We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

2.00/5 (Submit Your Rating)

Fairfield, CT

SUMMARY

  • Network specialist with a diverse background in various areas of IT infrastructure:
  • Around 8 years of experience in the plan, design, development, implementation and maintenance of complex network systems.
  • Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.
  • Experience in working with 2600, 2900, 3600, 3900, 7200, 7600 series Cisco Routers.
  • Comprehensive expertise in the implementation, analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
  • Configuring RIP, OSPF, EIGRP, BGP, MPLS, QOS, ATM and Frame Relay.
  • Designed and implemented switched highly available LAN IP infrastructure using VLANs, VTP, Spanning Tree, Fast/Gigabit Ethernet and Trunking/ channeling technologies (Catalyst 2950, 3750, and 4500).
  • Good knowledge of CISCO NEXUS data centre infrastructure with 5000 and 7000 switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (FEX) (222, 2248).
  • Experience configuring Virtual Device Context in Nexus 7010.
  • Experience in Configuring Checkpoint Firewall (Version R62, R65 and R71) and Cisco ASA firewalls as Standard and Distribution deployment to have the network secure and maintained Site to Site VPN connection through the Firewalls.
  • Experience on Check Point Firewalls NG, NGX, NG R55, NGX R60, R65, R70, R75.
  • Migrated and implemented new solutions with Cisco ASA Firewall series 5500 - X.
  • Deployed Check Point Provider-1 NGX and configured CMAs.
  • Experience in converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Experience with F5 load balancer configuring, implementing and troubleshooting in the enterprise network.
  • Experience with F5 iRules (F5’s TCL scripting language) enabling customization of application load balancing solutions through the control and direct manipulation of the application traffic.
  • Experience in managing and configuring F5 Big-IP LTM and GTM devices.
  • Extensive experience in Configuration and deployment of network security devices, including firewalls, Intrusion, Detection Systems, VPN, Identity Gateways.
  • Experience in implementing network security protocols L2TP, PPTP, IPSEC, implemented network diagrams using Microsoft Visio, and documented network deployments through the use of Cisco best practices.
  • Knowledge about Juniper VPN devices and Junos.
  • In-depth knowledge and hands-on experience in Tier II Routing Policies, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, ACL.
  • Expert in configuring and implementing proxy servers and Authorization, Authentication & Accounting (RADIUS, TACACS+).
  • Network monitoring using Solar winds and alerting using solarwinds to Operation Center (NOC) from a network management perspective.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Excellent working knowledge of TCP/IP protocol suite and OSI layers.
  • Good system administration skills along with Hardware and Software troubleshooting.
  • Knowledge in preparing technical documentation and presentations using Microsoft VISIO/Office.
  • Advanced knowledge in Linux and Unix Operating Systems.
  • Extensive knowledge and understanding of global security policies.
  • Demonstrate deep expertise in technical and security process design.
  • Advanced knowledge in IPS and IDS tools such as Cisco and ISS Site protector.
  • Process elaboration, flowchart and network topology and several documentations
  • Experience dealing with enterprise applications like domain Controller (i.e. LDAP, DNS Kerberos etc).
  • Experience in administration and designing web proxies which includes blue coat.
  • Extensively used the packet capture tools like Tcpdump, Wireshark, and snoop on the devices to identify the potential network issues.
  • Excellent verbal and written communication skills.
  • Strategic thinking and planning along with very good analytical Skills.
  • Self-starter and able to work independently or under minimal supervision.

TECHNICAL SKILLS

Cisco Routers: (1700, 1800, 2500, 2600, 2900, 3600, 3900, 7200 and 7600).

Cisco: L2 & L3 Switches (2900, 3560, 3750, 4500, 4900, 6500, Nexus 2K/5K/7K).

LAN Technologies: Ethernet, Fast Ethernet, and Gigabit Ethernet, SMTP, VLAN, InterVLAN Routing, VTP, STP, RSTP, Light weight access point, WLC, IPv6, WLAN.

WAN Technologies: Frame Relay, PPP, HDLC, T1/T3, DS3, OC-192.

Load Balancers: A10 Networks (AX2500), Cisco CSM, F5 Networks (Big-IP)

Firewalls: Juniper NetScreen, Firewalls ISG 1000/2000, Cisco PIX 505/515E/525 & ASA 5500 Series.

OS products/ Services: DNS, DHCP, Windows (2000/2003, XP), UNIX, LINUX.

Protocols/ Services: Routing Protocols (RIP v1 & v2, OSPF, UDP, EIGRP, BGP).

