Network Support/ Firewall Engineer Resume
Fort Worth, TX
SUMMARY
- 8+ years of experience in Networking and Security, including hands - on experience in providing network support, installation and analysis for a broad range of LAN / WAN/MAN communication systems.
- Hands on experience in configuring Cisco Catalyst 2960, 3750, 4500, 6500 and Nexus 3000, 5000, 6000, 7000 series switches and Cisco 2600, 2800, 3600, 3800, 7200, 7600 series routers, Load Balancers & Cisco Firewalls.
- Experience with various LAN and WAN technologies and protocols like: - TCP/IP, VLAN, VTP, STP, EIGRP, OSPF, BGP, IKE/IPSec VPNs, NAT, DNS, MPLS and access list.
- Hands on experience in configuring Cisco Nexus2232, 2248, 5548, 6001 and 7018(Sup 2E) and worked on nexus protocols VPC, VRF, VDC and FEX Links.
- Experience with tunneling methods like GRE/mGRE, DMVPN, IPsec, L2TP, ezvpn, IKE v1 and v2 remote vpns.
- Excellent knowledge and experience on multi-vendor platforms like Cisco, Juniper, Checkpoint, F5 Big-ip LTM load balancers, Bluecoat, Riverbed, Citrix, and VMware.
- Experience in implementing and designing new solutions with Cisco ASA Firewall and Palo Alto Firewall.
- Hands-on experience of various layer 2 transport protocols including ATM & Frame Relay and MPLS, 2547bis VPN, RFC 4364, mVPN, VPLS.
- Extensive knowledge of Load balancing technology including algorithms and health check options.
- Experience directly managing routers, switches, load balancers and SSL accelerators in a high-availability infrastructure.
- Expert understanding of TCP as it pertains to packet inspection and network/application flows.
- Expert ability to troubleshoot issues and make recommendations for system changes, as needed, to resolve issues.
- Designing and implementation of DMVPN based IPSEC on all ATM centres Installation and configuration.
- Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
- Good understanding of WAN optimization technologies like Riverbed and WLAN environment which includes Aero hive.
- Has a good experience working with the Trouble Tickets on F5 Load balancers on LTM module.
- Experience in configuring and troubleshooting BIG-IP F5 load balancer LTM creating virtual servers, nodes, pools and iRules on BIG-IP F5 in LTM module.
- Basic knowledge of Palo Alto Firewalls and Panorama centralized management.
- Working knowledge of IIS Server, DHCP Server, DNS Server, proxy server on linux and windows. Implementation and administration of DNS, DHCP and WINS.
- Knowledge inOTV,Virtual Device context, Fabric path, Virtual Port channel and VSS cluster. knowledge of networktechnologies, such as AWS, NX-OS, IOS/XE, VLANS, STP, BGP, OSPF, EIGRP, DMVPN, Firewall, VMware, f5 and Linux.
- Very good knowledge in scripting languages like TCL/TK, Perl and Python.
- Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view).
- Experience with WAN acceleration technologies, such as Cisco WAAS andRiverbedSteelheads.
- Intrusion Prevention System - IDS/IPS(IBM ISS IPS) Implementation and Upgrade for Site Protector.
- Experience with multi-vendor Load Balancers, WAN accelerators, Proxy Server, Content Filtering and with automate network administration using applications like HPNA.
- Expertise in creating groups and pruning traffic flow using VLAN, VTP, ISL, 802.1Q.
- Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
- Moderate knowledge in configuring and troubleshooting Wireless Network: Net gear, Wireless Security Basics, IEEE 802.11 a/b/g, RF spectrum characteristics as well as WAN testing.
- Experience with VOIP and QOS implements and support.
- Experience in the configuration of Aggregation protocols for Ether Channel i.e. PAgP and LACP.
- In-depth knowledge and hands-on experience on IP Addressing, Subnetting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
- Effective inter-personal skills, adaptive to any environment, keep abreast with the latest technologies and delivering solutions as an individual and as part of a team.
- Well organized, Self-starter, Quick learner, Self-Motivated, Team player with analytical, technical and communication skills.
