Network Engineer Resume
Detroit, MI
SUMMARY
- Network Engineer focused on wide area network with 7+ Experience implementing a complex networks includes companies and public school system.
- Strong hands on experience in installing, configuring, and troubleshooting of Cisco nexus 7K, 3K, 2K and HP - MSR series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 series switches.
- Experience in Layer 3, 2 Routing Protocol configurations: RIPv2, OSPF, BGP, EIGRP, MPLS, ARP, ATM/FRAME RELAY.
- Expertise in implementing, maintaining and troubleshooting L2 switching tasks such as VLANs, VTP, VLAN Trunking using ISL and 802.1Q, STP, RSTP, PVST+, Inter-Vlan routing.
- Hands on Experience with Cisco ASA, PIX firewalls and F5 load balancers.
- Cisco Security: Telnet, SDM, NAT/ACLs, DMZ, AAA, Layer 2 Security, Layer 3 Security, IPS/IDS, Cisco ASA 5500 series, VPN, GRE, IPsec.
- Experience in designing, implementing and Managing LAN, WAN solutions for different client setups.
- Strong Knowledge in WAN technologies including T1, T3, ISDN, HDLC, Point to Point, ATM and Frame Relay.
- Expertise in IP addressing management and allocation.
- Experienced in creating a secure tunnel like GRE, IPSEC VPN.
- Working experience with network monitoring tools such as IBM Tivoli, Service Now, BMC Remedy
- Hands on experience in analyzing the network and performance issues using network analyzing tools such Wireshark, Fiddler, Winmtr, Zscaler Analyzer.
- Redesign of Internet connectivity infrastructure for meeting bandwidth requirements.
- Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
- Experience with installing and managing IT services such as Active directory, site replication, DNS, SSH, DHCP, DNS, NAT and Terminal service.
- Experience working with FCOE on the nexus between the datacenters
- Experienced with redundancy protocols to minimize network downtime and reduce system outages with GLBP, HSRP, and failover firewall designs
- Deploying Layer 2 security in Server Farms by configuring switch for 802.1x port based authentication.
- Hands on experience in configuring and implementing the policies on palo alto next gen firewalls, check point firewalls, Cisco ASA, PIX firewall devices.
- Experienced in address translation using NAT, PAT.
- Configured policy based routing and access control list to allow/deny the specific source and destinations.
- Configured and managed Nexus 2k fabric extender, 5K and 7K switch network at the client’s location.
- Good experience with Security Incident and Event Management (SIEM), Intrusion Detection and Prevention Systems (IDS/IPS) and log management and database activity monitoring.
- Hands on experience in installing and administrating vCenter 5, ESXi 5.0, 5.5 on physical servers.
- Configuring virtual distributed vSwitches, spinning virtual machines in vSphere virtual environment.
- Experienced in create PAC files, user and group policies in cloud environment.
- Documenting the design modification changes and maintain the log records.
- Basic Knowledge on Cisco UCS environment and Fabric Interconnects.
- Responsible for the day-to-day administration and maintenance of various mission critical multi-area network infrastructures in an enterprise LAN/WAN environment.
- Develop a test case scenario with network simulator tools (GNS3, Cisco packet tracer, test VM environment) prior to deployment in production enviornment servers
- Ensuring 99.99% SLA compliance on handling the Incidents management and change Management related to Network
TECHNICAL SKILLS
Routers: Cisco 1900, 2600, 2800, 2900, 3600, 3800, 3900, 7200, 7600
Switches: Cisco Catalyst 2960, 3560, 3750, 4500, 6500 & Nexus 2K/5K/7K CISCO ASA 5505,5510 PIX 501,525,535. ACL (Standard, Extended)
Routing: OSPF, EIGRP, BGP, MPLS, RIP v1/v2, Route Filtering, Redistribution, Summarization& Static and default routing.
Switching: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels,Transparent Bridging
LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet
WAN: PPP, HDLC, Channelized links (E1/T1/E3/T3), Fiber Optic Circuits, Frame Relay, MPLS
Protocol: IP, TCP, UDP, ICMP, NAT, DHCP, SNMP, IPSEC, SSL, HTTP, SSH, DNS, PAT
Load Balancer: F5 Networks (Big-IP) LTM 6900 and 3900
Network Security: Cisco ASA 5540, ACL, IPSEC Network Management
Tools: Wireshark, Network analyzer, GNS3, Winmtr, Fiddler.
Gateway Redundancy: HSRP, GLBP, VRRP
AAA Architecture: TACACS+, RADIUS
Operating System: Windows, Linux, Cisco IOS.
Virtualization: vCenter, Esxi 5.1, 5.5 server management.