Physical interfaces: Fast Ethernet, Gigabit Ethernet, Serial, HSSI, Sonet (POS)

Network Management Tools: Wireshark, NetFlow Analyzer, NetScout, IBM Netcool, CiscoWorks, and Ethereal, OPNET Modeler, Nmap, Netcat, Tcpdump, Spirent, Ixia.

Security Server Protocols: TACACS+, RADIUS.

PROFESSIONAL EXPERIENCE

Confidential, Fairfield, CT

Senior Network Engineer

Responsibilities:

  • To ensure that day-to-day Network Operations run smoothly. Change management and third level incident management being the primary responsibility, participate directly as well as take escalations from the team members as and when required.
  • Involved in implementation of L2 technologies including VLAN’s, VTP, STP, RSTP and Trunking.
  • Involved in implementation of routing protocols RIP,RIP V2,EIGRP,OSPF, and BGP
  • Involved in configuring and implementing of composite Network models consists of Cisco7600, 7200, 3800 series routers and Cisco 2950, 3500, 5000, 6500 Series switches.
  • Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LANs of network.
  • Provided full visibility and notification of authorized and unauthorized network access with integration of CISCO ASA and NAC solution.
  • Handled deployment and management of Palo Aalto 2020X and Cisco ASA 5500 series.
  • Handled the migration to Checkpoint Provider-1 platform.
  • Switching related tasks include configuring VTP for Inter-VLAN Routing, EtherChannel (LACP & PAgP) and RPVST+ for loop avoidance.
  • Rule base verification and migration on Checkpoint firewalls.
  • Implemented the numerous firewalls polices on Cisco and Palo Alto
  • Applying hot fixes and patches for bug fixes / security vulnerabilities.
  • Modify Catalog policies as per Business requirement on web proxy blue coat.
  • Implementation and configuration of ASA 5520 in failover along with the CSC module as per the customer requirement.
  • Design the firewalls rules on Cisco ASA 5520 and 5540-X and implemented the different NAT policies.
  • Upgraded the Cisco ASA firewalls from version 8.6 to 9
  • Configured, monitored and troubleshoot Cisco's ASA 5500/PIX 515 security appliances, failover DMZ Zoning.
  • Negotiate VPN tunnels using IPsec encryption standards and, also configured and implemented Site to Site VPN and remote VPN.
  • Work with application team and Information security for ACL renewals and ACLS aging.
  • Writing the configuration script from 9.x version to 11.x version and troubleshooting issues.
  • Worked on building Global Traffic Manager and Iquery functionality between LTM & GTM for a HA design.
  • Dealt F5 GTM solutions, including Wide IP and Pool Load Balancing Methods, probers and monitors.
  • Worked on LTM Inbound SNAT configurations and outbound NAT server to IP mapping
  • Implementation and configuration of ASA 5520 in failover with Site to Site VPN and RA VPN;
  • Handled LAN environment involving HSRP, VLANs, Trunking and Spanning Tree protocol.
  • Work with IP for any vulnerabilities /ACLS and remediate as needed.
  • Troubleshooting and performing changes with Firewalls.

Environment: Cisco 7600/7200/3800 Routers, Cisco 2950/3500/5000/6500 Switches, Juniper MX 480, Juniper MX 960, RIP, OSPF, EIGRP, BGP, LAN, WAN, ASA 5520, PIX515, F5 8900, 5050, LTM, GTM, VPN, RA VPN, Checkpoint GAIA, R75, R71, R65, provider-1, UTM-1, VPN-1, VLANs, Wireshark.

Confidential, Wilmington, DE

Senior Network Consultant

Responsibilities:

  • Responsible for Configuring Cisco and Juniper Routers and Switches.
  • Worked on Juniper MX 80 and3D, MX240 and 3D, MX480 and 3D, MX960 and 3D, MX2010 and MX2020.
  • Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing protocols (BGP/OSPF), and IP addressing.
  • Ability to analyze, configure and troubleshoot networks
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Estimated Project costs and created documentation for project funding approvals.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Design, build, and implement various solutions on Check Point Firewalls, Blue Coat Proxies, F5 Load balancers and F5 Global Traffic Managers.
  • Performed upgrade from old platforms to new platforms R62 to R75.45, etc.
  • Worked on migrating to R75.20 on IP560 Nokia boxes.
  • Worked on various platforms of Checkpoint like Nokia, Checkpoint (SPLAT).Fully versed in the syntax of security platforms, and day to day rule verification
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope
  • Involved with implementing and maintaining network monitoring systems (CiscoWorks and HP OpenView) and experience with developing complex network design documentation and presentations using Visio.
  • Continuous monitoring of CPU utilization, link utilization, connection table utilization.
  • Worked on various different VPN platforms, IPsec, SSL & Web VPN. Mobile VPNs solutions from Cisco and Checkpoint.
  • Manage ACLS and pushing rules through Solsoft.
  • Checkpoint Connectra appliances-NGX R62 & R66.
  • Implemented clientless SSL VPN on ASA 5500-x platforms.
  • Worked on ASA routed mode and transparent mode.
  • Worked on ASA 5500-x platform configuring the ACLS, NAT policies and, AnyConnect VPN’s.
  • Configuring failover and working on SSL VPN when in active/standby failover on ASA.
  • Creating Virtual IP address, Pools and Persistence profiles on F5 LTMs.
  • Create complex iRules using TCL language for URL redirections, HTTP header-insertion and HTTP header modification.
  • Dealt with F5 iHealth reports creating and maintaining high quality installation guides, standards documents, diagrams, run books and other engineering documentations.
  • Creating Wide IPs with various load balancing methods like Global Availability, Topology and Round Robin.
  • Dealt with F5 GTM solutions, including Pool Load Balancing Methods, probers and monitors.
  • Deployed LTMs and GTMs in DMZ environments with FIPS solutions.
  • Perform SSL Offloading on LTMs and web accelerators with 2048-bits VeriSign certificates. Also, renewing certificates to ensure the security of websites.
  • Engaged in various migration projects like migrating v9.x load balancers to v10.x.
  • Administrated and implemented Palo Alto firewalls and configuring policy based filtering.
  • Experience in Configuring, deploying & upgrading the NX-OS operation system in the data center.
  • Working experience of upgrading NX-OS to version 6.1 on the Cisco Nexus 7010.
  • Experience configuring Virtual Device Context in Nexus 7010
  • Implement the firewall rules using NetScreen manager (NSM).
  • Push the firewall rules on various versions of Nokia boxes and cross beam from Provider-1 NGX CMAs.
  • Gathering details from customers and providing best security infrastructure solutions with F5 load balancers, Check Point/NetScreen firewalls and Blue Coat proxies.
  • Created various B2B environments using Blue Coat proxies.
  • Commissioning & de-commissioning with Cisco 7500, 7200, 6500 with SUP 720 module, 3550, 2950 switches for the Data center migration & operations.
  • Being part of L3 escalation team, receive the calls from L2 team during the On call time.

Environment: TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, ASA 5500, F5 6400, 3600, LTM, GTM, Blue Coat Proxy, LAN, WAN, SSL, AnyConnect VPN, NGX R66, IPsec, IP560 Nokia boxes, Connectra NGX R62 & R66, NX-OS, Firewall cluster, clusterXL, Checkpoint R65, NetScreen ISG2000, Load Balancers v9.0, v10.0.

Confidential, East Hanover, NJ

Senior Network Engineer

Responsibilities:

  • Configured Routing protocols such as OSPF and policy based routing.
  • Team member of Configuration ofCisco7206 router and Configuration of Catalyst switches.
  • Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
  • Configuring RIP, OSPF and Static routing on JuniperM and MX series Routers
  • Design, Implement & troubleshooting of Juniper switches, routers and Firewall.
  • Create and testCisco router and switching operations using OSPF routing protocol.
  • Configuration and troubleshooting link state protocols like OSPF in multiple areas.
  • Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Optimized performance of the WANnetworkconsisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Implementing NAT solution's on Cisco IOS routers.
  • Installing and configuring F5 Load balancers and firewalls with LAN/WAN configuration
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Change Management: Need to make sure that all the change designs and implementations are completed and tested as per the schedule required by the customers.
  • Worked on checkpoint UTM1, VPN1 and activating blade licenses to be used as Intrusion prevention and antivirus appliance.
  • Having data center design experience, installing and configuring network devices in a data center including patching the cables in the patch panel. Design and implemented network infrastructure and configured all network infrastructure devices including network printers and registers.
  • Implementation and configuration of ASA 5520 in failover along with the CSC module as per the customer requirement.
  • Implementation and configuration of ASA 5520 in failover with site Site-to-Site VPN and RA VPN; IPS
  • Deployed BIG-IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Net screen devices for easier management and common configurations.
  • Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series.
  • Configuring & managing around 500+ Network & Security Devices that includes Juniper (NetScreen) Firewalls, F5 Big-IP Load balancers and 3DNS, Blue Coat Proxies and Plug Proxies.
  • Clean up all legacy devices and insure all systems in the environment have been cleaned up.
  • Measure the application performances across the MPLS cloud through various routing and switching methods.
  • Implementation of HSRP, DHCP, DNS, FTP, TFTP, MRTG.
  • Designed, developed, maintained and supported wired and wireless networks.
  • Configured L3 protocols (IP, BGP, OSPF, EIGRP, IGRP, CIDR, RIP, ISIS), redistribution, summarization, Filtration (using distribute list, route map, prefix list, access list).
  • Training the new team members with product technologies and Infrastructure setups. Also to make them aware of all the processes that needs to be followed while doing the technical work.
  • Periodically or as and when required, revisit the process and improve it, covering any existing gaps and making it more robust as well as practical.
  • Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands on with F5 BIG-IP LTMs/EM.
  • Strong knowledge in working with F5 Load Balancers and their implementation in various networks.