TECHNICAL SKILLS
Cisco Platforms: Nexus 7K, 5K, 2K & 1K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series)
Juniper Platforms: SRX, MX, EX Series Routers and Switches
Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi
Firewall: PIX Firewall (506/515/525/535 ), ASA Firewall (5505/5510),Palo Alto, Checkpoint
Network Tools: Solar Winds, SNMP, Cisco Works, Wireshark
Load Balancers: A10 Networks(AX2500),Cisco CSM, F5 Networks (Big-IP)
WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPPDS1,DS3,OC3, T1 /T3 & SONET
LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q
Security Protocols: IKE, IPSEC, SSL-VPN
Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA
AAA Architecture: TACACS+, RADIUS, Cisco ACS.
Operating System: Windows 10,8,7/XP, MAC OS X, Windows Server 2008/2003,Basic Linux
PROFESSIONAL EXPERIENCE
Confidential, Fort Worth, TX
Network Support/ Firewall Engineer
Responsibilities:
- Active member of the design team to plan for Disaster Recovery project.
- Implemented necessary firewall rules on Cisco ASA and Checkpoint firewalls as part of Disaster Recover project. Provided support in troubleshooting issues wherever required.
- Implemented static routes and dynamic routes (ospf, bgp and eigrp) on layer 3 routers.
- Replaced Cisco routers with ASA failover pair as a part of project to upgrade the private line to MPLS connection.
- Analyzed the access-lists on the cisco routers and optimized as required by removing the unused rules.
- Further optimization of the ACLs on the routers was done by creating object-groups on the Cisco ASA firewalls. Optimized ACLs were copied into the new failover pair.
- Active member of the team putting together the required test plan to confirm the access to all the applications as required.
- Provided 24 x 7 On-call support on round robin basis.
- Implemented new service requests as a part of day to day business on Cisco ASAs and Checkpoint firewalls.
- Implemented weekly changes during the scheduled change window outside of regular business hours for standard firewall requests.
- Troubleshoot problem tickets by performing live testing with the user. Provided appropriate solution to fix the issues.
- Prioritized problem tickets as per the severity of the ticket (sev 1, 2, 3 and 4).
- Updated network diagrams, site documentation and the device list upon the completion of the project(s).
- Updated list on the Network Automation tool which would backup the configuration of all the active devices at regular intervals.
- Removed inactive/decommissioned devices on the Network Automation tool to reduce the load on the server.
Confidential, Minneapolis, MN
Sr. Network Engineer
Responsibilities:
- Working as Sr. Network engineer supporting Cisco routers, switches, Net screen Firewalls, Bluecoat proxy servers and BIGIP load balancers.
- Planning, designing, Installing and Configuring of Cisco Routers (1700, 1800, 2500, 2600, 3200, 3600, 3700, 3800 and 7200, 7609) & Cisco L2 & L3 Switches (2900, 3560, 4500 & 6500).
- Administration and diagnostics of LAN and WAN with in-depth knowledge of TCP/IP, NAT, PPP, ISDN and associates network protocols and services.
- Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
- Responsible for OSPF, BGP and static routing using Nexus, Cat6k, ISR, ASR.
- Also performed Dual-homing on nexus based platforms using the feature VPC and also managed to do Virtualization on the nexus platforms using the feature VDC and also maintained VRF’s in those VDC’s.
- Understanding of IPSEC & GRE tunnels in VPN technology implementation using Cisco IOS and have checkpoint firewall /VPN.
- Provided pro-active fault monitoring of Cisco routers and switches utilizing HP overview, Cisco Works and Cisco IOS commands.
- Dealt with monitoring tools like (Solarwinds, Infoblox, and Kiwi-cat tool), network packet capture tools like Wire-shark.
- Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
- Co-ordination with VoIP carriers for solving the complaints in SIP and h323 calls using wireshark trace.
- Design, Implementation, ongoing management and troubleshooting of Cisco Unified Communication systems including Call Manager/Unified Communication Manager 6x, 7x.
- Integrating Configuring RSA Secure ID with ISE for Token based authentications using RSA Native method RSA RADIUS method for user's remote VPN users.
- Tested QoS infrastructure to provide proper priority and queuing based on traffic type using Ixia and Spirent test sets.
- Configuration and support of QOS features like CBWFQ, WRED.
- Utilized SNMP-based network monitoring tools such as Nagios and Solarwinds to manage networks.
