We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

0/5 (Submit Your Rating)

Wayne, PA

SUMMARY

  • Cisco Certified Network professional with 8+ years of experience in in the field of Networking with strong and extensive knowledge of Design, configuration, implementation, operation, and support of Cisco Routers, Switches, and VPN devices.
  • Substantial knowledge in configuring and troubleshooting Dynamic routing protocol (Interior Gateway Routing Protocol) such as Distance Vector routing protocol (RIPv1, RIPv2 and IGRP), Link - State routing protocols (OSPF and IS-IS) and Hybrid protocol (EIGRP).
  • Significant knowledge in configuring and troubleshooting Exterior Gateway protocols such as BGPv4 including internal BGP (iBGP) and external BGP (eBGP).
  • Generous Knowledge in configuring Redundant router protocols like HSRP, VRRP and GLBP.
  • Indulgent in configuring Spanning Tree Protocol (STP), Per VLAN Spanning Tree (PVST), Rapid STP (RSTP) and Rapid per VLAN Spanning Tree (PVST+).
  • Ample experience in configuring Virtual Local Area Networks (VLAN) with IEEE 802.1Q, VLAN trunking protocol (VTP), shortest path bridging, Multiple VLAN Registration Protocol and VLAN Cross Connect (CC).
  • Worked on Network topologies and configurations, TCP/IP, UDP, Frame Relay, ATM, Bridges, Routers, Hubs and Switches.
  • Routing, Switching, Firewall technologies, System design, Implementation and Troubleshooting of complex network systems.
  • Configured Cisco Catalyst 6500, 4500, 3850, 3750, 2960 switches and Cisco 3600, 7200& ASR 1K & 9k Routers for an enterprise network.
  • Experience in Configuring and implementing Palo Alto Firewalls, checkpoint firewalls, PIX Firewall (506, 515, 525, 535), cisco ASA (5505,5510,5520) Firewall, Cisco ISE (Identity Service Engine) Juniper (SRX 220,300, Csrx) series firewalls.
  • Worked on Juniper Net Screen Firewalls like, NS50, SSG 550M, SSG520M, ISG 1000, and ISG 200.
  • Implementation of Juniper Firewall, SSG Series, Net screen Series ISG 1000, SRX Series.
  • In-depth knowledge and experience in WAN Technologies including OC3, E3/T3, E1/T1, Point to Point, MPLS and Frame Relay
  • Worked on latest Cisco Switches like Nexus 9000, 7018, 5548, 5020 and 5010, Implemented advanced features like VDC, VPC, OTV and configured top of the row Fabric Extenders 2248 and 2232.
  • Experience in Implementing, Maintaining, and Troubleshooting L2 Switching tasks: VLANs, VTP, VLAN Trunking (ISL/802.1Q), STP, RSTP, PVST, PVST+, CST, CEF and DCEF.
  • Experience in T1/E1/T3 technologies and different LAN & WAN technologies.
  • Managed F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs
  • Install and configure Bluecoat Proxy in the network for web traffic management and policy configuration.
  • Planned and worked on design with Network team to Re-architect F5 load-balancers to load-balance traffic anywhere in the company network.
  • Actively participated in upgrading Fast Ethernet, Layer 3 switched/routed LAN Infrastructure from Cisco 3640 to Cisco 2811 ISR Routers and Switches at access level to 2950, 3550.
  • Well understanding of Cisco UCS and M-Series Modular servers to enable centralized management of highly scalable system and to Speed-up IT operations.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Checkpoint security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls per design.
  • Hands on experience in analyzing the network and performance issues using network analyzing tools such Wireshark, Fiddler, Winmtr, Zscaler Analyzer
  • Experience with Software Defined Network (SDN) and specifically Cisco’s Application Centric Infrastructure (ACI), Cisco Nexus 1000V.
  • Hands on Experience on security devices and firewall infrastructure under enterprise level network.
  • Experience in Cisco: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay & MPLS), Routing protocol configurations (RIP, EIGRP, OSPF, and BGP)
  • Proficiency in Configuration of VLAN setup on various CISCO Routers and Switches.
  • Knowledge of Implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.
  • Extensive hands on Experience with Complex routed LAN networks, CISCO Routers and Switches.
  • In-depth expertise in the Analysis, Implementation, Troubleshooting & Documentation of LAN/WAN architecture and good experience on IP services.
  • Basic Experience with configuring and Managing on Snort and Suricata detection systems.
  • Experience through Hands-on Experience with Configuring T1.5, Gigabit Ethernet, Channelized T3 and full T3, OCX, ATM, Frame-Relay.
  • Experienced working on network monitoring and analysis tools like, SOLAR WINDS, CISCO works and RIVER BED and Wireshark.
  • Extensive experience in Configuring and troubleshooting of protocols RIP v1/v2, EIGRP, OSPF, BGP and MPLS.
  • Well experienced in Configuring HSRP, GLBP, ICMP, PPP, PAP, CHAP and SNMP.
  • Experience in Installing and Configuring DNS, DHCP server.

