We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

0/5 (Submit Your Rating)

Atlanta, GA

SUMMARY

  • Total 7+ years of experience in Networking, including hands - on experience in IP network design providing network support, installation and analysis.
  • Expert level knowledge of troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, BGP ability to interpret and resolve complex route table problems.
  • Experience working with Nexus 7K, 5K, 2K devices also configuring Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000.
  • Experience in network performance testing. Administration and Maintenance in multi-vendor platform environments (Cisco, Juniper, Checkpoint, F5, Palo Alto)
  • Worked extensively on firewalls and VPN gateways Checkpoint, CISCO, Juniper, FortiGate GUI and Arista equipments.
  • Manage administration ofJuniperFirewall, connecting offices worldwide through VPN tunnels to two HAJuniperSSG520's. The VPN provides 24/7/365 connectivity for corporate needs of all remote offices.
  • Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
  • Configured policies on F5 ASM Created rules and scripts for the automation of the environment. Reengineered Firewall policies onJuniperSSG320 and SSG140 Firewalls
  • Experience configuring and troubleshooting on Citrix NetScalar Load Balancer.
  • Migrated firewall rules from Cisco ASA to Palo Alto and Checkpoint Firewalls. Designing and Configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550).
  • Advanced knowledge in installation and configuration of Juniper Netscreen Firewall.
  • Migration from Cisco firewalls to Palo Alto firewalls platforms PA 4000 and PA 500 and PA- 200 firewalls.
  • Design, Build, and Implement various solutions on Check Point Firewalls, Blue Coat Proxies, F5 Load balancers and F5 Global Traffic Managers.
  • Hands on experience in configuring and supporting site-to-site and remote access Cisco, IPsec, VPN solutions using ASA/PIX firewalls, Cisco, B2B VPN client in addition to providing TACACS+ and RADIUS services.
  • Experience in working with Cisco Nexus 9k, 7k, 5k, 2k Switches and Virtual Port Channel configuration.
  • Deployed Cisco FireSight,ISEusing certificate authority signed certs with pxGrid remediation module.
  • Strong hands on experience onCheckpointFirewalls, ASA (5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • Good Understanding of Python scripts for system automation, monitoring and security reporting. Maintain existingPerlscripts and migration existingPerlscripts to Python.
  • Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.
  • Implement changes on switches, routers, load balancers (F5 LTM and CSS), Wireless devices as per Design engineers.
  • Checkpoint level 3 operations support with hardware operation and fixed all problems.
  • Excellent communication skills with ability to interact effectively with employees at all level of the organization.
  • Cisco Security: Telnet, NAT/ACLs, AAA, Layer 2 Security, Layer 3 Security, IPS/IDS, Cisco (ASA, PIX) 5510, Cryptography, VPN, IPsec.
  • Firewalltechnologies including general configuration, risk analysis, security policy, rules creation and modification of Check Point R65, R70, R75, R77 and Cisco ASA.
  • Supporting and troubleshooting Checkpoint/Cisco site-to-site VPN/IP Sec functionality.
  • Experience on working, implementing, configuration and managing Juniper SA 2500/4500/6500 SA devices with secure access services 7.1/8.0.
  • Performing theJuniperSRX 5800 deployment to replace the Crossbeam/Checkpoint firewalls.
  • Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)

TECHNICAL SKILLS

Cisco Platforms: Nexus 7K, 5K, 2K, 1K

Cisco Routers: 1700,1800,2500,2600,2800,3600,3800,3900,7200,7600

Cisco L2 & L3 Switches: 2900,3500,3560,3750,4500,4900,6500

Juniper Platforms: SRX, MX, EX Series Router and Switches

Networking Concepts: Access-lists, Routing, Switching, Sub netting, Designing, CSU/DSU, IPsec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall: ASA Firewall (5505/5510), Checkpoint, Cisco ASA

Network Tools: Solar Winds, SNMP, Cisco Works, Wireshark

Load Balancers: Cisco CSM, F5 Networks (Big-IP)

Wan Technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3,0C3, T1 /T3 & SONET

Lan Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channelVLANS, VTP, STP, RSTP, 802.1Q

Security Protocols: IKE, IPSEC, SSL-VPN

Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System: Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

