Sr. Network Security Engineer Resume
3.00/5 (Submit Your Rating)
Sandy, UT
SUMMARY
- 8+ years of IT experience in design, development, implementation, troubleshooting and maintenance of complex Network & Security devices, Network Security, Linux Kernel Programming.
- Expertise in network protocols, Firewalls and Communication Network design.
- Experience with Troubleshooting tools for example protocol analyzers, load generators & network traces.
- Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NATing, sub - netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RSTP & Multicasting protocols.
- Proficient in monitoring and managing networks using Solar Winds Net flow Traffic Analyzer, Network Performance Monitor (NPM), Network Configuration Manager (NCM), Security Device Manager (SDM), Cisco Works; Info lox, HP Open View and Wireshark, Cisco Prime.
- Designing, Implementing and Troubleshooting Cisco 3750, 3550, 3560, 2924, (6509, 6513, 6506) 6500 series catalyst switches.
- Knowledge and experience with F5 ADC, Palo Alto, Dell Force10, Brocade, Meraki/Aruba WLAN, Splunk, TACACS+.
- Experience with Next Generation and web application firewalls (Checkpoint, Palo Alto, Cisco ASA Firepower, Watch Guard, Juniper SRX, Akamai Kona WAF, AWS WAF)
- Experience with design and implementation of Virtual Switching System (VSS).
- Implementing 3750 Stackable switches using Cisco Stack wise technology. Experience to review and evaluate current and future design issues as required maintaining network integrity, efficient data flow.
- In-depth knowledge of Linux shell scripting.
- Configuration & management of the changes, additions and deletions from the network and administered via direct Interface or on command line Interface (CLI) to the device.
- Knowledge on Network security including NAT/PAT, ACL, VPN Concentrator.
- Possess Hands-on experience with TCP/IP, LANs, WANs, and WLANs (Wi-Fi)
- Possess hands-on experience with Cisco VPN Concentrators, F5 Fire pass SSL VPN, juniper SA Series SSL VPN Appliances Proficient in monitoring and managing networks.
- Strong knowledge of Cisco and Juniper software (IOS, IOS-XR, NX-OS and JunOS) and hardware.
- Implemented Firewall Security in compliance with PCI on Cisco ASA,FWSM & Checkpoint
- Well Experienced in configuring protocols HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, CHAP, and SNMP.
- Knowledge of Cisco Meraki Cloud managed Switches (MS250, MS350, MS410) and SD-WAN (MX 65, MX100, MX400)
- Strong hands on experience in installing, configuring, and troubleshooting of Cisco 7600, 7200, 3800, 3600, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
- Extensive Juniper Networks experience in JunOS, ScreenOS, Pulse, NSM, and JunOS Space
- In-Depth Knowledge and experience of various wireless 802.11 standards,5508 & 2504 controllers, Access Points, Wi-Fi analytics from various vendors (Cisco Meraki, HPE /Aruba, D-Link and Net gear)
- Advanced knowledge of OSI model, TCP/IP, Internet technologies, system security, firewall infrastructure, network architecture and Cisco network routing / switching (Layer 2 and 3) experience, including LAN and WAN, design and implementation which includes Layer 1 to Layer 7 experience
- Designing, Implementing and Troubleshooting Cisco Routers (2800,2900,3900,3800,7600) ISR using Static, RIPv2, OSPF, EIGRP & experience with Checkpoint, Cisco ASA devices
- Well experienced in configuring gateway redundancy protocols like HSRP, GLBP.
- Experience on Juniper: EX-2200, EX-4200, EX-4500; MX-480, 960, QFX10008, SRX210, SRX240, QFX 5100.
- Worked on Load Balancer F5 LTM, series like 6400, 6800, 8800 for the corporate applications and their availability.
- Experience on Network Security - Anomaly Detection in Attack Prevention System, Network and Host IPS/IDS, Cisco ASA firewall, Vulnerability scanning, Penetration testing, Buffer Overflows.
- Understanding of Open Source SDN-C platforms like CISCO, Brocade, Open Daylight, ONOS and NFV platforms like OpenStack/KVM.
- Experience in implementing Cisco VoIP using CUCM
- Experience working with Nexus 7K, 5K, 2K devices.
PROFESSIONAL EXPERIENCE
Confidential, Sandy, UT
Sr. Network Security Engineer
Responsibilities:
- Troubleshoot and Worked with Security issues related to Cisco ASA, Checkpoint, and IDS/IPS.
