We provide IT Staff Augmentation Services!

Network Engineer Resume

0/5 (Submit Your Rating)

Nashville, TN

SUMMARY

  • 8 years of extensive experience in network design, implementation, troubleshooting, engineering, managing & migration of large - scale enterprise Campus networks and Data Center networks.
  • Excellent knowledge and experience on different platforms like Cisco, Juniper, Checkpoint, ASA, Palo Alto, F5 Big-IP LTM load balancers.
  • Design, implementation and operational support of routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.
  • Configuring and implementing routing protocols including RIP, TCP/IP, and RIP v1/v2, OSPF, EIGRP and BGP.
  • Strong Knowledge in WAN technologies including E3, E1, T1, T3, ISDN, HDLC, Point to Point, ATM and Frame Relay and PPP.
  • Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2K series
  • Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500 and 1800 series and Cisco catalyst 6500, 4500, 3750, 3500 and 2900 series switches.
  • Configuring VDC & VPC in Nexus 9k, 7k, 5k and 2k.
  • Experience in working with IPSEC Site to Site, Remote VPN using different encryption methods.
  • Experience in installing, configuring and troubleshooting of Checkpoint Firewall and Juniper MX series.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Configured Client-to-Site VPN using SSL Client on Cisco ASA 5520.
  • Hands on Knowledge/experience on F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs.
  • Collaborated with third party vendor in cabling, configuring, and introducing new pair of F5 load balancer in the datacenter.
  • Experience in installing and configuring DNS, DHCP server.
  • Experience in installing and troubleshooting of WAN technologies like T1/T3, DS3, STM1, OC3, SONET, Gigabit and STM4 circuit types
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • Developed and presented LAN/WAN/WLAN network engineering design packages.
  • Experience in Network Protocol Testing and analyzing the Signaling of VoIP Protocols H323 and SIP as per standard RFCs.
  • Participated in a 24/7 working environment to resolve urgent trouble tickets filed by customer security admins.

TECHNICAL SKILLS

Operating Systems: Cisco IOS, Windows NT 4.0 (Desktop/Server), Windows 2000/2003/2008/2012 Server, Windows XP/Windows 7/8, LINUX, UNIX, MS Exchange server, Solaris, Active Directory.

Equipment’s (Switches & Routers): Cisco routers (7600, 7200, 3900, 3600, 2800, 2600, 2500, 1800 series, ASR 1K, 9K) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series, juniper SRX, MX480, 240, 80 series, EX Series Routers and Switches.

Routing: OSPF, EIGRP, BGP (EBGP/IBGP), RIP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing, IPV4, IPV6.

Switching: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing &Multi-Layer Switching, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.

Firewalls: ASA 5500 series, checkpoint, Juniper Netscreen Firewall ISG100, 2000, SSG, SRX, Palo Alto.

Load Balancer: ACE Module, GSS & F5 LTM

LAN Technology: Workgroup, Domain, HSRP, DNS, DHCP, Static, VLAN, STP, VTP, Ether Channel, Trunks.

WAN technology: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET.

Various Features &Services: HSRP, VRRP, GLBP, NAT, SNMP, SYSLOG, NTP, CDP, DNS, TFTP, FTP, IOS and Features, Management. Wireshark, IXIA chariot, Packet Sniffer, Packet Analyzer and Solar Winds Breaking Point, TCPDump, Python.

Wireless & Wi-Fi: Canopy Wireless Device (point to point/point to multipoint), DLink Wireless (point to point), DLink Access Point, CISCO 1200 series Access Point, and Linksys Wireless/Wi-Fi Router.

PROFESSIONAL EXPERIENCE

Confidential, Nashville, TN

Sr. Network Engineer

Responsibilities:

  • Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco 1600, 2600, 2800, 3600, 7300 series Routers.
  • Successfully implemented the datacenter segmentation project with 7K, 5K and 2K Cisco Nexus architecture, ISR and ASR 1001, 1004, 1006 series routers
  • F5 BIGIP 4000s and 7200v load balancers and Palo Alto Pa-5000/3000 series firewalls.
  • Supporting EIGRP, OSPF and BGP based network by resolving level 2 & 3 problems of internal teams & external customers of all locations.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Configured Nexus 7000, 5000, 2000, ASR 9k, Cisco 6500, 3560/3750s series multilayer switches.
  • Handling Complaints for Intranet and Extranet over MPLS backbone. Checking the connectivity between different locations.
  • Implemented, configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).
  • Perform ISSU upgrade on Nexus 7010 devices by operating the supervisors in active/standby mode on the devices by determining ISSU compatibility.
  • Configuring objects such as Load Balancer pools for local traffic management on F5 Load Balancers.
  • Worked on updating the SSL certificates to the application URL using the F5 LTM and F5 GTM.
  • Designed application mapping and application delivery using F5 BIG IP LTM.
  • Provided design, engineering, and implementation of new F5 deployment and transition from Cisco ACE and CSS environment. Implement F5 APM for new SSL VPN access with F5 GTM.
  • Licensing and provisioning of F5 modules such as LTM, GTM, VCMP (Virtual Cluster Multi Processing.
  • Configured different load balancing methods on F5 LTM & GTM and worked on one-connect profiles and HTTP compression and several persistence profiles.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
  • Successfully configured and maintained Site to Site IPSEC and SSL VPN's on Palo Alto firewalls.
  • Configuring rules and Maintaining Palo Alto & Analysis of firewall logs using various tools.
  • Exposure to wild fire advance malware detection using IPS feature of Palo Alto.
  • Responsible for Cisco ASA firewall administration across the Network. Installing & rebuilding IP appliances, checkpoint appliances. Configuring & troubleshooting Checkpoint ClusterXL& VRRP.
  • Involved in configuration of Access lists (ACL) on ASA firewall for the proper network routing for B2B network connectivity.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Provided proactive threat defense with Cisco ASA that stops attacks before they spread through the network.
  • Responsible for Cisco ASA firewall administration across the Network. Installing & rebuilding IP appliances, checkpoint appliances. Configuring & troubleshooting Checkpoint ClusterXL& VRRP.
  • Configured ACLs in Cisco 5540 ASA firewall for Internet Access requests for servers, Protocol Handling, Object Grouping and NAT.
  • Provide second/third level technical support for ACI (Application Centric Infrastructure) technologies.
  • Monitoring the network traffic with the help of Qradar and Cisco IPS event viewer.
  • Implementing and troubleshooting (on-call) IPsec VPNs for various business lines and making sure everything is in place.
  • Implementing IPsec and GRE tunnels in VPN technology. Designed, configured, implemented site-site VPN on Cisco ASA 5500 firewall.
  • Integrating Configuring Cisco ASA Firewalls with ISE to the Posture policy compliance perform CoA for remote VPN IPsec, SSL AnyConnect users.
  • Monitored and analyzed Intrusion Detection Systems (IDS) & Intrusion Prevention System (IPS) to identify security issues for remediation.
  • Implemented Juniper SRX FW Interface, MIP and VLAN using NSM.
  • Configuration of new Juniper SRX firewalls for remote site implementation.
  • Configuring DNS and DHCP scoops using Infoblox.
  • Integrating Configuring RSA SecurID with ISE for Token based authentications using RSA Native method RSA RADIUS method for user's remote VPN users.

Confidential, Seattle, WA

Sr. Network Engineer/ Systems Design and Strategy

Responsibilities:

  • Redesigns and upgrades corporate/datacenter backbone to 10G DWDM on Cisco ONS and Nexus class infrastructure.
  • Implements and monitors MPLS (MPLS-VPN), QoS (Layer 2 and Layer 3) and BGP technology.
  • Designs 10 gigabit networks using Cisco Nexus 7000 series switches and Cisco 3800 series routers.
  • Analyzes and tests network protocols (Ethernet, TCP/IP) using WireShark tool.
  • Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811
  • ISR routers and switches at access level to 2950, 3550. This project also involved in configuring and testing EIGRP and BGP protocols.
  • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Nexus 9k, 7k, 6k, 5k switches and Catalyst 4500 switches.
  • Configured Nexus 7010 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links.
  • LAN/WAN level 3 support (diagnose and troubleshoot layer 1, 2, 3 problems).
  • VLAN's design and implementation, Spanning Tree Implementation and support using PVST, R-PVST and MSTP to avoid loops in the network. Trunking and port channels creation.
  • Design and integration of Juniper SSG series firewalls, SA VPN Appliances, J series Routers and EX-series switches.
  • Managed Plan of Record with PLMs/SE/Sales/Marketing and followed up and monitor product lines of Juniper routing/switching/security portfolio (MX, PTX, EX, SRX).
  • Configuring RIP, OSPF and Static routing on Juniper M and MX Series Routers.
  • Implemented site to site VPN in Juniper SRX as per customer Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
  • Developed and implemented core network consolidation plan. Included redundant configuration of Juniper EX8200.
  • To support 64-bit machines Cisco SSL VPN ASA5500 is migrated to Juniper SSL VPN 6500.
  • Configuring Routing protocols like BGP, OSPF, MPLS, multicast and L2 protocols in Cisco ASA to check it is passing through via ASA in customer deployments.
  • Converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Creating a rule on the checkpoint firewall for a NAT (used ACLs to block unauthorized users) to the VLAN IP and allowing the IPsec traffic.
  • Migrated from Checkpoint to Cisco ASA firewall. Implemented Bluecoat Proxy 810 security devices. Third Party security appliances to Cisco technologies.
  • Configuring Site-Site VPN on Checkpoint Firewall with R77 GAIA.
  • Regularly performed firewall audits around CheckPoint Firewall-1 solutions for customers.
  • Provided tier 3 support for CheckPoint Firewall-1 software to support customers.
  • Implemented Checkpoint FW Interface, NAT and VLAN using R77 GAIA Smart Dashboard.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Worked on the migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0.
  • Implemented F5 hardware refresh of older 3600 hardware to Viprion.
  • Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.
  • Building the VPN tunnel and VPN encryption.
  • Experience CSM, F5 (LTM) Load balancers to provide efficient switching and routing for local and global traffic.
  • Configuration and installation for F5 reverse proxy load-balancers.
  • Determining the functionality with the DNS naming conventions and migrations from old load balancing environments to the F5 environment both 10.x and 11.x.
  • Contributed in implementation and configuration of F5 BIG-IP LTM-6400 load balancers, redistribution into OSPF on the core ASA firewall, working with Checkpoint Support for resolving escalated issues.
  • Plan, design and test the application migration from F5 load balancer to new A10 load balancers.
  • Creating App by APP configuration conversions from F5 to A10 load balancers and test it in Lab.
  • Created WIDE-IPs, WIDE-IP Pools and corresponding members in GTM’s.
  • Worked with Juniper SRX550 and Palo-alto Next-Gen PA-5000 Firewalls implementing and managing NAT, IPsec, site-to-site and remote VPNs, advanced inspection, anti-spoofing and AAA policies.
  • Contributed in implementation and configuration of F5 BIG-IP LTM-6400 load balancers, redistribution into OSPF on the core ASA firewall.

