We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

0/5 (Submit Your Rating)

Dallas, TX

SUMMARY

  • More than 6 years of Experience designing, installing, and configuring Local Area Networksand Wide Area Networks in a remote location with Wireless LAN Access Points Operations
  • Several years of experience in Information Technologies with expertise in area ofWindows server,VMware virtualization technologies, server automation Monitoring tool and some of the Storage technologies
  • Hands on experience in configuring Cisco routers, switches, ASA Firewalls, Wireless Networks, VoIP Networks.
  • LAN, WAN, WIRELESS LAN,TCP/IP, DNS, VPN, FTP, Cisco IOS, VTP, STP, RIPv2, EIGRP, OSPF, SNMP.
  • Experience in installing, administrating managing Windows server operating system2000,2003,2003 R2,2008,2008 R2,2012and their standard, Enterprise Datacenter Edition
  • Hands on experience in WindowsActive Directoryadministration,DNS, GPU, GPO, DHCP, LDAP
  • Experience in handling more than 3000 mix of Windows server, 200 ESXi servers, Remote data center, MultiplevCenter
  • Experience inActive Directory, GPOs, DNS, DHCP, File and Print Servers, IIS Web server, FTP, Terminal Server, NAT,Microsoft Clusteringand Exchange mail server in windows base server environment
  • Excellent knowledge in creating and managing users, permission setting, roles and responsibility assignment and VM resource allocation on ESXi hosts
  • Extensive experience in VMwareESX/ESXihosts 3.5, 4.1 5.x hypervisor and Microsoft virtual server as well Hyper V
  • Experience VMwareclustering,HA, DRSrules,vMotion, Storage vMotion, Snapshot manager, Cloning, Template creation and deploymentVMware View 4.x/5.x,Site Recovery managerSRM5.0
  • Experience in creating Virtual Machine, template creation, cloning them, VM tools 3.0/5.0/7.0install and upgrade
  • Hands on experience in Virtual standard switch, Virtual Distributed switch, VLAN mapping into VMware
  • Good understanding of windows and VMware server automation using scripting languagePower shell,VB Script,Power CLI

TECHNICAL SKILLS

Routers: 1800, 2500, 2600, 2800, 3600, 3800, 4600, 6300

Cisco Switches: 2900, 3500, 4000, 4500, 5000, 6500, Nexus 2k, 5k, 7k

LAN Technology: VLAN, VTP, Inter - vlan routing, ISL, STP, RSTP, PVST, HSRP, LBP

WAN Technology: Frame Relay, X.25, E1/T1/DS1/DS3, PPP, MPLS

Network Protocols: DHCP, DNS, HTTP, FTP, SMTP, TCP/IP, UDP, IPv4/v6, RIP, OSPF, EIGRP, ICMP,BGP, ARP, STP, VTP, HSRP, VRRP, GLBP, NAT, VLAN, VXLAN, ACL, VoIP, Bluetooth, Wi-Fi

Network Management Tools: Wireshark, Netflow Analyzer, HP OpenView, Cisco Works, Ethereal, OPNET, Solarwinds

Infrastructure services: DHCP, DNS, SMTP, FTP, TFTP

Documentation: MS Office, MS Visio

Virtualization: VMware, VCenter, iSCSI storage

Scripting: Ansible,Puppet

Other: DNS, DHCP, TCP/UDP, Subnetting, OSI Model

Platforms: Cisco - IOS, Junos, Celestica

Programming languages And Data Management Skills: C++ Language, Core Java, SQL, Microsoft Excel, Presentation Skills, Data Visualization, Data Analysis, Quality Assessment, Data Insights

PROFESSIONAL EXPERIENCE

Confidential, Dallas TX

Senior Network Engineer

Responsibilities:

  • Working on infrastructure with 6000 plus network devices.
  • Configure network switches/VLANs/VTP /Trunks in a large network to implement layer 2/3 switchfeatures.
  • Tweaking the STP configuration to achieve the desired goals and configuring the HSRP toachieve high availability.
  • Performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s
  • Migrating virtual environments VMWare to Azure cloud using ASR.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP OSPF is usedfor local routing only which involves new wan links.
  • Creating object, groups, updating access-lists on Check Point Firewall, apply static, hide NAT using smartdashboard.
  • Experience with connectivity of Cisco Networking Equipment with F5 Load Balancer.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Configuration and providing management support for Cisco ASA and Checkpoint Firewalls (R75, R76 andR77).
  • Monitor performance of network appliances and WAN utilizing using network analyzers like Wire sharkand Solar Winds.
  • Configured Solar Winds Orion alerts, created and maintained documentation, created and scheduledautomated reporting, and customized web consoles and overall design of how the platform is used withthe organization to monitor.
  • Updated SLA reporting and analysis procedures to correctly utilize Solar winds reporting.
  • Day-to-day operations and support of the dual site Orion Solar Winds performance monitoringenvironmentDaily Firewall rule base changes on Cisco ASA and Checkpoint firewalls, Barracuda NG Firewalls.
  • Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1.
  • Configuring the ACL to place the traffic on right class in QoS, restrict traffic and to carry testing activitywhile working or High CPU Utilization or during Connectivity/Reach ability issues. Configure or Tweak IPSLA, SNMP and NTP configurations.
  • Work on different networking concepts and routing protocols like BGP, EIGRP, OSPF and otherLAN/WAN technologies.
  • Configured VMs in availability sets using ARM templates to provide resiliency for IaaS based solution andscale sets using Azure Resource Manager to manage network traffic.
  • Configuring the Security feature like AAA for TACACS authentication, port security and private VLAN,VACL based on design requirement.
  • Configuring monitoring Sessions for the SPAN or RSPAN of trafficConfiguring the IPSEC site-to-site VPN or GRE tunnels for the branches during backup circuit installationand analyze/solve issue related to same. Real time experience on Site-to-Site VPN, DMVPN, GRE,GETVPN, and IKE2.
  • Performing Changes in Network production environment with minimal or zero disruption, whichincludes planned weekend activity like IOS upgrades on the Networking devices like routers, switches,load balancers and WAN Optimizers.
  • Performing Disaster recovery test, network failover in case of emergency and IP Migration activity forthe backup connectivity at the branch location.
  • Developed and maintained documentation of all LAN/WAN infrastructures using Granite (for circuitdesigning), IP control (for IP subnets documentations) and VISIO for network MAPInterfaced with Field Operations, Circuit design, NOC, IT and other internal groups on weekly capacityplanning and other project conference calls.
  • Will work with multiple teams on high priority issue on Bridge calls for problems like degradation inperformance of online application hosted by client and problems due to network impairment.
  • Making sure the networking devices are in Compliance with Clients Standard, if not will be reconfiguringthe Device during normal change window.
  • Day to day operations on Palo-Alto includes Adding routes, policies and monitoring the logs.
  • Worked on APP-ID feature of Palo-Alto used for deep packet inspection in Layer 7. Implemented SSLdecryption policy.
  • Day to Day operations on checkpoint is adding routes, pushing policies into Checkpoint gateways andbasic troubleshooting in CLI and monitoring logs using Smart View Tracker application.
  • Configured and managed IPsec Site-to-Site VPN on the ASA and Checkpoint Firewalls.
  • Implementation and configuration of F5 Big-IP LTM-6400 load balancers.
  • Providers for the WAN outage to analyze/solve the layer 1 issues.
  • Working with Cisco on TAC cases if required will create RMA for the replacing faulty Hardware Parts.

Confidential

Network Configuration Engineer

Responsibilities:

  • Configured Cisco and Juniper CE routers and switches according to the customer’s requirement. Designing new wired and wireless networks based on the existing standard and security based-line configurations.
  • Designing/Deploying/Maintaining, Configuration, Monitoring and Troubleshooting for FortGate/Juniper SRX firewall/Cisco ASA 55XX ZBF (NGFW): URL filtering, Content Filtering, SSL inspection, User identity.
  • Designing/Deploying/Maintaining Cisco Security Appliances/Suite of FirePOWER FTD, FMC, NGIPS, AMP, ISE, ACS, WSA, ESA, WLC, WCCP, Umbrella & Talos.
  • Designing/Deploying/Maintaining Next Generation Firewall (NGFW) features such as SSL inspection, user identity
  • Also configured Cisco and Juniper PE routers in the ISP’s MPLS cloud as per the PE design and customer requirement.
  • Troubleshooted circuit and connectivity issues liaising with the Telco engineers from AT&T, Verizon, Vodafone etc.,
  • Enchanced on Tools: PIPER in Data support and ONMSi, Rstudio and BERT
  • Sustained on Cable re-routes where I have to OFFSET the cables for every unique work order
  • Designed and Worked on DD Ports, FFTP(Fibre Node Configguration)
  • Created order Transistions, SR Priority Requests
  • Cable Laying and Deletions, DUCT Laying and Deletions, Structure Laying and Deletions
  • Performed and worked on Validations Errors and Work Order Merge and Posts, DSLAM
  • Cable Offsetting, Laying and adding new Equipments and Structure and Cable
  • Experience in Micro and Macro excel Updations for OTH in tool ONMSi for CBT,THP and OTH Additions and Deletions
  • Configured Solar Winds Orion alerts, created and maintained documentation, created and scheduled automated reporting, and customized web consoles and overall design of how the platform is used with the organization to monitor.
  • Updated SLA reporting and analysis procedures to correctly utilize Solar winds reporting.
  • Day-to-day operations and support of the dual site Orion Solar Winds performance monitoring environment
  • ODF(Optical Distribution Frame) and OLT (Optical Line Termination)
  • ILC’s and Data Loads, Callibrations and Tag not homes and XJR sheets Updations and Outport Association.

Confidential

Network Engineer

Responsibilities:

  • Completed site-survey, determined cabling/optic requirements, prepared a port-map layout, prepared configuration and executed the migration of routers/switches from Cisco 3000 series to Cisco 9000 series
  • Provided Tier III Level Load Balancer expertise on F5 Big IP Local Traffic Managers (LTM) and Designing F5 solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BIG IP Load Balancers.
  • Implemented Cisco’s Overlay Transport Virtualization (OTV) technology to establish connection between data centers.
  • Used “WIRESHARK” to analyze packets in the live traffic and troubleshoot the issue if there is any.
  • Handled SSL Cert installation using “VENAFI”.
  • Used “WINSCP” tool to download the data from the F5 load balancer.
  • Completed and troubleshooted complex enterprise routing issues with MPLS, BGP, OSPF and QoS
  • Configured DC setup with VPN (DMVPN, L2L and AnyConnect) tunnels configured on Cisco Routers and ASA boxes- Cisco ASR 1000 Service Aggregation routers, 4000 ISR.
  • Designed the routing architecture (OSPF) for the Metro Ethernet nationwide Network
  • Assisted cabling technicians with troubleshooting L1, L2 issues.
  • Assisted end-users with network connectivity issues and Honey well issues.
  • Collaborated with multiple onsite and offshore teams for project delivery.

Confidential

Network Engineer

Responsibilities:

  • Provided effective technical support to the process and actively resolve client issues directly or through timely escalation to meet process SLAs.
  • Key member of final escalation team in RIC for all RDN related technical issues
  • Assisted Data center technicians with troubleshooting L1, L2 issues.
  • Created cutsheets ahead of migration.
  • Monitored the capacity graph on a regular basis and ensured that scaling projects are kicked off in a timely manner to avoid non-redundancy between TC-DC.
  • Collaborated with multiple teams to ensure the timely delivery of projects.
  • Worked on ServiceNow and ITSM tools
  • Worked on the ticketing tools and Active Directory and had to onboard and offboard newly hired employees in the organization
  • Top performer in the ticketing and took technical calls and guided the technicians to make the Honeywell and point of sale (POS) systems work.
  • Escalated support desk tickets to Level 3 in the most crucial circumstances and after considerable time had been spent on a single ticket.
  • Solved 99.2% of Level 2 tech support tickets without needing to escalate to Level 3 tech support engineers.
  • Supported customers with basic technical support for current and past software releases.
  • Assisted clients with general support for hardware, peripherals, network connections, and external software.Escalated help desk tickets to Level 2 / Tier 2 support when outside the scope of L1/T1 technician support.

We'd love your feedback!