- Assisting in identifying security risks and exposures by participating in security reviews, evaluations, and risk assessments
- Providing expert level research and analysis for planning, organizing, and managing divisional security functions
- Participating in day-to-day information security activities such as questions, problems, exceptions, etc.
- Provides expert level research and analysis for planning, organizing, and managing divisional security functions
- Implementation of name resolution using WINS & DNS in TCP/IP environment
- Monitoring Network infrastructure using SNMP tools HP NNM, Solar-winds.
- Installed, configured and set security policies on cisco and checkpoint firewalls.
- Knowledge of F5 Best Practices, used iHealth, SSL offloading, Route Domains, GTM Sync Group.
- Configured VLANs, Private VLANs, VTP, Dot1.Q trunking on switches Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, InterVlan routing, LAN security.
- Worked extensively in configuring, Monitoring and Troubleshooting Checkpoint R77.XX security appliance, Failover DMZ zoning & configuring VLANs / Routing / NATing with the firewalls as per the design.
- Hands On experience in maintain the Fortinet infrastructure and Configuration of IPSEC VPN and troubleshooting in Fortinet firewall.
- Performed Administration and Deployment of CUCM, Free switch, Unity Connection, Presence, DSP Farm Routers, Upgrade to Cisco Unified Attendant Console 8.6 to 9.
- Installed, configured and set security policies on Cisco and checkpoint firewalls, VPN.
- Monitored and tested network protocols (Ethernet, TCP/IP) using Wire shark tool.
- Hands on experience with arista 7100 and 7050 switches.
- Worked on Windows server 2012 active directory and like deletion of user accounts and creation managing access controls.
- Implemented enterprise system monitoring using Nagios. Wrote many custom checkpoint
- Implemented the Inter VDOM Routing through the Fort iGATE Firewalls and also the Router.
- Implemented OSPF redistribution and authentication with type 3 LSA filtering to prevent LSA flooding and Configured OSPF over frame relay networks for NBMA and point to multipoint strategies.
- Installed and maintained Jenkins for Continuous Delivery as well as automate Ansible Playbook runs against production infrastructure
- Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
- Involved in the modification and removal of BGP from the MPLS routers.
- Worked on Orion for analysis and monitoring purposes
- Demonstrated understanding of cloud network concepts including SDN
- Also prepared documentation for various VLAN’s and Voice sub networks and worked on Visio for the same.
- Managing UTM Firewalls (Fortigate, Sophos, and WatchGaurd at 8 Locations.
- Wrote python scripts to parse XML documents and load the data in database.
- Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling
- Implement Imperva DAM, WAF, Counter Breach, and Encapsulate to client sites.
- Created and configure Imperva security policies
- Supporting EIGRP and BGP based company network by resolving level 2 &3 problems of internal teams & external customers of all locations.
- Implemented Zone Based Firewalling and Security Rules on the Checkpoint Firewall.
- Installed checkpoint and F5 load balancers in VMware workstation and VSphere.
- Involved in troubleshooting software, hardware and network problems.
- Responsible for Cisco ASA firewall administration across our global networks.
- Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series
- Worked in implementing and upgrading Defender One/One identity radius services.
- Configured L2/L3 Ether-Channels to increase bandwidth on core and distribution switches.
- IOS Upgrade in CISCO 6500 switch and 2800, 3845, 3945 routers.
- Primary responsibility is to design and deploy various network security & High Availability products lick Cisco ASA other security products.
- Support customer with the configuration and maintenance of ASA firewall systems.
- Worked on Cisco Firewalls, Cisco ASA 5500(5510/5540) Series.
- Experience with Firewall Administration, Rule Analysis, Rule Modification.
- Predominantly set up, configured and maintained a Windows server and Network Equipment on a TCP/IP network.
- Working knowledge of configuring routing protocols such as RIPv2, EIGRP, OSPF and BGP.
- Worked on INFLOBOX for Network Device Monitoring. Setting up Infoblox for local DNS and DHCP Configurations.
- Worked with Firemon policy manager to configure and monitor the firewall changes.
Confidential, Santa Clara, CA
Network Security Engineer
Responsibilities:
- Experience working with Nexus 7018/7010, 5020, 5548, 3600, 2248 devices.
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 and Fabric path and OTV in NX-OS
- Involved in upgrading switches from 6500 E to 4500-X
- Provided 1st tier support to Users Globally utilizing Cisco Call Manager 7.1/8.5 and Cisco Unity 7.1/8.5.
- Setting Aruba Access to link distribution switch system and then to WLAN controller.
