We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

3.00/5 (Submit Your Rating)

Issaquah, WA

SUMMARY

  • Around 7 years of professional experience in Network Designing, Deployment, Configuring, Troubleshooting and testing of networking system.
  • Experience in Layer 3 Routing Protocol configurations: RIP, OSPF, BGP, EIGRP and MPLS.
  • Strong hands on experience in installing, configuring, and troubleshooting of Cisco 7600, 7200, 3800, 3600, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
  • Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP.
  • Network security including NAT/PAT, ACL, VPN Concentrator, IDS/IPS, and ASA/PIX Firewalls.
  • Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.
  • Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Worked on F5 BIG-IP LTM 8900, Citrix and NetScaler configured profiles, provided and ensured high availability.
  • Done scripting in Python on Red hat Linux based Verimatrix Conditional Access servers
  • Develop, refine, and document NOC policies, processes, procedures, and associated system requirements and drive their implementation and use.
  • Worked as lead systems engineer and architect of the Joint Tactical Radio System - Ground Mobile Radio (JTRS-GMR) and Airborne, Maritime, and Fixed (AMF) waveform signal processing, developed and led development of a wideband secure and highly survivable data, voice, and video network utilizing highly advanced digital signal processing techniques, the Wideband Networking Waveform - Antijam and Low Probability of Intercept (WNW-AJ/LPI).
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
  • Experience in physical cabling, IP addressing and Subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Experience working with Nexus 7010, 7018, 5020, 2148, 2248 devices.
  • Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2K series, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches.
  • Participated in extended feature and solution testing of Cisco IoT products
  • Shell Scripting for automating tasks using Python
  • Upgrade PAN-OS from 6.1 to 7.0 in Palo Alto firewalls
  • Experience working on Juniper based Mx series router, SRX 220 firewall.
  • Experience on Blue coat ProxySG to block list/whitelist websites, URL Filtering and content filtering as per business request.
  • Install and troubleshoot Aruba Wireless Access Points, Controllers, HP Switches and Cisco Routers and Switches.
  • Strong hands on experience on PIX Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • A highly organized individual who adopts a systematic approach to problem solving, effectively analyzes results and implements solutions.
  • Configured and deployed QOS and defined class of service (COS) WRED and WFQ for bandwidth management. Working knowledge on configuring access lists. Troubleshooting DNS/DHCP issues within the LAN network.
  • Maintain the Palo Alto Networks solution and provide guidance on code upgrades, etc.
  • Provided 24x7x365 availability and on-call support as required by the projects.
  • Excellent working knowledge of TCP/IP protocol suite and OSI layers.
  • Good knowledge and experience in Installation, Configuration and Administration of Windows Servers 2003/2008, Active Directory, FTP, DNS, DHCP, TFTP, Linux OS under various LAN and WAN environments.
  • Experience working with JUNOS OS on Juniper Routers and Switches.
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with ASA Firewalls
  • Responsible for managing activities, Upgrading IOS - Upgrading hardware and installing new devices, Tuning (Configuration), make standardization for the topology
  • Experience on HSRP for load balancing.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
  • Plan, Design and Deploy SIEM Event Tracker solutions.
  • Installation & configuration of Microsoft Proxy Server 2.0 & Blue Coat Proxy
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
  • Experience converting Cat OS to Cisco IOS on the Cisco 6500 switches.
  • Experience with F5 load balancers - LTM, GTM series like 6800 and 8900 for the corporate applications and their availability.
  • Expertise in OSI layer model/TCP/IP.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
  • Monitoring and Logging SolarWinds, Splunk, Veritas Operations Manager, Hyperic, WhatsUp Gold.
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 Sonet POS OCX / GigE circuits, Firewalls.
  • Configured and deployed QOS and defined class of service (COS) WRED and WFQ for bandwidth management. Working knowledge on configuring access lists. Troubleshooting DNS/DHCP issues within the LAN network.
  • Expertise in IP Subnetting and worked on various designing and allocating various classes of IP address to the domain.
  • Involved in troubleshooting network traffic and its diagnosis using tools like ping, traceroute, Wireshark, TCP dump and Linux operating system servers.

