Network Security Engineer Resume
Philadelphia, PA
SUMMARY
- I am a Sr. Network/Cyber Security Analyst Engineering with Project Management experience. Excellent written, interpersonal, and communication skills.
- Outstanding problem solver with the ability to rapidly identify and analyze problems. Work on multiple assignments and consistently meet deadlines.
- Team player with the ability to work independently.
TECHNICAL SKILLS
Networks: Setup and configured 10/100Mb & 1000/10000Gb LAN Ethernet and Fiber optic networks.
Routers: Setup and configured WAN device(s); Cisco2800, 6000 and 7000 series devices w/RSM & Supv modules. Wireless Cisco1260.
Protocols: Configure Bridging, RIP, EIGRP, OSPF, MPLS, QOS, Multilink, HSRP and AAA.
Switches: CISCO Catalyst 2900, 3500, 4500, 5000, 6500, 7500, Nexus 5000 - 7000 series and FEX. Nortel 470, 5510, BPS and Passport 8000’s.
Load Balancers: F5 Big-IP LTM and GTM Appliances, Foundry Load Balancers.
WAN Services: MPLS, VPN, Frame Relay, Fast Ethernet, T-1, DS-3, OC-12, Point-to-Point.
WAN Accelerators: Riverbed optimizers.
Secure Devices: Cisco VPN Concentrator 3030, Checkpoint NG/R65, R70, R75 & R77.20-30 Firewalls, Cisco IDS’s, JUNIPER NSM, Shiva’s VPN Client, ASA5505, ASA5520, ASA5550 and Pulse PSA5&7000 Firewalls.
Platforms: Experienced in Troubleshooting Ethernet, Fiber connectivity issues on AS400, HP, and SUN.
Tools: Firemon, CiscoWorks/PRIME, NAC appliances, CiscoASDM, Solar Winds NCM/NPM, INFOBLOX, Provider-1, SKYBOX, NETSCOUT, Checkpoint MDS/MLM, HP OpenView, NG Sniffer, Firebirds and Polycom, NETINFO, SMARTS, APERTURE, TPAM, RSA-Archer.
Software: Microsoft’s DNS, DHCP, Windows XP, Windows7-10, Excel, MS Word, Exchange, Visio, PowerPoint, Lotus Notes, Snag it SharePoint, winscp.
Servers: Windows NT, Windows Server 2003 & 2008, Windows 2005 SQL, Radius Authentication Server, TACACS, TFTP Servers, VMware “vSphere” client and ENTRUST.
PROFESSIONAL EXPERIENCE
Confidential - Philadelphia PA
Network Security Engineer
Responsibilities:
- Run, export and provide Analytic reports from the FortiSIEM for Stakeholders.
- Use the FortiConverter tool to perform upgrades from Juniper to Fortinet.
- Modified configurations to Confidential standards after the conversion.
- Coordinate with site engineers for all site remedy efforts.
- Setup and configure firewalls in the lab, prior to site migration and implementation.
- Provided global firewall metrics to Sr Management.
Confidential - Wilmington DE
Sr. Network Engineer
Responsibilities:
- Provide Infrastructure support to client lines of service.
- Migrate, configure and document Cisco CSP 2100’s into multiple datacenters.
- Install Symantec ProxySG virtual appliances into multiple datacenters.
- Perform admin modifications to FortiManager, Fortinet firewalls and FortiSiem reports.
- Perform DNS, ZONE and sub-domain builds changes within INFOBLOX.
- Cisco ASA Install, configure and coordinate with vendors for remote setups.
- Perform core, man, bgp, routing, access-list configuration changes.
- Upgrade and install Out-of-band network devices and configurations.
- Raise data center patching request for device migrations.
- Configure devices via ACI fabric.
- Utilize Service Now/Service First.
Confidential
VP of Perimeter Security
Responsibilities:
- Perform Risk analysis and QA checks to Juniper, Checkpoint, Palo-Alto and Pulse Secure devices.
- PAN configure security policy rules for traffic btwn zones and enable logging for troubleshooting.
- QA all newly installed, decommissioned and firewall upgrades.
- SIEM reports to management for status and problem resolution.
- Coordinate and schedule Internal Vulnerability Assessment scans.
- Use Continuity Of Business (COB) tracking system
- Raise and resolve RFI’s, INC and Change tickets.
- Review and approve RFT’s and RFP’s raised by engineering team.
- Perform QA Standard Build Configuration Checks for all Perimeter devices. (CiscoASA, JuniperSRX/Junos SSLVPN, Algosec and Palo-Alto’s).
- Liaison support between management and engineering.
- SME for Algosec firewall analyzer, replaced by SKYBOX.
- Wrote ‘Security Operations Run Book of Standards’ for Quality Assurance.
- Host weekly status meetings Operations and Service Delivery Teams.
- Perform Root Cause Analysis reports for Perimeter devices.
- Daily Tools; ‘Service Now’ ticketing system, SMARTS Portal, NETINFO, HP Network Automation and INFOVISTA, TPAM, Linux Backups, automation scripting in BASH and Baseline configuration standards.
Confidential
Cyber Security Services Engineer
Responsibilities:
- Refresh Checkpoint firewalls appliances.
- Perform firewall rule remediation and redacts on Checkpoint and Juniper firewall policies for rule cleanups.
- RUN FireMon reports, tcp dumps, database installs on both Juniper and Checkpoint firewalls.
- Use BMC Remedy, FWDB, MAXIMO, clish, bash and perform pre-engineering checklist for installs.
- Peer review install steps and policy rule remediation’s of other team members.
- Check device health on old and newly installed firewalls.
Confidential - Wilmington DE
Sr. Network / Firewall Engineer
Responsibilities:
- Perform DNS, ZONE and sub-domain builds changes within INFOBLOX.
- Cisco ASA Install, configure and coordinate with vendors for remote setups.
- Perform core, man, bgp, routing, access-list configuration changes.
- Upgrade and install Out-of-band network devices and configurations.
- Switch port configurations create SVI interfaces, vlans, trunks and port spans and channel groups.
- Create and troubleshoot tunnels on core routers to Member Firm locations.
- Perform F5 create and modify VIPS, i-rule editor, pools and other LTM services.
- Work with ticket system CA UniCenter.
- Router HSRP configurations, add routes
- Support Cloud, Tsys, Open Stack and F5 developer’s migrations and other projects.
- Add new users to the NAC manager groups, Radius auth. Server and Cisco switchport configs using 802.1 protocols.
- Communicate with outside vendors for support and troubleshooting Firewall Administrator:
- Checkpoint Firewall installations, project upgrades, migrations and operations.
- Migrate Checkpoint MDM-1 and MLM onto the network and perform administrations.
- Create firewall rules and perform rule modifications.
- Troubleshoot and filter connectivity issues using “Smart View Tracker”.
- Import / export firewall database(s), work with GIA appliances.