We provide IT Staff Augmentation Services!

Nac Engineer Resume

5.00/5 (Submit Your Rating)

Maplewood, MN

SUMMARY:

  • Highly Motivated and technically strong network infrastructure professional with 10+ years of experience in design, installation, configuration and monitoring/maintenance of Network Infrastructure ‘s of Data Center, Call center, Branch and Remote sites.
  • Worked in Service Provider, Financial and giant corporate customers under various operations, design implementation and customer engagement engineer roles.
  • Involved and responsible for the end to end lifecycle of codes or patches such as IOS/IOS XE/IOS XR/NX OS/TMOS BIG IP on the respective Network Gear devices in Confidential and T Infrastructure.
  • Installed and configured the Data Center Architectures with Cisco Nexus 9K, 7K, 5K and 2K switches and Cutover or migration of data centers from legacy 6500/4500 to Nexus gear.
  • Responsible for VCE Team Architecture of VB 720 and VB 300 solutions network gear devices along with QOS mapping on Nexus Gear as per customer requirements.
  • Worked and implemented test bed or lab setups of client infrastructure simulation’s for testing new or existing feature sets along with documentation and design recommendations and migration strategies.
  • Worked and Implemented the VRF - Lite, MPLS L3 VPN, DMVPN, GETVPN and IPSEC solutions for Service Provider, Call center and Branch Sites.
  • Deployment of Dual Stack (IPV6 / IPv4), Multicast environments for low latency and cross continent customers.
  • Worked on Network Routers and Switches migrations and new installs related to Cisco GSR, CSR, ASR 9K, 1K, 7600,7200 and ISR 4K Routers, Juniper M and T series Routers and Cisco Nexus Platforms and Cisco 6K, 4K, 3K, 2K Series Switches.
  • Worked and Implemented the ACE to F5 Load Balancer Migration projects with LOB and Application Team’s
  • Involved and worked on Network Security Perimeter Deployments using the ASA, Checkpoint Firewalls and their migrations.
  • Worked and Implemented the Cisco Wireless controllers and AP’s of Cisco and Aruba Vendors.
  • Managed and Monitored the Network Infrastructure using different vendor tools like HPNA/HPNNMI, Cisco Works, Solar Winds Orion, Cisco ACS, ISE and Prime Infrastructure’s.
  • Knowledge and better understanding of new technologies like Vxlan, eVPN and IWAN and their implementations.
  • Knowledge and implantation experience of WAN accelerators like Cisco WAAS, River Bed.
  • Good knowledge and experience in Installation, Configuration and Administration of Windows 2000/2003, HTTP,FTP,DNS,NTP,DHCP,AD servers under various LAN and WAN environments.
  • Dot1x deployment in the call center environments consists of end users, Phones such as Avaya, Cisco and peripheral devices like Printers, Display, Telepresence and Audio & Video Codec devices using MAB authentication through AD Mapping.
  • Efficient use of Microsoft VISIO/Office for technical documentation and presentation tools.
  • Worked on Ticketing systems like Service Now, Nagios, Remedy for Incident and Change Management.

TECHNICAL SKILLS:

WAN Technologies: Hub and Spoke Frame Relay, PPP, MPLS L3 VPN, VRF Lite, DMVPN/GETVPN Tunnels.

WLAN Technologies: Cisco 5500 Series Wireless Controller and Access Points AIR-LAP 1242,1262 and Aruba 6000 wireless controller and Access Points AP-90, AP-105,AP-135

Cisco Router Platforms: CRS, GSR, ASR, 10K, 7600, 7300, 7200, ISR 4K, 3600, 2800, 2600, 2500, 1900 and 1800 series.

Switch Platforms: Cisco 6500, 4900, 4500, 3750, 3500, 2900, 1900, HP Procurve and Quanta series.

Nexus Switches: 9K ( C9396PX, C9372PX, 9508, 9504 ), 7018, 7010, 7004 { M1, M2, F1, F2 and F3 Line Cards }, 56128UP, 5672 UP, 5596UP, 5548 UP { N56-M24UP2Q and N55-M16UP }, 2248TP, 2232PP and 2148T series.

