We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

2.00/5 (Submit Your Rating)

Pleasanton, CA

SUMMARY

  • Around 7+ years of experience in Cisco/Juniper Networking, Security which includes designing, Deployment and providing network support, installation, and analysis for a broad range of LAN / WAN protocols. Experience with SD - WAN solutions that include Viptela and Versa.
  • Hands On experience Cisco IOS/IOS-XR/NX-OS, Juniper JUNOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, EIGRP, RIP, BGP v4.
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
  • Good knowledge of Palo Alto Firewalls and the Panorama Network Security Management Box.
  • Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.
  • Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 9K, 7010, 5000 series to provide a Flexible Access Solution for a datacenter access architecture
  • Responsible for Check Point (Secure Platform R70) and Cisco ASA firewall administration across global networks.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Implemented and maintained Sourcefire intrusion detection/ prevention (IDS/IPS) system and hardened protection standards, IDS/IPS signatures on Firewall for Fine-tuning of TCP and UDP services.
  • Implementation, Configuration and Support of Checkpoint (R80, R77 Gaia, R75 and R71), VSX,MDM/MDS, Provider - 1, Palo Alto Networks Firewall models (Panorama M-100, PA-2k, PA-3k, and PA-5 k).Proficiency in Cisco ASAs, ISRs, Catalyst/Nexus, HP Switches, Cisco Meraki, Aruba, EIGRP, OSPF, BGP.
  • Hands on experience on F5 BIG-IP LTM 11.2, F5 BIG-IP GTM, F5 BIG-IP APM and F5 BIG-IP ASM.
  • Experience with configuring virtual server and load balancing in F5 Networks BIG-IP LTM.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Participated in troubleshooting SDN/SD-WAN deployments
  • Provide consultation regarding segmentation, security and policy of the SDN network
  • Worked on latest Checkpoint R80 version in a lab environment.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
  • Worked extensively on Cisco ASA 5500(5510/5540) Series. Experience with Palo Alto 5K series. Migration from ASA to PA.
  • Experience with SSL decryption, APP ID, Threat ID, URL filtering in PA firewalls.
  • Worked on upgrading Aruba controllers and Access points in troubleshooting the onboarding devices with the networks.
  • Knowledge of WAN Optimization Technology, Riverbed.
  • Worked on Cisco Firewalls Cisco ASA 5500(5510/5540) Series and Checkpoint R75, 76, NGX R70 Firewalls.
  • Manager of a large ISP in which kept track of all accounts, answered phone for any trouble calls and kept a log of all calls, and did general troubleshooting of anyone trying to log into the ISPs network. Also did various troubleshooting of all PCs such as replacing modems, video cards and working on all software issues that came up.
  • Worked with Automation script with Python module like Chef & Ansible.
  • Configuring Cisco Wireless Controllers and AP’s.
  • Configuring the Network Admission Control (NAC).
  • Configuring Cisco WAAS.
  • Excellent customer management/resolution, problem solving, debugging skills and capable of quick learning, effectively analyze results, and implement and delivering solutions as an individual and as part of a team.
  • Hands on Experience testing iRules using Browser (IE), HTTP watch
  • Provided support that included resolving day-to-day operational issues with tickets generated by a server.
  • Good understanding of SNMP, IP SLA and Network Monitoring with experience in tools like PRTG.

TECHNICAL SKILLS

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP, SDN, SDWAN

Networking Hardware: Cisco Switches, Cisco Routers, ASA/Pix firewalls, IronPort

Routing Protocols: OSPF, IGRP, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting

Security Technologies: PAP, CHAP, Cisco PIX, Blue Coat

Network Monitoring: Cisco Works 2000, Wireshark, HR ping

Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR

Routers: CISCO 2600, 2800,3600,3800,7200, Juniper M & T Series, Cisco CRS-1, CRS -3, GSR

Load Balancers: Cisco CSM, F5 Networks (BIG-IP)

Capacity & performance: Cisco works

Switches: CISCO 2900, 3500,4500,5000,6500, Nexus 7k,5k,2k

Programming Languages: C, C++, Perl, Power Shell, Python

Simulation Tools: GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence

Firewalls: Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580 ), McAfee Web Gateway, Checkpoint, Palo Alto firewalls.

