We provide IT Staff Augmentation Services!

Technical Solutions Architect Resume

5.00/5 (Submit Your Rating)

SUMMARY

Data communications professional experienced in architecting solutions for network core, data center, and remote site LAN/WAN environments

TECHNICAL SKILLS

Knowledge Base: EVPN, Multicast, QoS - LAN/WAN/Vendor, DCI, NetMan and Application Visibility (NETCONF, ZBFW, SNMPv3, NBAR, NETFLOW, FNF), WAN Acceleration, VPN and Encryption, Security - Device and Protocol Hardening, Security - Policy and Compliance (PCI, HIPPA, SAS70, SAS16), MPLS (VRF/VPN, VRF Lite, Segment Routing, LDP, BGP FlowSpec), Provider Transport Liason - (Metro E -EPL, EVC, Pseudo-wire, LPVPN, VPLS), MLPPP, MLFR, BFD, HA technologies (ISSU, NSF, SSO), WAN Tunneling and Security- (DMVPN, GETVPN,, IPSec, IPSEc Suite B, FlexVPN, EasyVPN, - DC Storage(Fibre Channel, FCoE, DCB, FC-NAT, VSANs, IVR, FCC, and Zoning best practices), DC Network (9k,7k,5k,2k) and Compute(UCS0B and C series chassis); IPv6 for Enterprise, LAN Based HA and Features (NAT/DHCP/HSRP/VRRP/GLBP), SDN products for the Data Center, WAN and access(Cisco IWAN/SD-WAN, Cisco ACI, Cisco SD-Access / DNA); 10gig, 100Gig, Provider (NAT64/ 44), EEM Scripting, RADIUS, TACACS, ACLs MPLS, Voice (H323, Audio codecs: G.711, G.729, G.726; SS7, MGCP, H.323, H.248, SIP)

OS Software and/Apps Familiarity: Windows, Solaris, Redhat Linux Cisco Works, CheckPoint Firewall-1 & NG, HP OpenView, Remedy, Visio, Sniffer, Remedy, Service Center

Languages Experience: Perl scripting (limited), C programming (limited), SQL (limited). Python, (Limited), EEM (limited)

Cisco: IOS, IOS-XE, and IOS-XR based platforms including ISRG1, ISR G2, 4k ISR, ASR1x, 9k, CRS-1,3,X, NCS6K, Nexus 9,7,6,5,3,2,1k, Catalyst Line of IOS and IOS-XE based Middle tier and high Tier LAN switches including 29xx, 37xx, 36xx, 38xx, 68xx, 93xx, 94xx and 95xx, VPN3000Series Concentrator, Firewall Services Module, PIX:5xx, ASA55xx, ACE4710, Aironet 1300, 1400, 1500 Series, F5 LTM/GTM

Arista: CVP, CVX, 7280-CR6, 7050-SX128, 7050-72Q, ZTP, LANZ, Arista EVPN

Juniper: JUNOS - M7i, MX, Netscreen

PROFESSIONAL EXPERIENCE

Confidential

Technical Solutions Architect

Responsibilities:

  • Standards testing and certification for infrastructure and technologies related to Cloud, Branch and Data center
  • Mentorship and training of junior architects
  • Escalation support for network control center an design and build teams as it pertained to recently released solutions or standards
  • Advisory support for other architects doing proof of concepts on new firewall platforms, microsegmentation, automation, network access control (NAC)

Confidential

Network Consultant Engineer

Responsibilities:

  • Evaluation of platforms and software deployed on customer networks for risks and recommendations
  • Advisement to the customer on Design strategy in the use of Cisco products
  • Proactive escalation support for critical feature and hardware deployment and planning

Confidential

Network Architect Lead

Responsibilities:

  • Evaluation of platforms and software deployed on customer networks for risks and recommendations
  • Advisement to the customer on Design strategy in the use of Cisco products
  • Proactive escalation support for critical feature and hardware deployment and planning
  • Overall Network implementation and design for various client requirements within the data center and the remote site WAN.
  • Requirements and gathering and collection and translating those business requirements into designs and bill off materials for Client procurement and implementation.
  • Function as a team lead to ensure compliance of designs, implementations and deployments with corporate and department policies and procedures.
  • Served as Level 3 escalation point for resolution of high severity incidents and chronic issues representing potential loss of critical business and high monetary impact and penalty

Confidential

Network Engineering Analyst

Responsibilities:

  • Designed, and Project manage a Global QoS solution to protect network resources in the event of a worm attack while at the same time ensure adequate service levels for VoIP and Video based applications. (QoS Standardization Project)
  • Designed and Project managed a Global network security solution that locks down or bulkheads sections of the network in the event of a worm attack. (ChokePoint/Bulkehead Project)
  • Project managed a Global network security solution for securing DHCP allocations within the network so that rogue devices were not given ease of access to network resources. This solution was a stop gap measure for the implementation of 802.1x. (QIP Lock Down Project)
  • Designed and Project managed a Global network security solution that contains traffic from devices deemed unmanageable from the point of security engineering and desktop support. This implementation also a partial foundation to the deployment of 802.1x. (Unmanaged Machines Project)
  • Designed, and Project managed a Global network security solution that locks hardens the network perimeter to contain bogon traffic protect against DOS floods, and ensures the accuracy of bogon filters. (Internet Primer Security Project)
  • Installed and Managed Worm Mitigation security Lab for the testing and development of worm mitigation security projects being coordinated by other Worm Mitigation consultants and employees.

Confidential

Network Engineering Analyst

Responsibilities:

  • Diagnosed and resolved customer routing issues involving RIP, BGP, EIGRP, and OSPF.
  • Implemented NAT, COS, and Routing configurations onto 7200VXR, and 2600XM router platforms
  • Examined ATM COS settings and QoS settings for customer service profiles
  • Coordinated extensive testing on customer T1/E1 and T3/E3 access to the Radianz Global Extranet.