- Identified on-board/off-board gap impacting Access Management, resolved by updating organizational procedure shortfalls.
- Configured Cisco ISE and switches to authenticate and authorize devices and users
- Monitoring, managing and troubles devices using Cisco Meraki.
- Mutual redistribution of OSPF and BGP routes using route maps.
- Experience in deployment and Management of Bluecoat proxies in forward proxy scenario as well as for security in reverse proxy scenario.
- Configure the BIG IP boxes with both GUI and (command line interface) CLI with big pipe and tmsh commands.
- Responsible for performing predictive wireless designs/site surveys with Air magnet Planner (Cisco 3500/3600/Aruba 105 access points) and conducting physical wireless site surveys with Air magnet Survey Pro for 1100 J P stores.
- Unified Communication Certification (ex. AIPS 4000) or equivalent experience designing and supporting an enterprise Unified Communications System (Free switch, PBX, Cisco UCM, Lync, Confidential )
- Design and implementation of the Next Generation firewall environment
- Configuring IPSEC VPN on Pulse Secure Access Service.
- Involved in upgrades to the WAN network from existing 7200vxr with ASR1004 and 3845/3945 routers.
- Upgrading branch network connectivity with total refresh of the network infrastructure with new 3845 routers and 2960 switches.
- Testing and troubleshooting various L2 and L3 protocols like DNS, TCP/IP, OSPF, TCP, UDP, RIP, STP, LACP, LLDP, etc.
- Implemented IPS, DLP and UTM features on the firewall for added security purposes.
- SDN/NFV performance testing with Spirent vSTC and Ixia IxVM
- Install, implement, configure, manage and support Virtual Machines with VMware
- Designed, upgraded and troubleshot campus, datacenter and SMB switching infrastructures utilizing Force10, Dell Networking, Cisco, Brocade and VMware NSX technologies.
- Installed and Configured Cisco ASA G Firewall at Database & App Server Layer
- Configuration and troubleshooting on HSRP, VRRP, GLBP, RSTP, MST related issues coming in network environment
- Designed and implemented Cisco controller-based wireless infrastructure for new Confidential multi-floor Plano People Center campus.
- Provided Tier II Support for Checkpoint Manage Firewall clients.
- Configured, troubleshoot, and upgraded Checkpoint Firewalls for Manage clients, which included network and/or resource access, software, or hardware problems.
- Proven ability in performing Operating System Updates and applying patches to VMware environments configured and implemented of composite Network models consists of Cisco 2600, 2800, 7600, 7200, 3800 series routers and Cisco 3550, 3750,3600,3800,3500, 5000, 6500 Series switches.
- Configured/Troubleshoot Site to Site VPN tunnels with our clients on Cisco ASA 5500 Platform
- Implementation and configuration of GLBP/HSRP on multilayer switches for first hop redundancy
- Worked on F5 BIG-IP LTM, configured profiles provided and ensured high availability.
- Hands on Experience testing iRules using Browser (IE), HTTP watch on f5 load balancers.
- Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures.
- Configuration of Virtual Servers, Nodes, and load balancing Pools.
- Tested controllers from Cisco, Confidential, Aruba, Meru, Trapeze, Air magnet, Xirrus.
- Administer and Troubleshoot Cisco ACE/GSS load balancers.
- Firewall policy provisioning on Fortinet Fort iGATE appliances using FortiManager.
- Supported and executed migration to F5 BIG-IP LTM/GTM ADC Appliances from Citrix NetScaler
- Design, and configuration of OSPF, BGP on Juniper Routers and SRX Firewalls
- Conduct business impact analysis for vital functions; document recovery priorities of the key processes, applications and data. creation and modification of Checkpoint Firewalls up to GAIA R77.30, Palo Alto Next-Generation firewalls, Bluecoat proxies and Cisco ASA.
- Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route
- Configured networks using routing protocols such as RIP, OSPF, BGP,TCP,UDP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure
- Configure the Switches to add DNS, DHCP Infoblox servers to the network.
- Experience with configuring IPAM on DNS Infoblox like adding the already existing networks and
- Worked with Cisco IOS, NX-IOS, IOS-XR.
- Architect of SDN/NFV applications in the area of network defense, DDoS remediation and moving target defense.
- Maintain High Availability and Clustered firewall environments for customers using Check Point High Availability, and Nokia VRRP. Provide on-going support.