Firewalls: PIX (525,515E, 506E), Cisco ASA Appliances (5510, 5520), Juniper Net screen SSG20 and Check Point SG4800.

Terminal Servers: CISCO2901-16TS/K9 and Cisco 3845.

Juniper Router Platforms: MX series, M320, T640.

Load Balancer: BIG-IP F5 4200V {LTM and GTM}, Cisco ACE 4710 and CSS 11500.

Routing Protocols: RIP, EIGRP, OSPF and BGP.

L2 Protocols: VTP, STP, RSTP, RPVST+, MST, ISL and 802.1q.

Switching: VLANs, Private VLANs, Port-channel, Single and Double sided VPC.

Redundancy Protocols: HSRP, VRRP, GLBP.

Cisco AAA server management: ACS and ISE.

Network Management: Cisco Works, Cisco LMS, HPNA, HPNNMI, Solar Winds Orion.

Servers: AD, DHCP {IPAM and Infoblox}, DNS, NTP, HTTP, Syslog, TFTP, FTP, SFTP.

Documentation: MS office Suite and MS VISIO.

Languages: C, C++, MATLAB/SIMULINK.

Testing Tools: IXIA, Spirent and Agilent.

SPAN and TAP Monitoring Tools: APCON, GIGAMON, GIGASTORE, Vantage, DLP and NETMON.

PROFESSIONAL EXPERIENCE:

Confidential,Maplewood,MN

NAC Engineer

Environment: Routers: ISR 4K, ASR 1K Series,Switches: Cisco 6807XL and Cisco Catalyst 6500, 4500 in VSS.,Wireless: Cisco Wireless LAN Controllers 5508, 8510,Management and Monitoring Tools: JIRA, HPNA, ITSM and Confidential Proprietary Tools.

Responsibilities:

  • Planning, designing, and creating supporting documentation for network upgrades and increased network security across both wired and wireless networks through the use of Visio, Word, and Excel prior to deployment/implementation.
  • Wireless deployments spanning multiple countries requiring different radios to be used.
  • Securing both wired and wireless networks via incorporating dot1x.
  • Firmware upgrades on both wired and wireless network equipment.
  • Deploying wireless in both local controller mode and flex connect mode dependent upon location.
  • Implement network security, firmware upgrades, and LAN refreshes on network to match previously created documentation designs while overcoming any hurdles that arise during implementation. Implementations conducted in a manner to create the least amount of downtime for the site.
  • Troubleshoot network connectivity and access on both pre-existing issues as well as any issues that arise during implementation.
  • Knowledge of BlueCat DNS Edge integration with splunk for better DNS Administration and alert management
  • Perform peer reviews of others’ documentation and recommend any necessary changes prior to implementation.
  • Submitting the DHCP/DNS Tickets for New Campus/Branch and LAN refresh sites and confirmation of DHCP/DNS entries after implementation in Blue cat Servers
  • Managing and Monitoring the DHCP Schema scope and part of Migration Team from Microsoft DHCP to Blue cat Centralized server
  • Ability to point out potential issues prior to implementation and create plans to overcome them.
  • Ability to use the Agile method to rearrange priorities as business needs arise.
  • Provide support for up to 2 weeks after a deployment for any issues that arise after deployment.

Confidential,Wilson, NC

Network Engineer

Environment: Routers: ASR 9K, 1K, ISR 4K, ISR G1/G2, 7200, 7600 series,Switches: 6500, 4500, 3750, 3650, 3560 and 2960 series,Nexus: 9K ( C9396PX, C9372PX, 9508, 9504 ), 7K ( 7706, 7010 ), 5K (5596 ) and 2K.,Wireless: Light Weight AP’s, Controller 8510, 5508 and 2504 and Cisco Prime Infrastructure.,Load Balancers: ACE 4710 and BIG IP F5 (5250V and Viprion 4200),Monitoring and Management: HPNA/ HPNNMI, Cisco ACS and ISE, GIGAMON, GIGASTORE and configuration utility.,Technology Protocol Suite: BGP/OSPF/EIGRP, DMVPN/GETVPN, VPC/VDC/PVST+ and IWAN/VxLAN /EVPN (Knowledge)