TECHNICAL SKILLS

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, L2VPN, VTPNAT, PAT, STP, RSTP, PVST, MSTP

Networking Hardware: Cisco Switches, Cisco Routers, Pix firewalls, Gigamon

Routing Protocols: OSPF, IGRP, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting

Security Technologies: PAP, CHAP, Cisco PIX

Network Monitoring Tools: Cisco Works 2000, Wire Shark

Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR

Network Simulators: GNS3, Packet Tracer

Routers: CISCO 2600, … Juniper M & T Series, Cisco CRS-1, CRS -3, GSR

Management Tools: SNMP, Syslog, Sniffer, and Wire shark

Switches: CISCO 2900, … Nexus 7k,5k,2k,1k

Programming Languages: C, C++, VB Script, Power Shell, ITIL v3 - Service Strategy, Service DesignService Transition, Service Operation, Continual Service Improvement

Simulation Tools: Qualnet Developer, OPNET IT GURU, OPNET Modeler, Cadence, Fire-eye.

Web Technologies: HTML, XHTML, JAVA SCRIPT, CSS

Firewalls: Checkpoint 4000 series, juniper net screen … Juniper SRX … Pix …

Load Balancer: Cisco CSS, F5 Networks (Big-IP)

Network Security: Knowledge of Firewall, ASA, Cisco FWSM/PIX/ASDM, IPsec, Nokia Checkpoint NG, IPS/IDS(Snor), IPS 4260, Juniper SRX & VPN

Juniper: E series, J series and M series. MX960, M10i, T1600, T640

PROFESSIONAL EXPERIENCE

Confidential, Wayne, PA

Sr. Network Engineer

RESPONSIBILITIES:

  • Experience in design, Deploying & TroubleshootingF5LoadBalancerIncludes BIGIP Series 5050V, 10000V, 8900, 6900, and 3900
  • Hands on Experience in configuringF5objects, components and provisioning various modules like LTM. GTM, APM
  • Working experiences with Routers, Switches,LoadBalancers, Firewalls and Proxies
  • Installing theF5TMOS upgrades, Hot-fix installations depending on Business need
  • Prepare test plans for checking the configuration on the CLI, and GUI. writing iRules, scripts
  • Configuring of Virtual Servers, Pools, Nodes andloadbalancing methods onF5LTM
  • Comfortable working with both command line interface and the GUI access of anF5
  • ConfiguredF5GTM Wide IP, PoolLoadBalancing Methods, probers and monitors recreating Http and https redirect VIP's to client from data servers
  • Worked onF5issues using packet capture like TCP dump, Wireshark and SolarWinds and curl commands
  • Design nextgen data centers with nexus 9500/9300 ACI, openstack, DCI, EPGs/bridge domains, OTV, and VXLAN
  • Configuring load balance on F5 and Cisco ACE load balancers to allow traffic going to the Bluecoat proxies to be optimized and load balanced
  • Experienced inF5LTM and GTM series 6400, 6800, 8800, 7250 (VIPRION) for corporate applications and their availability
  • Created and resolved Palo Alto and Checkpoint Firewall Rules, Routing, Pushed Policy.
  • Expertise in Palo Alto design and installation for Application, URL filtering, Threat Prevention and Data Filtering.
  • Worked on configuration, maintenance and administration of Palo Alto PA3000 Firewalls and migrating customers from Cisco ASA to Palo Alto in HA network.
  • Created and resolved Checkpoint, Palo Alto Customer Orders, and Request Orders.
  • Migrated firewall rules from Cisco ASA to Palo Alto and Checkpoint Firewalls.
  • Created Data-filtering profiles in Palo Alto devices which helps to prevent sensitive information. Designed security policies on Palo Alto network firewall for controlling what traffic needs to be allowed or blocked based on customer requirements
  • Firewall Policy provisioning on Palo Alto devices using Web UI as well as PANORAMA.
  • Provide day-to-day operational support for all firewall and VPN platforms including Checkpoint and Palo alto firewalls.
  • Perform upgrades on Palo Alto OS devices in High Availability pair. Firewall OS upgrades and Maintenance of OS updates as part of addressing Vulnerabilities on Firewalls.
  • Configured Perimeter firewall and support Site to Site VPN tunnels.Security Policy Provisioning, Managing Security zones and interface configurations on Palo Alto Firewalls.
  • Configured and implemented APP and URL Filtering on Palo Alto Firewalls.Configured Firewall logging, DMZs and related security policies and monitoring.
  • Configured High availability, User ID on Palo Alto firewall.
  • Firewall policy configuration on Checkpoint, ASA and Palo Alto Firewalls. Site to site VPN configuration checkpoint firewall ASA and Palo alto Firewalls.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for Cisco ASA, Palo Alto, and check point firewalls.
  • Configured Cisco ASA 5510 for VPN Network Access Control integration with Cisco ISE (Inline PEPs).
  • Determining the functionality with the DNS naming conventions and migrations from oldload balancing environments to theF5environment both 10.x and 11.x
  • Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design
  • Troubleshooting of routers and switches to establish connectivity to Tripwire
  • Checking for firewall denies in the Splunk for routers and switches for tripwire connectivity
  • Software Updation of xi50 devices and adding/renewing the certificates
  • Proactively monitored network health and activity through NetQoS NFA, eHealth, Infoblox, Proteus, ServiceNow, Zscaler, Wireshark and Splunk.
  • Configuring F5 LTM,GTM of new Applications by writing scripts and inserting through tmsh commands.
  • Downloading of qkview files and providing them to F5 team
  • Adding/Renew certificates for the application via Venafi
  • Maintaining the SSL certificates for various applications hosted on the F5s and servers on the hardware
  • Software update of F5 devices from 11.x to 13.x but faced lot of issues.
  • Review meetings every week for support with the F5 team
  • Created virtual Datacenter using ARISTA 7124 Arista vEOS. Spine/Leaf architecture with BGP/ECMP, VXLAN overlay, as well as EIGRP, MPLS, BGP and Fabricpath protocols
  • Checking for logs in WireShark for troubleshooting
  • Support for ZscalerWeb Security Service
  • Planning, designing and Configuration of various Policy Configurations, Profile Authorizations, End device Profiling, User Identities, Cisco ISE and AD mapping with various attributes and levels of authorizations and Network Access
  • Design and develop infrastructure software for network management system and monitoring for one of the largest networks, containing SDN, traditional routed and traditional optical mode
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, InterVlan routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+
  • Experienced working with Cisco UCS in a data center environment
  • In the process of migrating the Datacenter to other region
  • Establishing VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN, Remote VPN

Environment: F5LTMs 8900,6900,1600, Viprions GTMs, Enterprise Managers, Cisco Routers: 1600, 1700, 2800, 3500, 3700, 7000 series Routers., Cisco Switches: 3350, 2500, 4900, 6509, UNIX, Putty, Cisco Products, Site-Analyzer, Net-Scout, and customized tools, Service-now, Blue Coat Proxy servers, Vi editor and Cisco, Juniper-Firewalls, Fortinet-Firewalls, Cisco Works ASA 5580, F5Load Balancers (LTM/GTM/EM).

