We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

Washington, DC

PROFESSIONAL SUMMARY:

  • 8+ years of experience in Networking, including hands - on experience in providing network support, installation and analysis for a broad range of LAN /WAN/MAN communication systems.
  • Strong hands on experience in installing, configuring, and troubleshooting of Cisco 7600, 3800, 3600, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
  • Highly skilled in implementing and troubleshooting complex layer 2 technologies such as VLANs, VTP, Ether channel, STP, RSTP and MST and gateway redundancy protocols like HSRP, VRRP, GLBP.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, EIGRP, RIP, BGP v4, MPLS.
  • Strong knowledge on Wireless Standards and Technologies, i.e. Ethernet, WAN, LAN, IEEE 802.11a, b, g, n (Wi-Fi). Cisco Wireless Management system, Cisco Meraki Products, PCI standards.Good knowledge on IEEE 802.15.1 (Bluetooth), Mesh networks, etc.
  • Moderate knowledge in configuring and troubleshooting Cisco Wireless networks; LWAPP, WLC, WCS, stand-alone apps, roaming, wireless security basis, IEEE 802.11a/b/g, RF spectrum characteristics.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture
  • Experience in VPC, VDC, Fabric path and OTV configurations.
  • Experience working on Cisco ASR 9001&ASR 1006.
  • F5 BIG-IP application load balancing subject matter expert with particular concentration on layer 7 load balancing using I-Rule scripting in TCL.
  • Knowledge on automation tools such as Ansible, Chef and Puppet.
  • Experience in writing scripts with Python to perform task automation.
  • Hands on experience on windows server 2007, 2008, 2012.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration also with Nexus 7K devices.
  • Experience on dealing with VoIP information deployment including troubleshooting protocols like Session Initiation Protocol (SIP), Real-Time Transport Protocol (RTP), Media Gateway Routing Protocol (MGRP) and Session Description Protocol (SDP)
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.
  • Experience on dealing with Aruba Wireless products including Access Points, Mobility Access Switches and Outdoor mesh routers
  • Hands on experience on dealing with Microsoft Azure cloud computing including implementing access lists in the Network Security Group.
  • Responsible for Check Point and Cisco ASA firewall administration across global networks.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Experience working with Nexus 7K, 5K, 2K devices.
  • Experience in testing Cisco routers and switches in laboratory and deploy them on site production.
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • Worked in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
  • Hands on experience in configuring and supporting site-to-site and remote access Cisco, IPsec, VPN solutions using ASA/PIX firewalls, Cisco and VPN client.
  • Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analyzes results and implement and delivering solutions as an individual and as part of a team.
  • Experience in designing MPLS VPN and QoS for architecture using Cisco multi-layer switches.
  • Hands on experience in configuring Cisco Catalyst 2 960, 3750, 4500, 6500 and Nexus 3000, 5000, 6000, 7000 series switches and Cisco 2600, 2800, 3600, 3800, 7200, 7600 series routers,Load Balancers& Cisco Firewalls.
  • Configuring BGP/OSPF routing policies and designs, worked on implementation strategies for the expansion of the MPLS VPN networks.
  • Expertise in creating groups and pruning traffic flow using VLAN, VTP, ISL, 802.1Q.
  • Performed switching technology administration includingVlans,inter-Vlan routing, trucking, port aggregation and link negotiation.

TECHNICAL SKILLS:

Network Configuration: Advanced switch/router configuration (Cisco IOS access list, Route redistribution/propagation).

Routing Protocols: IGRP, EIGRP, OSPF, BGPv4, MP-BGP, IS-IS, RIP

WAN Protocols: HDLC, PPP, MLPPP

Circuit switched WAN: T1/E1 - T3/E3/OCX (Channelized, Fractional & full).

Packet Switched WAN: ATM, FRAME RELAY, MPLS VPNs

Security Technologies: Cisco FWSM/PIX/ASDM, Juniper SRX, Palo Alto, Checkpoint, F5 Load Balancer, ASA firewall

Cisco Routers: Cisco GSR 12416, 12418, Cisco 7200vxr, Cisco 3640, Cisco 3600

Security Firewalls: Checkpoint, Palo Alto, Citrix NetScaler App, Fortinet 6TD,FortiGate 3000, 5000, 3815, 900, 800, 600 series, Imperva, Bluecoat.