Responsibilities:

  • Responsible for code upgrades or patching of Network Gear which includes different vendor devices such as Cisco Nexus 9K, 7K, 5K and 2K switches, Cisco ASR 1K, ISR 4K, 1900, 2800, 2900, 3800, 3900, 7200 and 7600 Series routers, Cisco Cat 2k/3k/4k and 6k series switches, Cisco ACE, WAAS and ACS modules, Cisco WLC and AP’s and Big IP F5 Load Balancers and Network Monitoring tools like GIGAMON, GIGASTOREs, etc.
  • Involved and responsible for the end to end lifecycle of codes or patches such as IOS/IOS XE/IOS XR/NX OS/TMOS BIG IP on the respective Network Gear devices in Confidential and T Infrastructure.
  • Lifecycle of Code or Patch is as follows
  • Code Scrub of respective codes or patches based on the vulnerability or added feature in existing and newly added network design’s with vendors like CISCO, F5 and GIGAMON
  • Once Code Scrub is done then code is tested in Confidential and T LAB. This is Testing Phase.
  • Once Testing Phase results with new code or patch is completed successfully then code or patch is placed in Staging Phase
  • In Staging Phase this new code or patch is implemented on Pilot Sites. Pilot Sites Are Low Risk Production Network gear devices.
  • Once this staging phase is completed successfully, then Code or Patch is under Deployment Phase.
  • In Deployment Phase, then Code or Patch is implemented on all the Specific Production Network Gear Devices such as Routers, Switches, Load Balancers and Monitoring Tools like GIGAMON, NTP etc.
  • Once the Deployment Phase is Completed then this new code or patch is new Confidential and T standard for respective Network Gear Device
  • Any Network Gear installed at the Confidential and T should have this new standard code or patch for it to be considered Operational and in Confidential and T Compliance Policy Standard.
  • Working with the Patch Management Team and as a part of it, primarily focuses on US-CERT vulnerability updates review and assessing their impact on network gear and their remediation’s for Confidential &T Infrastructure.
  • Working with the Engineering and Design Teams and responsible for implementation and risk analysis of US-CERT vulnerabilities and their remediation’s. Remediation’s can be one of the following
  • Disabling a Feature on Network gear if not used currently, but will be active by default in the respective network gear device existing code or patch.
  • Implementing a Firmware or license feature to remediate the vulnerability
  • Assessing the New Code or patch fixes the vulnerability as released by the respective network gear vendor and going through the end to end lifecycle of code or patch before considering it a Confidential and T standard.
  • Working with Cisco and other vendor network Team Managed platform devices related to latest code scrubs and assessing flexibility of that code in the current environment and their deployments planning.
  • Responsible for Change and Incident Management Tickets related to Network Break/Fix, code and patch updates for US-CERT vulnerabilities remediation tasks, etc.
  • Working and learning new technologies with Engineering and Design Teams such as IWAN, GETVPN and their deployments and migrating the Confidential &T Infrastructure from legacy Networks to these new technologies.

Confidential,Warren,MI

Network Engineer - GCC Network Engineering

Environment: Nexus Switches: N7K (7018, 7010, 7004), N5K (5672 UP, 5596UP, 5548UP) and N2K (2248TP, 2232PP),Routers: Cisco ASR 9K, 1K, Terminal Server Series and Juniper MX series,Switches: Cisco 6K, 4K and 3K (Stack and standalone) series,Firewalls: ASA 5520, 5585 and Checkpoint SG 4800,Load Balancers: BIG IP F5 4200V and ACE 4710,Servers: Infoblox (DHCP), HPC7000, DNS, ISE, APCON and GIGAMON.

