We provide IT Staff Augmentation Services!

Senior Technical Architect/lead Network Consultant Resume

0/5 (Submit Your Rating)

SUMMARY:

  • Twenty years of demonstrated expertise in Network Architecture/design, implementation, consulting, customer interfacing, program management, strategic planning, team building and problem resolution
  • Network Infrastructure: Providing architecture, design and implementation support for LAN, WAN, Data Center, Call Center, network management, networked applications, security, and virtualization; working knowledge of key routing protocols EIGRP, OSPF, MPLS, BGP
  • Consulting: Interface effectively with customer at all levels, managing customer expectations, identify business requirements, and develop technical specifications to meet business requirements for data, voice, video communications systems; design and implement secure network infrastructure and produce documentation for the procurement and support of systems
  • Project Management: Manage multiple projects simultaneously; Planning, controlling, executing and implementing projects in accordance to customer requirements, and managing dedicated project management staff
  • Enterprise Application Management: Enable application - centric management of networked application infrastructure, using agent-based and agent-less technical solutions
  • Information Assurance: Interfaced and assisted IA team with resolving vulnerabilities; managing vulnerability resolution efficiently and documenting accordingly

TECHNICAL SKILLS:

Routers: Cisco 700, 800, 2500, 2600, 3600, 7200, RSM, MSFC, Juniper M7i, M10i, MX80, MX480

Switches: Cisco 6500, 5500, 4003, 1900 Juniper EX 8200, 4200, 2200

Firewalls: Cisco PIX, Juniper Netscreen, Juniper SSG 550, 20; Cisco ASA and Juniper Firewalls (SRX-3600, SRX-3400, SRX-650)

Protocols: Advanced TCP/IP, IPX/SPX, Appletalk, PPP, HDLC, SNA, ISDN, Frame Relay, RIP, IGRP, OSPF, BGP, ISIS, Tacacs, CDP, STP, MPLS, VPLS

Network OS: Cisco IOS software, Junos, Netscreen, Windows 2000/2003, Novell 3x-5x,Sun Solaris 2.6, and Unix

Desktop OS: Windows 2000/2003, Windows NT Workstation 4.0/3.5, Windows 9x/XP,DOS, and Linux Redhat 5.0

Hardware: Hard drives, SCSI drives, motherboards, memory, sound cards, modems,printers, signature cards, valitek (backup machine), Zip drives, super disk drives, USB, Polycom video equipment: Network Mail Systems

GroupWise 5.5 CC mail: OtherVMWare ESX, F5 BigIP/3DNS/LTM/VIP/Pool/SSL Cert, Cisco VPN, Rmon Probe, Netscout server, Ciscoworks, Concord eHealth, What s up Gold, HP Openview MS Office 2000/, MS Works, Word Perfect, Lotus Notes, Lotus123, Harvard Graphics, Groupwise, PC Check, Disk Manager, Disk Partition, Micro 2000, Snooper, Microhouse library, Ghost, and Backup Exec Action Request Systems Remedy, HEAT, Tivoli

PROFESSIONAL EXPERIENCE:

Confidential

Senior Technical Architect/Lead Network Consultant

Responsibilities:

  • Designed Cyber security DDoS solutions including cloud scrubbing with SDN networks to dynamically route traffic.
  • Key in the Design for SDN solutions, for DDoS attacks by rerouting traffic to a scrubbing device to scrub bad traffic which resulted in clean traffic getting to its destination
  • Researched and recommended SSL inspection solutions. Steered traffic to encryption domain. SSL/TLS traffic was steered towards decryption device then sent back to FireEye and defence pro for deep packet inspection.
  • Designed solutions with multivendor routers such as Juniper, Brocade Vyatta’s and Cisco
  • Researched and designed strategy around openflow and opendaylight
  • Designed solutions for multitency ADC customers for cloud application hosting. Completely isolated not just VRF.
  • Configured Brocade Vyatta on bare-metal servers
  • Configured Vyatta Firewall, VPN and Nat settings
  • Designed & Configured MPLS/VPLS between (4) MX-480 and (4) MX-80 across data centers between Atlanta and Jacksonville to form a OC-48 link between data centers which provided a stretched layer 2/3 network and provided redundancy
  • Installed VMware ESX servers and workstations, have a strong understanding of Virtual technologies and studied the importance of them for the Network evolution into the cloud
  • Configured stretched VLans across data centers using irb/mpls/vpls utilizing OC-48 sonet circuit; Configured virtual chassis for SRX-3600, SRX-3400 and SRX-650; Configured routing protocols (OSPF and BGP), security zones, address books, ports/protocols, policies and troubleshooting SRX-3600, SRX-3400, SRX-650; configure Juniper switches for routing, port aggregation, vlan’s, spanning tree, etc.. (ex-8200, ex-4200, ex-3200),
  • Configured Palo Alto and Blue Coat devices to control bandwidth and to monitor at application level.
  • Worked with team to help implement Radware Defense Pro into the Cisco FirePower 9000.
  • Configured virtual routing to separate routing tables; used policies in order to leak applicable routes to certain route tables
  • Configured and connected F5 to different SRX firewalls for flows from/to back-end data bases/http servers to front-end HTTP server and/or VIP connectivity. Configured pools, imported SSL Certs and used Open SSL to decrypt/encrypt certs and create SSL certs
  • Managing multiple projects simultaneously; daily interaction with the client and managing client expectations
  • Meeting deadlines efficiently while managing client deliverables; developing network diagrams via MS Visio, and developing technical documentation such as Standard Operating Procedures (SOP), network configuration documents, weekly and monthly status reports
  • Managing project timelines and milestones, developing network solutions in accordance to client requirements; managing project team tasks, schedules and milestones

Confidential

Senior Network Architect & Consultant

Responsibilities:

  • Responsible for leading network infrastructure projects for various regions within the Navy under the direction of the CIO and Network Manager of Naval District Washington to develop network solutions for the following programs: Electric Smart Grid, Virtual Perimeter Monitoring Systems, Door access and others to be demonstrated to Admirals and senior Navy officials.
  • Responsible for the coordination of tasks and activities, provide weekly and monthly status reporting; Coordinated communication among senior personnel, and document impact analysis of scope, budget, risks, resources and timelines
  • Managed teams to design a transport WAN solution in order to carry critical Navy programs and applications from base to base in the Conus and Oconus regions, implement and configure open / closed side networks consisting of MPLS/VPN/IPSEC/VRF solutions / cross domain solutions, and F5 load balancing solutions for East / West coast data center redundancy / failover
  • Designed, Configured and worked with multiple routing protocols (BGP, OSPF, ISIS) to establish core routing, VRF, overlay routing through IPSEC tunnel mesh and redistribution to third party vendors; Configured advanced routing to work between VRF’s and core routing by selectively leaking route prefix’ to core routing table; Configured Juniper SSG firewalls via NSM and command line to secure network perimeters with policies and zones. Pushed out / managed over 400 SSG firewalls.
  • Managed network team to create master IP scheme for the network; Installed and configured VMware and NetAPP storage solution.
  • Acted as Deployment Lead for equipment installation and configuration at bases using Juniper M10i/M7i, SSG firewalls, Cisco 2811, 2600, 3500, 6500, Adit’s, and WTI’s; responsible for installing MPLS, Frame Relay and point to point circuits which included (SC3, T3, bonded and unbonded T1’s).
  • Assisted IA team with mitigation of category 1 through 3 issues, and resolved IAVA’s; Used retina and gold disk to scan the network for vulnerabilities, assisted IA team with revising POAM to reflect current state of the network.

