We provide IT Staff Augmentation Services!

Senior Ipam/dns Engineer Resume S

3.00/5 (Submit Your Rating)

s

SUMMARY

  • dis is a brief outline of my skill set, experiences, and educational profile.
  • me is seeking to join a company where me can apply my noledge and experience to add value to teh organization.
  • My experiences have been versatile - ranging from applications, network Architect/engineering, and Infoblox DDI (DNS, DHCP, and IPAM)

PROFESSIONAL EXPERIENCE

Confidential

Senior IPAM/DNS Engineer

Responsibilities:

  • Development of DNS/IPAM Architecture.
  • Configuration/Operation of Infoblox Trinzic Appliances.
  • SNMP Tools
  • DNS/DHCP Troubleshooting
  • IPAM data processing and conversion to Infoblox-compatible format
  • Configuration and operation of Infoblox ND 800 used for network discovery
  • Design and configuration of Infoblox Administration using RADIUS,
  • F5 Load Balancers: GTM, LTM
  • Integration of F5 DNS and Infoblox DNS
  • DHCP
  • Active Directory
  • Wireless LAN (WLAN) - installation of controllers, Access points, wireless coverage plans
  • Wide Area Network (WAN) - calculation of Bandwidth Requirements for applications. Working wif Confidential, Confidential and other WAN providers to provide optimal WAN circuits. Testing WAN bandwidth to validate teh provisioned WAN circuits.
  • LAN - DNS, DHCP, F5, wiring, routers, switches, Firewalls, etc.

Confidential

Senior IPAM/DNS Engineer

Responsibilities:

  • Development of DNS/IPAM Architecture.
  • Configuration/Operation of Infoblox Trinzic Appliances.
  • Configuration and operation of Infoblox ND 800 used for network discovery
  • Design and configuration of Infoblox Administration using RADIUS,
  • TACACS+, LDAP, and AD Authentication server groups.
  • DNS Design and trouble-shooting
  • F5 Load Balancers
  • DHCP
  • Active Directory
  • Cisco Works
  • Wireless LAN (WLAN) - Operation of teh deployed Access points ensuring no overlaps in teh wireless channels
  • Wide Area Network (WAN) - Interfacing wif teh ISPs to ensure that teh BGP and MPLS routing work successfully. Testing WAN bandwidth to validate teh provisioned WAN circuits.
  • LAN - all aspects of WAN operations including Network Monitoring DNS, DHCP, IPAM,Firewalls, etc

Confidential

DDI Engineer

Responsibilities:

  • DDI (DNS/DHCP/IPAM) support, design, Security, Planning and trouble-shooting.
  • Teh IPAM Platform is QIP wif Infoblox on teh External Network where
  • DNSSEC is deployed. My job also involves PERL scripting aimed Confidential automating most IP
  • Registrar functions hence reducing human errors and increasing speed cum efficiency. Also use F5 Load Balancers for GTMs and LTMs.

Confidential

Network/DNS Engineer

Responsibilities:

  • DDI (DNS/DHCP/IPAM) support, design, and trouble-shooting for various customers including DOW Chemical, Amtrak, Federal government departments, State of Georgia, Astellas, etc.
  • Worked on teh following IPAM platforms:
  • Infoblox
  • QIP
  • Diamond IP
  • Blue Cat

Confidential

Product Specialist

Responsibilities:

  • DNS/DHCP/IPAM Migration.

Confidential

DNS Architect/Planner

Responsibilities:

