We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

SUMMARY:

  • More than 15 years of Networking Experience, with strong analytical skills and a broad knowledge of computer hardware and software.
  • Excellent problem - solving skills, with the ability to quickly pinpoint problem areas with timely resolution.
  • Strong leadership skills. This comes in handy when enlisting the support of all team members in aligning with project and organizational goals.
  • Cisco Routers: Cisco Routers 1600, 1700, 2600, 2800, 3600, 7200, and ASR 1000 series routers
  • Big-IP F5 Load Balancers: Big-IP 8800 series; Big-IP 8400 series; Big-IP 6400 series; Big-IP 3400 series; Big-IP 1500 series,Viprion.
  • Cisco Catalyst Switches: Cisco Catalyst Switch 1900, 2900, 3500, 4000 and 6000 series
  • Cisco Nexus 5000, 7000,9336PQ,9508, FEX and Cisco ACI
  • Enterasys 800,D and K-series switches
  • Cisco ASA Firewall: Cisco ASA firewall 5000 series (5510 5550 5585 ) Cisco firepower 4110
  • Checkpoint R75.20, R 76 and R 77
  • I have 6-8 years technical experience in architecture, network design, software defined networking with exposure to various Palo Alto Firewall environments.
  • Responsible for the planning, design, implementation, organization and operation of Palo Alto Firewalls based perimeter security network and network security devices including but not limited to 7000, 5000, 3000 2000, 500 series FW’s.
  • Simultaneously working on the successful engineering, testing, and deployment of multiple Palo Alto FW projects
  • Plan and conduct complex project studies; includes analyzing multiple data sources and publishing results to the team or to the technical user community
  • Responsible for the planning, design, implementation, organization and operation of Palo Alto network security devices.
  • Responsible for troubleshooting network and firewall problems, specifically Palo Alto, Checkpoint and Cisco ASA’s.
  • Adequately monitor the firewall and network system to identify and solve data communication problems and user performance issues.

PROFESSIONAL EXPERIENCE:

Confidential

Senior Network Engineer

Responsibilities:

  • Giving advice on purchasing networking software, hardware and other technical supplies. Completing hardware implementations and upgrade.
  • Troubleshooting hardware and software network connectivity problems, analyzing and developing key components using prescribed techniques.
  • Analyze current security device configurations and determine implementation requirements.
  • Implemented ADC F5 LTM and GTM hardware platforms design and deployment implementation guidelines, DMZ Network infrastructure policies, LTM Inbound SNAT configurations and outbound NAT server to IP mapping processes.
  • Analyze current security device configurations and determine implementation requirements.
  • Develop implementation strategies, plans and processes for a nationwide rollout/upgrade of the Palo-Alto, Cisco ASA and Check Point Firewalls.
  • Configure interfaces, zones and security policies.
  • Configure granular App control concepts.
  • Configure URL filtering, anti-virus and vulnerability and spy ware protection.
  • Create VPN zones, configure global protect gateway and portal.
  • Configure Site-to-Site VPN.
  • Develop documentation, including diagrams, standards, specifications and operating procedures.
  • Monitor for opportunities to enhance the customer network security performance or reliability.
  • Experienced F5 systems engineer of large enterprise F5 Big-IP LTM, GTM, ASM, and Enterprise Manager environments.
  • Evaluate potential network security products, technical solutions, and capacity requirements to meet business needs.
  • Responding to inquiries professionally with time sensitivity and ensuring proper communications with customers or vendors.
  • Detecting logging, categorizing and prioritizing incidents and providing incident supports.

Confidential

Senior Network Engineer

Responsibilities:

  • Design, Install and configure a state of the art datacenter for the Confidential, comprising of Cisco FEX 2248, 2232, Nexus 5596 UP, and Nexus 7000 series switches.
  • Configure and troubleshoot VPCs, Fabric path, OTV to extend layer two domains across multiple datacenters.
  • Lead Engineer to migrate the county WAN EIGRP to BGP routing protocols, configure outbound policies using BGP communities, route-map, prefix-lists, regular expressions
  • Experienced F5 systems engineer of large enterprise F5 Big-IP LTM, GTM, ASM, and Enterprise Manager environments.
  • Evaluate potential network security products, technical solutions, and capacity requirements to meet business needs.
  • Provide specifications and detail schematics for network security architecture of the enterprise.
  • Analyze current security device configurations and determine implementation requirements.
  • Develop implementation strategies, plans and processes for a nationwide rollout/upgrade of the Palo-Alto, Cisco ASA and Check Point Firewalls.
  • Configure interfaces, zones and security policies.
  • Configure granular App control concepts.
  • Configure URL filtering, anti-virus and vulnerability and spy ware protection.
  • Create VPN zones, configure global protect gateway and portal.
  • Configure Site-to-Site VPN.
  • Configure M-100 to function as a log Collector and Panorama.
  • Develop Standard Operating Procedures (SOPs) for administering the firewalls and Endpoint Profiler system
  • Upgrade configuration of existing server load balancer equipment to support new features and functions. Configured VIPs, pools, nodes, iRules on F5 load balancers, troubleshoot and resolved complex F5 issues using QKview files, iHealth and TCP dumps, create application delivery using iApps.
  • Provide daily monitoring/detection of potential treats and develop risk mitigation solutions
  • Configure and maintain Domain Name Server (DNS), Network Time Protocol (NTP), Simple Mail Transfer Protocol (SMTP) servers
  • Provide third-level technical support and troubleshooting for critical network security problems
  • Develop documentation, including diagrams, standards, specifications and operating procedures.
  • Monitor for opportunities to enhance the customer network security performance or reliability.
  • Monitor for opportunities to improve the customer service delivery practices.
  • Provide third-level support and troubleshooting of network problems. Periodically provide after-hours and weekend support.
  • Provide technical design, build and support solutions using F5 products including LTM, APM. The emphasis would be on skills like
  • Proactive Metrics and Improvement
  • Irule/TCL design and troubleshoot
  • Excellent Technical Solution Engineering
  • Customer sensitivity and Rapid Response
  • Proactive and Clear Communication
  • Quality & Process Compliance
  • F5 LTM/APM/ASM iRule/TCL Knowledge
  • VPN SSL & IPSEC
  • Application Delivery Controllers