- Worked on design and implementation of Dial-plan for Inbound and Outbound calls in CUCM Clusters
- Provided firewall policy configuration and services with Juniper SRX series
- Performed basic security audit of perimeter routers, identifying missing ACL’s, writing and applying ACL’s
- Troubleshooting and installing of ISR, GSR, ASR9000 and Nexus 3600 devices.
- Migrated L3VPN Traffic from Juniper M320’s to Cisco CRS-1 with minimum disruption.
- Multiple VCE Vblock implementation with 356 ESXI 5.5 hosts and over 5700 virtual servers including UIM provisioning storage and NSX firewalls and Vsheild
- Managed rules on Checkpoint NGX firewall.
- Performed Administration and Deployment of CUCM, Free switch, Unity Connection, Presence, DSP Farm Routers, Upgrade to Cisco Unified Attendant Console 8.6 to 9.x
- Configured IPSEC VPN on SA6500series firewalls
- Experience with Virtualization, SDN, NFV, OpenFlow, Openstack Neutron
- Level 3 support Firewall Engineer (Cisco ASA and Juniper SRX)
- Configured and troubleshoot VPN's on infrastructure VPN devices. Provided support for infrastructure FW/IPS platforms.
- Upgraded device codes Cisco IOS, NX-OS, PAN-OS, Aironet- OS with planned roll-back procedures
- Perform installs, configure and troubleshooting on stateful inspection firewalls and inline/passive IPS/IDS sensors.
- Administration is Arista (7050,7060,7260.7150) switches
- Configuring/Managing Intrusion Prevention System IPS: Cisco IPS/Fortigate Checkpoint UTM.
- Specialized in Network Security technologies (Firewall, IPS/IDS, Content Filtering, Proxy and Cisco network products).
- Responsible for conducting physical wireless site surveys with Air magnet Survey Pro, predictive site surveys with Cisco WCS and Air magnet Planner, system design, deployments, implementations, migrations, support, troubleshooting of Cisco/ Confidential /Symbol 802.11b/g/a/n Wireless Local Area Networks (WLAN) for customers like Outback Steak House, Bonefish Grill, DBK Concepts, Aveva, NLS Group.
- Implemented Zone Based Firewalling and security rules on the Palo Alto Firewall.
Confidential
Network Security Engineer
Responsibilities:
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco ASA's 5585.
- Responsible for Cisco ASA firewall administration, Rule Analysis, Rule Modification.
- Implementation of Access Lists for allowing/blocking desired traffic.
- Worked with Aruba Access point as a Public Wi-Fi and successfully implemented Wireless Access Point (WAP) worked on Aruba Airwave for wireless management
- Designed Call Flow diagrams for Legacy voice and UC auto attendants.
- Packet capturing, troubleshooting on network problems, identifying and fixing problems.
- Experience working in Datacenters environment, configuration changes as per the needs of company.
- Integrate with other systems using Rest APIs, Netcong/Yang and OpenConfig models, evaluate third party solutions, influence vendor solutions and standard adoptions.
- Experience in migration of VLANS.
- Configured the Hadoop properties to achieve the high performance.
- Created multiple EC2 instances in different zones through AWS dashboard
- Performed Configuration on ASR9K Pairs includes HSRP, Bundle Ethernet Config, and Assigning DHCP profiles.
- Supported Check Point 3.x, 4.x, Net Ranger IDS, Cisco Pix, HP Open View
- Upgraded internal and customer TLS/SSL Apache Web Server configurations; trained staff on proper implementations, potential issues/concerns, and automated changes with Ansible
- Implementing Troubleshooting Cisco ASA 5500 security appliance FWSM Modules and Managing Security devices using Cisco Security Manager CSM.
- Manual Web-Application vulnerability assessment & Network assessment through OWASP framework using "Burp Suite" and Rapid7 framework, while particularly focused on OWASP Top 10 and Rapid Top 10 vulns.
- Provider Class Enterprise series routers and switches Cisco 5508 Controllers Arista Switches Firewalls / IDS Checkpoint Firewall Cisco IP phones Cisco Access Points Juniper Mag4610
- Administered Windows 2003/2008 Active Directory, DNS, DHCP and built new windows physical/virtual server as per the requirement of the Oncology EHR Project
- Improved Quality of Service (QoS) by defining LSPs on MPLS to meet specific service level agreements (SLAs) on traffic latency, jitter, packet loss and downtime
- Responsible for conducting physical wireless site surveys with Air magnet Survey Pro and predictive site surveys with Cisco WCS and Air magnet Planner for the Department of Veterans Affairs (VA) National Wireless Infrastructure Site Survey project. This project consisted of conducting location based, VoIP, and data wireless site surveys for more than 50 VA hospitals (Phase 3).
