We provide IT Staff Augmentation Services!

Network Engineer. Resume

0/5 (Submit Your Rating)

Redmond, Wa

SUMMARY:

  • Over 6 years of experience as a Network & Security Engineer, including hands - on experience in providing network design, deployment, support, installation and analysis. Experience in providing a wide range Network Infrastructure and Security Solutions for LAN / WAN, Enterprise and Data Center Environments.
  • Experience Working on equipment from Multiple vendors such as Cisco, Juniper, F5, Palo Alto Checkpoint, Fortigate.
  • Expertise in working with Cisco Nexus 7k, 5k, 2k, Cisco Catalyst 6500’s, 4500’s & VPC, VDC, VRF configuration.
  • Expertise in installing, configuring and troubleshooting Juniper EX Switches & Mx Routers.
  • Experience working with Cisco IOS, IOS-XR, NX-OS, JunOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, EIGRP, BGP v4, MPLS.
  • Knowledge of implementing and troubleshooting, complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.
  • Expert level knowledge of troubleshooting, implementing, optimizing and testing of Static & Dynamic routing protocols such as EIGRP, OSPF, BGP, QoS ability to interpret and resolve complex route table problems.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for Cisco ASA, Palo Alto, Checkpoint.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Security Appliances with Polices, rules, Profiles, Failover, DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • In-depth knowledge and hands-on experience in Service Provider Routing Policies, Network Architecture, IP Sub netting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Knowledge in preparing Technical Documentation and presentations using Confidential VISIO/Office.
  • Excellent technical and project management skills combined with strong communication skills
  • Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analyses results and implement and delivering solutions as an individual and as part of a team.

CORE COMPETENCIES:

Routing Protocols: Static Routes, Dynamic Routing RIPv2, EIGRP, OSPF(V2,V3), BGP(ibgp,eBGP), MP-BGP

WAN Protocols: HDLC, PPP, MLPPP

Layer 2 technology: VLAN, VTP, VMPS, ISL, dot1q, DTP, Spanning-tree, PVST

Layer 3 Switching: CEF, MLS, Ether Channel

Packet Switched WAN: ATM, FRAME RELAY, MPLS VPNs

Security Technologies: Cisco ASA, Palo Alto, Checkpoint NG, Juniper SRX

Cisco Routers: Cisco GSR 12416, 12418, Cisco 7200vxr, Cisco 3640, Cisco 3600

Redundancy and management: HSRP, RPR, NSF/NSR

Physical interfaces: Fast Ethernet, Gigabit Ethernet, Serial, HSSI, Sonet (POS)

Switches: Catalyst 6500, MSFC, MSFC2, 7600, 3700, 3500

Operating Systems: MS Windows, Server 03/08/12, Linux, MACos

Office Suite: Outlook, Word, Excel, Visio

Programming & Scripting: Python, C, C++

PROFESSIONAL EXPERIENCE

Confidential, REDMOND, WA.

NETWORK ENGINEER.

Responsibilities:

  • Configuration and Deployment of new Big IP F5 LTM and GTM load balancers at multiple Data Centers.
  • Day to day activities include Incident Resolution and Service Requests for creating new VIP’s on the F5 LTM/GTM. Virtual edition and the F5 BigIP VIPRION 4800, 4480 hardware.
  • Configure Server Pool, Pool Members, Server nodes for a VIP.
  • Configure SNAT and NAT for accessing the content from Internet.
  • Configure different types of Monitors to check the health of Servers.
  • Configure advanced features on VIP’s. This includes configure a Profile for Cookie persistence. To configure a Profile SSL termination.
  • Software Upgrade projects across F5 upgrade of Big-IP from 11.6 to 13.0
  • Troubleshoot issues related to Application slowness by Analyzing nodes, Health monitors, Server pools.
  • Management of F5 LTMs and GTMs Load Balancers. This include Incident Resolution Tickets, Service request Tickets, renewals.
  • Upgraded outdated cisco ACE 20,30 load balancers to F5 BigIP LTM to improve availability, functionality and scalability in the enterprise.
  • Configuration and troubleshooting of Issues related to VIP’s, Server pool’s, Redundancy, Persistence, SSL offloading to improve application performance.
  • Experience working with Cisco Nexus 7700, 5500, 2148, 2248 series in Data Center Environment.
  • Performed ISSU to upgrade to Core Nexus 7k switches.
  • Decommission of legacy Cisco 6500’s, Cisco 4500’s and Deployment of new 6807 to replace the 6500.
  • Configure OSPF & Troubleshoot issue’s related to OSPF as Internal Routing Protocol.
  • Installed and configured WAN routers usingBGPto provide connectivity to geographically separate office areas by utilizing Verizon ISP.
  • Performing troubleshooting on slow network Performance/connectivity issues, routing issues that involves OSPF, BGP and identifying the Root Cause Analysis of the issues.
  • Perform Layer 2 switching and Layer 3 routing within a Data Center Environment, between Core, Distribution& Access Layers
  • Configure and Troubleshoot Issues related to Port Configuration, Port security, VLAN Configuration, Inter VLAN routing, Ether-Channels, Port Channel, Trunking, Spanning tree, SNMP. Etc.
  • Write Rulebooks to upgrade Cisco IOS, CAT OS, and NX-OS In High Availability production environments & Pre/Post checks for customer production upgrades.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and downstream devices.
  • Enterprise level Cisco ISE administration, Cisco Prime configuration, troubleshooting and maintenance.
  • Upgrade PAN-OS from 7.1.9 to 8.0.1 in Palo Alto firewalls.
  • Configure Security Profiles such as Antivirus, Anti malware, Threat Prevention, Vulnerability
  • Implement URL filtering on Palo Alto Firewall and control access to restricted sites.
  • Configure and troubleshoot IPSEC VPN form Site to Site with Cisco, Checkpoint Devices as peer.
  • Configuring and troubleshoot Global protect SSL VPN for Work from Home Users on Palo Alto.
  • Configuring Security Policies for Access control, interzone connectivity, External Access on Palo Alto Firewall.
  • Configure NAT polices on Palo firewalls as per requirements.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Panorama firewall management tool to administer Palo Alto 5050, & 5250 device groups.
  • Infoblox to provide DNS, DHCP, IPAM, administration services.
  • Implemented DHCP, DNS, IPAM configuration on the servers to allocate, resolute the IP addresses from subnets on Infoblox.
  • Infoblox Management of replication between Grid Master and member appliances
  • Experience with CA Suite, Spectrum Network Monitoring tool.
  • Use tools like Wireshark, NetBrain etc.

Confidential, Bridgewater, NJ.

NETWORK SECURITY ENGINEER.

Responsibilities:

  • Primary responsibility is to design, test and deploy various Network Infrastructure & Network Security Products in High Availability Configuration from Vendors such Cisco, Juniper, HP Procurve and Palo Alto.
  • Migration of Cisco Catalyst, IOS Platforms to Cisco Nexus, Juniper Platform Conversion on Core, distribution & Access layer switches.
  • Worked on Datacenter Fleet Migration project to migrate the existing 6509, 4509 devices to a Nexus 7010, 5010 and Nexus 2248 FEX based solution.
  • Configure VDC on Nexus 7k. Virtual Port Channel (VPC) between 5K and 2K. Configured VRF, VRF-Lite.
  • Configuring Nexus 2K (FEX) which acts as a remote line card (module) for the Nexus 5k for the Nexus 5000 to connect servers and storage devices.
  • Worked on in corporate Cisco Nexus 9000 NXOS to ACI fabric to work in concert with the existing Nexus 7000s and ASRs for MPLS implementation.
  • Designed the ACI fabric to ensure each tenant/host is secured and has separated from other tenants/hosts. Used of L3/L2 outs via common tenants to reduce TCAM and RAMutilization.
  • Created ACI migration plan (brownfield) create L2/L3 transitions. Map traffic flows for EPGs and BDs. Handled drivers for ML2 and GBO OpenStack integrations.
  • Worked on Configuration of VLAN, VRF, VX-LAN, VPC, on Nexus devices.
  • Configuring OSPF and Static routing on JuniperM and MX series Routers in data center environment.
  • Configuring Layer 2 switching protocols and deployment of Juniper EX sand QFX series switches in data center environment.
  • Configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, BGP v4.
  • Public internet connectivity usingBGP. Redesigned theBGP configuration in the ASR 9010 platforms to make it more efficient and redundant. Instituted non-stop routing, non-stop forwarding, and dual supervisor engine redundancy.
  • Experience with manipulating various BGP attributes such as Local P, MED, Extended Communities, Route-Reflector clusters, Route-maps and route policy implementation.
  • Load Balancing solutions by employing Citrix NetScalar Load Balancers.
  • Experienced on configuring Server nodes, Server-pools, VIP’s, SSL termination, Persistence, SNAT across Citrix NetScalar Load Balancers
  • Experience with Resolving Incident tickets and Day to Day Activities like s, New VIP’s, Etc Across NetScalar
  • Design, implementation and operational support of routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.
  • Performing troubleshooting on slow network connectivity issues, routing issues that involves OSPF, BGP and identifying the Root Cause Analysis of the issues.
  • Deploying and decommissioning of Cisco Routers, Cisco switches and their respective software upgrades.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Hands on Experience working on NextGen Firewalls such as Cisco ASA with Firepower (5585) and Palo Alto (5050).
  • Cisco Firesight management tool to manage Cisco ASA with firepower, Firepower appliances
  • Refining IPS Policy and Creating Rules as per the Security Standard on Cisco Sourcefire IPS.
  • Perform firewall administration adding, updating and troubleshooting as per requirement rules/policies on Palo Alto 5050 & Cisco ASA 5555, 5585.
  • Configure Security Profiles on Palo Alto / ASA for URL filtering, Anti-Virus, Anti-Spyware, Vulnerability Protection, Threat Prevention, File Blocking.
  • Configure Clientless/AnyConnect SSL VPN on Cisco ASA for Work from Home Users
  • Configuration and Troubleshooting of IPSEC VPN tunnel On Palo Alto/ Cisco ASA and Cisco ASA as peer.
  • Handle Incident tickets & Service Requests related to Cisco ASA & Palo Altofirewall, & VPN along with the connectivity issuesand provide prompt support when any issue pops up.
  • Implement DMZ for multiple clients of the state on the Palo Alto/ ASA firewall.
  • Analyze of firewall logs, Provide administrational and Monitoring Support, Dynamic Updates for Palo Alto 5050 Firewall & Cisco ASA 5555, 5585.
  • Responsible for Migration from Legacy Cisco ASA firewall to Palo Alto firewall.
  • Experience with Splunk Security Infrastructure and Event Management. (SIEM). correlate, review, rank, and coordinate work efforts for sites to follow up on high-priority events.
  • Work with Level 2 / Level 3 Engineering on software bugs and solutions involving software upgrades and feature enhancements.