Confidential

Senior Network Engineer

Responsibilities:

  • Designed and deployed Checkpoint firewalls on GAiA and SPLAT platform appliances in an enterprise distributed environment.
  • Experienced F5 systems engineer of large enterprise F5 Big-IP LTM, GTM, ASM, and Enterprise Manager environments.
  • Installed and configured Checkpoint SmartCenter server on Linux and Windows platforms.
  • Created checkpoint policies and rules using smart dashboard, troubleshoot connectivity issues through the smart view tracker application.
  • Installed, configured and created policies on Juniper SRX firewalls.
  • Configured Juniper SRX firewall in a redundant cluster solution.
  • Install and configure Enterasys 800 D and K-series switches on the network
  • Perform code upgrade on the Enterasys switches to the latest version.
  • Created trunk and port channel using PAGP and 802.1Q on the Enterasys 800.D and K series switches to connect to the Cisco 6513 Core switches.
  • Configure and troubleshoot IGP protocols like OSPG and EIGRP within datacenters and branch offices.
  • Upgrade Checkpoint software to version R75, analyze rule base on the checkpoint using Solarwinds firewall security manager in order to delete obsolete rules.
  • Identified traffic classes within the network and performed QOS techniques for delay sensitive applications such as voice and video.
  • Provide real-time (or near real-time) detection and reaction services for information security incidents and analyze malware incidents to determine direct threat to organization.
  • Review data source events from NSM (Network Security Manager) to determine key events for input to content development.
  • Designed, Installed and configured Sourcefire IPS appliance inline, updated and tuned signatures to guard against vulnerabilities.
  • Monitor intrusion detection and prevention systems and other security event data sources. Determine if security events monitored should be escalated to incidents and follow all applicable incident response and reporting processes and procedures.
  • Provided LAN and WAN technical support, analyzing and resolving complex network connectivity and routing configuration issues.
  • Developed testing criteria for new products IOS released security. Maintained lab environment for testing validation to ensure current hardware and software is up- to-date, and bug free.
  • Performed IOS upgrade on both CISCO switches and routers.
  • Configured and troubleshoot MPLS and BGP for more than 100 sites all over the United States. Designed and configured WCCP on access routers to avoid unnecessary web traffic over WAN links to reduce bandwidth utilization.
  • Senior Engineer assigned to the Application Environment Modernization project at the Internal Revenue Service (IRS).
  • Experience with network load balancing technologies - Cisco ACE, F5 BigIP, or NetScaler preferred, including deployment, troubleshooting, management, upgrades, round robin, persistence, one armed (SNAT) and two armed configurations. Acquisition and maintenance of public and private certificates to terminate SSL sessions, and knowledge of SSL security and vulnerabilities.
  • Maintained and updated Cisco ASA 5510, 5585 firewall to provide demarcation between our DMZ, secured internal and external network.
  • Designed a load balancing solution utilizing BigIP's F5 LTM/GTM devices.
  • Secured network edge and monitored network activity and threats through the use of various IDS/IDP technologies including Cisco products, Sonicwall, Netscreen, checkpoint and watchguard.
  • Implemented ADC F5 LTM and GTM hardware platforms design and deployment implementation guidelines, DMZ Network infrastructure policies, LTM Inbound SNAT configurations and outbound NAT server to IP mapping processes.
  • Responsible for supporting the current F5 BIG-IP load balancing platform; including implementing, configuring, and integrating F5 BIG IP GTM, LTM, APM, ASM, iRules, DNS-SEC, IPv6, SSL administration.
  • Primary engineer for writing, testing, and implementing custom iRules and health checks for enterprise applications.
  • Work with business units in the design, planning, assessment, implementation, troubleshooting, fine tuning, and best practices of F5 configurations.
  • Performed system upgrades from version 10 to 11.3 HF5, install hotfixes, install and deploy replacement RMA devices.
  • Monitor F5 network and report on traffic and statistics to maintain appropriate performance.
  • Supported datacenter migration of F5 BIG-IP 1500 v9 LTMs to 1600 v11 LTM, rewriting TCL iRules to support new features and synta
  • Implementation of F5 LTM load balancing for highly available web clusters, and centralized certificate and redirect management using iRules

Confidential

NETWORK ENGINEER

Responsibilities:

  • Assisted in providing network design, implementation and documentation.
  • Installed, maintained and administered all network and data communication equipment including terminal server, Cisco routers and switches.
  • Upgraded multiple switches and routers with cat OS and IOS software to conform to U.S Department of Commerce standards.
  • Assisted in testing and implementing new network services to remote stations
  • Opened and tracked trouble ticket through Remedy and serve as a member of the 24/7 team responsible for member connectivity and any network impacting event to the U.S Department of Commerce.

Confidential

Network Engineer

Responsibilities:

  • Reviewed and redesigned of current network for internal development and testing teams
  • IOS upgrade and router hardening for 2600, 3600, 7200 routers and 6500,2900 3500 series of switches.
  • Provided wireless network design and support for clients
  • Assisted with establishing global network operations center (GNOC) to proactively monitor the network resulting in better SLA and network performance.

Hire Now