: 1700,1800,2500,2600,2800,2900,3600,3800,3900,7200,7600

Confidential L2 & L3 Switches: 2900,3500,3560,3750,4500,4900,6500

LAN, WAN Technologies: VLAN, VTP, Inter-Vlan routing, Ethernet, Port-Channel, STP, RSTP, PVST, 802.1x, Frame Relay, ISDN, PPP, ATM, MPLS, Leased lines, HDLC,VSS, CEF and DCEF.

Network Security: NAT/PAT, VPN, Filtering, IDS/IPS, IPsec, ACL, GRE Tunneling, Remote Access VPN, Site-to-Site VPN, ASA 5505, AIP SSM, CSC SSM, FWSM, FortiGate, Juniper Net Screen firewall, Palo Alto Firewalls, Windows Patch Management (WSUS), CDP, Confidential ACS

Infrastructure Services: DHCP, DNS, SMTP, MIBs, Syslog, POP3, FTP, TFTP

IP Telephony: VOIP, FXO/FXS/E&M/T1/ISDN/PRI, Call manager Express

Network Management: SNMP, SSH, Telnet, ICMP

Network Tools: Solar Winds, E-flow, SNMP, Confidential Works, Wireshark, TIRKS, LIMS

Languages/ Tools: Python, Linux Red Hat

Protocols: RIP, RIP2, PPP, OSPF, EIGRP, IS-IS, BGP, SNMP, HTTP, FTP, TFTP, HTTP, DHCP, SMTP, ICMP

Protocol Analyzers: OPNET, Wireshark.

Comm. Protocols: Wi-Fi, WiMax, CDMA, 3G

Wireless Managed Networks: Confidential Meraki, Aruba

Load Balancers: Confidential CSM, F5 Networks (Big-IP),F5 ASM,F5 LTM

Firewall: ASA, PIX, SRX, Watch guard, ASDM, CSM, Checkpoint

Cloud Technologies: Amazon Web services, Microsoft Azure

Operating Systems: Windows Vista/XP/NT/2003, Windows (98, ME, 2000, XP, Vista, Windows 7, 8.1), MS DOS, UNIX, Linux

AAA Architecture: TACACS+, RADIUS, Confidential ACS

Servers: Domain servers, DNS servers, WINS servers, Mail Servers, Proxy Servers, Print Servers, Application servers, FTP Servers

Monitoring Tools: Wireshark, Fiddler, Microsoft Network Monitor, solar winds and some sniffers

PROFESSIONAL EXPERIENCE

Confidential, CA

Sr. Network Engineer

Responsibilities:

  • Design, implementation and operational support of routing/switching protocols in complex environments including IS-IS, BGP, OSPF, EIGRP, Spanning Tree
  • Worked with security products such as Confidential ISE
  • Write LLDs for various IP/MPLS projects implementations. (IP planning, configuration scripts, roll-back procedures etc.)
  • Creating MPLS connections to customers and other data centers.
  • In charge of their Network infrastructure, and end user support. Trouble shoot network issues/problems (TCP/IP, Ethernet),
  • Configured Multi-Layer Switches with VLAN’s, STP, VTP and Port Security
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9k, 7K, 5K and its downstream devices.
  • Experience working with Confidential Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.
  • Configuration of FortiGate (Fortinet) 3600 and 3800 series firewalls.
  • Worked on WAF for filtering/blocking data packets.
  • Worked on Confidential Prime for Increasing operational efficiency through automated network discovery, configuration and change management.
  • Lowering integration costs through pre-integration with Confidential Prime Carrier Management suite and northbound interfaces to third party applications
  • Hands on experience on JNCIP which is Designed for experienced networking professionals with advanced knowledge of the Juniper Networks Junos OS
  • Demonstrated experience with VMware vSphere, vRealize Automation and Operations, VMware NSX products and technologies.
  • Configuring and managing F5 ASM (Application security manager). Develop security policies.
  • Provided technical assistance for LAN/WAN management & troubleshooting and complex customer issues using Network monitoring tools such as Solar winds.
  • Used VMware 6.5 for providing powerful, flexible and secure foundation for business.
  • Implementing security Solutions using Palo Alto PA 5000, Check Point Firewalls R75, R77.20 Gaia and Provider-1/MDM.
  • Handled Company's Confidential Umbrella and AMP infrastructure as well as PAM/IAM authentication and SIEM logging systems.
  • Hands on experience with deployment, design, and architecture, of Symantec's Bluecoat proxy products.
  • Handled all the Firewall Migrations from Confidential ASA to Fortinet on a Global Scale.
  • Creation of Firewall policies as per the requirements on Check point, ASA, FWSM, and Juniper Firewalls.
  • Proactively developed and delivered notifications of new Zscaler products and technologies to premium support customers.
  • Extensive hands on experience with Checkpoint R80.10/Palo Alto/ Confidential ASA.
  • Staging, installing and upgrading from Check Point R77.20 to Check Point R80.10 GAiA to next generation 23500 appliances.
  • Implemented Confidential 5500-X Firepower and Confidential Sourcefire IPS & FireEye.
  • Managed, escalated and derived satisfactory resolutions of customers technical support, services and infrastructure issues on Zscaler products and technologies.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Dealing with Change Requests and making the required customization changes as per the requirement.
  • Worked with RFC Service Management and Monitoring System and Remedy IT Service Management.
  • Administrated and maintained Fortinet FortiGate Firewalls, Forti Analyzer and Forti Manager.
  • Established network latency and configured Traffic Engineering parameters as needed on trunk and access circuits, interfaces, LAGs and ports as needed.
  • Responsible for Confidential ASA firewall administration across our global networks.
  • Scheduled maintenance of Nexus (2248, 5548, and 7010) switches so that there are no Orphan ports in the network, and all Users to be dual homed, so that they have sufficient redundancy.
  • Configured ASA 5500 to ensure high-end security on the network with ACLs and Firewall
  • Responsible for managing activities, Upgrading IOS — Upgrading hardware and installing new devices, Tuning (Configuration), make standardization for the topology
  • Involved in configuring Juniper SSG-140, SRX-240, and Confidential ASA 5585.
  • Troubleshoots Different technologies problems involving to Confidential routers, Firewalls, APs, Switches, Fortinet and Meraki. Configured EIGRP, RIP, OSPF and Static routing on Juniper M and MX series Routers for Lab Environment.
  • Provided clear and constructive product feedback to Zscaler product management based on customer requirements
  • Worked on Juniper J series j230, M 320 routers and EX 3200 series switch.
  • Responsible in troubleshooting on Confidential ISE added new devices on network based on policies on ISE.
  • Daily support enabling customers to integrate application with multiple vendor platforms. Confidential, Checkpoint, Juniper, Palo Alto, F5, and Blue Coat.
  • Installed, Administrated, Upgraded, and Deployed the Blue Coat Proxy servers, content filtering, and policy including the BCAAA (Blue Coat Authentication Agent) Servers.
  • Deploy ISE technology in infrastructure to establish secure and authenticated network and ISE development with profiling and certificate-based authentication.
  • Proficient in Checkpoint, Confidential, Juniper, Lucent, Fortinet and Blue Coat technologies.

Environment: Confidential 3750/3550/3500/2960 switches, Confidential 3640/12000/ 7200/3845/3600/2800 routers, Confidential ASA5510, Checkpoint, Confidential Nexus 7K/5K, 2248/3560/5020/6509 , ASA, Checkpoint, LAN, OSPF, BGP, RIP, EIGRP.

Confidential, NC

Sr. Network Engineer

Responsibilities:

  • Designing, Implementing LAN/WAN configurations on Confidential Nexus 5k, Catalyst 6500 switch.
  • Configured Confidential routers for MPLS VPN connectivity and VRF tables on edge routers for customer usage of the MPLS network.
  • Designs and implements Audit solutions for the DOCSIS network in an Operations environment
  • Participates in network planning, network architecture design and engineering, and in all phases of the SDLC
  • Evaluates new products, performs network problem resolution.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.
  • Experience in Next Generation Firewalls (FirePOWER) design and implementation.
  • Installation of Palo Alto (Web Application and URL filtering, Threat Prevention, Data Filtering).
  • Performed IOS Software upgrades on switches Confidential 6509, 4510, 3750 and Confidential ASR for compatibility with Confidential ISE.
  • Good Understanding of Python scripts for system automation, monitoring and security reporting. Maintain existing Perl scripts and migration existing Perl scripts to Python.
  • Experience with IBM Proventia (GX7, GX5, XGS Devices)/Checkpoint(GAIA R77.30, R80.30) troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Upgrade and Configure Confidential ASA to manage it with Firepower.
  • Implementing and troubleshooting firewall rules in Checkpoint R80.10 as per the business requirements.
  • Configured & Managed distributed logical switches & Edge firewalls in NSX
  • Upgrade and Configure Confidential ISE, IOS Based firewalls, Confidential FIREPOWER, Confidential Prime Infrastructure, Confidential Security Manager.
  • Configuring SRX devices and troubleshooting them, connecting them with Confidential nexus devices to test connectivity.
  • Worked on migrating the Confidential ACS (5.6) TO Confidential ISE(2.5) and successfully implemented Confidential ISE for wireless security across our company network.
  • Assists in the development and documentation of technical standards.
  • Implements approved methods of procedure.
  • Monitors protocol compatibility standards, develops and implements network enhancements and makes recommendations for improvementWorking on security devices ASA, Juniper, Palo Alto Firewalls, Routers, and Switches.
  • Implementation of secure enclaves with Palo Alto and ASA firewalls
  • Remote access and site-to-site VPN administration using Confidential ASA/ASR and Palo Alto
  • Worked with Confidential ISE to identify threats in the network for rapid containment and remediation.
  • Perform day to day Wi-Fi functionality checks of Wireless Access Points (AP's) along with the switches that support these networks, rotating on call for 24X7 support.
  • F5 build-out of the base F5 BIG-IP infrastructure, including the BIG-IP 10200v platforms and vCMP guest instances.
  • Redistribution of OSPF and EIGRP into BGP with the correct tagging parameters from the old legacy network to route and to utilize the correct MPLS VRF VPN’s provided from the bearers.
  • Checkpoint, Confidential ASA, Fortinet and Palo Alto installation, upgrade, Monitoring and patch management.
  • Works on projects/systems/issues of medium to high complexity surrounding network planning, configuration, optimization, and audit.
  • Provides tier support across organizations.
  • Works on one or more projects as a project team member, occasionally as a project team lead.
  • Adheres to industry specific local, state, and federal regulations, as applicable.
  • NX-OS upgrade in Nexus 7010 through ISSU (In service software upgrade)
  • Migration from Confidential to Palo Alto firewall & Confidential to Checkpoint firewall.
  • Built and support VRRP / Cluster based HA of Checkpoint firewalls.
  • Deploying the policies on firewall using the Checkpoint’s Smart Console Manager and Smart Dashboard.
  • Configured and Maintained Confidential Wireless Access Points ( Confidential - 3500's, 3600's), using Confidential Wireless Controllers at the Data-Center Admin Department.
  • Configured of ACL’s in Confidential 5520 ASA firewall for internet Access requests for servers, Protocol Handling, Object Grouping and NAT
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs
  • Managed the deployment of Confidential ISE and migration of all Wireless authentications
  • Worked on Migration of Juniper SRX firewalls for isolation of network segments and VPN's, ASR
  • Deploying BIG-IP F5LTM Load Balancers for load balancing and traffic management of business application.
  • Deployment of Confidential ASA firewalls and migration of end of life ASA firewalls to New ASA firewalls
  • Confidential Firewalls include ASA 5585x, 5580, 5550 Series Hardware managed through CLI, ASDM as well as CSM.

Environment: Confidential ASA 5505/5510/5520 , Confidential Routers 2900 series, Confidential Switches 2950/2960/3750 HSRP, Ether channel, OSPF, EIGRP, BGP, STP, RSTP, PVST, VTP, MPLS, ATM, PPP, HDLC, SNMP, DNS, DHCP, MS exchange 2010, Xenserver 6.0, xcenter, Hyper-V 2008/2012

Confidential

Network Engineer

Responsibilities:

  • Proficient in design, implementation, management and troubleshooting of Check point firewalls, Confidential PIX, NetScreen Firewalls, Check point Provider-1 / VSX, Nokia VPN, Palo alto IDS, Foundry / F5 Load Balancers, and Blue Coat Packet Shaper systems.
  • Configuring and maintaining F5 SSL VPN and network access and Single Sign-On (SSO) for SAML resources.
  • Configure all Palo alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized
  • Configured Confidential ASA 5510 for VPN Network Access Control integration with Confidential ISE (Inline PEPs).
  • Configuring, Administering and troubleshooting the Checkpoint and ASA firewall.
  • Configuration, Installation and troubleshooting of Juniper routers like PTX5000, PTX3000, T4000, MX960 Implemented, and Tested and troubleshoot Juniper Firewall to establish VPN network to Datacenter and Juniper wireless for local network.
  • Experience with converting check points VPN rules over to the Confidential ASA Solution. Migration with Confidential ASA VPN experience.
  • Knows, understands and follows company policy.
  • Performs other duties as requested by supervisor.
  • Working on security devices ASA, Juniper, Palo alto Firewalls, Routers, and Switches
  • Managed and coordinated the efforts with Vendors like Confidential, Juniper etc. for implementing and staging the equipment and installing and finally configuring it for the required projects.
  • Maintenance of Confidential ASA 5580 firewall for DCA site, adding new rules or changing existing access lists if necessary.
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access
  • Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Worked as a part of data center deployment where we converted from Confidential 6500 to Nexus.
  • Strong hands on experience on PIX (506, 515, 525, 535), ASA (5505/5510) Firewalls. Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Co-ordinate with the Data Network and Security team and come up with possible solutions for any network outages.
  • Experience with design and implementation of Virtual Switching System (VSS) for both User segment and server segment using 6509-V-E catalyst switches
  • Provide design and SDN/NFV networking support using Open-Stack, Juniper Contrail and Big Switch Networks
  • Juniper Contrail SDN Cloud Computing Open Networking Open flow/ODL
  • Deployed Nexus switches 2248, 5548, 7018 and implemented features like FEX Links, VPC, VRF, VDC, and OTV, Fabric Path.
  • Involved in the configuration of the Nexus 2248 Fabric Extender (FEX) module on the Nexus 5000 to connect servers and storage devices.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling
  • Network Infrastructure: Operation, configuration and maintenance of all Microsoft operating systems; PC and Server. Active Directory, Virtualization, CNA (Novell), WAN LAN/ Wireless troubleshooting, including Confidential, Confidential UCM and Aruba hardware
  • Administering network workstations, utilizing TCP/IP networking protocol on Windows based operating system.
  • Installing, configuring, and maintaining personal computers, Ethernet networks, network cabling, and other related equipment, devices, and systems, disk drives, data acquisition boards, printers, and related equipment.

Environment: EIGRP, RIP, OSPF, BGP, VPN, CSM, SUP720, Ether Channels, Confidential 7200/3845/3600/2800 routers, Fluke and Sniffer, Confidential 6509/ 3750/3550/3500/2950 switches, Checkpoint firewalls (SPLAT).

Confidential

Network Engineer

Responsibilities:

  • Configuration and maintenance of Confidential 2900 series including VLANS and TRUNKING protocols.
  • Implemented load balancing between Confidential L3 switch by HSRP and GLBP.
  • Delivered Departmental Efficiency through advanced engineering, technical support and documentation procedures.
  • Configuring and troubleshooting issues related to STP, RSTP and VLAN's allocation in Organization for maintaining Layer 2/3 Switching intact.
  • Worked on 4500 Catalyst switches for the purpose of LAN requirement and for troubleshooting LAN issues.
  • Ensuring all cable nodes terminated within specification on CAT 5 and CAT 6;
  • Clarifying a client’s VMware and Windows Server 2003/2008R2 specifications, understanding their work practices and the nature of their business.
  • Hands on experience with VMWare technologies such as ESXi, NSX, SRM, and VSAN.
  • Experience of VoIP allow dynamic interconnection between users on any two domains on the Internet when a user wishes to place a call.
  • Provided very consistence performance in CSAT and schedule adherence.
  • Installation, configuration and maintenance of Confidential Routers like 7600, 7200 and JUNIPER mx series.
  • Configuring, maintaining and troubleshooting routing protocols such as OSPF, EIGRP and BGP.
  • Engaged in office moves, helped in identifying network requirements of new building, installed new networking hardware, and coordinated with vendors for cabling/wiring.
  • Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Confidential 3640 to Confidential 2811 ISM routers and switches at access level to 2950, 3550.
  • Worked on Configuring, managing, and troubleshooting networks using routing protocols like RIP, EIGRP and OSPF (Single Area and Multi Area).

Environment: Router 2800,3800, Confidential catalyst switch 3550, 2960. Fiber and Ethernet cabling

We'd love your feedback!