Network Engineer Resume
Bellevue, WA
SUMMARY
- 8.3 years of experience in Network design, deployment and operations of both Cisco and Juniper Networks
- Provides technical leadership forproblem escalation and resolution.
- Highly motivated with the ability to work independently or as an integral part of a team and Committed to highest levels of professional.
- Very sound knowledge IPV4/IPV6, implementation of Subnetting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
- Experience in installing, configuring and troubleshooting of Checkpoint Firewall and Juniper SSG series.
- Experience in adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications.
- Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls
- Implemented traffic filters using Standard and extended access - lists, Distribute-Lists, prefix lists and Route Maps.
- Experience on thePaloAltofirewall platforms PA-7050, PA-5050, PA-2000 series, PA-200, PA-500.
- Design, develop, and document comprehensive test plans to setup of test scenarios, both hardware and software components, and Executes and update test cases with TCL/TK scripting.
- Worked in configuring and troubleshooting Cisco Wireless Networks: LWAPP, WLC, WCS, Standalone APs, Roaming, Wireless Security Basics, IEEE 802.11 a/b/g, RF spectrum characteristics.
- Experience on Up-gradation of Cisco IOS of different Cisco devices & modules.
- Well Experienced in configuring protocols HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, CHAP, and SNMP.
- Experience working on Cloud Computing Virtualization using VMware Six 4.0 and Windows Hyper-V.
- Strong hands on experience in installing, configuring, and troubleshooting of Cisco Nexus 7k, 5k, 2k, Cisco 7600, 7200, 3800, 3900, 2800, 2900 series Routers, Cisco Catalyst 6500, 4500, 2960 and 3750 Stack Switches.
- Designed and deployed new Cisco catalyst 6513 and 6509 with dual Supervisor Engine 720 at both Distort and Core layer.
- Experience working with OTV & FCOE on the Cisco Nexus 7010/5548 between the datacenters
- Responsible for Cisco ASA firewall administration across our global networks
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
TECHNICAL SKILLS
Operating Systems: Windows (Server 2003/2008, Vista, Windows 7), Basic Linux OS, Sun Solaris OS
Routers: Cisco GSR12016, ASR1001, 2900, 3900, 7200, 7600 & ASR9000.
Switches: Cisco 3750, 4507, 4510 & 6500 series switches, Nexus 7010, 5548, 2448
Routing Protocols: MPLS, OSPF, EIGRP, BGP, RIP-2, PBR, IS-IS, Route Filtering, Redistribution, Summarization, Static Routing.
Switching Protocols: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.
Network security: Cisco (ASA, PIX) 5510, ACL, IPSEC VPN, GRE VPN, Check point
Load Balancer: F5 Networks (Big-IP) LTM Module, Cisco ACE 30 load balancer
LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet.
WAN: Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN, Load Balancing.
Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management.
AAA Architecture: TACACS+, RADIUS, Cisco ACS
Network Management: SNMP, Solar Winds, HP open view, and Wire shark
Reports: Microsoft (Visio pro.)
PROFESSIONAL EXPERIENCE
Confidential, Chicago, IL
Sr. Network Security Engineer
Responsibilities:
- Creating or Modifying Firewall rules on Cisco 5555, 5520, Juniper SRX and Palo Alto VM-300 devices.
- Upgrading the IOS on Network Devices including cisco 6800, 6500 and Palo Alto VM-300 devices
- Experience in working in panorama, Palo alto user interface version 8.0.2 and VM-300 series firewalls.
- Creating templates in panorama to manage the individual devices from it.
- Configuring HA pair for two Palo VM-300 series AWS instance firewalls and testing the failover activity as well as ENI migration.
- Creating Network objects, dynamic address groups, FQDN and assigning it to rules based on the information in tickets
- Involved in periodic IOS upgrades, troubleshooting network outages and high severity incidents.
- Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco ASA Firewalls, NAT and Juniper SRX firewall.
- Creating custom URL profile based on the expressions and assigning it to rule to perform URL filtering.
- Configuring network interfaces, static routes, NAT rules in panorama and thereafter pushing to individual Palo alto devices.
- Experience working on F5 load balancer, CitrixNetScaler, Cisco ACE load balancer.
- Automated network implementations and tasks and designed monitoring tools using python scripting
- Apply Cisco ISE configuration to switches
- Installed ESX devices on Nexus cluster and creating port-profiles for the VMWARE platform.
- Provide level 2/3 support for ISE related issues, including off-shift and weekend support functions
- Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
- Performing the software upgrade from version 7 to 8.0.2 on panorama and VM-300 series Palo Alto firewalls.
- Configuration included VLANs & VTP, STP port features, Gateway redundancy using HSRP, enterprise security using Cisco Port Security and Dot1X framework.
- Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Like, 4500-X in VSS mode and 3850 switches for distribution and POE-user switches.
- Troubleshooting the Network failure issues and thereby making the changes to Network Infrastructure.
