We provide IT Staff Augmentation Services!

Network Engineer Resume

SUMMARY:

Experienced and fast - learning Network Engineer with proven skills and System Engineering experience in installation, configuring, and troubleshooting of state-of-the-art secure Enterprise networking technologies.

TECHNICAL SKILLS:

Cisco Routers: 1800, 1900, 2600, 2900, 3600Cisco Switches: Catalyst 2900, 3500, 3700

Firewalls: Cisco ASA 5500, Sonicwall TZ &NSA Series, Fortigate Fortinet 300 - 500 Series, Meraki MX60, MX100, MX400, Checkpoint 1120, 1180

Wireless: Cisco 2500 and 4400, Ruckus ZD1100, Meraki MR18 and MR32, Brocade RFS4000

Security: Forescout CounterAct NAC, NAT/PAT, VPN, Load Balancing, IDS/IPS, IPsec and ACL.

Routing: OSPF, EIGRP, BGP

Switching: VLAN, VTP, STP, RSTP, Port Security, Ether-Channel (PAgP, LACP).

Other Vendors Switches: Brocade FCX648S/POE, Dell PowerConnect 2800 and 6200 Series

Microsoft Server: 2003, 2008/2008r2, 2012/2012r2, 2016

Microsoft: Win7/8/10, Office 2007/2010/2013/2016

Other Protocols: HSRP, VRRP, GLBP, IPv4, IPv6

PROFESSIONAL EXPERIENCE:

Confidential

Network Engineer

Responsibilities:

  • Responsible for architecture design, implementation and advanced support of Routers, Switches, Security Solutions, VPNs and Network Management Solutions across LAN/WAN
  • Responsible for managing activities such as upgrading Cisco IOS/ASA and Checkpoint firmware, upgrading hardware by installing new devices, optimizing configurations, making standardization for the network topology
  • Upgraded network devices that were using SNMPv2c to the more secure SNMPv3 with authentication and privacy keys so the payload will be encrypted
  • Enabled/Configured multiple security solutions (on network devices) such as ARP inspection, BPDU Guard, Root Guard, OSPF/EIGRP MD5 Authentication, 802.1x, Port Security, and others to mitigate any threats that could potentially be performed on the network
  • Configured and troubleshot various networking protocols and features such as EIGRP, OSPF, port security, Access-list, VLAN, NAT and STP
  • Configured SolarWinds NCM to maximize efficiency in the intercontinental management of remote network devices
  • Followed ForeScout CounterAct best practice design and configure SPAN port on the switch so the NAC could monitor the network traffic
  • Configured, monitored and troubleshot Cisco's ASA 5500 with ACL, NAT, Object Groups, Failover, Multi-Contexts
  • Created and edited policies on Checkpoint and ASA Firewalls
  • Upgraded the wireless devices (and configuration) deployed in remote offices from Cisco 1602 APs that were in an autonomous system deployment to Cisco Mobility Express 1852 APs which is a WLC/CAPWAP deployment, this implementation gave us greater visibility, security, and control over the wireless network

Confidential

Network Engineer

Responsibilities:

  • Deployed, configured, and managed Cisco, Ruckus, Brocade, Ubiquiti, and Meraki wireless networks, with and without WLAN Controllers
  • Created Traffic Shaping policies on a per application basis to prioritize the bandwidth of Enterprise applications and throttle recreational ones within Meraki based wireless networks
  • Led Network Reconfiguration project where I configured and designed a topology and for a client that wanted to move all servers to a datacenter that was located in the same building
  • Configured 802.1x Authentication for both Wired and Wireless networks to help prevent non-domain joined devices from connecting to the internal network
  • Isolated Guest Wireless networks from LAN on Cisco, Brocade, and Meraki devices through VLANs and ACLs
  • Implemented Failover using VRRP on Meraki MX100 & MX400 Firewalls for redundancy purposes.
  • Configured InterVLAN Routing on Cisco, Brocade, and Meraki Layer 3 switches to allow hosts in different VLANs to communicate with each other and/or network resources.
  • Led migration of existing IPSEC VPN tunnels from Pre-Shared key to the more secure option of Certificates.
  • Troubleshooting of LAN/WAN infrastructure, including routing protocols EIGRP, OSPF & BGP.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, AAA (RADIUS) to help harden client’s network infrastructure.
  • Configured Group Policy Mappings from Firewall Groups to Active Directory Groups on Fortinet and Meraki Firewalls
  • Configured Remote Access SSL VPN on SonicWALL and Fortinet Firewall and managed the deployment of the client application.
  • Configured DMZs in both Single and Dual Firewall configurations
  • Configured site-to-site IPsec VPNs to connect Branch Offices to Corporate Headquarters
  • Interface with the customer’s POC serving in a Virtual CIO type role providing guidance on IT strategies and solutions

Confidential

Network Administrator

Responsibilities:

  • SME on MDT 2012/2013 and using it for enterprise level deployments of Windows 7, 8, and 10 Operating Systems
  • Led projects where I integrated the customer’s on-premise Windows Active Directory with Microsoft Azure Active Directory
  • Contributed to projects that moved clients from a Microsoft Exchange 2007/2010/2013 to cloud-based solutions (Google Apps for Work and Office365)
  • Experience in virtualization platforms with hypervisors related to VMware vSphere 5.x, 6.x, ESXi 5.x, 6.x, VMware Workstation
  • Performed P2V, V2V MIGRATION using VMware vCenter Converter and Created host/client VM templates
  • Created system administration SOP (Standard Operating Procedures) documents
  • Provided a Data Security solution by creating a policy where Windows Bitlocker would auto-encrypt all domain joined workstations during OS deployment and configured the recovery keys to be backed up to Active Directory automatically
  • Proficient at creating/managing OUs, Security Groups, Users, and other objects and components within an Active Directory Database
  • Created/Linked/Enforced GPOs via the Group Policy Management Console in Server 2008r2/2012r2
  • Configured Windows Server 2008r2/2012r2 Domain Controllers, DHCP, and Terminal Servers for small to medium sized clients
  • Deployed RADIUS servers using Microsoft Server 2012r2 NPS to authenticate users connecting to the network, both wired or wirelessly
  • Created Sites, Subnets, and Site-Links in AD Sites and Services for RODC servers that were deployed to branch offices
  • Configured HP iLO and Dell iDRAC cards for remote management of servers.

Confidential

Computer Analyst

Responsibilities:

  • Served as internal/external customer liaison to expedite resolution of customer issues
  • Provided dedicated on-site support for metropolitan D.C. area clients and instant remote support for global customers
  • Led and completed client projects to configure and install WDS with MDT2012/2013, for use as the Windows 7 and 8 Deployment Solution
  • Provided Tiers 1, 2, & 3 technical desktop support (on-site, phone) and routine monthly maintenance calls
  • Responded to all customer phone and email inquiries to the Help Desk, escalated support as required, and logged details in a ticket tracking system

Confidential

Help Desk Technician

Responsibilities:

  • Used Remedy Ticketing System to track of user issues, resolution actions, and phone/email follow-up to ensure satisfactory resolution
  • Used Symantec Ghost to reimage Desktops and Laptops with irreparable operational systems, and replaced failed hardware components
  • Resolved Microsoft XP and Microsoft Office 2003 user issues, and used Remote Desktop and Active Directory (password resets, lockouts, deletion of inactive PC’s and terminated users)
  • Escalated calls to next tier, and collaborated with team members to research and resolve user issues

Hire Now