Responsibilities:

  • Worked on Confidential GCC Project which consists of Nexus 7018, 7010, 7004, 5672 UP, 5596UP, 5548UP, 2248TP, 2232PP switches, Cisco 6513, 6509, 6506 and 3750 series switches with and without stack wise, BIG IP F5 4200V LTM and GTM Load Balancers, APCON Chassis and TAP switches, Checkpoint SG 4800 and Cisco ASA Firewalls and Server’s like: HPC7000, C220, Infoblox, IPT/Telephony, Avaya PBX and UCS chassis issues related to networking connectivity.
  • As a part of Confidential GCC Project working and involved in lifecycle of Warren MI, Europe and Milford MI Datacenter's i.e. Design, Architecture, ESAT, Deployment and network issues related to them.
  • As a part of Confidential GCC LAN Refresh Project working on Call Center Refresh’s such as implementation and configuration of network devices at Ren Cen Tower and Warren Call center.
  • Worked with VCE Team related to VBLOCK 720, 300 architectures and integration of them into On Star Data Center and ITLAB Infrastructure’s which consists of Nexus 5596UP, 5548 UP and Cisco 3560-24 devices as network peripheral devices to customer network.
  • Working on Call Center Network related issues and new server deployment cut sheets at various locations such as Oshawa, Warren, Mexico, Charlotte and Ren Cen.
  • Responsible for EWO (Engineering Work Order) documentation and creation of new and existing data centers and Call Centers as per Confidential Standards.
  • Responsible for ESAT which validates and reviews the EWO's created for the new Data centers and refresh of existing call center sites as a part of Confidential GCC Project.
  • Design, Racking specifications validation and address scope segmentation and port allocation of new data center devices as a part of Confidential GCC Project.
  • Code Upgrades and Configuration verification of new Data center builds and live environments as per EWO's along with documentation using Microsoft Tools like Visio, MS Office and OS.
  • Worked on Nexus 7010, 5596UP devices QOS Tweaking as per End User Computing, Application Teams and IPT/Telephony and Sustain Teams requirements in Data center and IT LAB’s.
  • Worked and managed Checkpoint SG 4800 Firewalls in congestion with ATT Service Provider Teams for tracking the traffic flow pattern across Data centers and analysis of App or user drops using smart dashboard and trackers as per end user computing tickets.
  • Worked on ACE to F5 Migration project at these Data centers through parallel build and hot cut strategies.
  • Implementation of dot1x with MAB and Multicast broadcast updates support at Warren, Ren Cen and Lutton Call Centers.
  • Worked on Network SPAN and TAP sessions using APCON Chassis and TAP solutions and analysis of the respective environments feeds at Vantage, DLP and NETMON Servers.

Confidential,TX

Sr. Network Engineer

Environment: Routers and Switches: Cisco 7200, 2900, 1900 and 1800 Series and Cisco 6500, 4500 and 3K Stack Series,Wireless: Cisco Light Weight AP’s and 5500 series Controller,Servers and Security: Windows 2008/2012, AD, NTP, DHCP, DNS and Solar Winds Orion and ASA 5520 and IPS.

Responsibilities:

  • Worked on WHD Tickets, CQ requests and Nagios alert monitoring as per client requirement.
  • Managed and monitored the Client Infrastructure using Solar Winds Orion consisting of above mentioned Network Gear along with RMA of faulty hardware and replacement support with onsite tech.
  • Configured NPS in Windows 2012 server as radius server with user mapping in AD for Network Gear access

Confidential,WA

Network Analyst

Environment: Routers and Switches: Cisco 7300, 7200, 3K and Juniper MX series and Cisco 6k, 4K, 2K series and HP Pro Curve.Nexus: 7K, 5K and 2K Series, Load Balancers and Wireless: BIG IP F5 LTM/GTM and ACE and Aruba AP-105, AP -115 and Aruba Controller 7K series.Microsoft Legacy Tools: MLSNET Ops Dashboard, UTS, Iadmin, NetDesign, MS interface, Jack DB and MS Labtool,Management and Support Tools: HPNNMI/HPNA, DHCP, DNS, AD, MS Office Suite and Windows 2003/2008 Server’s.

