Senior Network Engineer Resume
Delaware, TX
Professional Summary
- 9+ years of experience in the field of network engineering, managing & migration of large-scale enterprise network
- Strong Quantitative & Analytical background, with emphasis on Network Management, developed through professional experience in System/Network Administration, Quality of Service (QoS), Security Policies & Project Management
- Extensive knowledge of deploying & troubleshooting L2/L3 TCP/IP, Multilayer Switching, QoS, IPSec, UDP, Ethernet, Voice & Data Integration & IP Routing Protocols RIP, EIGRP & OSPF
- Expertise in deployment of Routers, Switches, Hubs, Firewalls, IDS, load balancers, VPN Concentrators. Hand-on experience in installation and maintenance of windows NT/2000/2003, IBM AIX, Red hat Linux operating systems.
- Experience in maintaining network environment using network management tools such as SNMP, anti-virus, change management
- Experience in managing & migration of large scale enterprise network
- Excellent communication skills with the ability to interface at all levels. A team player who also can work well independently
Technical Summary
Hands on experience on the following products:
- CISCO Routers - GSR 12000 series, 7500, 7200 VXR, 4500M, 3700, 3600, 2600,1700 series
- CISCO L2/L3 Switches – 2800, 3500, 3700,4000, 6500 series
- CISCO PIX Firewall – 506,515,525,535
- CISCO ASA 5500 series.
- CISCO IDS - 4235
- Microsoft Windows NT, 2000, 2003, Active Directory
- IBM AIX 4.3.3,5.x, IBM Servers Model 43P-150,F30
- CHECKPOINT NGX Firewall on NOKIA IPSO’s, Fortigate Firewall, Gauntlet Firewall
- McAfee Total Defense Anti-Virus solution; Symantec Enterprise Antivirus solution
- F5 Network-GTM, LTM, Enterprise Manager
- Network Management software – Cisco Works, Whatsupgold, Solar Winds, OPNet
- Familiar with latest network technologies, its related standards and protocols viz. Ethernet, Fast Ethernet, Gigabit Ethernet, VPN, ISDN, T1,VOIP, SSH, FTP,
- Familiar with routed protocols such as TCP/IP and routing protocols such as EIGRP/OSPF
- COMPAQ Proliant Servers, DELL PoweEdge 24xx, 25xx,4400 Servers
- IBM PCs/Compatible Desktops, peripheral devices such as network printers
- Vulnerability Assessment (VA) Tools – Nessus, NMAP.
- Remote Access Technologies (RAS), PGP Encryption, Proxy Servers.
- Process Audits involving various domains like Information security policy, compliance of information security infrastructure and system development and maintenance
Education:
- Bachelor of Engineering in Electronics, Confidential University
Certification / Training:
- Cisco Certified Network Associate 2.0
- Cisco Certified Network Professional
- F5-LTM Certified Engineer
- Certified course in Java, RDBMS, LAN AND WAN
Engagement Overview
Confidential., Delaware
April 2009 to Feb 2010
Senior Network Engineer
Confidential has presence in about 10 data centers across major Cities in US and utilizes MPLS based backbone solutions using. They use CISCO GSR, 7200 VXR, Catalyst 7500/6513 and Cisco 7513 based routers for MPLS VPN services.
Responsibilities:
- Actively involved in Network Enable Program in designing and implementing inter networks using Cisco Enterprise Products.
- Designing schemes for IP addressing, subnetting and routing policies using BGP/OSPF.
- Configuring, installing and maintaining Cisco routers, switches & access servers
- Involved in a project of migrating the existing WAN infrastructure to MPLS using CISCO GSR.
- Troubleshoot wan related problems including OSPF, EIGRP, BGP and RIP routing and design; troubleshoot L2/L3 related network problems.
- Security: Implementation of PIX and Checkpoint firewalls. Implementation of AAA,TACACS server
- Migration of site to site of IPsec VPNs for Citrix to MPLS VPNs.
- Conversion of Catalyst 6513 switches from CAT OS to Native IOS
- VOIP support: Implementation of VOIP services for various call centers and companies.
- Used test tools such Ether Real Sniffer plus.