Confidential

Network Engineer L2

Responsibilities:

  • Configuring, managing and troubleshooting networks using routing protocols like RIP, EIGRP and OSPF (Single Area and Multi Area).
  • Troubleshoot MPLS issues with in the core and edge.
  • Implementing, configuring, and troubleshooting various routing protocols like RIP, EIGRP, OSPF, and BGP.
  • Maintaining & Troubleshooting L2 LAN switches.
  • Analyze Level 1 issues based on TCP/IP model of Communication.
  • Monitor/support the WAN, MAN, LAN, VPN, switches, routers.
  • Working on DNS, DHCP Request.
  • Performed migration of legacy Bigip and 3-DNS devices to newer version of LTM 8900 boxer.
  • Worked on Checkpoint Firewalls Clusters of both High-Availability and Load-Sharing. Implemented firewall policy change on the Checkpoint clusters.
  • Worked on projects of Migrating CMA R65 to R77 through Provider-1, MDS Environment.
  • Providing requested permissions by adding/modifying the Checkpoint Firewall Policies and rules.
  • Implementing and Managing VPN Networks of the Customer through Checkpoint firewalls.
  • Created VSYS Builds from Checkpoint to Palo Alto Panorama Database Zone, Access Zone.
  • Configured Checkpoint Firewall's Web Defense to mitigate malicious traffic.
  • Palo Alto App ID migration from the legacy-based port rules for PA 5060, 7050.
  • Integrating Palo alto firewall with Active directory for user-identification.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Installation of Palo alto user-id agent on Active directory, Migrating URL filtering policies from Bluecoat to Palo alto.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x authentication for Wireless users.

Confidential

Network Engineer

Responsibilities:

  • Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team.
  • The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.
  • Created OSPF multi area summarization plan. Created stub, totally stub areas.
  • Tested routers and Line Cards using SmartBits and done Performance Analysis of both LAN/WAN infrastructures.
  • Upgraded distribution switches from .
  • Involved in managing the Routing Protocols OSPF and BGP on 7200 and 7600 and on ASR
  • Interacted with business users from a service delivery and service support perspective.
  • Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
  • Configured Routing protocols such as VLANs, VTP, STP, MSTP, VRRP and HSRP
  • Configured STP for switching loop prevention, and VLANs for data and voice along with configuring port security for users connecting to the switches.
  • Negotiate VPN tunnels using IPsec encryption standards and also configured and implemented site to site VPN and remote VPN
  • Configured NATs, ACL and routing on Cisco routers, firewalls, and layer 2 & layer 3 switches.
  • Configured policy-based routing for specific traffic, route filtering with route maps and route redistribution.
  • Implemented Network monitoring tools Wireshark and Manage Engine IT360.
  • Implemented IP Telephony and Cisco VoIP 7960 phone systems in the company.
  • Worked in Multi-vendor environment containing Juniper, Cisco and Nortel routers.
  • Worked as a member of NOC and involved in troubleshooting LAN/WAN issues.

We'd love your feedback!