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Features & Services: IOS and Features, HSRP, GLBP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR’s, HLD and LLD documents, Dell equal logics

PROFESSIONAL EXPERIENCE

Confidential, Pleasanton, CA

Senior Network Engineer

Responsibilities:

  • Design, Deployment, Installation, Configuration, and Upgrading the Cisco ISR routers, Catalyst and Nexus switches.
  • Responsible for the conversion of Atrium Health’s sites from Metro Ethernet (Metro E) to Multi-Protocol Label Switching (MPLS) technology.
  • Implementation of the routing protocols BGP (EBGP, IBGP) and EIGRP to enable MPLS on the sites.
  • Checkpoint R65, R71 and R75 Provider-1 on Multiple CMAs updates, configurations, OS upgrades and CLI troubleshooting, rule re-ordering and optimization.
  • Install/Upgrade/Configure/Troubleshoot Checkpoint physical and virtual firewalls (VSX with Gaia R77, R80 with appliance type of 13500 and 4800 series) and firewall central management appliance Smart1.
  • Polycom Devices: Polycom V700, VSX 7000, HDX 4000, 7000 8000, RMX 2000 MCU, CMA 5000 Gatekeeper, Polycom VBP, Polycom RSS
  • Experience with Checkpoint VSX.
  • Installation and Configuration of Video Conferencing Setup such as Polycom V700, VSX 7000, HDX 4000,7000, 8000
  • Expertise in checkpoint suite, deploying/troubleshooting standalone, cluster or VSX environments.
  • Worked extensively on the Cisco2821, Cisco2921, Cisco3925, Cisco ISR 4K series routers.
  • Responsible for replacing the End-of-Life support switches such as Catalyst 3560, 3650, 3850 series with Cisco Catalyst 9300, 9500 series switches.
  • Responsible for replacing the End-of-Life support routers such as Cisco2821, 2921, 3925 routers with the Cisco ISR 4K series routers, Cisco ASR routers.
  • Palo Alto, ASA and Pix Rule implementation, migration and cleanup to Check Point Provider-1.
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 POS OCX / GigE circuits, Firewalls.
  • In-depth technical hands-on with Check Point with versions R77.30 & R80.10, VSX and Cluster XL. Have fully working R80.10 firewall gateways lab setup Confidential home for regular testing of features and functionality.
  • Lead engineering design metrics of Check Point Security Solutions R77.30 and R80.10 GAIA software blades.
  • Worked extensively on the Cisco Catalyst 3560, Catalyst 3650, Catalyst 4500-X series, Catalyst 6500 series, Catalyst 9200, Catalyst 9300, and Catalyst 9500 series.
  • Responsible for preparing the test scripts to evaluate the MPLS circuits on GNS3.
  • Worked on the design of BGP features such as Route-filtering, AS-Path filtering to manipulate the traffic path in the MPLS-BGP. Migrated the sites from OSPF to MPLS-BGP.