Confidential., Philadelphia
Aug 2006 to Feb 2009
Telecom Deployment specialist
As a network consultant, Confidential was involved in deploying, configuring & maintaining F5 3DNS(Global traffic Manager) Controller and BigIP -LTM(local traffic manager) for wide area load balancing and global redirection using various load balancing techniques
Brief Overview:
This position involved network integration and support of load balancers across Vanguard platforms which includes updating to latest version of Operating system with latest hot fixes along with set up of enterprise manager for monitoring all the devices through central console
Responsibilities
- Maintenance of F5 Load balancers-6600/6800
- Upgrade Cisco 6500 series Sup2 modules to Sup 32 at access, core & distribution layer. Configured Cisco 7200 series routers for OSPF, HSRP, NAT, compression, traffic shaping etc.
- Upgrade and replace Cisco 6500 series chassis with enhanced chassis
- Deploy Qos for VoIP implementation across Vanguard Infrastructure
- Upgradation of Cisco PIX - 515/525/535 & Cisco ASA firewalls
- Provide Network , Tier 3 support(diagnose and troubleshoot layer1,2 &3 problems) and administration for various Vanguard environments like Internet, Intranet, QA, DR, Proxy
- Produce Network documentation
- Develop work plans, migration plans, and conversion scripts needed to integrate proposed solutions
Environment
Cisco 6500 series switches(CAT OS/IOS), F5 Load Balancers-Global Traffic Manager(GTM), Local Traffic Manager(LTM), Enterprise Manager(EM). Unix shell scripting, Windows 2000/XP, DHCP, DNS, Avaya IP phones
Confidential., Michigan
April 2006 to Aug 2006
Network Consultant
As a Network Consultant, Confidential was involved in network support, administration and monitoring of routers, Firewalls.
Brief Overview:
This position as Network Consultant involved support for Systems department. The network consists of more than 2500 nodes. He administered and managed all the critical core servers involving various platforms of AIX, Linux and Windows.
Responsibilities
- Total administration and ensuring the integrity of twenty servers, three wireless networks, a PIX firewall, Cisco routers, two hundred personal computers (in information technology department) with Windows 2000 and Windows XP operating systems, and support for over thousand employees
- Monitored system logs daily to ensure the entire network system was operating at an optimum level and to detect and correct any issues with storage space, system errors, or application issues
- Configure and monitor ISS Real secure
- Configure and monitor PIX/Checkpoint firewall
- Recommended, purchased and installed two new servers and combined software components from other servers to increase productivity levels in software performance
- Created and maintained VPN connections and Remote Desktop Connections
- Installed all hardware and software and upgrades for Windows Servers, desktops, and two different clinical software packages.
Environment
Cisco 3500/3700 series switches, Cisco PIX firewall-501/515, Windows 2000//NT/XP, Linux, AIX, VPN, DHCP,DNS, Oracle 9i, Mysql, RIP v2.
Confidential
July 2003 to March 2006
Network Consultant
As Security and Network Engineer, Confidential was involved in the designing, implementation and support of the WAN network. He managed and configured the routers, PIX firewall, and Checkpoint firewall (including site-to-site VPN). He was also involved in managing the Cisco and ISS Realsecure Intrusion Detection Systems. He was also involved in TCP/IP addressing schemes. He was in charge of OS hardening and Vulnerability testing of critical windows and UNIX servers. He was also in charge for load balancing across primary site and DR site using BIG IP load balancers. He coordinated with the vendors for VSATs. He was also involved in process audit which included various domains like Information security policy, compliance of information security infrastructure and system development and maintenance. In addition, he maintained the entire wide area network of 64 sites with multiple point to point leased circuits that is backed up by ISDN on Cisco routers (3660 series, 3745, 2600, 1751 series).
Brief Overview:
This position as Network Consultant involves support for a mission a critical datacenter environment. The network consists of more than 2500 nodes. He administered and managed all the critical core servers involving various platforms of AIX, Linux and Windows.
Responsibilities
- Installation and configuration of Cisco Routers and Cisco Catalyst Switches
- Installation and configuration of Cisco PIX Firewalls-506/515/525/535
- Installation and Administration of Windows NT/2000/2003 servers under Microsoft Active Directory environment
- Security scanning for all Vulnerabilities on Windows 2000/IBM Aix/Red Hat Linux Servers and Desktops using Internet security Scanner (ISS).