Confidential

Network Engineering Analyst

Responsibilities:

  • Responsible for the design, implementation, and migration of the mute-protocol Baker and Taylor WAN from low bandwidth frame network to high bandwidth Frame to ATM Network
  • Designed and implemented new ISDN based Frame-Relay backup network
  • Designed and implemented Layer 2 switching infrastructure utilizing Gigastack layer 3 Switches
  • Designed and implemented New Pix Firewall solution to replace Old Checkpoint Platform
  • Coordinated and deployed temporary and permanent WAN/LAN network for Charlotte, NC Branch office
  • Installed Out of Band solution for Network Management
  • Installed Solarwinds Network Monitoring Platform
  • Designed and implemented Distributed Sniffer/IDS system for Baker and Taylor LAN/WAN
  • Deployed and Administered Norton Anti-Virus with automated virus update
  • Coordinated and implemented various hardware and software upgrade solutions for the Baker and Taylor WAN
  • Evaluated and Implemented Radware Solution for Applications Services Group
  • Responsible for setting up site to site AT&T Managed VPN tunnels and remote VPN access for new branch office sites.
  • Responsible for resolving any issues and problems involved with the Baker and Taylor WAN.
  • Set up Linux based NTP servers and automated TFTP scripts on LINUX platforms

Confidential

Network Engineering Analyst

Responsibilities:

  • Designed new remote access platform for dial-in customers of the Network Data Mining Department. Configured, placed and tested Ascend Max TNT’s, AS5300’s, with ISDN PRI’s for 56K dial-up terminal services.
  • Designed new switching platform for server farm utilized by the Network Data Mining Department. Placed 5500 Switches with 802.1q trunking for services primary and secondary production and test LAN environments.
  • Planned, Coordinated and supervised the migration of several hundred customers and network host from former remote access and switching infrastructure to new. Provisioned radius authentication servers for secure customer access -- transferring security profiles from customer current access platform to new installed remote access platform.
  • Designed and provision site to site and site to mobile VPN access for partner access for departmental consultants utilizing Nokia IP satellites and Checkpoint Firewall-1 to Bay Contivity solution.
  • Wrote Unix Based application scripts to hand Word to Post Script, Text to Post Script and PDF to post script conversion for FAX over IP solution.
  • Unix user account setup and administration
  • Deployed VoATM managed solution for Managed Service Customers
  • Configured and Turned-Up MPLS VPN services for Managed Service Customers
  • Integrated QoS traffic shaping and policing for VoATM customers
  • Configured and Turned-Up VoATM service for Managed Service Customers

Confidential

Network Engineering Analyst

Responsibilities:

  • Responsible for Layer 3 design and implementation of the Globix WAN backbone. Utilized BGP for global route propagation control and transit routing from various peering partners and transit providers. Implemented OSPF for internal route propagation and WAN layer 3 connectivity.
  • Diagnosed and resolved layer three issues related to the Globix backbone. Backbone segmentations faults due to major link failures were resolved in timely fashion. Organized Telco dispatch and testing procedures for transatlantic, European, and U.S. backbone core and distribution links. Worked on and resolved several route-propagation, and aggregation issues on the Globix WAN.
  • Engineered peering solutions for prospective peering partners to the Globix Organization. Worked with peering partners to turn up BGP peering in several Globix peering points such as Mae East, Chicago AADS, and PARIX
  • Developed migration plan for the Globix backbone for the purpose of moving Globix traffic from and ATM based infrastructure to connectionless IP based. Infrastructure. Turned up OC3 connectivity between old and newly installed WAN network and utilized OSPF cost controls to gradually migrate traffic.
  • Planned and supervised the rollout of the Globix backbone in a least 8 major metropolitan areas around the world. Placed and configured several Juniper M40’s, and Cisco 7200s connected with Sonet OC48’s and SDH STM16’s in ring topology for Globix WAN. Installed and configured layer 3 distribution switch infrastructure for the purpose of Collocation and Enterprise services in the Globix Enterprise LAN located in NY. Utilizing Catalyst 6500, 5500, 2900, 1900 core and distribution switches, and PIX 525 firewalls with IDS 4230 hardware.
  • Trained operational personal on Globix backbone procedures and new architectures. Wrote documentation and presentations for training operations personnel in use and procedures regarding newly installed equipment and services on the Globix WAN
  • Diagnosed and resolved second and third level escalation issues for the Globix LAN/WAN. Traveled to several Globix sites to diagnose, configure, and change out various Globix equipment such as BPX ATM switch hardware, Cisco 2500, 2600, 3600 routers, Cisco 7500, and Cisco MGX.

Confidential

WAN Network Analyst

Responsibilities:

  • Diagnosed and resolved second and third level escalation issues for AT&T Managed service customer LAN/WAN. Resolved internal routing issues involving RIP, EIGRP, and OSPF.
  • Diagnosed and resolved second and third level escalation issues arising on the AT&T U.S. WAN. Resolved circuit issues for facilities ranging from 56k to T45
  • Coordinated customer service upgrades and equipment installation. Re-configured improperly provisioned customer routers with IOS software and managed service configurations.

Confidential

LAN Network Analyst

Responsibilities:

  • Coordinated moves adds and changes for 100+ user departments.
  • Implemented Move, Adds and Change request for various smaller departments and users within the Goldman Sachs Building.
  • Responded to and resolved customer layer two and layer three issues.
  • Planned and coordinated several Cabletron MMAC to Catalyst workgroup switch upgrades for the 85broad street location for Goldman Sachs.
  • Implemented hardware and software upgrades for the Catalyst 5000 switch infrastructure.

We'd love your feedback!