  • Worked on OSPF and implemented successful migration from OSPF to EIGRP for internal routing.
  • Responsible for License upgrading on the devices and maintained network performance.
  • Responsible for documentation of the Metro Ethernet to MPLS conversion procedures.
  • Implemented Quality of Service (QoS) Policy-maps, Class-maps to segregate and provide better data transmission within the enterprise network.
  • Participated actively in proof of concept projects implementation which included storage and backup solutions from private cloud providers Amazon AWS and Microsoft Azure.
  • Worked on Cisco Meraki switching and wireless LAN.
  • Worked on the installation of Meraki MR42E and MR53 wireless access points for the cloud management.
  • TCSE functions: setup and install tiffin cluster in virtual environment. Train Dell's client on usage and reporting of Check Point. Check Point Optimization Consulting.
  • Hands on experience on F5 BIG-IP LTM 11.2, F5 BIG-IP GTM, F5 BIG-IP APM and F5 BIG-IP ASM.
  • Experience with configuring virtual server and load balancing in F5 Networks BIG-IP LTM.
  • Worked on F5 Load Balancer for managing F5 LTM Application Load Balancing.
  • Experience in troubleshooting, Installation of Cisco and Aruba WLAN controllers.
  • Worked along with wireless team on the integration of Cisco ISE with Wireless LAN controllers and Active Directory.
  • Worked with the team on the creation of policies on Cisco ISE for Endpoint profiling.
  • Procure network equipment for the devices that are Confidential the End-of-Life support and planning the scheduled upgrades.
  • Check Point SME for over inter-connectivity 150 firewalls Check Point, Juniper, ASA, PIX
  • Updates Confidential OS level, firmware and application level on Check Point, Juniper, Cisco, Sourcefire Devices
  • Responsible for recommending Industry best practices for the network implementation and management.
  • Manage Checkpoint policies, security architecture via Provider-1, Check Point VSX firewall virtualization.
  • Installation and Configuration of Video Conferencing Setup such as Polycom V700, VSX 7000, HDX 4000,7000, 8000
  • Expertise in checkpoint suite, deploying/troubleshooting standalone, cluster or VSX environments.
  • Assisted Network team in the installation of Spine (Nexus 9500 series) switches and leaf (Nexus 9300 series) switches to create ACI environment.
  • Responsible for the creation of Tenant Networking and Tenant Policies as part of the ACI architecture.
  • Performed network monitoring and analysis through the SolarWinds monitoring tool and Wire Shark.