Environment: OSPF, Cisco 3550/4500/6500 switches, Cisco 2500/2600/3000/6500/7500/7200/7260 routers, ASA 5520, F5 6800, LTM, GTM, LAN, WAN, SSL, AnyConnect VPN, NGX R66, IPsec, NetScreens, SSL termination and initiation, LTM 5100 series, 6800 series, Checkpoint R65, R62, R60, UTM-1, VPN-1.

Confidential

Network Engineer

Responsibilities:

  • Responsible for the configuration, implementation and operation of Cisco 3745 routers, Cisco 6509 and 3560 L2/L3 switches.
  • Removed Cisco 3600 and 2600 series routers and Cisco 2900 series switches from the current infrastructure and replaced them with the Cisco 6509 or 3560 L2/L3 switches.
  • Configured RSTP, MST and used VTP with 802.1Q trunk encapsulation. Provided port binding and port security wherever required. Provided router redundancy through HSRP.
  • Configured ether channels using PAgP and LACP.
  • Designed ACLs, VLANs, troubleshooting IP addressing issues and taking back-up of the configurations on switches and routers.
  • Provided testing for network connectivity before and after install/upgrade.
  • Switching related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet and Gigabit Ethernet channel between switches.
  • Worked on troubleshooting and resolving issues escalated by the NOC and internal systems, including developing, implementing and deploying emergency hot fixes within a global network.
  • Experience in Cisco switches and routers: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay and ATM).
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external.
  • Escalation procedures and customer notifications.
  • Configured Cisco Routers for OSPF, IGRP, RIPv2, EIGRP, Static and default route.
  • Worked on HSRP and GLBP for first hop redundancy and load balancing.
  • Designing the firewall implementation architecture.
  • Planning the security levels for each zone.
  • Migration of policies from existing firewall to new firewall.
  • Implementing HA in firewall.
  • Hardening the firewall according to the standards.

Environment: Cisco routers, switches, Firewalls, L2/L3 routing and switching protocols, ACLs, VLANs, IP addressing, WAN, PAgP, LACP.

Confidential

Network Engineer

Responsibilities:

  • Migration of RIPv2 to OSPF, BGP routing protocols.
  • Configured EIGRP for lab environment.
  • Implemented ISL and 802.1Q for communicating through VTP.
  • Working with Client teams to find out requirements for their networks.
  • Designing solutions for frozen requirements using Cisco Routers and Switches.
  • Deploying the network infrastructure to meet the requirements.
  • Created VLAN and Inter-VLAN routing with Multilayer Switching.
  • Providing technical consultancy for better application response using QoS.
  • Monitor performance of network and servers to identify potential problems and bottleneck.
  • ConfiguredVLANTrunking802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Performed RIP, OSPF, BGP EIGRP routing protocol administration.
  • Configuring of IP Allocation and sub netting for all applications and servers and other needs throughout company using FLSM, VLSM addressing
  • Installed wireless access points (WAP) at various locations in the company.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 router with HSRP.
  • Working knowledge in IP Subnetting for Class A, B, and C networks.
  • Used various Network sniffers like Ethereal, Sniffer capture, TCP dump, etc.
  • Real time monitoring and network management using Cisco Works LMS.
  • Provided technical support on hardware and software related issues to remote production sites.
  • Identify, troubleshoot and, resolve hardware, software and network related issues on systems of end users.
  • Configure and install Windows/Macintosh OS.
  • Maintaining the exchange server and office 365.
  • Maintaining user data backup and server backups on regular basis.

Environment: Cisco routers, switches, Firewalls, VLAN, Routing protocols, VLSM, FLSM, QoS, VTP.

We'd love your feedback!