- Worked on maintenance and upgraded Cisco wireless WLC, LWAPP Aps.
- Troubleshoot issues with Wireless Access points (Cisco 3502) and configure SSID’s on 5520 Wireless LAN Controllers.
- Implemented the Core switch cut over project from Cisco 6509 to Nexus 7004 devices.
- Configured VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7k/5k devices.
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
- Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
- Established BGP peering between onsite datacenter in Chicago and AWS cloud.
- Worked with Cisco advance services to implement data center Nexus environment for new Upgraded datacenter for the NX-OS in 7004 in core layer, 6880 in aggregation layer and cisco 6800 in access layer.
- Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
- Providing Technical Support and solutions for Network Problems and resolve tickets across sites and corporate offices.
- Configuring & managing around 500+Network& Security Devices that includes Juniper (NetScreen) Firewalls, F5 BigIP Load balancers, CitrixNetscalarand 3DNS, Blue Coat Proxies and Plug Proxies.
- Configuring Node, pool, VIP, SSL client, server profile in F5 LTM 4000 series Big IP and thereby adding firewall rule to bring the end servers live.
- Troubleshooting when the servers are down, checking logs the Identify the error and thereby taking necessary steps.
- Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long-term planning, implementation, project management and operations support as required.
Confidential, Bellevue, WA
Network Engineer
Responsibilities:
- Designed and configured of OSPF, BGP on Juniper Routers and SRX Firewalls Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network
- Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
- Coding firewall upgrades on Cisco ASA’s (5505, 5510, 5508-X) and responsible for ASA migrations from pre-8.3 to 9.0 code (upgrading NAT rules and ACLs).
- Prepping ASA units with correct code for next reboot, addressing known software vulnerabilities and identifying changes in behavior based on code change
- Administrating Palo AltoNetworkFirewalls using Panorama Centralized Management System and troubleshooting firewall rules to prevent system problems.
- Migration and implementation ofPaloAltoNext-Generation Firewall seriesPA-500, PA-3060, PA-5060, PA-7050, PA-7080.
- BrocadeVDXFabric switches and Citrix NetScalers for user VDI sessions.
- Experience in software development using python scripting
- Responsible for configuration and troubleshooting issues related to F5 GTM/LTM devices such as 4200v, 5200v, VI prion 2200 and F5 APM.
- Involved in configuring Juniper SSG-140.
- Preparing failover configuration updates for datacenter firewalls (Cisco 5525).
- Designing firewall policies for corporate firewalls to support application requirements.
- Assisting Corporate Network team with general router and switch configuration cleanups, IP addressing and documentation.
- Configuring site to site primary and backup VPNs between multiple corporate sites and datacenter locations.
- Configuring SLA monitoring on ASAs for redundant ISP links.
Confidential, North Quincy, MA
Network Engineer
Responsibilities:
- Configured Routing protocols such as OSPF, EIGRP, static routing and policy-based routing on various branch and datacenter devices.
- Team member of Configuration of Cisco 7206 router with VPN and Configuration of 6509, 4506 Catalyst devices.
- Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
- Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
- Configuration and troubleshooting link state protocols like OSPF in single area and multiple areas.
- Involved in the Redesign of Internet connectivity infrastructure for meeting bandwidth requirements across multiple sites.
- Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches to be implemented in the datacenter.
- Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
- Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
- Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
- Providing Technical Support and solutions for Network Problems and resolve tickets across sites, plants and corporate offices.
- Responsible Implementing NAT solutions on WAN applications with Cisco ASA based solution.
- Planned, tested and evaluated various equipment, systems, IOSs and procedures for use within the Network / security infrastructure.
- Involved in periodic IOS upgrades, troubleshooting network outages and high severity incidents.
- Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long-term planning, implementation, project management and operations support as required.
- Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco ASA Firewalls, NAT and Juniper SRX firewall.
- Deploy and support network load balancers, such as F5 LTM/GTM, Cisco ACE, ETC
Confidential
Network Engineer
Responsibilities:
- Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.
- Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications.
- Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access.
- Implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.
- Installing new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations.
- Working on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path, and Community, Providing technical support to LAN & WAN systems.
- Provided technical support on hardware and software related issues to remote production sites.
- Performed administrative support for RIP, OSPF routing protocol.
- Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
Confidential
Jr Network Engineer
Responsibilities:
- Installed and supported LANs, WANs, network segments, and Internet, and also maintained network hardware such as Cisco routers 2600 series, 2800 series, 3600 series, 3800 series and Cisco switches
- Configuration and troubleshooting issues related to access lists and DNS/DHCP issues within the LAN network.
- Worked with senior network engineers for multiple site Upgrades for data and VOIP equipment’s and also in re-configuring the new device and making sure projects are done under defined project timelines.
- Monitored networks to ensure security and availability to specific users and modified system's performance based on the network and system requirements and to maintain integrity of the network, server deployment, and security.
- Maintained and provided Level 1 technical supports for all network related issues and providing the requirements of the customer by interacting with the customer on daily basis via email and phone.