TECHNICAL SKILLS

Cisco router platforms: 2500, 2600, 2800, 3600, 3700, 3800, 7200, 7609.

Cisco Switch platforms: 2900XL, 2950, 2960, 3560, 3750, 4500, and 6500.

Firewalls & Load Balancers: Cisco ASA 5585, 5550, 5540, Juniper SRX5400, 5600, 5800

Juniper Netscreen: 6500, 6000, And 5400. Juniper SSG Firewalls, Palo Alto, F-5

Routers: Cisco routers (1900, 2600, 2800, 2900, 3600, 3800, 3900, 7200,7600), Cisco L2 & L3, Juniper routers (M7i, M10i, M320)

Switches: Cisco switches (3560, 3750, 4500, 4900 & 6500), Nexus (2248, 5548 &7010)

Routing: RIP, EIGRP, OSPF & BGP, Route Filtering, Redistribution, Summarization, Static routing

WAN Technologies: FRAME RELAY, ISDN T1/E1, PPP, ATM, MPLS, leased lines

LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, NAT/PAT, FDDI.

Secure Access Control Server: (ACS) for TACACS+/Radius.

Routing Protocols: RIP, OSPF, EIGRP, and BGP.

Switching Protocols: VTP, STP, RSTP, MSTP, VLANs, PAgP, and LACP.

Network management: SNMP, Cisco Works LMS, HP Openview, Solar winds, Ethereal.

Layer 3 Switching: CEF, Multi-Layer Switching, Ether Channel.

Redundancy protocols: HSRP, VRRP, GLBP.

Security Protocols: IKE, IPsec, SSL, AAA, Access-lists, prefix-lists.

Software: Microsoft Office Suite, MS SQL Server 2008, HTML.

Language: UNIX, Python Turbo C / C++, basics in Perl and Shell scripting.

PROFESSIONAL EXPERIENCE

Confidential, Issaquah, WA

Sr. Network Engineer

Responsibilities:

  • Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco 1600, 2600, 2800, 3600, 7300 series Routers.
  • Deployed on Nexus 7000, 5000 and 2000 series with V-Block servers and Cisco UCS E-series.
  • Experience in working with Cisco Nexus 2148 Fabric Extender and Nexus 7010, 5000 series to provide a Flexible Access Solution for datacenter access architecture.
  • Experience in configuring, upgrading and verifying the NX-OS.
  • Supported for Zscaler Web Security Service
  • Oversaw the Cisco Internet of Things (IOT) application during the tours
  • Expansion and implementation of current data center for different phases of migration.
  • Designed internal marketing collateral, executive presentations, newsletters, web sites and infographics for Cisco IT Internet of Things (IoT) program targeted to employees and internal stakeholders
  • Perform extensive testing around the upgrade, migration and configuration functionality of our software.
  • Designed MPLS VPN and QoS for the architecture using Cisco multi-layer switches
  • Closely involved with the worldwide deployment of Zscaler's cloud
  • Configured Easy VPN server and SSL VPN to facilitate various employees' access internal servers and resources with access restrictions.
  • Proficient in LCS Build for Vblock 720 & 340.
  • Plan, build, deploy, and maintain ACI data center lab utilized by the global support team.
  • Responsible for entire company network infrastructure that includes Cisco Switches, Routers, Firewalls, Access Points, Servers and PBX.
  • Support third party products and technologies within the ACI ecosystem such as VMware ESX, OpenStack, F5
  • Design, Implement & troubleshooting of Juniper switches, routers and Firewalls EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240, SRX 3600/650.
  • Configuring and implementation of Juniper Firewall, SSG Series, Netscreen Series ISG 1000, SRX Series.
  • Configure, and Implement NetScreen NS-5XT.
  • Design and implementation of preventative, detective and corrective technical and administrative controls to support information security program objectives, including logging/SIEM, access controls, authorization for access. Controls include security metrics.
  • Multicast mib testing for Brocade MLX and CES/CER switches
  • Extensively worked on Brocade Director Switches, McDATA and Cisco MDS switches
  • Configured and Troubleshoot Aruba Wireless LAN Controllers, Cisco Meraki and Access Points.
  • Expert-level professional experience with Cisco iOS or Juniper JunOS including configuration and troubleshooting.
  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers.
  • Partner with multiple teams to introduce features in to Cisco cloud to improve functionality and scale such as ACI ML2/Opflex, IPV6, AVI LBaaS, CPNR DHCP, VPNaaS with CSR1000v.
  • Experience with configuring OTV between the data centers as a layer 2 extension.
  • Implementation of Site-to-Site VPNs and DMVPN over the internet using IKE Phase 1 and IKE Phase 2 based on traffic with ASA 5500 series Firewalls.
  • Create and maintain custom content filters on Ironport based on alerts from FAA SOC and US CERT in addition to self-identified attacks across port 25
  • Provisioned and maintained Ironport email security servers
  • Participated & completed LCS for Vblock 720 & 340 from network & DC compute UCS hardware perspective for DC.
  • Assisted with implementation of Fortinet FortiGate 200b upgrade.
  • Implement VPN connections using NetScreen NS-5GT and NS-500.
  • Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as Cisco 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.
  • Provided network element support 24/7 in a front-line break/fix global carrier class NOC environment, liaising with customers and carriers to resolve issues.
  • Responsible for nightly maintenances including Big F5, ACS, all Cisco ASAs, Citrix Netscaler.
  • Responsible for design & management of Juniper NetScreen Firewalls, Juniper Switches, Cisco Switches.
  • Managing and troubleshooting of Juniper M320 routers including installation, upgrade, configuration and network management.