Wireless: Ciscowirelessaccess points: AIR-CAP3702, AIR-CAP3502, AIR-CAP2602, AIR-CAP2702, WLC 5508, 4404 and WLC 4402wireless

LAN controllers: Catalyst 6513, 6509, 4006, 4003, 3750, 3560, 3550, 2950G switches

PROFESSIONAL EXPERIENCE

Confidential, Atlanta GA

Sr. Network Engineer

Responsibilities:

  • Designing MPLS VPN and QoS for architecture using Cisco multi-layer switches.
  • Currently working on future CRAN architecture and design and Small cell migration to NFV.
  • Provide Tier II Load Balancer expertise on F5 BigIP Local Traffic Managers (LTM). Designing F5 solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BigIP Load Balancers.
  • Configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
  • Configured Cisco routers for MPLS VPN connectivity and VRF tables on edge routers for customer usage of the MPLS network.
  • Juniper ContrailSDNCloud Computing Open Networking Openflow/ODL
  • Configured Cisco ASA 5510 for VPN Network Access Control integration with CiscoISE(Inline PEPs).
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
  • Knowledge in new technologies like SDN,Openflowprotocol and NOX controller Python based.
  • Training sessions forOpenStack, Open Contrail, SDN and NFV at domestic and international level.
  • OpenStackMitaka with integration of Open Contrail 3.1.0.
  • Juniper ContrailSDNdeployment assistance to the senior engineering team.
  • Worked extensively on lab build for POC comprising of Cisco Catalyst Switch 6500s, 4500s, 3750, Nexus 7000s, and CiscoISE3300 Appliances and 1.0.4 CiscoISEsoftware on VMware's.
  • Juniper ContrailSDNsolution provisioning in test labs.
  • Good knowledge of CISCO firewalls, CISCO PIX and ASA 5500 series, Palo Alto Firewalls.
  • Configuring virtual chassis for Juniper switches EX- 4200 and firewalls NS 5200.
  • Configuration of VLAN, BFD, LAG Port Channel, HSRP, VRRP on Cisco/Juniperdevices.
  • Deploying BIG-IP F5LTMLoadBalancersforloadbalancing and traffic management of business application.
  • Configure allPaloAltoNetworksFirewallmodels (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scalefirewalldeployments.
  • Configuring VPN, clustering and ISP redundancy in Check Point Firewall.
  • Asset management, keeping inventory of every device in the data center.
  • Migrated Firewall infrastructure from Checkpoint R65 to Netscreen ISG2000.
  • Hands on experience with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
  • NX-OS upgrade in Nexus 7010 through ISSU (In service software upgrade)
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with CiscoISE
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture
  • Implementing security Solutions using Palo alto PA 5000, Check PointFirewallsR75, R77.20 Gaia and Provider-1/MDM.
  • Migrating Cisco ASA firewalls policy to new Checkpoint appliance with support of vendor specific tool.
  • Experience with Network Redesign of branch and Campus Networks. This includes changes to both the voice and data environment.
  • Maintained, upgraded, configured, and installed Cisco ASA 5510, 5520, & 5505Firewallsfrom the CLI and ASDM.

Confidential, Tempe AZ.

Network Security Engineer

Responsibilities:

  • Working with VPN tunnels, DS1, DS3 & T1 links.
  • Experience with designing and deployment of MPLS Traffic Engineering.
  • Worked extensively on policy design and implementation forISEsolution various Network.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with CiscoISE.
  • BGP/OSPF/EIGRP Automation of Flows NFV/SDNAT&T Open stack.
  • SDN/ODL Controllers MPLSSDN-WAN Anisbile.
  • Engaged withOpenStackcomponents such as KVM,Neutron, Keystone, and Horizon for troubleshooting and configuration.
  • Designed, implemented and maintained WAN technologies like DWDM, MPLS, VPLS and tunneling technologies.
  • Implemented Cisco site to site VPN for partnering with different partners around the world.
  • Juniper ContrailSDNCloud Computing Open Networking Open flow/ODL
  • Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls
  • Experience with configuring BGP in the data center and using BGP as a WAN protocol and manipulating BGP attributes. implemented and supported Cisco PIX, Cisco ASA, Cisco ACS/ISEwith AD/LDAP.
  • Successfully deployed and turned up routing on carrier-classCiscoCRSPE's to COIN'sCRSPE's routers to support transport for new "state of the art" Mobile.
  • Configure allPalo altoNetworksFirewallmodels (PA-2k, PA-3k, PA-5k etc.) as well as a centralized
  • Installation and configuration of Cisco Nexus 9k, 7k, 5k, 2k, ASRs, 6500s, 4510s, 3800s, 2900s.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9k, 7K, 5K and its downstream devices.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.
  • Provided technical assistance for LAN/WAN management & troubleshooting and complex customer issues using Network monitoring tools such as Solar winds.
  • Implementing security Solutions using Palo Alto PA 5000, Check PointFirewallsR75, R77.20 Gaia and Provider-1/MDM.
  • Configured VLAN, Spanning tree, VSTP, SNMP onJuniperEX series switches.
  • Hands on Experience with blocking of IP's onCheckpointwhich are suspicious.
  • Good knowledge onjuniperSRX240, SRX220 and SRX550 series Firewalls.
  • Configure allPaloAltoNetworksFirewall models and Panorama to manage large scale Firewall deployments.
  • Implemented the network segmentation for PCI network which utilizes MPLS VPN andVRFLite.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to point site.