Confidential, TEMPE, AZ.

NETWORK SECURITY ENGINEER.

Responsibilities:

  • Experience with design and implementation of Data center migration Involving in Access, Distribution and Core layers.
  • Experience working with Cisco Nexus 7000 as Core Switches, and Nexus 5500, 2148, 2248 series at Distribution and access level.
  • Configuration and deployment of Juniper EX sand QFX series Data Center switches.
  • Experience working JuniperT-Series, M-Series, MX-Series, J-Series Routers.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Experience with BGP community Strings, Autonomous Numbering system.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems during the conversion of existing point to point circuits to MPLS
  • Configuring routing protocols OSPF, EIGRP, MPBGP, LDP and BGPV4.
  • Responsible for network hardware like Cisco routers and Switches, software upgrades, installations and any related infrastructure
  • Configuring and troubleshooting CISCO catalyst 6509, 7609, 7613 with Supervisor cards, Cisco 3640, Cisco GSR 12416, 21418.
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalysts.
  • Strong Experience in Load balancing solutions by implementing F5 LTM in Various Environments.
  • Day to Day Management, troubleshooting F5 LTMs & GTMs for the Web Applications/ corporate applications, their Speed & availability.
  • Worked in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Configuration of Fortinet 3000,5000 series Firewalls
  • Worked extensively in Configuring, Monitoring and Troubleshooting Checkpoint / Juniper security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Administration of Service Requests, Incident Tickets, troubleshooting of CheckPoint 15000, 23000 series firewalls.
  • Implementation, configuration of Policies and troubleshooting of Checkpoint Firewall via GAIA.
  • Adding security rules and pushing the security policy on Checkpoint Using Smart Update, User Management and Authentication in Checkpoint Firewall.
  • Responsible for investigating and troubleshooting incidents related to Cyber Security or Network Security.
  • Administration and troubleshoot of Juniper SRX 3000, 4000, 5000 Series firewalls.
  • Policy management and changes in Juniper SRX firewall.
  • Experience working on Juniper SRX, Netscreen, Screen-OS.
  • Provide Subject Matter Expertise in network switches, routers,firewall, and security technologies within TASC.
  • Configuration of Cisco ACS for Access Control.
  • Experience with Cisco Identity Services Engine (ISE).
  • Worked On UNIX, Linux, and Windows Platforms and involved in capacity planning of Network Maintenance.
  • Hands-on experience on VMware, VSphere, virtualization.

Confidential, FOSTER CITY, CA.

NETWORK ENGINEER.

