We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

0/5 (Submit Your Rating)

Chicago, IL

SUMMARY

  • Over 7+years’ experience in LAN/WAN, Layer 2, Layer 3, routing, switching technologies, systems design, administration and troubleshooting.
  • Very Strong expertise in VPN technologies, and dedicated security configurations (Firewalls, IDS, Routers) and best practises in information security policies/procedures.
  • Architecture, planning and design of IPsec VPN implementations for multiple sites on various VPN appliances/UTM vendors, routers and maintaining cross functionality between them.
  • Efficient and Expert in EIGRP, OSPF, with knowledge on MPLS, BGP (including configuration and troubleshooting)
  • Proficient in Layer2 technology STP, RSTP, HSRP, VRRP.
  • Diagnose Layer1, Layer2 and Layer3 fault - related cases effectively, utilizing software diagnostics and tools.
  • Administration of Cisco Routers (12410, ASR 9K, 7200, 7600), Juniper and other vendors.
  • Experience on Cisco IOS (11.0, 12.0, 15.0) and JunOS and IOS-XR 3.2
  • Configure, install, maintain and troubleshoot UTM Firewalls (multi-platform), Cisco PIX/ASA.
  • Expert knowledge in various applications, services and network management tools including FTP, Telnet, Ping, DNS, DHCP, ARP etc.
  • Knowledge in Documenting and preparing the Process related Operational Manuals.
  • Experience in relating the theoretical OSI Networking Model to practical networking scenarios.
  • Communicating and managing relationship with external & internal customers and ensuring customer satisfaction of service delivery in accordance to their quality & consistency of Statements of Work & Service Level Agreements.
  • Experience in working with JTAC, Cisco TAC engineers on several networking issues.
  • Supervised permanent and contract personnel. Excellent communication skills with an ability to interface at all levels.
  • Fluent in computer software packages like MS Office (Word, Excel, Visio) for accounting purposes

TECHNICAL SKILLS

Cisco Routers: ISR 2600, 2800, 3600, 3700, 3800, 7600, 7200, ASR and other vendors

Switches: Cat3k series, Cat4k Series, Cat6k Series and other vendors

Load Balancer: Citrix Netscaler, F5(LTM, GTM)

Firewalls/Security: Cisco ASA 5500, Check Point, Juniper SRX, Junos, TACAS/RADIUS/SSO implementation, Fortinet, Confidential (NSA,SuperMassive)

Workstation Tools/OS: Visio, MS suite, Citrix clients. Windows, Linux, MacOS, iOS, Android platforms Wireshark, nmap, Nessus, Backtrack/Kali Linux IPsec and SSL VPN clients from different vendors

PROFESSIONAL EXPERIENCE

Confidential, Chicago, IL

Sr. Network Engineer

Responsibilities:

  • Established policies and procedures related to Systems security and integrity.
  • Skilled knowledge of RIP, EIGRP, BGP and OSPF.
  • Configured/ administered/ deployed several Cisco 12000, 10000 and 6500 series.
  • Configured channelized DS3 card on the Cisco 12000 series router for managing T1 lines.
  • Implemented and managed network monitoring tools like Nagios and Orion.
  • Experience working with 5505, 5510, 5520 and 5550 model ASA's.
  • Experience working with the latest ASA IOS (8.3, 8.4,9.1)
  • Extensive experience with Check Point and CISCO Security Firewall Configurations and network configurations.
  • Part of the Re-IP project.
  • Migration of MPLS from Confidential to Timewarner.
  • Experience with Citrix Netscaler, F5 GTM Loadbalancer
  • Configured with F5, Citrix Load balancers in Failover for Load balancing and SSL handling
  • Configured F5 BiGip to provide Load Balancing for server farm.
  • Experience with configuring VIPs on F5 and Citrix load balancer which include creating policies and creating redirection rules
  • Implemented and managed SSL VPN using Radius server (Cisco any connect) on ASA 5550.
  • Experience working with Cisco 3750, 4948, 2811, 2600, 7200, 6500, 12000, 10000 series switches and routers.
  • Configured/ administered/ deployed several Cisco 6500 series switches.
  • Implemented and administered Web sense Web Security Gateway for web content filtering and DLP.
  • Managed software and hardware contracts. Audited contracts and worked with vendors to terminate unused services and reduced costs. Negotiated key contracts with vendors and reduced costs.
  • Extensive experience with Juniper and Cisco ASA firewalls.
  • Experience with configuring, supporting, and troubleshooting security products including Check Point, Juniper, Cisco, IDS solutions, and others.