Environment: Cisco ASR1002-HX, Cisco ISR 4451/4351/4321/4221 , MPLS-BGP, Nexus 9504/9508, Nexus 93600CD-GX, ACI, Cisco 3903/3930/6500 , Cisco ME-3600X, Cisco Catalyst 6500 series/9k switches, BGP, OSPF, EIGRP, GNS3, Microsoft Visio, Metro Ethernet.

Confidential, Atlanta, GA

Senior Network Engineer

Responsibilities:

  • Involved in working with Data Center hardware and management software.
  • Performed Virtualization (compute, storage, network) e.g. VMWare, KVM.
  • Update customer networks by configuring routers, switches, and incorporate the SDWAN into the network design.
  • Expertise in checkpoint suite, deploying/troubleshooting standalone, cluster or VSX environments.
  • VSX installation on Cisco Server Chassis UCS-5108, UCS 6120xp for new product testing and development, in both a test and production environment.
  • Experience with Checkpoint VSX, including virtual systems, routers and switches.
  • Proficient in manage and maintain Checkpoint Cluster XL, VSX, VPN-1 firewall along with experience in installation and configuration of Checkpoint security gateway, Smart Console and Smart Center server
  • Experience in risk analysis, security policy, rules creation and modification of Check Point Firewall VPN-1 FW-1 NGX R65, R70 & R75, R77.30, R80.10 and Provider-1/MDM/MDS.
  • Technology Used: ISP, WAP, OSHA, Cisco Switches, Cisco Routers, Ethernet, DNS DHCP, WLAN, VOIP, T1, T3, ADSL, SDSL, ISDN, CAT5E/6, ladders, cable trays, equipment racks and cabinets.
  • Worked on issues with IPS/IDS servers, Z scaler and Bluecoat Proxies.
  • Firewall policy provisioning on Fortinet FortiGate appliances using Forti Manager.
  • Change control / ITIL Service Controls / PCI compliance. Coordinating with various teams to perform Network Changes.
  • Technology Used: ISP/OSP Engineering, OSHA, OSP, ISP, Ethernet, VLAN, WLAN, IEEE 802.11 b/g/n, Cisco Switches, Cisco Routers equipment racks and cabinets.
  • Migrated to Juniper EX series switches from Cisco 3500, 3700 series and 6500 series switches. Worked on setting up Cisco ASR as edge routers. Worked on BGP for inter Data center connectivity.
  • Experience in upgrading IOS in the Data center switches and routers. Worked on change controls and cut overs during weekend on routing, switching and security.
  • Documenting the network design using Microsoft Visio and GNS3.
  • Identification of Vicious Data Injections in WSN Using EADA NS2
  • Installed and Configured Firepower Management Center within new core network.
  • Installed and configured firepower IDS/IPS and came up with the baseline configuration for the organization.
  • Technology Used: OSP/ISP Maintenance, OSHA, VLAN, WAP, Window OS, Cisco Switches, Ethernet, Frame Relay, CAT5E, ladders, cable trays, equipment racks and cabinets.
  • Well Experienced in configuring protocols HSRP, GLBP, PPP, PAP, CHAP, and SNMP.
  • Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers
  • Configuration and troubleshooting of VPN DMVPN with ISP's Sprint and Confidential T.
  • Network migrations, IOS and bandwidth upgradations in coordination with multiple ISP vendors.
  • Managing customer accounts as a Subject Matter Expert for Check Point Security Products
  • Smart Defense Check Point Firewall A/V and kernel level debugging.
  • Provide level 2 technical support for Check Point firewall and networking issues.
  • Level 2 VPN, Cluster, and Provider-1 Support Engineer for Check Point related products
  • Implementing routing, ACL's with ISP using OSPF and BGP.
  • Perform WLAN testing of newly installed WLAN controllers and Aps. Interface daily with customers and NOC reporting production milestones and any issues
  • Performed virtualization and deployed various VMs using VMware ESXI 6.5
  • Configuration and Administration of Cisco and Juniper Routers and Switches
  • Working with Juniper JUNOS on M and MX series routers.
  • Instrumental in the planning and architecture development of SDN based virtual enterprise gateways (infrastructure as a service -IaaS) reducing the customer time to deployment from months to days.
  • RESTful API, Multi-vendor OSS Integration experience
  • Network Management of IP and WAN networks (includes HP-OV, SNMP, and CLI knowledge).
  • Configuring IP Networking: Security Settings, QoS, Routing Protocols (OSPF, ISIS, BGP), signaling protocols like RSVP, LDP etc.
  • Help desk tech support for major ISP accounts
  • Setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer
  • Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.
  • Worked in setting up Inter-VLAN routing, redistribution, access-lists and dynamic routing.

Environment: Cisco 3500, 3700, 3900 series Routers, Cisco ASA Firewalls, F5 ADC, Cisco ACI, VMware, Aruba, VTP, Juniper SSG-140, Palo Alto Wildfire, Juniper EX series switches, Cisco Firepower, Bluecoat, Aruba Wireless, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k, Nexus 2000 FEX, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting, ACL Configuration.

Confidential, Wilmington, DE

Sr. Network Engineer

Responsibilities:

  • Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Configuration, Assigning DHCP profiles.
  • Regularly performed firewall audits around Check Point Firewall-1 solutions for customers
  • Troubleshoot and hands on experience on security related issues on Cisco ASA/PIX, Checkpoint, IDS/IPS, Palo Alto and Juniper Net screen firewalls.
  • Designed, Implemented and configured checkpoint R80.10 infrastructure with 200+ gateways and 10 Mgmt. provider one “P1” server.
  • Working on R80 & PAN OS 7 in UAT setup as deployment is planned for early next year.
  • Configuration and setting a lab for the testing of Checkpoint R80.10 Gaia operating system on both Management and Gateway. Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability
  • Installation of Checkpoint OS R80.10 Gaia on checkpoint appliances 4400 and Smart 1 for testing before upgrading the production firewalls.
  • Provided tier 3 support for Check Point Firewall-1 software to support customers
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network
  • Managing and configuring Aruba Wireless devices and Cisco Access Points
  • Configuring and managing F5 ASM (Application security manager). Developed security policies.
  • Configure and troubleshoot Juniper EX series switches.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x
  • Designed & Deployed Cisco ISE and Provided comprehensive guest access management for Cisco ISE administrators.
  • Configured Cisco ISE for Domain Integration and Active Directory Integration.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Performing network monitoring, providing analysis and network topologies using various tools like NS3, Wireshark, SolarWinds etc.
  • Redundancy &Management HSRP, VRRP, Wireshark, SolarWinds, SNMP, Cisco Works, GNS3, Riverbed.
  • Performed WLAN validation of newly installed APs using NetScout Survey Pro analytical software
  • Hands on Experience working with security issue like applying ACL's, configuring NAT and VPN
  • Responsible for design and implementation/migration from Cisco wireless platform to Aruba wireless platform.
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP
  • Configured, installed and maintained VeloCloud SDWAN systems Confidential customer offices, remote offices, and data centers.
  • Installation, deployment, Analysis and troubleshooting of Firewall Technologies i.e. Checkpoint, Fortinet, Palo - alto, Cisco ASA, F5 (LTM).
  • Checkpoint, Cisco ASA, Fortinet and Palo Alto installation, upgrade, Monitoring and patch management.
  • Managed Checkpoint Clusters in Provider1 environment.
  • Migrate, Upgrade and Patch Management of Cisco ASA, Checkpoint, Palo alto and Fortinet Firewalls.
  • Setup site-to-site IPSEC VPN tunnel and Remote VPN (SSL) within and across platforms like Checkpoint, Cisco ASA, Palo alto and Forti gate Firewalls and Cisco Router devices
  • Install, manage and monitored Palo Alto Firewalls in Panorama.
  • Manage various Security platforms; Juniper, Cisco ASA, Next-Gen, Check Point, Microsoft Azure, AWS Cloud and Fortinet Firewalls
  • Manage Business to Business VPN Tunnels, Fixed line and Client remote access solutions
  • Blue Coat and IronPort proxy Content management, Citrix NetScaler Load Balancing
  • Experienced in planning and development of designs for Migrating to AWS cloud.
  • Implement changes on switches, routers, load balancers (F5 and CSS), wireless devices per engineer’s instructions and troubleshooting any related issues
  • Configured & Implemented Cisco Firepower Services with Cisco ASA 5500-X advanced security defenses
  • Experience with communicating with different customers, IT teams in gathering the details for the project
  • Switching tasks include VTP, ISL/ 802.1q, IP Sec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP.
  • Configure and install Aruba wireless controllers 7210 and access points.
  • Implementing PCI policies and procedures, ITIL practice in customer infrastructures.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IP Sec/GRE to Get VPN.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trucking, deployed port security when possible for user ports.
  • Involved in configuring Juniper SSG-140 and Cisco ASA firewall.
  • Strong hands on experience on, ASA Firewalls, Palo Alto Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • Implemented Zone Based Firewalls and Security Rules on the Palo Alto Firewall. Exposure to wildfire feature of Palo Alto. Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.

Environment: Cisco ASA Firewalls, F5 ADC, Cisco 3900 Routers, Cisco Catalyst switches 6500, 3750, 3550, 2960 Switches, Juniper SSG-140, Palo Alto Wildfire, Juniper EX series switches, Cisco Firepower, Aruba Wireless, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k, Nexus 2000 FEX, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting, ACL Configuration.

