We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

0/5 (Submit Your Rating)

Cupertino, CA

SUMMARY

  • 8+ years of IT experience in design, development, implementation, testing, troubleshooting and maintenance of Cisco/Juniper devices for both networking and security.
  • Designing, Implementing and Troubleshooting Cisco 3750, 3550, 3560, 2924, 6509 - V-E, 6513, 6504, 6503, 6506, 6500 series switches.
  • Strong hands on experience on PIX (506, 515, 525, 535), ASA (5505/5510) Firewalls. Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series.
  • Troubleshooting and installing of CRS, ISR, GSR, ASR9000 and Nexus devices.
  • Engineering the configurations for the different branches, campus locations & Data center environment.
  • Experience with configuring and troubleshooting Palo Alto Firewalls.
  • Experience in installing and configuring DNS, DHCP server.
  • Strong grasp of current and future technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, ACL, VPN, Wireless LAN and configuration of VLANS.
  • Strong Analytical, Problem Solving, Technical Troubleshooting, Decision-Making, Customer Service Skills, Results-Driven.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • Experienced in networking protocols, firewalls and Communication Network design.
  • Strong hands-on experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2K series, Cisco router models like 7200,3800,3600,2800,2600,2500,1800 series and Cisco catalyst 6500,4500,3750,3500,2900 series switches.
  • Provided 24X7X365 availability and on-call support as required.
  • Responsible for Check Point and Cisco ASA firewall administration across global networks.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Experience in testing Cisco routers and switches in laboratory and deploy them on site production.
  • Worked on Load Balancer F5 LTM, GTM series like 6400, 6800, and 8800.
  • Knowledge in preparing Technical Documentation and presentations using Confidential VISIO/Office.
  • Strong knowledge on Wireless Standards and Technologies, i.e. Ethernet, WAN, LAN, IEEE 802.11 (Wi-Fi). Very good knowledge on IEEE 802.15.1 (Bluetooth), IEEE 802.15.31a (UWB), IEEE 802.15.4 (ZigBee), Cognitive radio networks, Mesh networks, etc.
  • Experience with developing testing strategy, executing test cases and analyzing of test reports.
  • Experienced with learning Amazon Web Services (AWS).
  • Highly enthusiastic, creative team player with project implementation, analytical, interpersonal and communication skills.
  • Design, Implement & troubleshooting of Juniper switches, routers and Firewalls Juniper: EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240
  • Hands-on experience with Ether Channel, Spanning Tree, Trucking, ACLs, Syslog.

TECHNICAL SKILLS

Protocols & Standards: TCP/IP Protocol Suite, Ethernet, Token Ring, FDDI, OSPF, EIGRP, Rip, BGP, HSRP, L2/L3/L4/L7 Switching, VLAN’s, VTP, IPv4, IPv6, ATM, VoIP, LAN, SSL, SNMP V1, V2. T1, DS3.

Security: Anomaly Detection in attack prevention system, IPS/IDS, Penetration Testing and Web application testing, Buffer Overflows, Cross Site Scripting, Session Management, Cisco PIX, and Security attacks like DoS, DDoS, Spoofing, Nessus & Cisco IOS, Cisco Works

Networking: Network Design & Engineering, Operations Research, Cisco Routers (800, 2600, 2800, 3800, 4500), Switches (2950, 3560, 6500), Snort network intrusion detection systems (IDS). Network penetration testing tools like NMAP, Netfilter, IPTables, Ethereal, SONNET, MPLS, DSU/CSU, ASR9K and Octane Line Cards

Routers & Switches: GSR 12000, 7200, 7600, ASR 1002. 6500, 4506, 4510, Nexus 7000

Programming: Python, C Programming, TCL/TK, Perl, Redhat Linux

ASA Firewall: 5505, 5510, 5520, 5540, 5550, Checkpoint Firewall NGX R75.

Palo Alto Firewall: PA-7080, PA-7050, PA GXM-NPC.

Software and OS: Windows, OPNET, Wire shark, Cisco IOS, VYATTA, Confidential Visio, Putty. LINUX, IXIA, Agilent.

