We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

0/5 (Submit Your Rating)

Milwaukee, WI

SUMMARY

  • 8 years of professional experience in Network Planning, Implementing, Configuring and Troubleshooting of networking system on both Cisco and Juniper Networks.
  • Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system remedy.
  • Expert level knowledge of troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, BGP ability to interpret and resolve complex route table problems.
  • Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches.
  • Experience in Riverbed Steelhead WAN Accelerator Models 5520,1050,2050 and Center management console, Model 8000
  • Implementation traffic filters on Cisco routes using Standard, extended Access list.
  • In - depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP services.
  • Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks
  • Hands-on experience in using network monitoring tool Solarwinds Orion.
  • Excellent leadership with good written and oral communication.
  • Experience in implementation and troubleshooting of Datacenter devices like Nexus 7000, Nexus 5000 and Nexus 2000 Series devices with VDC's /VRF’s configurations.
  • Edge Security design and implementation of Cisco ASA security appliances withFirepowerservices.
  • Experience in Design and assistance for deploying enterprise-wide Network Security and High Availability Solutions using ASA as well as Palo Alto.
  • Experience in ASA Configuration (5525X & 5515X with Firepower services)
  • Experience in migration from Cisco ASA to Palo Alto Firewalls.
  • Worked with Palo Alto firewalls using Panorama servers.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Great team player and able to work under pressure 24x7 duty rotation.
  • Strong knowledge in HSRP, VRRP redundancy Protocols.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
  • Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Experience in configuring QOS on Cisco routers.
  • Access control server configuration for RADIUS & TACAS+.
  • Hands-on experience using Cisco Virtual Switching System (VSS).
  • Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248)
  • Hands-on Experience with CISCO Nexus 7000, Nexus 5000, and Nexus 2000 platforms.
  • Good knowledge in Application Layer Socket programming.
  • Tested and worked with software designers to establish a user-friendly environment.
  • Great team player with good written and oral communication.

TECHNICAL SKILLS

Cisco Platforms: Nexus 7K, 5K, 2K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800, 810 series) Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series) CISCO 5500 WLC, CISCO ISEJuniper Platforms SRX, MX, EX Series Routers and Switches

Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPsec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi, QOS

Firewall: ASA Firewall (5520/5540/5585 ), Palo Alto Firewalls, Bluecoat, Netscreen.

Network Tools: Solar Winds, SNMP, Ciscoworks, Wireshark, Qradar, RSA Envision, Zenoss Core, NCM, Algosec, Voyence, Netscout, InfoBlox, Wireshark, ASDM, XenApp

Load Balancers: F5 BIG IP LTM 5000, GTM C-112, VIPRION VPR 2400

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Security Protocols: IPsec, RSA, SSH, SSLIPS,IDS, IP Sec VPN Tunnels, SSL VPNs

Networking Protocols: OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA

Operating System: Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

PROFESSIONAL EXPERIENCE

Confidential, Milwaukee, WI

Sr. Network Engineer

Responsibilities:

  • Experience in implementation and troubleshooting of Datacenter devices like Nexus 7000, Nexus 5000 and Nexus 2000 Series devices with VDC's /VRF’s configurations.
  • Hands on experience with distributing a network built from scratch which was tested in SDE (Software Defined Environment) into production for our clients.
  • Dynamically controlling the network access in reducing the risk of threats usingCISCOISE
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Cisco Routers, Cisco Switches, Cisco IOS, Layer 2, Layer 3, IPv4, IPv6, RIP v2. Advanced IP addressing and Routing, Configuration of secure routing solutions,WLAN, LAN and WAN.
  • Design, implement and troubleshoot LAN,WLAN& WAN solution to suite client's needs.
  • Worked on Datacenter Migration project to migrate the existing 6509, 4509 devices to a Nexus 7010, 5010 and Nexus 2248 FEX based solution.
  • Software Defined Networking (SDN) - VMware NSX, Cisco ACI experience in Cisco ACI Integrating Layer 2, Layer 3, L4-L7 and VMware with ACI
  • Configure and troubleshoot Juniper EX series switches and routers
  • Migrated to Juniper EX series switches from Cisco 3500 series and 6500 series switches.
  • Configuration and extension of VLAN from one network segment to other network segment between different vendor switches (Cisco, Juniper).
  • Configuring NetScaler Gateway on VPX/SDX instance.
  • Building and configuring Netscaler Gateway on VPX and SDX boxes.
  • Monitoring and troubleshooting Juniper SRX210/650, EX 4200/4500/8200 series devices.
  • Upgrading and Installing IPS (Intrusion prevention system)/ Firepower
  • Worked onJuniper(ISG1000, ISG2000 & SRX), Cisco Pix & ASA, FortiGate, Palo Alto and Checkpoint firewall, Websense, Proxies, McAfee & IBM (IPS & IDS).
  • Managing and troubleshooting ofJuniperM320 routers including installation, upgrade, configuration andnetworkmanagement.Supervised call center and technician routine maintenance and up-gradation of network device.
  • Implementation of JuniperSTRM from scratch in distributed deployment model, End to end administration, Managing Users, Roles, Profiles, Log sources, Custom Regex, HA etc.
  • Configured Catalyst Switch 3560, 3750, 3850, 4507, 65XX, 6800 series switch, Nexus switches N5K (FCoE), N7K (Nexus) andASRroutersASR1k (1001,1004, 106, 1013),ASR9k andASR900 in enterprise network environment.
  • PerformingBluecoatand F5 Overview training to various network team personnel for proper knowledge transfer
  • Hands on experience with deployments of the newly built network to our clients remotely.60to 70 deployments.
  • Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Work with the server team to get the DHCP scope created for Voice, Data and wireless networks for the new Site setup at Brooklyn data center.
  • Perform ISSU upgrade on Nexus 7010 devices by operating the supervisors in active/standby mode on the devices by determining ISSU compatibility
  • Worked on 1800,2600,2800,3600,7200,7600 Routers and 3850,4500,4900 Switches
  • Dealt with implementation of Cisco ASA 5585 devices to apply security policies on it
  • Areas of responsibility include routing and switching, SSL VPN and Site-to-Site VPN using Cisco ASA 5505 and 5520, Riverbed WAN optimization
  • Deployed and configured VPN appliances including ASA 5500 for site-to-site VPN, DMVPN and Any Connect with LDAP based authentication and CiscoISR4451for Confidential MPLS services.
  • Researched, designed and replaced aging Cisco ASA firewall architecture with the new Next Generation Palo Alto appliances serving as firewalls for URL application inspection.
  • Experience with deployment of Palo Alto firewalls for different NAT, video conferencing traffic
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering) remotely using SDN software such as VMware (NSX for vSphere) as well as on-site.
  • Using Smart Update, User Management and Authentication in Checkpoint Firewall.
  • Manage, Install, and Renew SSL andPGPcertificates for various internal and external websites and software applications
  • Worked on F5 Load balancers and ConfiguredBIG IP as reverse proxy and Managing Application traffic
  • Responsible for configuration and troubleshooting issues related to F5 GTM/LTM devices such as 4200v, 5200v, Viprion 2200 and F5 APM
  • Responsible for configuration and troubleshooting issues related to F5 LTM 2000,3000,6900
  • Monitor the health of the devices, alarms with network monitoring tools such as Solarwinds, Wireshark, Orion and VPM
  • Utilize BMCremedy ticketing system to monitor, troubleshoot and resolve alarms on sites
  • Work with the server team to get the DHCP scope created for Voice, Data and wireless networks for the new Site setup

Confidential, Colorado Springs, CO

Sr. Network Engineer

Responsibilities:

  • Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network
  • Configuration and Administration of Cisco and Juniper Routers and Switches
  • Involved in configuring Juniper SSG-140, Cisco pix firewall and Check point firewall.
  • Working with Juniper JUNOS on M and MX series routers.
  • Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210
  • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices
  • Responsible to evaluate, test, configure, propose and implement network, firewall and security solution with Palo Alto networks.
  • Implemented application based policy and URL filtering, Threat prevention, Data filtering policies (Palo Alto, Checkpoint) with Multiple gateways in cluster for granting access to the business vendors.
  • Configured, Installed and upgraded Palo Alto and Checkpoint Firewalls for managed client which included network/resource access, software, or hardware problems.
  • Involved in configuring Juniper SRX-240.
  • Implementation and administration of Juniper WX/WXC devices for WAN Traffic acceleration
  • Design and configuring of OSPF, BGP on Juniper Routers (MX960) and SRX Firewalls(SRX240)
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Deploying and configuring Citrix Access Gateway to leverage connectivity for external users.
  • Configuring Citrix policies, configuring load evaluator and configuring Edge sight monitoring.
  • Worked hand in hand with engineers to onboardFirepoweras the main IDS/IPS at Publix in three different configurations for the protection of multiple environments within the Publix network.
  • Integrate Data Centre technologies such as ASR, Catalyst, Nexus, UCS and Storage as well as Layer 4-7 devices including but not limited to Firewalls and Load balancers withACL
  • Testing Services SDN for Service Chaining, Virtual Home Gateway, Virtual Enterprise Gateways and L3VPN SDN Support
  • Configured & maintained LAN, WAN, VPN,WLAN, and Firewalls on Cisco Routers for end users.
  • Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
  • Experience with configuring FCOE using Cisco nexus 5548
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Worked on F5 load Balancer, configured Virtual servers, pool, pool members, worked on load balancing methods for LTM.
  • Install Brocade ICX 7450 switches to replace Cisco 4510 Core
  • Developed standards and implemented end to end QoS across carrier exchange platform consisting of multiple vendors and transport technologies.
  • Great understanding ofWLANincluding 802.11 standards, Lightweight and Autonomous systems, WPA, PEAP.
  • Configured virtual servers, nodes and load balancing pools on the F5 LTM 6400, 6800 devices for various medical/biomed applications and their availability
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
  • Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data environment
  • Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
  • Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
  • Experience in installing and configuring DNS, DHCP servers.
  • Replace branch hardware with new 3900 routers and 2960 switches.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed

Confidential, Hightstown, NJ

Network Engineer

Responsibilities:

  • Experience with Supporting bothNetworkand Security infrastructure in data center environment and Campus environment, which involved with devices such as routers, switches, firewalls and wireless access points.
  • Experience with moving data center from one location to another location, from Cisco 6500 based data center to both Cisco 6500 & Nexus based data center.
  • Worked on upgradingCiscoISE1.2, 1.3
  • Performed IOS Software upgrades on switches 6500, 3750 and 4500s andCiscoASR for compatibility withCiscoISE1.3/1.4 setup
  • WLANdesign and troubleshooting ranging from isolating issues with WAP configurations to upgrading from Cisco Prime 1.9.x to 3.0.1
  • Member of a project to migrate from Cisco ASA to Palo Alto firewalls
  • Strong hands on experience on ASA (5525/5545/5585 ) Firewalls. Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Add Trunks, Spanning Tree protocol, Port-Security, VLAN-MAPs and DOT1X for Switches and Wireless
  • Experience with implementing Cisco 6500 VSS on the User distribution switches.
  • Upgraded IOS on the different ASA flavors like 5510, 5520 and 5585 firewalls
  • Involved in design and implementation of Data Center Migration, worked on implementation Strategies for the expansion of the MPLS VPNnetworks
  • Working Knowledge of Cisco IOS, Cisco IOS-XR, Cisco Cat OS, Cisco NX-OS, JUNOS
  • Good experience with check-point firewalls.
  • Implemented site to site VPN in Juniper SRX as per customer.
  • Implemented various EX, SRX & J series Juniper devices.
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls
  • Experience with configuring BGP, OSPF in Juniper M and MX series routers
  • Experience with deploying Fabric Path using Nexus 7000 Devices
  • Experience with configuring VPC, VDC and OTV between the data centers as a layer 2 extension.
  • Experience with configuring FCOE using Cisco Nexus 5548.
  • Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multilayer Switching.
  • Configuring OSPF and Static routing on Juniper M and MX series Routers
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
  • Dealt with monitoring tools like (Solar Winds, Cisco Works),networkpacket capture tools like Wire shark
  • Maintaining the health of 250+ wireless Access points in multiple locations.

Confidential

Network Engineer

Responsibilities:

  • In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
  • Configured and troubleshoot OSPF and EIGRP.
  • Contributed to the bug fixing on QOS, ACL platform and SNMP area.
  • Planning and configuring the routing protocols such as OSPF and Static Routing on the routers.
  • WAN Infrastructure running OSPF & BGP as core routing protocol.
  • Tested authentication in OSPF and BGP.
  • Performed and technically documented various test results on the lab tests conducted.
  • Hands on Experience working with security issue like applying ACL’s, configuring NAT and VPN
  • Responsible for Internal and external accounts and, managing LAN/WAN/WLAN and checking for Security
  • Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series
  • Responsible for Configuring SITE TO SITE VPN on VPN Concentrators series between Head office and Branch office
  • Configured Firewall logging, DMZs& related security policies & monitoring
  • Worked onCiscoLayer 2 switches (spanning tree, VLAN).

Confidential

Network Engineer

Responsibilities:

  • Troubleshooting of CISCO routers like ping, trace route and basic issues.
  • Ensure connectivity and communication among networks, servers and clients inside and outside department.
  • IOS upgrade for Cisco routers & switches.
  • Configured and troubleshoot OSPF and EIGRP.
  • Ensure reliability, stability and recoverable of specific server environments.
  • WAN Infrastructure running OSPF & BGP as core routing protocol.
  • Good knowledge with the technologies VPN,WLANand Multicast.
  • Planning and configuring the routing protocols such as OSPF, RIP, and Static Routing on the routers.
  • Worked on ASA firewalls and F5 load balancers
  • Managing Layer 2 switches of Cisco, VLAN configuration and assigning ports to specific VLAN as per requirement.
  • Monitor and tune network to ensure acceptable levels of performance.
  • Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security

We'd love your feedback!