Confidential

Sr. Network Engineer

Responsibilities:

  • Responsible for installing, configuring, and troubleshooting the network, with the following network management software: Ciscoworks, Netscout, Concord, Ehealth, PAC (software from Confidential ), What’s up Gold, and HP Openview
  • Responsible for configuring and redistributing OSPF and EIGRP to maintain routing metrics with third party vendors; Configured Layer 3 routing interfaces and designed IP address system for 6509 series routers.
  • Redistributed OSPF into routing protocols for third party vendors connecting to the Confidential network, and enhanced STP by configuring uplink fast, backbone fast, and port fast to increase convergence on the network.
  • Configured Netflow for visibility into application traffic flows, and provided insight for capacity planning, identifying network performance issues, and provided mission-critical reports to senior personnel.
  • Traveled domestically in order to configure, rack, and install Cisco 2600/3600 routers, 4000 switches, CSU/DSU, T1 circuits for new or improved state offices in the Confidential network.

Confidential

Sr. Network Engineer

Responsibilities:

  • Responsible for configuring Cisco 3640 router for the following connectivity:
  • Installed WIC cards for T1’s,
  • Troubleshot T1’s with Bell Atlantic to verify connections, and
  • Configured Serial interfaces for SNA connections to IBM 3174 controller and Risc 6000.
  • Configured span port to do a baseline study on network traffic across all VLan’s, and analyzed trunk port traffic, VLan traffic, and individual port traffic; Configured, designed and installed Cisco Wireless Infrastructure throughout 400,000 square foot plant.
  • Managed cabling projects to ensure proper connectivity(Ethernet, Single mode and multimode fiber, Coax)
  • Configured and created VLans, configured VLan Tagging, IRB, routing, routing policies, T1 and T3, routing instances on MX-80, passwords, host and system names, and IP addresses for IP network design scheme and configured spanning tree to prevent loops; Configured routing protocols on all Cisco routers for dynamic and inter-VLan routing, and created VLans on all Multi-Switch Feature Cards (MSFC)
  • Configured trunk links with 802.1q tagging to carry multiple VLan traffic, and turned on VTP pruning to eliminate broadcast traffic.

Confidential

Project Manager

Responsibilities:

  • Responsible for $1,000,000 budget of computer hardware/software in order to design, configure, install and troubleshoot the following:
  • Cisco Routers (2500,700,800, and
  • Route switch modules (rsm))/Switches (1900,2900.5509/rsm)
  • Designed VLan’s, Configured VLan Tagging, IRB, routing, routing policies, T1 and T3, routing instances on MX-80, Novell 5, GroupWise 5.5, Windows NT workstation/server and HP Net servers (LH4’s/LPR’s), HP Surestore tape library’s with backup exec; Configured and monitored the servers and printers with HP top tools, Jet admin.
  • Replaced all hubs with switches (configured ports for 10/100, half/full duplex, VLan and turned of ports for security).
  • Responsible for the configuration, installation and troubleshooting of the following Novell products: 17 Novell 5 servers, Zenworks, NDS, NDPS, and Que. based printing. GroupWise 5.5 with 1 mta, 5 post offices and 4.
  • Used Zenworks to distribute software, workstation inventory and remote control to assist users remotely; Designed IP address scheme for small and medium networks.
  • Migrated 200 users and data with GSNW (gateway services for Netware) from a Novell 4.11 server to Windows NT 4.0 PDC

Confidential

Network Engineer

Responsibilities:

  • Responsible for supporting a base of 1000 users in a token ring Novell / Windows NT network infrastructure; Troubleshot major configuration issues, NT desktop and network connectivity.
  • Implemented NT roll out of over 800 computers in accordance with aggressive schedule constraints; configured multiple NT W/S for rapid deployment using GHOST technology
  • Configured NT W/S with software such as Office97, Visio 4-5, Project98, Satellite software from Novell NAL explorer and Microsoft sysdiff

Confidential

Network Specialist

Responsibilities:

  • Configured and installed Cisco 2100 series routers, PCs in Win 95/NT platform to connect to Novell/NT servers.
  • Provided technical and administrative support to 200 users and managers on a Novell/NT environment and provided Help Desk support to customers via telephone troubleshooting and resolving hardware and software issues.
  • Installed twisted pair, coaxial and fiber optic cables; configured network cards in W/S and servers.
  • Upgraded over 100 workstations from Windows 3.11 to Win 95/NT.

We'd love your feedback!