PROFESSIONAL EXPERIENCE
Confidential, St. Louis, MO
Network Cloud Administrator
Responsibilities:
- Implementing, configuring, and troubleshooting routing protocols i.e. BGP, OSPF, MPLS networks
- Expertise in implementing, maintaining and troubleshooting L2 switching tasks such as VLANs, VTP, VLAN Trunking using ISL and 802.1Q, STP, RSTP, PVST+, Inter-Vlan routing.
- Designed, installed, and maintained various LAN/WAN technologies and applications connecting remote sites to corporate headquarter.
- Configure and administrate network security devices such as ASA, PIX, Palo alto firewalls and F5 load balancer
- Implementing, configuring redundancy protocols HSRP and failover for Default Gateway Redundancy
- Performed route filtering and route manipulation by applying distribute-lists, route-maps & offset lists respectively.
- Implement GRE, IPSEC and SSL tunnels to establish the VPN connection to branch offices.
- Interacting with the clients by creating tickets for the issue and dispatching to the correct queues for resolution
- Creating proxy auto configuration (PAC) file to select the appropriate PAC server for client Confidential .
- High level understanding of multi-tiered application traffic flow, server load balancing and global load balancing load balancing
- Created and maintained Visio network diagrams and supporting documentation.
- Creating firewall policies to secure the internet access rules based on the client requirements.
- Install and configure network devices such as Cisco, HP routers and switches.
- Installed ESXi hosts and vCenter on physical servers.
- Administering and monitoring virtualized environment in order to maintain the high availability of the resources.
- Performed OS upgrades & device replacements on several CISCO devices (6500, Nexus 2K, 3K, 5k and 7k series switches)
- Generating traffic reports based on users, groups, locations and as per client requests.
- Monitor and assist to make sure policies are working fine or not.
Environment: CISCO 6500, 6509, 6504 series and Nexus 7004, 7009, 3064, 3048 switches Cisco 3640/12000, 7200/3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA, PIX, Checkpoint, Windows server 2003/2008, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, MPLS, T1, T3 GRE, IPSEC, Palo alto, cloud administration, Wireshark, fiddler, vCenter 5.1, 5.5 and ESXI 5.1, 5.5. SDM.
Confidential, Detroit, MI
Network Engineer
Responsibilities:
- Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route-feedback, BGP attributes) on Cisco Routers 7613, 7201, and 3945E.
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
- Installed and deployed legacy networking equipment to a new network design. Troubleshooting of legacy T-1 connections to end sites.
- Regular upgrade and maintenance of Infrastructure, Installing, configuring Cisco Nexus 7K and 5K Series Switches, Cisco 6500, 4500, 3750 series Switches, Cisco 2800, 2900, 7200, ASR 1000 Series Routers, ASA, Check Point Firewalls, F5 Load Balancers.
- Responsible for the day-to-day administration and maintenance of various mission critical multi-area network infrastructures in an enterprise LAN/WAN environment.
- Lab testing & validation prior to implementation of Nexus 7K, 5K & 3K connecting to blade servers. servers
- Rack and Stack, Installed and configured new cisco routers (Nexus 7k,3k, 2900,2800, ASR, ISR) and switches catalyst series 3725, 3560, 3550, 2960, 2950, 4500 & 6500.
- Designed, validated and implemented LAN, WLAN & WAN solution to suite client's needs.
- Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location of office on the switched network.
- Configured ISR/ASR Routers, Cat Switches, ASA (5500 series) and PIX (500 series) Firewall Devices for networksecurity implementation such as IP Sec VPN (Site-to-Site, Remote-Access, AnyConnect VPN) with GRE/DMVPN tunneling
- Administration of ASA firewalls in the DMZ and FWSM in the Server Farm to provide security and controlled/restricted access.
- Experience on working with Palo Alto Next Generation firewall with security networking, management features such as URL filtering, Anti-virus, IPsec VPN, SSL VPN, IPS, Log Management etc.
- Created virtualized environment by installing ESXI servers and Vcenter server appliances (VCSA) to manage the host in production environment based on the requirements.
- Spinning up Windowsand Linux servers using VMware and tying them to the Domain Controller Installing Windows Domain controller (DC) and Active directory (AD).
- Working on the tickets generated by end users based on the service level agreements (SLA).
- Update and inform the changes to higher authority according to the ITIL management process.
Environment: CISCO 6500, 6509, 6504 series and Nexus 7004, 7009, 3064, 3048 switches Cisco 3640/12000, 7200/3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Checkpoint, Windows server 2003/2008, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, DMZ
Confidential, Lebanon, NY
Network Support Administrator
Responsibilities:
- Provide technical support for clients with dial-up internet issues.