- Migrating to Layer 3 routing from Cisco L2 switches to Cisco 3745 L3 switch for intervlan routing
- Maintaining and upgrading the Network Backbone
- Troubleshooting network issues by using sniffers and analyzing the outputs
- Consolidating the servers by moving various services like DHCP,TCP/IP printing etc. between different servers.
- Involved in setting up the security policy which included documentation of the existing network, migration from CUG network to VPN backbone, writing of procedure for installs, backup and restore policy planning and contingency planning in the event of disaster and procedures for quick recovery in the event of a disaster
- Quarterly Process audit for datacenter which included various domains like Information security policy, compliance of information security infrastructure and system development and maintenance
Environment
Cisco 3500 series switches, Cisco Routers 3700/2600 series, Cisco PIX firewall-515/525/535, Checkpoint Firewall-NG, Windows 2000//NT/XP, Linux, AIX, VPN, DHCP,DNS, Cisco IDS 4235, ISS Real secure IDS, Fortinet Firewall, Nessus, Solar Winds, MRTG, NMS- Cisco Works, OSPF, EIGRP.
Confidential
April 2002 to July 2003
Administration and Management of LAN, e-mail, and FTP
As System Engineer, Confidential was involved in the administration and management of LAN, e-mail, FTP, SSH and Telnet applications. He was responsible for incorporating the security features in the existing system using Gauntlet Firewall. He managed and updated the software and ensured virus free environment. He was involved in the market scanning of the latest development in the industry for the purpose of enhancement of IT related information in the organization. He was also involved in system documentation, data management, and report generation.
Brief Overview:
Their network consists of 15+ Windows 2000/2003 servers providing the front end applications such as file/print, e-mail, and antivirus solution as well as services to support individual workstations such as Internet connectivity and network access. IBM AIX servers host the back-office functions such as finance, accounting and fulfillment services. Network infrastructure is spread across offices in Pittsburgh (US), Bangalore(India), Israel ,Malaysia ,UK ,Canada with co-location services provided by third party. Multiple T1 links connect the various offices. Microsoft VPN server provides remote access. Primarily responsible for managing, supporting and overseeing the network infrastructure and windows 2003 environment.
Responsibilities
- Manage and administer the active directory enabled windows 2000/2003 environment including setting up users, file and user level security, system and account policies.
- Deploy new windows 2003 servers and update windows 2000/2003 servers with latest service packs and hot fixes.
- Manage and administer Domain Controllers and DNS servers.
- Backup policy administration using Veritas Backup Exec 9.1. Backups of critical servers and data are performed on a regular basis on to standalone storage subsystems.
- Migrated all workstations from static IP address scheme to DHCP.
- Provide day to day administration and support for on-site Windows 2000/2003 file and print servers, including setup, configuration, maintenance and upgrades.
- Administer, update and implement Symantec Anti-Virus policies on the servers and workstations.
- Configure and manage Gauntlet firewall by setting up specific rules to secure access into the network.
- Troubleshoot and manage LAN segmentation, TCP/IP protocol setup, internetwork and intranetwork connectivity issues.
- Provide assistance to helpdesk personnel on end-user problem resolution for different OS.
Environment
Cisco (1700/2500) and Telindus Routers, Dlink LAN Switches, RAD A/D, Mux- FCD-E1 , Linux, web server, ftp server and Windows NT / 98 / XP, Gauntlet firewall, Symantec Anti-virus, Veritas Volume manager 3.5.
October 2000 to April 2002
Brief Overview:
Confidential, authorized distributor for Bintech communications of Germany, is a leading Networking solutions provider in India. Its clients include a number of banks and corporate customers. As part of network solutions team, I managed various projects for in-house infrastructure set-up as well as implementing various network design and implementation projects for the company clients. Involved in setting up of company internet website, designed and implemented structure cabling solutions for corporate customers and banks, provided total office automation solutions for clients, designed, implemented and maintained in-house network, implemented various connectivity and network redundancy solutions for the company clients
Responsibilities
- Design, configuration and implementation of branch-to-branch connectivity solution for a bank. Multiple branch offices were connected to main office to carry out inter-branch transactions using Bintec routers over 64k Leased Lines.
- Provided technical training and support to field engineers on different hardware supplied by the company
- Hardware sizing based on requirements
Environment
Windows XP/98/2000, MRTG, TFTP and Syslog Server, ISDN, PSTN Dial-up & Lease Circuits connectivity, Bintech ISDN routers.