Confidential, Louisville, KY

Sr. Network Engineer

Responsibilities:

  • Involved in the Configuration & Troubleshooting of Routing Protocols MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access Filter policies.
  • F5 Big-IP load balancer Configuration, layer 7 load balancing using I-Rules (TCL)
  • Windows Server Administration (Windows 2000, 2003 & 2008).
  • Identify, Design and Implement Flexible, Responsive, and Secure Technology services
  • Experience with Firewall Administration, Rule Analysis, Rule Modification
  • Design, procure parts and implement networks for LAN & WAN (IPSec, MPLS, Frame Relay, ISDN, and T1/ E1/T3/E3 Lease Line)
  • Implemented Positive Enforcement Model with the help of Palo Alto Networks.
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Creating and provisioning Juniper SRX firewall policies.
  • Created standard access lists to allow SNMP, NTP and logging servers.
  • Documented new VPN enrollments in a database and create standard procedures for further improvement.
  • Policy provisioning, access to specific segments of the networks through Cisco ISE.
  • Experience with proxy automatic configuration(pac) and SMTP protocol.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures
  • Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team. The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.
  • Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark tool.
  • Configure VRRP & GLBP and VLAN Trucking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Deployment and Management of Bluecoat proxies in the forward proxy scenario as well as for security in reverse proxy scenario
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Co-ordinated with the Data Network and Security team and came up with possible solutions.
  • Work on Physical Site Inventory verification, gather information of various Cisco Network devices and Security Devices to develop Run book and Spec Book.
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network
  • Engineered, configured and deployed routers using Cisco ISE.
  • Dealt with monitoring tools like Xymon, cacti and solar winds.
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view) and experience with developing complex network design documentation and presentations using VISIO
  • Estimated Project costs and created documentation for project funding approvals.
  • Monitoring and troubleshooting network issues between client site and 85 remote sites with legacy switches and routers
  • Performed and presented network analysis as a part of network migration. Involved in knowledge transfer to vendors and provided them network support as required
  • Good Experience on ITIL framework
  • Security Device - Palo Alto/ASA Firewalls, Sourcefire IPS/IDS, Cisco Identity Services Engine (ISE), VPN
  • Worked as a single point of contact for the whole migration.
  • Worked on Snort and Suricata detection systems, security devices.
  • Configuration and maintenance of EIGRP and BGP network on router 7200 and 6500 MLS.
  • Configuration and maintenance of 3750 stack and 6500 VSS for improved efficiency of the data plane.
  • Configuration and management of NEXUS network in the existing network infrastructure.
  • Created LAB Setup with 7k and 5K NEXUS switches for application testing.
  • Experience on Bluecoat proxy server.
  • Dynamic IP Routing protocols (OSPF, EIGRP, BGP, Multicast).
  • Lead Engineer for Network refresh project for Multinational insurance company. Providing remote assistance for replacing exiting switches with new Cisco switches.
  • Configuring routing protocols OSPF, EIGRP, RIP, MPBGP, LDP and BGPV4

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/ 00/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, Palo Alto, Cisco Nexus7K/5K, 2248/3560/5020/6509 , ASA, Checkpoint, LAN, OSPF, BGP, RIP, EIGRP

Confidential, Austin, TX

Sr. Network Engineer

Responsibilities:

  • Responsible for turning up new sites this includes designing, configuring, and coordinating in turning up the new circuits on Routers and switches.
  • Analyzed, configured, and troubleshoot the LAN/WAN networks. Monitored Network traffic and access logs in order to troubleshoot network access issues. Used network analysis tools to monitor and shape traffic for optimum performance.
  • Implemented traffic filters using Standard and Extended Access-lists.
  • Handled Route-map, Redistribution list, & access-list configurations.
  • Designed and configured Local Area Networks consisting of Cisco Catalyst Switches 6509E, 4500s, 3750, 3560 Wired Switches, Wide Area Networks consisting of Cisco Routers 3900s, 2951s, and Wireless LAN Networks using controllers of Cisco 5508s with Cisco APs 3502Es.
  • Performed Pilot Test on Cisco Nexus Data Center Switches 7000s for compatibility issues, Cisco Carrier Routing System (CRS), Cisco Aggregation Service Routers, and Cisco 12000 GSR.
  • Performed configuration and maintenance of LAN/WAN technologies such as Ethernet and Fast Ethernet. Securing the network with access lists applied on interfaces.
  • Implemented IP Routing protocols EIGRP, OSPF, BGP on Cisco Routers 7600, 3600, 2800.
  • Configured and managed Windows Firewalls, Cisco PIX, and Checkpoint firewalls.
  • Planned, designed, and configured ASA 5580 Firewalls with software version 8.0, Cisco Load balancers, VPN concentrators, and implemented QoS and performing traffic engineering.
  • Responsible for daily administration of Windows servers including creation/deletion of new user accounts, print services, and backups.
  • Installed and Maintained software license agreements: administering patch management and operating system deployment with SCCM and SCOM.
  • Configured and Utilized network monitoring software to ensure network availability to all system users and Communication Manager.
  • Deployed F5 Edge Gateways for SSL, remote access load balancing. Created templates, SSL profiles and network ACLs.
  • Assisted in design and implementation of load balancing solutions.
  • Assisted in PoC design & evaluation for purchasing IP Networking hardware and software for expansion of the circuits.
  • Created documentation to record test result as well as identify and escalate issues to proper team.
  • Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0.
  • Designed and Implemented DMZ for FTP, Web and Mail Servers with CISCO PIX 506, PIX515.
  • Built VPN tunnel and VPN encryption.
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2B network connectivity.
  • To secure configurations of load balancing in F5, SSL/VPN connections, troubleshooting CISCO ASA firewalls, and related network security measures.

Environment: Net Flow, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, CSM, SUP720, Ether Channels, Cisco 7200/3845/3600/2800 routers, Fluke and Sniffer, Cisco 6509/ 3750/3550/3500/2950 switches, Checkpoint firewalls (SPLAT).

Confidential, Phoenix, AZ

Sr. Network Engineer

Responsibilities:

  • Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security Settings of the networking devices (Cisco Router, switches) co-coordinating with the system/Network administrator during any major changes and implementation
  • Worked with Complex Routed IP networks, routers, layer 2/3 switches, firewalls, LAN/WAN networking hardware and protocols.
  • Comprehensive elementary configurations on the F5 Big-IP LTMs load balancer on prevailing network to divide traffic on web-servers.
  • Worked on Cisco 2950,2960, 4507, 6509 series switch for LAN requirements, that includes managing VLANs, Inter-VLAN Routing, VTP, STP, RSTP, PVST+, Port-Securities and troubleshooting LAN issues.
  • Responsible for Level 3 support Firewall Engineer (Cisco ASA).
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
  • Troubleshoot TCP/IP, and troubleshoot connectivity issues in multi-protocol Ethernet.
  • Troubleshooting the issues and outages on Trunks and Router interfaces comprehensively.
  • Provided technical assistance for LAN/WAN management & troubleshooting.
  • Developed deployment solutions for network technologies, including Optical, VoIP, VPN, switching and routing.
  • Experience configuring VPC, Virtual Device Context in Nexus 7010
  • Configuring STP for loop deterrence and VTP for Inter-VLAN Routing.
  • Installing and configuring Routers, Switches and CSU/DSU's to support WAN links.
  • Product analysis and support for Access-layer switches such as Cisco 4510, 4948, 4507, distribution layer switches such as 6513, 6509, 6504 and a routed core.
  • Setting VLANS and configuring trunk on Fast-Ethernet channel between switches.
  • Installed and maintained CISCO 3600, 2600, 2900 and provided Gateway Redundancy by HSRP, VRRP.
  • Expanding the network and providing proper routing such as OSPF, EIGRP, static route and default route.
  • Used Network Troubleshooting Tools such as Ping, Telnet and Trace route to verify network diagrams proposed network changes and IP services.
  • Troubleshooting issues and outages on Trunks and Router interfaces extensively.