  • Configuration and troubleshooting of CSM, integration with ASA devices.
  • Experience in migration of VLANS & Configured VLANs with 802.1q tagging, Ether channels, and Spanning tree for creating Access/distribution and core layer switching.
  • Maintain and administer firewalls: Palo Alto, Fortinet, cisco, checkpoint.
  • Creation of firewall rules on Checkpoint Smart Dashboard and install policies.
  • Developed a Python script to automate the data fetching and processing mechanism for the network.
  • Contributed to migration and decommission of network devices (e.g. router, switch, Firewall, Blue coat Proxy SG, Imperva Secure Sphere Web Application Firewall and HP Tipping Point etc.).
  • Managed Checkpoint, Fortinet, Palo Alto firewalls and reviewed information security requirements, assessed security risks, and defined security requirements.
  • Developed various Splunk search scripts to process and filter the network data as per the requirements
  • Management of corporate Checkpoint Firewall implementing security protocols and alleviating network attacks.
  • Administering and Monitoring Vblock components using element managers (UCS Manager, vCenter Server, Unisphere).
  • Level 2-3 repair assistance for NOC, Provisioning and Service Delivery Operations. .
  • Developed test plans and test equipment and processes.
  • Understanding new requirements from the design documents
  • Designing Test Topologies.
  • Bug Fix Verification Q-Fabric Platform.
  • Using Data Traffic generators LXIA network and spirant to test the L2/L3 Protocols.
  • Executed manual testing, protocol testing and system testing.
  • Involved nonstop forwarding testing for Q-Fabric.
  • Involved performance testing for Q-Fabric developing test automation using Perl.
  • Deployed Palo Alto Firewalls for web filtering and application control.
  • Configured EBGP load balancing and ensured stability of BGP peering interfaces.
  • Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
  • Responsible for full life cycle from site surveys, implementation, testing and training of secure Aruba Wireless Network installations.
  • Blue coat and Load balancers deployment at ADMC.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Experience in Juniper Net screen 5200 firewall and VPN Security Systems in large Enterprise and Data Centers.
  • Implementation and configuring of F5 Big-IP LTM-6400 load balancers along with Netscaler.
  • Working with Juniper JUNOS operating system and working on M and MX series routers.
  • Worked on FortiGate 5000-series security appliance to maintain SSL Inspection, Application control, Firewall and VPN management.
  • Have knowledge on various advanced technologies like VOIP, H.323, SIP, QOS, IPv6,
  • Multicasting, and MPLS.
  • Extensive use of NSM (Network and Security Manager), Fort iOS 5 and CSM (Cisco Security Manager) for adding or modifying firewall policies for the firewalls in use.
  • Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.
  • Test and implement Cisco ACI based network infrastructure as Openstack underlay network
  • Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0.
  • Design and Implement DMZ for FTP, Web and Mail Servers with CISCO PIX 506, PIX515.
  • Mapped, Network Diagrams and physical identification in MS Visio.
  • Includes XTremeIO, VMAX3, VBLOCK 700, VNX, Replication Manager, NETWORKER, AVAMAR, DATADOMAIN, DPA, and BRM
  • Worked with engineering team to resolve tickets and troubleshoot L3/L2 problems efficiently.
  • Configured Cisco 2800, 3800 routers and 3750, 4500, 6500 switches as part of the implementation plan.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960 6500 switches and Cisco 3640/1200/7200/7600/3845/3600/2800 routers, VBlock environment, Netscreen, Cisco Nexus 5K/2K, Cisco ASA 500, Juniper- net Screen 5200/500, EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240, SRX 3600/650, Checkpoint, FortiGate 5000-series windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