- Configured Policies to allow customer traffic in Juniper Net screen/SRX firewalls
- Drafted and installed Juniper SRX Firewall rules and policies
- Level 3 support Firewall Engineer (Checkpoint and Juniper SRX
- Implemented a 40 agent IPCC Express call center.
- Configuring objects such as Load Balancer pools for local traffic management on F5 Load Balancers
- Configuring VLANs/routing/NATing with the firewalls as per the network design.
- Experience in establishing NIC bonding/ teaming, IP aliasing.
- Installed Cisco Prime 3.1 and implemented a template based configuration standard for new deployments.
- Acted as lead engineer on Cisco Call Manager IPT implementations.
- Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices and also configure 2k, 3k,7k series and ISR Routers
- Used Python scripting for network sniffing and managed parameters for pool of servers and updated, automated and migrated different services and software by means of Ansible.
- Worked with Host Master for shared web hosting and managed Web Application firewall (WAF), DNS and DHCP management using Infoblox and Analyzed networks using Wireshark
- Reviewed QoS policies and configurations for network team members.
- Closed 95% of trouble tickets on the first call without escalation.
- Proficient in Palo Alto Next-Generation Bluecoat web proxy, HP Arc Sight, Splunk Enterprise, Wireshark, Fire Eye, and various internet tools to assist in analysis.
- Configuring and resolving various OSPF issues in an OSPF multi area environment.
- Implemented, configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).
- Installed and maintained Cisco and F5 Load Balancer and documentation.
- Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
- Implementing, configuring, and troubleshooting various routing protocols like RIPv2, EIGRP, OSPF, and BGP etc.
- Prior experience with IT security devices such as Check Point Firewalls, Bluecoat Secure Web Gateway, Source Fire IDS/IPS, Symantec DLP, Nessus, Juniper SSL-VPN, and Fore Scout (NAC)
- Good knowledge in systems integration, software hardware emulation experience.
- Perform setup of test scenarios, both hardware and software components, and perform troubleshooting.
- Configured and deployed robust VoIP Infrastructure using KAMAILIO with asterisk integration, High Availability, flood detection and built a PHP/AJAX based web interface for management.
- Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network
- Configuring, implementing and troubleshooting VLAN’s, VTP, STP, Trunking, Ether channels.
- Designing, implementing LAN/WAN configurations on Cisco 5K, catalyst 6500 switches.
- Experience configuring Virtual Device Context in Nexus 3800 series switch.
- Strong knowledge on networking concepts like TCP/IP, Routing and Switching.
- Designed, configured, implemented site-site VPN on juniper PSA5000 firewall.
- Implemented, configured redundancy protocols HSRP, VRRP, GLBP for Default Gateway Redundancy.
- Experience in troubleshooting network issues including boundary protection devices and Bluecoat Proxy Servers.
- On Catalyst 6500 switches configured VLAN Routing
- Working with Checkpoints, ASA’s (Other Remote sites), Palo Alto’s FW’s
- Worked in projects converting P2P circuits into MPLS circuits, commissioning and decommissioning of the MPLS circuits.
- Utilize Solar winds and Cisco Prime to monitor and manage all Netlfow and SNMP-enabled network devices
- Performing network monitoring, providing analysis using various tools like Wireshark, Solar winds etc.
- QRF for transformed sites as per the client requirement.
- Provided proactive threat defense with ASA that stops attacks before they spread through the network.
- Replace branch hardware with new 2851 routers and 2960 switches.
- Designed, Validated and implemented LAN, WLAN & WAN solution to suite client’s needs.
- Implemented client-server application, which will communicate over 802.15.4. using 6LoWPAN and IPv6.
- Deployment of Check Point firewalls/UTM - Includes configuration and troubleshooting boxes.
- Serve as organization SME for Tenable Security Center, HP Fortify and Imperva Secure sphere
- Excellent Hands on Experience with Apache and NIGINX Web Servers.
- Experience with Project documentation tools & implementing and monitoring systems. Experience with developing network design documentation and presentations using VISIO.
Confidential
Network Engineer
Responsibilities:
- Management and D&I of a Vblock 540,340.
- Configuring Vdc, fex pinning, fex port-channel, port-channel, peer keep alive, peer link.
- Paging systems integration with CUCM, configuration and testing. (Informa Cast/IP Celerate)
- Perform day to day admin level on VBLOCK.