Confidential, Orlando FL

Network Engineer

Responsibilities:

  • Worked onCiscoLayer 2 switches (spanning tree, VLAN).
  • WAN Infrastructure running OSPF & BGP as core routing protocol.
  • Created virtual network overlays, tenants and VM's using IPAM's setting up security policy using Juniper Contrail in conjunction withOpen stack.
  • Implemented and configured BGP,BGPv6, using policy route-maps, prefix list to regulate advertise routes from specified Autonomous Systems. Verified BGP neighbor establishment and prefix received and converged with transit providers.
  • Worked on migrating the F5 LTM 5100 version 9.2 to 5100 LTM version 9.4 and F5 GTM configurations
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access
  • Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Worked as a part of data center deployment where we converted from Cisco 6500 to Nexus.
  • Adding Websites to the URL filtering blocklist in Bluecoat Proxies and upgrading firmware on the bluecoat proxies.
  • Configured ACI for remote Authentication in the respective organization, manage project task to migrate from Cisco ASA firewalls to Checkpoint firewalls.
  • Deployed Nexus switches 2248, 5548, 7018 and implemented features like FEX Links, VPC, VRF, VDC, and OTV, Fabric Path.
  • Review the existing process and recommend changes to increase productivity and efficiency such asSDN, Deep packet analysis.
  • Assisted installing cisco ISR 2900 series routers, Cisco 5520 ASA appliance, Wireless LAN upgrade project. Assisted infrastructure team with the installation of 60 cisco 3700 series AP, around the building.
  • Configured and then racked 3 Cisco 2911 voice gateways with H323 to the carrier.
  • Leading and supporting role regarding technical topics and solutions within a network implementation organization.
  • Configured Security policies including NAT, PAT, VPN's and Access Control Lists.
  • Configured VDC's on nexus 7K for creating multiple logical switches and HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches.

Confidential

Network Engineer

Responsibilities:

  • Work on different networking concepts and routing protocols like BGP, EIGRP, OSPF and other LAN/WAN technologies.
  • Configured Cisco Catalyst 6500, 4500, 3850, 3750, 2960 switches and Cisco 3600, 7200 &ASR1K & 9k Routers for an enterprisenetwork.
  • Upgrading and managing Linux Kernel on Red Hat Linux 5 &6 & ESX Reboots.
  • Configured routers and modems, troubleshot issues related to broadband technologies for Residential and Business Customers.
  • Efficient in cabling as per co-location contracts with loop-back testing, including all DS1, DS3, T1, T3, CAT 6 and CAT 5 connections as per defined cabling procedures.
  • Configured and managed networks using L3 protocols like RIPv2.
  • Configured VLANs, Private VLANs, VTP and Trunking on switches.
  • Support remote office WAN, PFR & DMVPN technologies.
  • Configured L2 and L3 security features on devices.
  • Maintained copper and fiber opticnetworkinfrastructure performing maintenance and installations where necessary.
  • Specializing in voice and datanetworkadministration and troubleshooting. Experienced problem solver competent in customer service and team management.
  • Involved in a project for a re-design of the LAN network (Cisco Catalyst 2960 and Nexus 5000 switches) and the virtualization of some systems.

We'd love your feedback!