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture
- Used Cisco ACE load balancer between the servers inside the networkand in the DMZ.
- Documenting all the technical upgrades and changes in the network.
- Monitoring the NMS system for different networkalerts
- Ensure problems are satisfactorily resolved in a timely manner with focus on providing a high level of support for all customers.
- Developing information security policies, Procedures and their implementation across the enterprise based on the system design servers
- Once trouble ticket has been created keep customer informed of status of ticket and estimated time to repair.
- Installed and configured DNS and DHCP server.
- Involved in troubleshooting of DHCP and other IP conflict problems.
- Performed switching technology administration including VLANs, inter-VLAN routing, Trunking, STP, RSTP, port aggregation & link negotiation.
- Designed and installed new Branchnetworksystems. Resolved networkissues, ran test scripts and preparednetworkdocumentation.
- Checking and configuring Cisco 7613 routers at data center for remote sites' issues.
- Working on Cisco 6509 and 4507 series switches for LAN requirements, that includes managing VLANs, Port Security and troubleshooting LAN issues
Environment: Cisco 6500, 6509, 6504 series and Nexus 7004, 7009, 3064, 3048 switches Cisco 3640/7200/3845/3600/2800/1800/2900, Wireless Access controllers, routers, Cisco Nexus 7K/5K, Cisco ASA 500, Checkpoint, Windows server 2003/2008, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, service now.
Confidential
Network Engineer
Responsibilities:
- Lead the team (4 members) for Confidential north region (nearly 3100 branches) for network monitor and availability
- Configuring and troubleshooting routing protocols like EIGRP, BGP, Static and Default routing.
- Installed, Configured and maintained Cisco 72xx, 39xx Series Routers, 2950, 3750, 3800 and 65xx Cat switches.
- Configuring and modifying Access-lists, policy maps, route-maps.
- Configuring and troubleshooting Vlans, STP, Trunking, Ether channel, DTP on the LAN switches.
- Management of IP addressing and conversion from a public IP addressing (NAT) scheme to a private IP network
- Downloaded and upgraded IOS versions on Cisco devices servers
- Monitoring the WAN links using IBM TIVOLI NETCOOL and BMC REMEDY monitoring tools
- Updating the Incidents (WAN link, LAN Alerts) with the troubleshooting Steps to resolve state.
- Hardening of all Devices such as Cisco (3945,2600, 1900,1800,1700 series), 3 COM (MSR 20-11, MSR 20-12, MSR20-15series) routers
- Configuration and troubleshooting of Serial, Ethernet interfaces for LAN, WAN connectivity.
- Configuration and troubleshooting of VLAN, GRE Tunnel, IPsec Tunnel, STP, Port security.
- Ensuring 100% SLA compliance on handling the Incidents management and change Management related to Network.
- Coordinating with 13 service providers to make the wan links up and working fine.
Environment: Banking sector, IBM Tivoli, BMC remedy, Service now, Cisco 6500, 6509, 6504 series and Nexus 7004, 7009, 3064, 3048 switches Cisco 3640/ 7200/3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Checkpoint, Windows server 2003/2008, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, port security.
Confidential
IT support and Network Administrator (Intern)
Responsibilities:
- Got Hands-on experience in maintaining and troubleshooting RIP, OSPF and EIGRP routing protocols.
- Performed IOS upgrades on 2900, 3500 series Cisco Catalyst Switches and 1800, 1900, 2600, 2800 series Cisco routers using TFTP.
- Involved in Switching Technology Administration including creating and managing VLANS, Port security, LAN security etc.
- Spinning up Windowsand Linux servers using VMware and tying them to the Domain Controller Installing Windows Domain controller (DC) and Active directory (AD).
- Installation and Configuration of SSH, NFS, FTP, TCP/IP, DHCP, DNS
- Implemented standard, extended access control lists.
- Network monitoring using IBM Tivoli
- Provide 24/7 support and troubleshooting of a variety of network related issues including Guests' connectivity and devices operability.
- Investigate, analyze and document technical issues, then provide recommendation to upper management.
- Responsible for applying permissions to Privilege User Groups such as Domain Admins and file and share permission management
- Involved in installing, configuring & troubleshooting different operating systems, software & Hardware in PC & Laptops.
- Maintained IP management system for over 1000 Class C networks.
- Monitor and coordinate all data systemsoperations, including security procedures, and liaison with end users.
Environment: Cisco routers 1800,1900,2600,2800,2900, Cisco Switches: Catalyst 3750, 3650, 2960, EIGRP, OSPF, Windows Active directory, IBM Tivoli, LAN, WAN, VLAN, STP, Trunk, port securityEDUCATION