- Providing KT on VBLOCK.
- Provide advance technical support on VCE's Vblock series systems.
- Implement VBLOCK into production
- Troubleshoot call routing issues using debugs and traces to identify and correct issues.
- Installing license according to the Customer requirements.
- Experience with a mixed vendor environment - Checkpoint, Cisco, Skybox and Splunk
- Providing Knowledge Transfer of various components including Compute, Network and Database.
- Advanced Management to the clients of VBlocks.
- Investigate, evaluate and recommend new network products and architecture, maintain knowledge of emerging technologies for application to enterprise.
- Develop and maintain support documentation including support guides, knowledge base articles, procedures, and online customer information.
- Evaluation of Cisco Nexus Series of switches (Nexus 7K, 5k, 1k).
- Managed corporate Juniper SRX Firewall implementing security rules and mitigating network attacks.
- Experience working with Active Directory (as a centralized system) to automate network security management and user data
- Deployed Site to Site and Client to Site VPNs utilizing.
- Working on Multi-vendor switches evaluation such-as Force 10, Juniper, and Brocade.
- Cabling and verifying the VBlocks infrastructure.
- Testing and verifying all the vblock hardware components and troubleshoot accordingly.
- Configuration of UCS and VMware Infrastructure part of the logical build and infrastructure services.
- Rack and stack Pre-configured new hardware and connect the circuits. Work with Carrier to test and turn-up circuits.
- Troubleshooting, diagnosing and repairing faults in WiMax RF network
- Experience on working/troubleshooting with UCS.
- Knowledge on Amp servers and Hands on experience with MDS switches.
- Experience with migration of services from one data center to another data center.
- Hands on Experience with N2k, N3k, N5k, N7k.
- Troubleshooting issues related to VMware & UCS in deploying stage and install according to the client requirements.
Confidential, Tampa, FL
Network Engineer
Responsibilities:
- Involved in configuring IP Quality of service (QoS)
- Experienced in WAN environments, installing and troubleshooting data circuit problems (MPLS, T1)
- Involved in designing and applying QOS and policy map to 2800 series routers for all the branches
- Involved in designing GRE tunnels for encryption of data flow from source to destination.
- Migration from Analog telephone to VOIP based infrastructure
- Implementing VoIP solutions using SIP & H.323 also have sound knowledge of Confidential VoIP product.
- Hands on experience with Cisco 3500, 3750, 4500, 6500 series equipment and configuring and deploying and fixing them with various modules like Gig card, VPN SPA card, WIC card.
- Juniper NSM and Juniper CLI for SSG and SRX, Juniper SSL-VPN, OS upgrades, CLI changes, troubleshooting, configurations, rule re-ordering and optimizations.
- Build and flash Fortinet 90D routers and switches with new configurations.
- Tightened security of routers, switches, servers, and thin clients after new configurations.
- Perform DSL to broadband cutovers through creating IPSEC VPN Tunnels in Fortinet.
- Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210.
- Hands-on experience on Checkpoint Firewall R70, Palo Alto and Cisco ASA 5500 firewalls.
- Experience on Checkpoint Firewalls NG, NGX R65, R70 and VDs (VMware Network).
- Experience in creating multiple policies and pushing them in to Checkpoint Firewall (Gateways) and hands on experience in managing the Checkpoint Management Server.
- Configuring BGP/OSPF routing policies and designs, worked on implementation strategies for the expansion of the MPLS VPN networks.
- Managed IOT (Interoperability Testing) for new end-user devices to be incorporated in Mobil ink WiMAX Network
- Configured Frame-Relay, ISDN, ATM, load balancing switches and also configured IPX/SPX, HDLC, PPP, BGP, EIGRP, OSPF and VRRP on various sites.
- Provided support for internal network and system related trouble tickets.
- Applying crypto maps and security keys for the branches, ISAKMP (Internet security association key management protocol) for establishing Security associations (SA) cryptographic keys.
- Experience with Project documentation tools & implementing and maintaining network monitoring systems (Cisco works & Solar winds) and experience with developing network design documentation and presentations using VISIO.
- Understanding & Implementation of IPSEC & GRE tunnels in VPN technology.
- Involved in designing L2VPN services, VPN-IPSEC authentication & encryption system.
- Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.
- Implementing & Troubleshooting of T1 and CSU/DSU and data circuits.
- Have experience with Cisco works LAN Management Solution.
- Experience in migration of Frame-relay based branches to MPLS based technology using multi-layer stackable switch like 6500 series and 2800 series router.
- Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.