Confidential - Jacksonville, FL

Senior Network Engineer

Responsibilities:

  • Configure / Troubleshoot CISCO 12000, 7500, 3800 series routers and 3560 series switches for LAN/WAN connectivity.
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
  • Performing standard network operations via ITIL standard with Incident Management and Change Management.
  • Configured Cisco ASA and Checkpoint firewall layers to secure the infrastructure for the Data Center.
  • Migrated firewalls from ASA to Checkpoint.
  • Drafted, installed, and provisioned ASA and Checkpoint firewall rules and policies.
  • Experience in configuring VPC, VDC and ISSU software upgrade in Nexus 7010
  • Actively involved in Switching Technology Administration including creating and managing VLANS, Port security- 802.1x, Trucking 802.1Q, RPVST+, Inter-VLAN routing, and LAN security on Cisco Catalyst Switches4507R+E, 6509-E and Cisco Nexus Switches 2232, 5596, 7009.
  • Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP, MPLS
  • Experience with deploying PIM Sparse-mode/Dense-mode multicasting in Campus locations.
  • Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.
  • Design, implement and administer IPv4 enterprise network infrastructure utilizing Juniper routers like Juniper MX80, MX 480 and MX960.
  • SDWAN design and implementation using CISCO VIPTELA & Meraki Switches
  • Devised new VPN solution utilizing Cisco Firepower and Cisco AnyConnect
  • Designed perimeter security policy; Implemented Firewall ACL's; Allowed access to specified services; Enabled IDS/IPS signatures in Firewall & fine-tuned TCP & UDP.
  • Design and implement Catalyst/ASA Firewall Service Module for various LAN’s. responsible for managing Cisco routers, switches, HP switches, F5 load-balancers using SNMP MIBs for fault detection and for fault isolation.
  • Working on products for Wi-Fi alliance and WLAN testing & pre and post deployment wireless security WEP, WPA, EAP
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Implemented Cisco ISE 1.2 for Wireless 802.1x Authentication and Authorization with Flex Connect
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 2504, 4404, 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Upgrading Cisco ISE appliances company wide. Recently rolled out OpenDNS including onsite VM appliances.
  • Experienced on Cisco ISE and advanced technologies like QOS, Multicasting, MPLS and MPLS-VPN and Bluecoat proxy server SG.
  • Troubleshoot Fortinet Firewall, issues, edited policies and created rules.
  • Fortinet Firewall administration configuration of FortiGate 3000, 3815 series as per network diagram
  • Understand OSPF configuration and authentication settings to migrate routing over to the Firepower platform
  • Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity.
  • Integrate Microsoft active directory (LDAP) into checkpoint for identity awareness and user authentication.
  • Implemented Cisco and Aruba Wireless Controllers, Aruba Wireless Access Points Confidential corporate site as a part of WLAN Infrastructure.
  • Rapid firewall security assessments through Python automation.
  • Successful Data Center Migration Planning and Successfully developed Python automation scripts to perform Cisco firewall rule assessments.
  • Created the AAA servers for LDAP and AD authentication in F5 APM.
  • Configure and manage LDAP User management with Checkpoint Smart Directory. Implemented the policy rules and DMZ for multiple clients of the state on the Checkpoint firewall.
  • Worked with several network engineers for the understanding of Juniper SRX firewalls along with the changeover to Palo Alto. Palo Alto Firewall Management-Panorama.
  • Configured and deployed Cloud Lifecycle Management (CLM) DNS solution to automate IP address assignment and DNS record updating for new servers created in the CLM environment
  • Experienced in handling and installing Palo Alto Firewalls
  • Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.
  • Performed configuration for end users on CUCM, IM&P, Jabber, WebEx, Telepresence Video Communication Server, SX80 and end points DX80's, SX20's and SX10's.
  • Configured and managed APM as an SSL VPN solution for remote management.
  • Provided Layer-3 redundancy by implementing HSRP and GLBP for High availability
  • Implementation and Configuration (Profiles, iRules) of F5 Big-IP LTM-6400 load balancers
  • Implemented Access lists and policy mapping on Juniper router installed in each branch across all the states.
  • Worked on configuration commissioning and upgradation of the MPLS circuits for various branch offices. Disabling all unused ports and putting them in unused VLAN.
  • Implemented, analyzed and recommended appropriate system for the out of band management monitoring. Utilizing SolarWinds for primary and disaster recovery site.
  • Monitored and responded to network anomalies utilizing SolarWinds/Orion's software and recommended appropriate network solutions for issues.