Responsibilities:

  • Code / patch upgrades, Configuring and Installing of Juniper MX series, Cisco 7304,7206,7204,3845 3U,1U routers, Cisco Catalyst switches 6509,6506,4948,4509,4506,2948G, HP Pro curve 2650 and Quanta T3048-LB8 48-Port 1/10GbE switch and Aruba Wireless AP’s and Controller with BGP/OSPF and RSTP/PVSTP+
  • Configured VPC, VDC and Upgraded the NX-OS on Nexus 7010, Nexus 5596 and 2248TP Switches.
  • Configured and troubleshooting F5 Load Balancer’s as per Line of Business and Application Team requests.
  • Provided hands on support, power maintenance support and hardware replacements of network gear related to self-managed and managed lab services infrastructure such as Supervisor,Fans,Powersupply, SFP, Chassis etc..
  • Based on user requests change the DHCP Scope options, reserving address pool’s, tweaking the lease periods, adding or deleting scopes on DHCP server’s and DTAP connection’s to Static NAT VM’s.
  • Worked on Microsoft internal tools like NM tools, iadmin, net design, MS interface, Jack DB and mslabtool.
  • Worked on ticketing system UTS and MLSNET Ops Dashboard to perform and track the work done on various platform networking devices as per requests.

Confidential,NC

NOSTG Systems Test Engineer

Environment: Routers and Switches: Cisco 7304, 7206 and 7204 and Cisco 6506, 4507, 4948E, 4948 and 3K stack,Traffic Generation: IXIA, Spirent and Predator

Responsibilities:

  • Installed and configured Cisco 7304, 7206, 7604 Routers and 6506, 4507, 4948 E, 4948, 3 K Stack Switches in LAB setup as Testbed for validations of 4K Platform VSS Feature set.
  • As a part of Test Bed, Simulated 1 Call Center, 1 Main branch and 1 Small branch setup with Live WAN, LAN Traffic simulation using IXIA, Spirent Tools.
  • Configured and tested the 4K VSS and 6K VSS at distribution layer at branch locations as per VSS design specifications.
  • Configured and tested the IPV4/IPV6 dual stack along with Multicast Feed and 802.1x LAN users with WAN BGP, LAN EIGRP routing and HSRP, RSTP, L2 Ether Channel LAN Protocol suites.
  • Traffic Generation using Pageant Routers for testing CPU Stress Analysis on Routing and Switching Platforms using ARP, MAC, IP Payload tuning.

Confidential,TX

IP MPLS Configuration Engineer

Environment: Routers: Cisco 12K, 10K, 1K, 7300, 7200, 3800, 2800, 1800 Series, Switches: Cisco 6500, 4500 and 2960 Series, Firewalls: Juniper Net screen and Cisco ASA Series,Confidential and T Legacy Tools: IVSERVE, COT+ and PPR

Responsibilities:

  • Migrating the BT Legacy Network to MPLS Network consisting of Cisco 12K,10K, 7304, 7206, 7204, 3845, 2851, 1841, ASR 1K and Cisco 6509E, 4006, 2960 series switches.
  • Configured L3 MPLS VPN’s for Management and Service of different Customers for easy Hierarchical Level of control over routing and switching to meet required SLA’s.
  • Configured and tested the MSAP infrastructure which includes Metro Ethernet line, dot1q, Vlan and MST configurations in existing RXN Setup.
  • Worked on Designing MOP’s for Non-standard and semi-standard Infrastructure Clients.
  • Worked on reverse Telnet issues related to Juniper Net screen 5200 and Cisco Firewall devices.
  • Dealing with Migrations of clients from RXN to MPLS under Phased Approach which includes configuring of MPLS VPN’s and changing Demark location based on Clients preference.
  • Worked on tools like IVSERVE, COT+ and PPR which helps in generating configurations and tracking SLA by generating RFS.