Redundancy and management: HSRP, VRRP, GLBP, RPR, NSF/NSR, Wireshark, Solarwinds, SNMP

Physical interfaces: Fast Ethernet, Gigabit Ethernet, Serial, HSSI, Sonet (POS)

Layer 2 Technology: VLAN, HSRP, VRRP,GLBP,STP, RSTP, PVST+, MST, PVLAN, Optimizing STP (Port Fast, Uplink Fast, Backbone Fast, Root Guard, BPDU Guard)

Layer 3 Switching: CEF, MLS, Ether channel (PAGP & LACP, Load Balancing)

Switches: Cisco Catalyst 6500, MSFC, MSFC2, 7600, 3700, 3500, Arista 7500, 7050,7300 series,Cisco 2948/3560/4500/3560/ 3750/3550/3500/2960, Nexus 7010, 5548, 2148

Operating Systems: Microsoft XP/Vista/7, UNIX, Linux, Windows Servers 2003/2008Windows MS-Office, VMware ESX 5.1, VMware Vsphere client, Microsoft Azure, office 365, Python

PROFESSIONAL EXPERIENCE:

Confidential, Washington, DC

Sr. Network Engineer

Responsibilities:

  • Experience with design and implementation of Data center migration Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.
  • Working with Network Design and implementation teams on various projects across North America and South America.
  • Experience with manipulating various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters, Route-maps and route policy implementation.
  • Experience with design and implementation of Data center migration.
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 as per the requirement of the Organization.
  • Worked on designing configurations for VPC, VPCdomian, VPC peer-gateway, VPC peer switch, auto-discovery, VPC single sided, vPCdouble sided, NX-OS and fabric path using 9K Series switches with the APIC to run in the leaf/spine ACI
  • Configured vdc, fex pinning, fex port-channel, port-channel, peer keep alive, peer link on Nexus 5k devices.
  • Configured and maintained VPCs with 7010/7018 and 5548 in the network. Also configured and maintained VDCs in 7010/7018 switches, maintained VRFs in those separate VDCs.
  • Worked on migration project from cisco catalyst 6500 to cisco Nexus 7k, 5k and 2k.
  • Install, upgrade and configure Next-Gen Palo Alto Firewall series PA-200,PA-500
  • Implemented and configured Fortinet Firewall FortiGate 600, 800 series.
  • Experience in dealing with Cisco Application Centric Infrastructure (ACI) by integration hardware and software products as per network layout
  • Configured and troubleshooting Riverbed WAN optimization software to improve the network acceleration at the user end.
  • Experience on coordinating and monitoring entire organizations Authentication, Authorization and Accounting (AAA) systems
  • Experience in designing, implementing and supporting Cisco VOIP technologies.
  • Fortinet Firewall administration configuration of FortiGate 3000, 3815 series as per network diagram.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Assisted in MPLS migrations, implemented a backup for the existing WAN connection using site-to-site IP sec VPN tunnels.
  • Experience on Cisco wireless management systems which includes Cisco 8540 Wireless controller, Cisco 5520 Wireless LAN controller, and virtual wireless controllers.
  • Configured and troubleshooting Aruba Wireless products like Access Points and Mobility Access Switches.
  • Hands on experience on Cisco ISE and various network security concepts like SSH, IPsec, firewall polices and 802.1x.
  • Experienced and configured firewall administration including Bluecoat, F5, Checkpoint, Citrix NetScaler App and Fortinet.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPSec/GRE to GetVPN.
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst.
  • Build Logical design and Implementation of Wireless Solution.
  • Configured CIDR IP RIP, PPP, BGP, MPLS and OSPF routing.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Involved in setting up NetScaler MPX andNetScaler SDX hardware based appliances.
  • Configured and involved in Citrix NetScaler responder policy configuration and Citrix NetScaler Access gateway configurations.
  • Configured and troubleshooting Cisco unified UC560 manager VoIP systems.
  • Secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
  • Worked on dealing with Cisco Collaboration system 10.x Solution Reference Network Design (SRND) considering the network layout.
  • Configuring and Troubleshooting the Juniper SRX100 and 110 series, Juniper Net Screen routers.
  • Deploying and decommissioning Cisco switches, Cisco Meraki Products and their respective software upgrades.
  • Performing the ACL requests change for various clients by collecting source and destination information from them.
  • Worked extensively on Cisco ASA 5500(5510/5540) Series,Nexus 7000 Series experience inconverting PIX rules over to the Cisco ASA solution.
  • Supporting EIGRP and BGP based on the network by resolving level 2 & 3 problems of internal teams & external customers of all locations
  • Extensively used Infoblox for IP address management. Created and added IPv4 Network, Reserved IP addresses for various devices, Defined DHCP Scope as per the requirements, Created DHCP scopeoptions for setting up Voice VLANs and PXE Clients etc.
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2Bnetwork connectivity.
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Created Visio Dean / Visio Documentation to give complete picture of network design for each building.
  • Experience in Configuring, upgrading and verifying the NX-OS operation system.

Environment: Cisco 2948/3560/4500/3560/ 3750/3550/3500/2960 6500, Arista 7K seriesswitches and Cisco 3640/12000 7200/3845/3600/2800 routers,Fortinet Firewall, Nexus 7K/5K&2K, Cisco ASA 500, Checkpoint, windows server 2003/2008: F5 BIGIP LTM, RIP,OSPF,BGP,EIGRP,LAN,WAN,VPN,HSRP, F5 Load Balancers, Checkpoint

Confidential, Philadelphia, PA

Sr. Network Engineer

Responsibilities:

  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Installed, configured and managed Cisco routers such as 7200 series, 3800 series, 3700 series, 2800 series and Cisco Catalyst switch series 6500, 4500, 3500, and 2900.
  • Performed installation and upgrades of office 365 Business as per the changes recommended by the network architect.
  • Performed Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Conducted F5 Big-IP load balancer configuration, layer 7 load balancing using I-Rules (TCL).
  • Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
  • Extensive experience with F5 load balancers- LTM, GTM series like 6400, 6800, 5000 and 2000 for the corporate applications and their availability.
  • Actively involved in switching technology Administration including creating and managing VLANS, Port security - 802.1x, Trunking 802.1Q, RPVST+, Inter-VLAN routing, and LAN security on Cisco Catalyst Switches 4507R+E, 6509- E and Cisco Nexus Switches 2232, 5596, 7009.
  • Experience on dealing with Cisco ISE Secure Network Server 3515 and other network security products.
  • Experience on configuring Cisco Call manager. This Cisco Call Manager uses Cisco's proprietary SCCP (also known as Skinny) protocol. The Call Manager works as part of Cisco's solution to provide IP Telephony with many of the functions of a PBX system for an enterprise.
  • Identify, design and implement flexible, responsive, and secure technology services
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Configured FortiGate 5000 series firewall through FortiOS operating System which delivers upto 1 Tbps throughput
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Creating and provisioning Juniper SRX firewall policies.
  • Created standard access lists to allow SNMP, NTP and logging servers.
  • Documented new VPN enrollments in a database and create standard procedures for further improvement.
  • Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Co-ordinated with the Data Network and Security team and came up with possible solutions.
  • Experience on dealing with Infoblox traffic control products to simplify DNS load balancing operations
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view) and experience with developing complex network design documentation and presentations using VISIO
  • Monitoring and troubleshootingnetwork issues between client site and 85 remote sites with legacyswitches and routers.
  • Performed and presented network analysis as a part of network migration. Involved in knowledge transfer to vendors and provided them network support as required
  • Configuration and maintenance of EIGRP and BGP network on routers 7200 and 6500 MLS.
  • Configuration and maintenance of 3750 stack and 6500 VSS for improved efficiency of the data plane.
  • Configuration and management of NEXUS network in the existing network infrastructure.
  • Created LAB setup with 7k and 5K NEXUS switches and Arista 7K for application testing.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco ASA5510, Fortinet Firewall FortiGate 5000 series,Nexus7K/5K,2248/ 3560/5020/6509 ,ASA,Checkpoint,LAN,OSPF,BGP,RIP,EIGRP Checkpoint, Palo Alto

Confidential

Sr. Network Engineer

Responsibilities:

  • Involved in the activity of DATA-Center migration of regular Cisco catalyst switches with the new Nexus 2148, 2224T, 5548, 6018, 7010 using F3/M3 line-cards with 10GE & 40GE interfaces and Supervisor 2E.
  • Configuring Palo Alto policies and setting different device configurations.
  • Performed remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.
  • Good Experience in deploying BIG-IP F5 LTM load balancers for load balancing and traffic management of business application.
  • Configured and installed F5 New Virtual Servers, Profiles, I Rules, Pools, Nodes, Generate CSR Certificate, SSL Certificates Etc.,
  • Maintenance of F5 load balancers 6600, 6800
  • Configured Firewall logging, DMZs& related security policies & monitoring
  • Hands-on experience with Ether Channel, Spanning Tree, Trunking, ACLs, Syslog. Experience in setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.
  • Involved in the troubleshooting aspects of complex network infrastructure using routing protocols like EIGRP, OSPF and BGP.Configuring Palo Alto policies and setting different device configurations.
  • Responsibilities also included placing order for new SFP’s, implementing inline capabilities for home agents and running network cables from Palo Alto direct to required firewall.
  • Applied ACLs for Internet access to the servers using Cisco 5550 ASA firewall and performed NAT.
  • Dealing with Cisco ASA 5550 providing advanced application-aware firewall services with identity-based access control, denial of service (DoS) attack protection all built upon market-proven Cisco PIX Security Appliance technology.
  • Involved in configuration of Arista 7K series switchesTroubleshooting the Juniper SRX100 and 110 series, Juniper Net Screen routers.
  • Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.
  • Created standard access lists to allow SNMP, NTP and logging servers.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Performed Security operations in terms of pushing new policies and deploying new rules. Performing security troubleshooting in terms of checking ACLs and ACEs and traffic flow analysis using packet capture features.
  • Dealt with the service providers in the case of WAN outages.
  • Responsible for simulating network operations with the usage of packet analyzer like Wire shark, and use to resolve tickets whenever there is an issue.
  • Performed load balancing and application level redundancy by deploying F5 BIG-IP LTM 3900.

Environment: In Corporate office architecture with highly reliable & secured network including Cisco routers (7200, 3800, 2800) and Cisco switches (6500, 3700, 4900, 2900), Nexus (7K, 5K & 2K) Routing Protocols (EIGRP, OSPF, BGP), Switching protocols (VTP, STP, GLBP, HSRP), Cisco PIX (525, 535), ASA (5505, 5510), FortiGate Firewall 80C, 100d, 1240b on Forti OS5.2., Checkpoint, Palo Alto, Load balancers

Hire Now