Confidential, Mclean, VA

Network Engineer

Responsibilities:

  • Configured OSPF redistribution and authentication with type 3 LSA filtering and to prevent LSA flooding.
  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Administration of Vblock Systems which includes.
  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
  • Managing AMP - Management Cluster which contains all management servers of Vblock System.
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Worked on HSRP for load balancing.
  • Automate ACI network configuration and testing with ACI COBRA python SDK.
  • Experience in designing data communications and networks utilizing that utilize a mixture of frame relay,
  • Good Experience in Linux Bash scripting and following PEP Guidelines in Python
  • Worked on Blue coat ProxySG to block list/ whitelist websites, URL Filtering and content filtering as per business request.
  • Assisted in PCI-DSS audits, in charge of removing all security vulnerabilities identified by security tools
  • Proficient in using EMC Connectrix Manager, Brocade Fabric Manager, CLI and Cisco
  • Perform Cold Migration of VDI Server from VMAX2 to Vblock- XIO.
  • Migrated the NOC's call center to new in-house hosted phone system.
  • Implementing Security Solutions in Juniper SRX and NetScreen SSG firewalls by using NSM.
  • Migrated the NOC's ticket system into our new ticketing system OSS from RT.
  • Configured CISCO content switch for load balancing and Netscaler load balancing.
  • Migrate Openstack underlay network from Standalone Nexus to ACI.
  • Lead the development of new network and security model in the virtual VM infrastructure by utilizing VCE
  • Vblock platform. Implemented the Layer 2 security separation by utilizing VMware integration and vShield firewalls. Lead the Implementation of the VCE Vblock network infrastructure in five DTCC US and International Data Centers. Responsible for configuration of the Cisco routers & switches, Check Point firewalls.
  • Experience working with JUNOS OS on Juniper Routers and Switches.
  • Working on the Blue coat Proxy SG for URL filtering and content filtering.
  • Working on Vblock- VISION Management solution.
  • Experience in designing MPLS VPN and QoS for architecture using Cisco multi-layer switches.
  • Administration of Cisco 11.x and 12.1 versions and higher.
  • Advanced knowledge in installation and configuration of Juniper NetScreen Firewall.
  • Automated network implementations and tasks and designed monitoring tools using python scripting
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.
  • Experience converting Cat OS to Cisco IOS on the Cisco 6500 switches
  • Configuring, and troubleshooting if various types of IPSec VPN between multiple SonicWALL and other firewalls like Cisco Pix/ASA, Fortinet, Juniper, Watch Guard and Checkpoint
  • Designed MPLS VPN and QoS for the architecture using Cisco multi-layer switches
  • Working with Juniper JUNOS operating system and working on M and MX series routers.
  • Cisco IOS experience on 3600/7200 class hardware in complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data center environment
  • Hands on experience installing Sup720 for Cisco 6509-E series and its Gigabit Ethernet port deployment in the core network
  • Worked on F5 BIG-IP LTM 8900, Citrix and Netscaler configured profiles, provided and ensured high availability.
  • Configuring IP, RIP, EIGRP, OSPF and BGP in routers.
  • Responsible for overall firewall configuration implementations and policy installations across all platforms during maintenance windows including Juniper, Check Point, and Fortinet for major enterprise network.
  • Experience in deploying EIGRP/BGP redistribution and the changing the metrics for the primary and backup paths for the packet prioritization and EIGRP tuning
  • Experience on a mesh 6500 and 5500 series routes and switches to support the core trading system. Involved.
  • Migrated Legacy NetScreen SSG firewalls to SRX firewalls for couple of environments.
  • Manage Cisco Routers and troubleshoot layer1, layer2 and layer3 technologies for customer escalations.
  • Taking Regular backups & testing the backups by restoring in test lab frequently
  • Experience on design and implement Palo Alto PA-500 and PA-3020 security appliance.
  • Managing a TACACS server for VPN user authentication and network devices authentication
  • Handled Corporate and Review Audits from the perspective of IT Security for Network Devices and Servers under our control
  • Developed shell scripts using python that run on switches using Tera-Term
  • Configuring IPSEC VPN on SRX series firewalls
  • Experience on designing of LAN/WAN/Security architectures utilizing Palo Alto in a Cisco environment.
  • Troubleshooting and installing of CRS, ISR, GSR, ASR9000 and Nexus devices.
  • Installation, Configuration and Administration of ADS, DNS, DHCP and Web proxy(ISA)server
  • Upgrade Cisco Routers, Switches and Firewall (PIX) IOS using TFTP
  • Implemented the concept of Route Redistribution between different routing protocols
  • Switching related tasks included implementing VLANS, VTP, STP and configuring on Fast Ethernet
  • Administration of Cisco 11.x and 12.1 versions and higher
  • Monitored all Cisco equipment’s using Cisco Works.
  • Platforms: Juniper mi101, MX960, SRX3400, SRX5400, netscreen Cisco 6509 7609, Nexus, ASR9K
  • Developed a Python script to automate the data fetching and processing mechanism for the network
  • Working with Juniper JUNOS operating system and working on M and MX series routers.
  • This includes Artifacts for regular Health Checks, IP and System Integrity, Change management, Problem management, Logical Access Controls, Network Connectivity, Service Registration and Performance Management
  • Installed and configured the Cisco routers 2800 in two different customer locations. It includes coordinating with Verizon and AT&T in order to bring the serial interface up for T3 link. Also, configuration includes frame relay, BGP and VPN tunnel on GRE
  • VLAN Configurations, troubleshooting and Firewall ACLs and Object-Groups configuration and support
  • Created a Web based HTTP server using socket programming in Python
  • Configured IPsec site-to-site VPN connection between Cisco VPN 3000 Concentrator and Cisco 3800

Environment: Juniper firewalls 5GT, 208, SSG 5, 140, 550, 550M, NSM, IDS/IPS 6500/3750/3550/3500/2950 switches, Juniper (M320, T640), python, VBlock environment, Load balancing, Cisco 7200/3845/3600/2800 routers, Netscreen, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, Ether Channels.

Confidential, Culvercity, CA

Network Engineer

Responsibilities:

  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies. Cisco CLI, Cisco works, Network Security, Network Analysis Tools
  • Experience with Checkpoint Firewall policy provisioning.
  • Firewall Policy implementation on Checkpoint R62 and R65 using Provider 1
  • Develop, design and implement firewall infrastructure surrounding Checkpoint and Cisco Firewalls and a good experience with security tools and protocols like NERC/CIP and SOX
  • Troubleshoot traffic passing managed firewalls via logs and packet captures.
  • Having knowledge on the Data Centre Multi-Tier data design
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
  • Layer 2 switching technology architecture, implementation and operations including L2 and L3 switching and related functionality.
  • Write and Deploy python scripts to perform admin tasks, report generation and push new changes
  • Responsible for configuring Cisco IP phones and implementing QOS prioritizing voice traffic.
  • Experience working on Juniper based Mx series router, SRX 220 firewall.
  • This includes the use of VLANS, STP, VTP and their functions as they relate to networking infrastructure requirements including internal and external treatment, configuration and security.
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Estimated Project costs and created documentation for project funding approvals.
  • Managed various teams involved in site surveys, cabling specifications, Network equipment installation and configuration.
  • Responsible for implementing QOS parameter on switching configuration.
  • Good understanding of python scripts for system automation, monitoring and security reporting. Maintain existing Perl scripts and migrating existing Perl scripts to python.
  • Planned resources and presented project status to higher management.
  • Deployed 7613 as PE and CE routers and configured the Edge Routers.
  • Excellent troubleshooting knowledge on T1, T3, OC-3 and OC-12.
  • Created and delivered internal trainings for BGP.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to point site.
  • Having Hands on experience with deployment and Configuration with MAC Authentication Bypass
  • Configured egress and ingress queues for ISP facing routers using CBWFQ.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Ability to analyze, configure and troubleshoot networks.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support
  • Supporting EIGRP and BGP based PwC network by resolving level 2 &3 problems of internal teams & external customers of all locations

Environment: Net Flow, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, CSM, SUP720, Ether Channels, python, Cisco 7200/3845/3600/2800 routers, Fluke and Sniffer, Cisco 6509/ 3750/3550/3500/2950 switches, Checkpoint firewalls(SPLAT).

Confidential

Network Engineer

Responsibilities:

  • Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route feedback, BGP attributes) on Cisco Routers 7613, 7201, and 3945E.
  • Monitoring the traffic through Cisco catalyst switches for Detection of Intrusion using IDSM2 and its Prevention IPS.
  • Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
  • Configured of ACL's in Cisco 5520 ASA firewall for internet Access requests for servers, Protocol Handling, Object Grouping and NAT.
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution and worked on RSA secure IDs to providing VPN Token to Company USERS.
  • Performed IP address planning, designing, installation, configuration, testing, and maintenance and troubleshooting in complete LAN, WAN development.
  • Supporting EIGRP and BGP based on the network by resolving level 2 & 3 problems of internal teams & external customers of all locations.
  • Resolving tickets on network and service provisioning.
  • Installing and configuring the peripherals, components and drivers.
  • Installing, Monitoring and Maintaining Local Area Network.
  • Troubleshoot network connectivity issues such as DNS, WINS and DHCP.

Environment: Cisco 7200/3845/3600/2800 routers, TACACS, EIGRP, RIP, and Vulnerability Assessment tools like Nessus, Red Hat, Solaris, Juniper VPN’s, and SSL.

Confidential

Network Engineer

Responsibilities:

  • Providing documentation by creating MOPs and VISIO diagrams for the network designing team.
  • Maintaining the networking devices which mean racking, stacking & cabling for the networking devices.
  • Providing gateway redundancy for Cisco 2600, 2800 & 3600 routers using HSRP.
  • Configuring routing protocols like EIGRP, OSPF & BGP and troubleshooting layer3 issues.
  • Implemented VTP and Trunking protocols (802.1q and ISL) on 3560, 3750 and 4500 series Cisco Catalyst switches.
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Creating VLANS and enabling inter-VLAN routing.
  • Configuring layer-2 technologies like STP, VTP with suitable parameters as per the network environment.
  • Involved in trouble shooting of DNS, DHCP and other IP conflict problems.
  • Managing network security with respect to port-security on access layer and access control lists on distribution layer.
  • Provided Technical support for improvement, upgradation, and expansion of the existing network architecture.
  • Troubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment.

Environment: CISCO routers and switches, Access Control Server, VLAN, Trunk Protocols, CISCO ASA, DHCP, DNS, Spanning tree, Nimsoft Junos.

We'd love your feedback!