Confidential,NJ

Customer Design Engineer

Environment: Routers: Cisco 10K, ASR 1K, 7300, 7200 Series and Juniper MX and T series.,Switches: Cisco 6500, 4500, 3500, 2900 series, Circuits: Metro Ethernet, SONET/SDH, T1/T3.,Monitoring and Management Tools: HPNA, Cisco ACS and Solar Winds.,Servers: Windows Server 2003/2008, Win SCP and AD.

Responsibilities:

  • Installed and Configured the Cisco 10K,ASR1006,1002,7304,7206 routers, Juniper M and T series Routers and Cisco 6509E,4948E,4006,3560G,2960 series switches in LAB and Production staging as per requirements.
  • Configured SONET/SDH, T1/E1, T3/E3 and Metro Ethernet Circuits on Cisco 10K and ASR Routers.
  • Configured and troubleshooting BGP setup with VRF - Lite scenarios of customers peering with RIPV2, OSPF and BGP peering with BT Infrastructure (PE‘s).
  • Fine Tuning of BGP attributes, community strings and policy based routing (PBR) based on customer requirement in LAB and in production respectively.
  • Configured MPLS L3 VPN setup Test Bed with 5 * P routers, 10 * PE routers, 10 * CE routers and 10 * CPE equipment with VRF - lite Scenario’s.
  • Configured various Nat techniques like static NAT, Dynamic NAT and Twice NAT and validations of them per customer requirements.
  • Loop Testing of various CKT’s under different router platforms with suppliers like AT&T, Verizon and Light Channel.
  • Documentation of customer’s LAB testing and simulation along with recommendation as per BT standard’s.

Confidential,NY

Network Operations Engineer

Environment: Routers: Cisco CRS, 7600, 7200 Series,Switches: Cisco 6500, 4500, 3500, 2900 series

Load Balancer: CISS, ACE Load Balancer,Firewalls: Cisco PIX (506 E, 525), ASA (5505 and 5510),Monitoring and Management Tools: Cisco Works, Cisco ACS, Nagios and Remedy Ticketing.,Servers: Windows Server 2003, FileZilla ( FTP ) and AD.

Responsibilities:

  • Working on the Incident Tickets related to Company Network Services related to Routing, Switching, Security and Load Balancing Issues.
  • Implementation and Configuring of Network Devices using Change and Break/Fix Tickets based on the Priority and Impact of Environment.
  • Dealt with the Routing Issues related to Static, RIP, OSPF and BGP protocols at Branch, Call Center and Data center environments.
  • Dealt with Switching Issues related to SVLAN, Ether-Channel, Spanning Tree and Private Vlan’s.
  • Implemented IPSEC Site to Site and Remote VPN’s on Cisco PIX and ASA Firewalls.
  • Monitoring and troubleshooting the VPN sessions in Cisco VPN 3000 concentration.
  • Troubleshooting and Configuration of ACE load balancer existing and new requests as per server and line of business requirements.
  • Worked on adding the new network gear to Cisco ACS for AAA and troubleshooting issues related to existing network gear AAA issues related to SNMP and AD Mappings.
  • Network monitoring using Cisco works for Node, Link failures and documentation of network changes.

Confidential

Circuit Technician

Environment: Routers: 7200, 2800 and 1800 Series,Switches: 4500 and 2900 Series,Circuits: T1, T3, E1 and E3.,Ticketing and Service System: Remedy,Documentation: MS Office and VISIO

Responsibilities:

  • Responsible to work in Team and ensure that the installed circuits at branch offices and other end clients in South India are passing health checks.
  • Responsible for Monitoring and Reporting of Health Checks of New and Existing Circuits based on the Company assigned region perimeter.
  • Checking the routing tables of the Confidential PE or Head end routers based on the customer request.
  • Worked on the Remedy Ticketing system for tracking the Customer Requests related to new and existing circuit requests and monitoring and updating the tickets appropriately.
  • Documentation of New customer circuits using MS VISIO and MS Office.

We'd love your feedback!