Environment: Cisco Routers 7600, 7200, 3800, 3700, 2800, 2500; Cisco Catalyst switches: 6500, 4500, 3500, 3750, 3850, 2900; Cisco ASA 5550, 5520; VTP, VLAN and 802.1Q trunking; Routing Protocols OSPF, EIGRP, Static Route; Sniffer tools: Wire shark, MS Visio

Confidential

Network Engineer

Responsibilities:

  • Connected switches using trunk links and Ether Channel.
  • Converted network with multiple routing protocols RIP, IGRP, EIGRP into a single OSPF domain, thus providing for future network scalability.
  • Configuring of IP Allocation and sub netting for all applications and servers and other needs throughout company using FLSM, VLSM addressing.
  • Implemented redundant Load balancing technique with Internet applications for switches and routers.
  • Configured Cisco IOS Feature Set, NAT and Simple Network Management Protocol (SNMP) for Network Security implementation.
  • Support Network Technicians as they require training & support for problem resolution including performing diagnostics, & configuring network devices.
  • Documenting and Log analyzing the Cisco ASA 5500 series firewalls.
  • Used Network Monitoring tool to manage, monitor and troubleshoot the network.
  • Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.
  • Received inbound calls of technical nature, independently resolved customer complaints, concerns and inquiries regarding their Internet connection.
  • Troubleshoot a wide range of technical support issues and connectivity problems such as authentication, connection speed, e-mail configuration, and loss of synchronization.
  • Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LANs of network.
  • Experience in new employee mentoring, training and coaching.

Environment: Net Flow, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, CSM, SUP720, Ether Channels, Cisco 7200/3845/3600/2800 routers, Fluke and Sniffer, Cisco 6509/ 3750/3550/3500/2950 switches, Checkpoint firewalls(SPLAT).

Confidential

Network Support Engineer

Responsibilities:

  • Involved in Product analysis and support for Access-layer switches such as Cisco 4510, 4948, 4507, distribution layer switches such as 6513, 6509, 6504 and a routed core.
  • Participates in network planning and provides input on network design and the selection of network equipment.
  • Configured site to site VPN for connecting student lab to training and development centers.
  • Configured various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as CISCO 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.
  • Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
  • Worked on IP control for management and optimal allocation of IP addresses.
  • Perform any required interface, VLAN, trunking, and routing moves, adds, and changes for existing services.
  • Enabled STP attack (BPDU Guard, Root Guard) using MD5authentication for VTP, disabling all unused ports and putting them in unused VLAN.
  • Monitor and analyze network threats through Palo Alto Panorama; run vulnerability assessment on machines with anomalous behavior, monitor firewall for incoming and outgoing threats.
  • Engaged in ongoing performance monitoring of installed hardware and WAN circuits recommending or implementing changes to improve performance.
  • Optimized and configured performance of the WAN network consisting of Cisco Nexus 5000 series Switches by configuring VLANs.

Environment: Cisco 7200/3845/3600/2800 routers, TACACS, EIGRP, RIP and Vulnerability Assessment tools like Nessus, Red Hat, Solaris, VPN's and SSL.

We'd love your feedback!