Network Engineer

Confidential, Dublin OH

Responsibilities:

  • Responsible for implementing and integrating new network technologies, troubleshooting and supporting existing technologies and devices.
  • Involved in deployment of new F5 GTM to replace the existing A10 GSLBs.
  • Configure the F5 GTMs to globally load balance the local brocade or F5 load balancers.
  • Involved in complete LAN and WAN commissioning and deployment (IP address planning, designing, installation, configuration, testing, maintenance, and troubleshooting issues).
  • Responsible for conversion of IBM Tivoli monitoring situation to Solarwind monitoring template.
  • Write VBScript codes to cater to customer monitoring requirement is Solarwind.
  • Create monitoring template using custom MIBs in Solarwind.
  • Gather and document system functional requirement with respect to Solarwind.
  • Performed configuration and troubleshooting of routing protocol such as BGP and EIGRP.
  • Implemented Cisco Secure Access Control Server (ACS 3.0) for Tacacs+/ Radius.
  • Performed configuration for data center connectivity with Cisco 6500 switches (Sup720) and configured BGP attributes for WAN connectivity (routing with EIGRP).
  • Performed network administration tasks such as creation and management of VLANs, PVST, Inter-VLAN routing, HSRP, GLBP and LAN security for Layer-2 switching domains and Layer-3 Routing.
  • Worked on firewall administration on day-to-day basis by performing Move Add Change (MAC) functions on Cisco ASA 5500 firewalls.
  • Generate RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 outages.
  • Ensure all data and VoIP infrastructure meet 100% SLA uptime standard and co-ordinate with vendors in case of any issue to get them fixed within SLA time frame.

Confidential, Somerset, NJ

Network Engineer

Responsibilities:

  • Perform administration, optimization, and support of internal LAN/WAN infrastructure.
  • Configuration and Maintenance of MPLS between satellite locations and Data center. Rule Management for MPLS routers.
  • Management of BGP peering with Service Providers to ensure availability and maintain SLA with MD5 authentications and TTL security.
  • Develop and support network lifecycle management, capacity planning and availability management programs and update technical documents.
  • Maintenance of Cisco ASA and Barracuda Web Filter including IPSec VPN and troubleshooting L2VPN.
  • Configure and maintain access points through Cisco 4400 WLAN controller.
  • Design VPN tunnels between locations. Implement these tunnels using IPsec and GRE protocols and maintain the tunnels.
  • Configure of VLAN, BFD, LAG Port Channel, HSRP and VRRP on Cisco/Juniper devices.
  • Monitor Data and Voice network utilization to ensure proper circuit sizing. Plan for expansion based on reports of monitoring.
  • Deploy F5 Edge Gateways for SSL, remote access load balancing. Create templates, SSL profiles and network ACLs.
  • Assist in design and implementation of load balancing solutions.
  • Assist in PoC design & evaluation for purchasing IP Networking hardware and software for expansion of the circuits.
  • Configure and implement routing protocols on the routers and switches like OSPF, EIGRP and STP for LAN.
  • Assist network operations and level two network engineers in the diagnosis of difficult or complex network related problems.
  • Troubleshooting and documenting the L2 connectivity issues.
  • Advise on projects needed to enhance performance of the network as well as the research, analysis, design, planning, and implementation of these enhancement projects.
  • Apply project management skills to complete assigned projects within the project timeline.
  • Plan and document the network inventory and maintenance procedure along with lifecycle management of these devices.
  • Develop and assist in projects for replacement and upgrade of devices which are EOL.
  • Emulate Production Network in Lab to test the network recommendations and document the result for further analysis. Document the procedure to perform the upgrade/replacement of devices.
  • Work with Data Center Operations to perform the replacements in scheduled maintenance windows.