PROFESSIONAL EXPERIENCE

Confidential, Cupertino, CA

Sr. Network Engineer

Responsibilities:

  • Experience with Network Troubleshooting and applying Hotfixes.
  • Experience of working with F5 Load balancers.
  • Hands on experience with Fortinet Firewalls.
  • Cisco ASR 9K, 1K Nexus 9k, 7k, 5k, 3K and IOS platform.
  • Data Centers and global infrastructure support.
  • Advanced routing and switching configuration and troubleshooting.
  • Enabled TACACS+ on Cisco devices for authentication, authorization and accounting (AAA).
  • Experience in troubleshooting, configuring and applying policies on Palo Alto Firewall.
  • Migration Network, Firewall and F5 Load Balancer infrastructure from one data-center to another data center.
  • Responsible for procurement and installation of Hardware, network drives and other IT infrastructure. Documented the design, implementation and troubleshooting procedures with Method of Procedure (MOPS).
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) hich acts as a remote line card (module) for the Nexus 5000.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems and also manipulating BGP attribute.
  • Designed, validated and implemented LAN, WLAN & WAN solution to suite client’s needs.
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K.
  • Reviewing, analyzing, approving and executing all changes in the network. All Configurations of Cisco Routers and Switches.
  • Experienced in preparing Network Wireframes and Project Lifecycle documents using MS Office Suite applications like Visio, Word, PowerPoint, Excel, and Project.
  • Design OSPF Areas for reliable Access Distribution and for Core IP Routing.
  • Performed Troubleshooting and monitored routing protocols such RIP, OSPF, EIGRP & BGP.
  • Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
  • Experience with implementing engineering methodologies to monitor operation of IT systems to detect suspicious activity that could indicate attempted or actual data leakage events involving Windows, Email, or mobile platforms.
  • Experienced with design and development; cross systems technical knowledge; subject matter expertise in one or more technical areas; demonstrates knowledge of technologies Confidential core focus of initial study

Confidential, Redmond WA

Network Engineer

Responsibilities:

  • Worked on 2600, 3500, 7613 Cisco Routers and 4500 and 6500 series Cisco Switches.
  • Performed VSS on cisco catalyst 6500 series switches.
  • Configured and managed Cisco access layer routers and switches & carried out route redistribution & manipulated route updates using distribute lists, route-maps & administrative distance, and offset-lists.
  • Experrience with troubleshooting, configuring and applying hotfixes on Palo Alto Firewall.
  • Tested various BGP attributes like local preference, MED, Weight and replicated customer issues in the testing environment lab.
  • Worked on configuring L3VPN’s in an MPLS environment.
  • Designed WAN structure to prevent single point of failure in case of link failure.
  • Configured PVSTP+ for loop prevention and VTP for Inter-VLAN Routing.
  • Implemented port aggregation & link negotiation using LACP and PAGP.
  • Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location of office on the switched network.
  • Configured and deployed BIG-IP LTM 6900 for providing application redundancy and load balancing.
  • Experience in troubleshooting Palo Alto firewall configurations remotely supporting all Confidential managed firewall solutions East-Coast, West-Coast, UK and Customer remotely managed Firewalls).
  • Develop, implement and update Palo Alto security principles supporting customer migrations, configurations and implementations.
  • Experience in testing different platforms on different IOS codes.
  • Configured Client VPN technologies including Cisco’s VPN client via IPSEC.
  • Configuring switch for 802.1x port based authentication.
  • Troubleshot issues and outages on Trunks and Router interfaces and firewalls extensively.
  • Experience working with network monitoring applications. (Solarwinds).
  • Involved in operations and administration of WAN consisting Ethernet Handoffs, T1, DS3, and Optic Fiber Handoffs.
  • Provided technical assistance for LAN/WAN management & troubleshooting and complex customer issues.
  • Assisted Network Engineer in the installation and configuration of firewalls.

Confidential, San Jose, CA

Network & Hardware Test Engineer

Responsibilities:

  • Working with EDVT unit of Confidential s on the ASR 9000 series platform including the world’s highest density routers including line cards with bandwidth of up to 400 Gigabit per slot.
  • Provided service to other departments, which comprise of the Development Test group, Platform Test group, MDVT (Mechanical Design Verification Test) group, EDVT (Electronic Design Verification Test) group and ODVT (Optical Design Verification Test) group.
  • Experience of testing Single-mode Fiber and Multi-mode Fiber (MMF).
  • Responsible for Automate testing of hardware prototypes Cisco ASR 9000 series over temperature, voltage, and frequency margins to ensure the electrical design is robust prior to going to production builds.
  • Test/debug test scripts (UNIX) to fully-automate EDVT testing. Includes scripts to drive automation of environmental chambers, power supplies, power cycling boxes, and traffic generation equipment like IXIA and Spirent Traffic Generators.
  • Create, test and deploy new access control rules, signatures, and then validate results via post-deployment report.
  • Evaluate risk to the company and apply this methodology to active incidents
  • Performed system level performance testing conducted (Diagnostics and Cisco IOS XR) on line cards used in the ASR (Aggregation Switching Routing) 9000 2nd Generation series Cisco Routers to detect component and design margin faults at extreme levels of operational temperature and supply voltage.
  • Configured the routers to run L2/L3 traffic on fully loaded chassis.
  • Executed Power cycle test with board level diagnostic software to detect the faults in the UUT.
  • Automated the test procedure using TCL and Expect Scripting.
  • Debugging of line cards if a particular problem occurs by troubleshooting, inspecting the circuitry using standard test bench equipment including various oscilloscopes.
  • Experienced of working with Dynamical Fan Speed Algorithm (DFSA) for Confidential s.
  • Remotely programmed and upgraded the line cards for the other teams across the world using Telnet.
  • Experienced of working with Telecommunications Energy Efficiency Ratio (TEER) project for Confidential s.
  • Experience with deploying Cisco 6509 VSS in the Server distribution and User Distribution layer
  • Redesigning the 5000 User large office location from the Access, Distribution, Core and WAN infrastructure.
  • Responsible for procurement and installation of Hardware, network drives and other IT infrastructure. Documented the design, implementation and troubleshooting procedures with Method of Procedure (MOPS).
  • Experience with configuring Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems and also manipulating BGP attribute.
  • Designed, validated and implemented LAN, WLAN & WAN solution to suite client’s needs.
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • Experienced in developing test documentation using Confidential office Suite Applications.
  • Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K.
  • Reviewing, analyzing, approving and executing all changes in the network. All Configurations of Cisco Routers and Switches.
  • Design OSPF Areas for reliable Access Distribution and for Core IP Routing.
  • Performed Troubleshooting and monitored routing protocols such RIP, OSPF, EIGRP & BGP.
  • Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
  • Configured RIP and EIGRP on 2600, 2900 and 3600 series Cisco routers.
  • Implemented VTP and trunking protocols (802.1q and ISL) on 3560, 3750 and 4500 series Cisco Catalyst switches.
  • Upgraded the IOS on 1900, 2900, 3500 series Cisco Catalyst switches and 2500, 2600, 3600 series Cisco routers using TFTP.
  • Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, Frame relay, NAT, DHCP, TCP/IP).
  • Configured Access List (Standard, Extended, and Named) to allow users all over the company to access different applications and blocking others.
  • Configured STP for loop prevention and VTP for Inter-VLAN Routing.
  • Done troubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment.
  • Worked on network-based IT systems such as racking, stacking, and cabling.

Confidential, Philadelphia, PA

Network Test Engineer

Responsibilities:

  • Analyze various computer operating systems and ensure better results and administer all management networking tools.
  • Worked on Cisco switches, router and load balancer administration and maintenance.
  • Configured Cisco Switches (catalyst 3500 series), Routers, Firewall and monitored network performance (Cacti).
  • Worked on IP Routing protocols BGP, OSPF and EIGRP.
  • Experienced of working with Linux Operating System.
  • Configured the routers to run L2/L3 traffic on fully loaded chassis.
  • Worked on LAN/WAN/WLAN/VoIP/VPN/Network Security, Cabling and racking.
  • Experience of working F5 Load Balancer.
  • Implemented and maintained internal DNS, DHCP, FTP and Windows network services.
  • Develop and upgrade an efficient network and perform troubleshoot on various network processes with help of monitoring tools.
  • Perform troubleshoot and resolve complicated problems in relation to LAN and WAN systems.
  • Coordinate with various departments and establish effective communication with service providers to provide quality service.
  • Developed Testing Strategy, executed test cases and analyzed test reports using Confidential Office, Excel.
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that includes routing protocols EIGRP, OSPF & BGP.
  • Involved in the redistribution into OSPF on the core ASA firewall.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
  • Involved in the modification and removal (wherever necessary) of BGP from the MPLS routers.
  • Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Responsible for Checkpoint firewall management and operations across our global networks.
  • Working with Checkpoint Support for resolving escalated issues.
  • Configured, troubleshoot, and upgraded Palo Alto Firewalls for Manage clients, which included network and/or resource access, software, or hardware problems.
  • Opened, resolved, or updated Tier II Support tickets for Palo Alto Firewall clients.
  • Provided Palo Alto Firewall Clients' with regular status reports of their trouble tickets
  • Documented all the work done by using Visio, Excel & MS word.
  • Experience with information security subject and security policies.
  • Experience with providing DLP solution, architecture, design, and implementation.
  • Experience with working on methods to protect data at rest, data in motion and data in use
  • Knowledge of change control processes and how it works.
  • Knowledge of information security principles, including risk assessmentand management, and incident response.
  • Technical proficiency with security related systems and applications.
  • Experience in developing, documenting and maintainingsecurity procedures.
  • Experience in working with Nexus 7010, 5548, 5020, 2148, 2248 devices.

We'd love your feedback!