- Create S2S VPN with our own offices and various clients using Juniper SRX firewalls or Cisco ASA.
- Maintained BIG IP F5 APM VPN and provided solutions for intricate issues.
- Deployed Palo Alto Firewalls for web filtering and application control.
- Provide post breach firewall analysis on checkpoint R77.10 gain, Palo Alto firewalls to recommend two-factor authentication solution.
- Implementing, maintaining and troubleshooting switching tasks such as VLANs, VTP, VLAN Trunking using ISL and 802.1Q, STP, RSTP, PVST+, Ether channel using LACP and PAGP, Inter-Vlan routing, CEF and DCEF.
- Creating and provisioning Juniper SRX firewall policies.
- Configured Cisco Wireless Networks like IEEE 802.11 a/b/g/n, LWAPP, WLC, WCS, Standalone APs, Roaming, Wireless Security Basics, RF spectrum characteristics.
- Implementation of HSRP, IPSec, Static Route, IPSEC over GRE, Dynamic routing, DHCP, DNS, FTP, TFTP, RAS.
- Migration to virtual servers in F5 Load balancer as part of web.
- IP Base software includes advanced quality of service (QoS), rate limiting, access control lists (ACLs), Open Shortest Path First (OSPF) for routed access, and IPv6 functionality.
- Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
- Performed attribute manipulation in BGP multi-homed scenario using attributes like AS-Path, MED, Local Preference and weight.
- Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.
- Configured and installed new IP addresses for new users by using IP Addressing and Subnetting Scheme, and work on CITRIX applications.
- Performed Network Security Assessment and implemented security features such as network filtering, SSH, AAA, SNMP access lists, VTY access lists and HSRP authentication.
- Wrote IOS and CAT OS upgrade procedures and Pre/Post checks for customer production upgrades.
Confidential
Network Support/Technician
Responsibilities:
- Responsible for designing and implementation of customer’s network infrastructure.
- Creating and maintaining the login and privacy credential information of users.
- Rectify and solve the bandwidth related issues to the customer through remote login.
- Configured EIGRP and OSPF for lab environment.
- Configuration and maintenance LAN networks with switches such as Cisco 4507, 4510.
- Configuring of IP Allocation and sub netting for all applications and servers and other needs throughout company using FLSM, VLSM addressing.
- Troubleshot the issues related to L1 and L2 levels.
- Set up LAN cabling, servers, PCs, printers, routers, hubs, switches, scanners, software, backup/restore, tuning and optimizing
- Configured VLAN’s, VTP, and dot1.Q trunking on switches.
- Achieved proficient in Adaptive Security Device Manager (SDM) and used it while performing security audit on routers.
- Implemented dedicated VLAN ID for all trunk ports, set user ports to non-Trunking, and deployed port security when possible for user ports for layer 2 security.
- Perform filter review of chunk of devices every quarter. Submit necessary change records or firewall change request if any deviation found.
- Troubleshoot issues related to connectivity, STP, Vlans, Trunking, VTP, Layer 2 switching, Ether Channels, Inter-Vlan routing, log messages, high CPU utilization and parameters that can degrade Performance of the network.
- Monitor traffic and get to sign keeping in mind the end goal to troubleshoot network access issues.
- Responsible for implementation and day to day operations of all associated hubs, routers, bridges, Gateways and related equipment.
- Monitoring the network, troubleshooting network problems, implementing changes, provided by Cisco
Confidential
Network Support/ Service
Responsibilities:
- Monitoring servers like domain controllers, exchange servers and connectivity.
- Responsible for Staff PCs troubleshooting and network connectivity.
- Troubleshooting problems pertaining to Performance Tuning, Network Administration and Application Conflicts.
- Installing, configuring and maintaining Application Software & Hardware.
- Installing and monitoring web proxy.
- Addressing queries regarding the Information System/Software & extending onsite support to the clients including maintenance of hardware/software.
Confidential
System administrator
Responsibilities:
- Worked on Cadence Tool
- Implementing and designing VLSI schematic diagram on Cadence software.
- Helped Students in managing software tool.
- Organized an events based on Verilog Large Scale Industry on Campus.
- Responsible for training and clarifying doubts for students based on Cadence tool.