  • DNS/DHCP Migration: me planned and migrated over 200 DHCP/DNS servers from teh Solaris platform to teh Infoblox appliance platform. dis was a global project affecting locations in Africa, Asia Pacific, teh United States, Latin America, and Europe. Most of teh migrated sites were manufacturing plants where efficiency and diligence were very important to ensure no disruptive impact to production disruption during teh migration process.
  • Used teh QIP (Quadrant IP) Internet Protocol (IP) Management System to manage teh DNS and DHCP servers in Ford’s facilities across teh globe.
  • Consolidated DHCP and DNS Servers in teh Ford’s Data Centers
  • Maintained DNS security via DNS ACLs and other DNS security measures. Implemented IP security measures and cured areas of DNS vulnerability.
  • Performance monitoring and optimization of DNS/DHCP servers wif respect to load sharing and traffic balancing.
  • Performed version changes on teh QIP Enterprise servers and converted teh QIP enterprise server from Lucent 6.2 to version 7.2.
  • Repaired teh QIP enterprise databases and recovered damaged data.
  • Ensured data synchronization in teh QIP enterprise servers and teh remote DHCP servers to ensure data compatibility between teh enterprise server and teh remote DNS/DHCP servers.
  • Provided assistance to teh network engineers in teh design of teh network infrastructure and teh configuration of IP Helpers and DNS data in teh router/switch configuration files. me also provided assistance to teh Firewall team in designing and implementing teh external network infrastructure to allow Ford’s external clients and partners to access resources in teh DMZ.
  • Assisted Ford’s Application developers in teh optimization of application architectures wif respect to DNS/DHCP services and teh access of teh web interface.
  • Designed enhancements to teh DNS architecture, and specifically segmented teh Internal-facing and teh External-facing DNS services..
  • Developed strategies to migrate to IPv6 DHCPI conducted testing.
  • Scripting: developed scripts to automate some of teh manually- intensive activities inherent in teh migration of DNS/DHCP services. Teh scripts augmented teh CLI suite of commands.
  • My job also included teh migration of DHCP/DNS servers from teh existing IP space to a High Availability (HA) space in a transparent manner that caused no outages. dis process involved DHCP scope moves and teh re-direction of statically configured DNS clients.
  • Configured teh DNS ACLs and worked in concert wif teh Active directory teams to ensure that only authorized servers are allowed to alter DNS records on Master DNS servers.
  • Performed trouble-shooting using Digs, Nslookups, Protocol analyzers, etc. to fix internal and external DNS problems
  • Integration of IP v4 and IPv6 in teh DHCP and DNS environments.
  • Performed customer support and also supported teh network engineering team to ensure that teh DNS architecture supports teh network infrastructure fabric.

Confidential

Network Engineer

Responsibilities:

  • Configuration of Routers, Switches, and Access points
  • Network Security
  • Juniper Firewalls; implementation firewall rules.
  • Application testing and optimization
  • Connectivity between Confidential and Daimler Benz and other partners
  • Configured GSS (Global Site Selectors) and Cisco ACES.
  • Engineered security and connectivity strategies between Confidential and its external clients
  • Firewall

Confidential

DNS Operations Engineer

Responsibilities:

  • IPAM evaluation and benchmarking of teh QIP system.
  • Migration of DHCP and DNS servers
  • DNS security
  • Video applications benchmarking, including bandwidth sizing for video
  • Monitoring performances of video surveillance applications
  • DNS/DHCP trouble-shooting
  • Maintenance of teh GM DNS Root servers.
  • Registration of GM’s external DNS Root servers

Confidential

Network Engineer/Network Trouble Shooter

Responsibilities:

  • Lead Network (LAN/WAN) Application Trouble Shooter. Using teh Network General’s Protocol Analyzer- teh Sniffer, me was responsible for debugging network and application problems in GM’s offices and manufacturing facilities in teh US, Canada, Europe, and Mexico (Silao, Ramos Arizpe, and Mexico City).
  • Wireless network troubleshooting and implementation. My work included teh optimization of Access Points (APs) and teh minimization of channel overlaps. Part of my initial work identified some of teh wireless challenges encountered in teh Assembly plants. These challenges included signal interference from structures in teh plants as well as microwave ovens.
  • Application testing: using teh Chariot application, me simulated various GM applications and tested their response times and latency prior to deploying teh applications into production.
  • Performed remote network and server management using OVO, BMC, Cisco Works, Radia, and NNM.
  • Circuit testing: tested teh Confidential &T WAN circuits to verify teh throughput was consistent wif teh bandwidth GM paid for. Most of teh tested circuits were TI lines, fractional T1s, and 43mb/s lines.
  • Configured Cisco routers, switches, hubs, and Access Points.
  • Performed Logical network design.
  • Laid Fiber-optic cables, category 5 Wiring, etc.
  • Prepared EWOs (Electronic Work Orders) for risky jobs that could potentially impact production

We'd love your feedback!