Responsibilities:

  • Implemented WLAN Aruba Wireless Access Points and its Controllers at various corporate sites for LAN Technical Environment: EIGRP, ISIS, BGP, LAN, WAN, MPLS, VLAN, Cisco 3845/3600/2800 routers, Cisco 6509/ 3750/3550/3500/2950 switches
  • Experience with large Scale Enterprise Networks with more than 12000 users
  • Experience with VOIP, voice gateways, QOS policies configuration.
  • Strong Experience in working with F5 Load Balancers and their Implementation in various Networks.
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalysts.
  • Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, BGP v4. Configured IP access filter policies.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Knowledgeable in understanding of the ITIL framework.
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Worked on Cisco Layer 2/Layer 3 switches (spanning tree, VLAN).
  • Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
  • Configured VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Planning and configuring the routing protocols such as ISIS, EIGRP and Static Routing on the routers.
  • Network Monitoring using tools like Cisco Works 2000.
  • Experience with Solarwinds NPM.
  • Hands on Experience working on NextGen Firewalls such as Cisco ASA (5585), Firepower 9300, Cisco Firesight management tool to manage Cisco ASA with firepower appliance
  • Perform firewall administration adding, updating and troubleshooting as per requirement rules/ Cisco ASA 5555, 5585.
  • Configure Thick Client AnyConnect SSL VPN on Cisco ASA for Work from Home Users
  • Configuration and Troubleshooting of IPSEC VPN tunnel On Cisco ASA and Cisco ASA as peer.
  • Handle Incident tickets & Service Requests related to Cisco ASAfirewall, & VPN along with the connectivity issuesand provide prompt support when any issue pops up.
  • Implement DMZ for multiple clients of the state on the ASA firewall.
  • Analyze of firewall logs, Provide administrational and Monitoring Support, Updates Cisco ASA 5555, 5585.
  • Plan Design and assist in deploying enterprise wide Network Security and High Availability Solutions for ASA.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification on ASA
  • Performed Maintenance activities during the work window in IM bridge with the Operations Center Team and Property, work includes batch of upgrades with Network devices under the production environment by shifting the services thereby causing negligible impact
  • Writing Engineering work orders as per the changes going in data center and implement the changes as per the schedule.
  • Efficient use of Confidential VISIO as for technical diagrams, technical documentation and various office suite tools.
  • Hardware installations using Fiber cable, Ethernet, copper wiring etc.
  • Performed Pre-Checks by taking the Configuration Back-Ups, Health checks, Code Transfers and SNMP interface checks before the maintenance activity and confirmed the device by Post-Check activities which includes Health-checks and comparing the device is in the same state after the upgrade
  • Attended Change Advisory Board (CAB) meetings to represent the change impact to the production environment before beginning of maintenance
  • Mitigated and eliminated the potential risk, defects, trends and vulnerabilities from rapid scale of the environment and ensured network agility without compromising quality
  • Involved in the Operations Daily Sync meetings to represent any changes caused due to the maintenance in the production environment.
  • Worked on Standardizing nonstandard configurations and reduced hardware and software variability.

Confidential

NETWORK DEPLOYMENT ENGINEER.

Responsibilities:

  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.
  • Worked with telecom vendors in regard to network fault isolation.
  • Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, BGP v4. Configured IP access filter policies.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configured egress and ingress queues for ISP facing routers using CBWFQ.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Configured BGP and OSPF routing.
  • Cisco ASA 5510, 5540 Firewall Administration, Rule Analysis, Rule Modification
  • Troubleshoot by Analyzing traffic passing managed firewalls via logs and packet captures.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope
  • Efficient at use of Confidential VISIO/Office as technical documentation and presentation tools.

Confidential

NETWORK SUPPORT ENGINEER.

Responsibilities:

  • AAA implementation using Cisco Secure ACS (TACACS+, RADIUS).
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc).
  • Identify, design and implement flexible, responsive, and secure technology services.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Strong knowledge on networking concepts like TCP/IP, Routing and Switching
  • Configuring HSRP between the 3845 router pairs for Gateway redundancy for the client desktops.
  • ConfigureVRRP & GLBP andVLANTrunking802.1Q on Catalyst 6500 switches.
  • Negotiate VPN tunnels using IPSec encryption standards and configured and implemented site-to-site VPN, Remote VPN.
  • Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.
  • Verify network status using basic utilities (including: ping, trace route, telnet, SSH, ARP, ipconfig)
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support
  • Supporting EIGRP and BGP network by resolving problems of internal teams & external customers of all locations.

We'd love your feedback!