Environment: Cisco 12000, 7500, 3800 series routers and Cisco 3560 series switches, Juniper EX4200, EX3200 Switches, Juniper MX80, MX480, MX960 Routers, F5 ADC, FHRP: HSRP, GLBP, ASR 9000, Cisco Firepower, Juniper SSG-140, Cisco Nexus Switches 2232, 5596, 7009, Checkpoint Firewall, VLAN, 802.1Q Trunking.

Confidential, Knoxville, TN

Network Engineer / Technical Support Engineer

Responsibilities:

  • Assisted in troubleshooting LAN connectivity and hardware issues in the network of 500 hosts.
  • Studied and analyzed client requirements to provide solutions for network design, configuration, administration, and security.
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
  • Troubleshooting in python automation script and networking issue with remote connection.

    • Responsible for maintaining the entire Routing and switching domain

  • Monitor performance of network and servers to identify potential problems and bottleneck.
  • Performed RIP & OSPF routing protocol administration.
  • Implementing Security Solutions in Juniper SRX and Net screen SSG firewalls by using NSM. Experience with F5 load balancers LTM and GTM and reverse proxy design and setup. Migration from A10 to F5.
  • Configured and supported F5 load balancer and Citrix NetScaler load balancer to support corporate internal applications
  • Interacted with support services to reduce the downtime on leased lines.
  • Maintenance and Troubleshooting of connectivity problems using Ping, Trace route.
  • Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issue Other responsibilities included documentation and support other teams
  • Configured OSPF over frame relay networks for NBMA and point to multipoint strategies
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Implemented security policies using ASA 55XX Firewall as well as Fortinet firewall IPS/IDS, AAA Security (TACACS+, RADIUS) on different series of routers
  • Configuring rules and Maintaining Palo Alto & Analysis of firewall logs using various tools. Build Cisco UCS 6200 series fabric interconnect. Recommend and design equipment configurations for LAN/WAN/VOIP deployment on Cisco, ADTRAN, Fortinet, F5, Redware and Bluecoat.
  • Troubleshooting of Cisco 2800,2900, 3900, 7200, 7600, ASR9k, CRS, GSR 12k Series routers
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Configure BGP features such as as-override, Local pre, EBGP load sharing on client connections
  • Configured and resolved various OSPF issues in an OSPF multi area environment between multiple branch routers.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.
  • Configuring HSRP between the 3845 router pairs of Gateway redundancy for the client desktops.
  • Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 & 6000 series.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Deploy and configure Cisco Meraki SDWAN Confidential 30 sites globally. configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and trouble shooting.
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Worked with Load balancing device like F5 Big-IP local traffic manager (LTM) 1600
  • Responsible for implementing QOS parameter on switching configuration.
  • Involved in Design and Implementation of complex networks related to extranet clients.
  • Knowledge and experience of 802.11 a/b/g/n Ethernet standard for wireless Technology.
  • Plan and implement complex network changes as per ITIL specifications.
  • Hands-on experience in the network management of circuits using TDM and Frame Relay network, performing configuration and provisioning management, fault management and performance monitoring.
  • Deliver IT Services Management (ITSM) solutions based on ITIL best practices that focused on the people, process, and technology, and information perspectives of providing business solutions within the IT infrastructure.
  • Troubleshooting the Network Routing protocols (BGP, EIGRP and OSPF) during the Migrations and new client connections.
  • Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K, Checkpoint, Cisco ASA

We'd love your feedback!