Environment: Cisco ASR 1001, 1004, 3945, 6513, 4948. Juniper MX480, Juniper SRX 110

Confidential

Network Security Analyst - Enterprise Technical Support Analyst

Responsibilities:

  • Complete role configuration/troubleshooting of Confidential products
  • Worked on Routing/Security/Wireless domains while ensuring multi-vendor network products compatibility at client locations.
  • Involved in Firmware Pre-release testing and resolution workarounds.
  • Highest level of technical support provided to enterprise clients when required

Confidential

Network Security Engineer

Responsibilities:

  • Performed the configuration in routers and voice gateways for migration of ISDN PRI circuit from one service provider to another across 45 office locations.
  • Maintain and load balance the web server traffic for customers using F5 load balancers.
  • Configured and deployed Cisco 6500, 4500 and 3750 Catalyst switches at the core, distribution and access layers respectively.
  • Designed and maintained switch network with other CISCO L3 switches (4500, 6500) in Multi-VLAN, configured 802.1Q Trunking, VTP between L3 and Access Layer Switches, and thereby provided inter-Vlan routing, maintained consistent VLAN information between switches.
  • Performed the installation and configuration of Solarwind Orion Network Performance Monitor for monitoring traffic across the network.
  • Installation and configuration of Websense Triton Web Security and configure them in clustered environment.

Environment: s: Routers, Voice Gateways, F5 Load Balancers, Cisco 6500, 4500, 3750, VLAN, CISCO CALL MANAGER, H323 Trunk, Websense Web Security.

Confidential

Responsibilities:

  • Reviewed and approved all firewall requests (ACL, NAT, VPN, etc) based upon potential security impact. Also managed all firewalls in the test, dev, R&D labs.
  • Managed and maintained various web content filtering solutions including Web Sense and Blue Coat.
  • Managed and maintained an internal certificate authority (CA) request along with RSA servers for two factor VPN authentication.
  • Architecture, planning and design of IPSEC VPN implementations for multiple sites on Cisco VPN appliances, routers and Checkpoint firewalls.
  • Analyzed firewall performance and suggested/implemented improvements.
  • Installed and maintained all security infrastructures, including IPS, IDS, log managements, and security assessment systems.
  • Configured with Citrix Load balancers in Failover for Load balancing and SSL handling
  • ConfiguredCitrix to provide Load Balancing for server farm.
  • Secure IIS Web Server Protection (Application Firewall), ISS Internet Scanner Penetration Testing, Security Access Lists, Firewall Protection, VLAN Security.
  • In-depth knowledge of IP routing, virtual routing and forwarding (VRF) and routing protocols
  • Well versed in different vendors L2/3 switch hardware architectures
  • Detailed knowledge and hands-on experience of Layer 2 protocols includes Spanning Tree Protocols, VLAN Tagging (802.1Q), Link aggregation (IEEE 802.1AX)
  • Configure Voice Gateway, Voice gatekeeper.
  • Perform HP automation testing.
  • Design and Implementation of enterprise-level LAN and WAN infrastructures.
  • Checkpoint Firewall design and implementation and planning of rule bases
  • Network refresh project that includes redesigning and relocation of ASA, Checkpoint and Fortinet firewalls.
  • Implemented and maintained network performance testing software like PRTG and MRTG
  • Implemented Perl scripts for network monitoring tasks.
  • Perform regular vulnerability and penetrations tests utilizing NESSUS and NMAP along with recommending remediation solutions.
  • Assess threats, risks, and vulnerabilities from emerging security issues.
  • Troubleshoot various customer environments when issues arise, provide resolutions, and keep our customers informed as to the status of any on-going problems.

We'd love your feedback!