We provide IT Staff Augmentation Services!

Network Architect /network Support Engineer Resume

SUMMARY:

  • CCIE Certified Network Engineer with extensive experience in Information Technology Industry that includes Network Architecture, Network Support Engineering, and Windows System/Server Administration.
  • For over10 years Consultant responsible for leading and directing information - technology operations across broad disciplines, including hardware, software, development, testing, production support, project management, database technologies, customer satisfaction, vendor relationships, strategic planning, staff development, promoting change and improvement, and technology implementation.
  • Over 10 years of experience in Network Architecture, and deploying, managing, and maintaining VOIP, MPLS.
  • Deployed Voice over IP Solution for various customers, each with distinct requirements including but not limited to Cisco Communications Manager centralized cluster with remote sites running SRST functionality.
  • Executed several implementations of Cisco Call Manager Express and Unity Express.
  • Solid experience with UCCX, Call Manager, Jabber, CUCM, WebEx or similar Cisco technologies
  • Solved/Engineered call routing, number translation, pickup groups, and call handler issues.
  • Designed, tested and implemented cost effective customized Voice solutions for clients including full and fractional ISDN-T1 circuits.
  • Experience in designing security solutions like Cisco Cleanpipe, RTBH, CoPP, iACL, DNSSEC, Netflow and Multicast security for major SP networks
  • Design DDoS detection and mitigation solution for SP networks; experience in integrating Cisco products with 3rd party solutions like Arbor for DDoS mitigation
  • Strong knowledge in VPN: Design, Implementation Scenarios, Connectivity troubleshooting and other Algorithms such as DES, 3DES, MD5, SHA, PKI, IPSEC Site to Site & Remote Access VPN.
  • Experience configuring and managing Microsoft and Symantec MPKI technologies
  • Experience with cryptographic concepts including PKI, SSL, HSM, Smart cards, Symmetric/Asymmetric (Public/Private-PKI), subordinate CAs, cross-certification and certificate-based two-factor authentication
  • Experience with Gemalto HSM, Microsoft PKI, Symantec PGP/SEE, Symantec MPKI, and Vormetric technologiesExtensive experience in software solutions architecture and design Primarily in EMS/ NMS and Infrastructure domain
  • Experience installing, configuring and troubleshooting one or more of the following Cisco security technologies: Cisco ISE, IPS/SourceFire, ASA, CSM, VPN, ACS, FTD, ACI, Trustsec, StealthWatch, Cisco Umbrella architectural Experience on Migration from SourceFire to FireAmp.
  • Experience on Cisco FirePower upgrade from Sourcefire.
  • Experience with Knowledge Management, Change Management, Asset and Configuration Management, Release and Deployment Management, Transition Planning and Support, Service Validation and Testing, Evaluation
  • Configure, validate, manage, and back up configurations of all NMTs
  • Configure, validate, and manage all Device settings (e.g., IP address, subnet mask, proxy settings, Windows Internet Name Service (WINS) primary and secondary Server address, default gateway address.
  • Work with/across global/regional/local IT teams by providing advanced/expert consultation for responsible services
  • Develop detailed designs, business cases, and communicate detailed architecture recommendations needed to support business critical systems and operations
  • Evaluate and propose technology solutions which will deliver highly secure and dynamic IT services
  • Experience with Service Delivery Management (SDM) or Technical Delivery Management (TDM)
  • Ability to lead complex projects, monitor the results, and make adjustments as needed to ensure goals are accomplished
  • Understand the business needs and deliver prompt, efficient, quality service to the business; works to anticipate, identify and meet end-user needs; drives outward results and ensures high-quality standards are met
  • Integrated Cisco Contact Center express with Cisco Unified Communications Manager.
  • Demonstrated thorough understanding of Voice Gateways (H323, MGCP), Protocols (H323, SIP, and MGCP), IP Contact Center technologies (ACD, IVR) and CTI application in providing solutions to customer.
  • Integrated the Cisco Unified Wireless IP Phones (792X series) with Cisco Unified Communications Manager and Cisco Unified Communications Manager Express using IEEE 802.11 over a Cisco access point.
  • Contact Center Enterprise (PCCE) experience
  • CVP scripting experience
  • Experience with Cisco Unity
  • Managing day to day incidents thru ITSM tool
  • Experience in contact center Recording Solutions ( NICE, VERINT etc.,)
  • Implemented Cisco Unified Communications Manager Applications like CUPS, IPMA, Extension mobility and Attendant console as per customer requirement.
  • 10+ years’ experience designing, implementing and supporting LANs, WANs, VLANs, VPNs), routing and switching experience utilizing Cisco, Juniper, and Force 10 Network devices.
  • Configure the broadsoft call manager
  • Configure broadsoft architecture design to meet client requirement.
  • Configure Subscriber Level Configuration Parameters
  • Enable SIP Authentication for a line
  • Configure a Multipurpose Key for “eventlist BLF”.
  • Configuration files be converted into a binary format, an extra step must be performed when using this feature
  • Configured via web GUI as well as via the Configuration File through TFTP or HTTP.
  • Hands on exposure on Remote Access VPN - Cisco ASA/Juniper
  • Strong understanding of encryption technologies, DLP, multi-factor authentication, email filtering, API integration and scripting.

TECHNICAL SKILLS:

Cisco IP Telephony: CUCM (4.X-7.X), Gatekeepers, Voice Gateways, Cisco Unity, Cisco Unity Connection, CME, Cisco Presence, Cisco IP Communicator, Cisco IP Soft Phone, Cisco 792X,794X,796X IP Phones, IPCC Express.

Systems: Windows NT/2000/XP/Vista and Blackberry Enterprise Server.

Networks: Cisco routers 3600, 3700, 3800/2800 ISR series and CME/SRST router, switches (LAN, WAN, 2950, 3550, 3560 and 3750 series).

Security: Cisco ACS, TACACS. 802.1x, WPA.

Protocols: H323. SIP, MGCP, SCCP, RTP, TCP/IP, SNMP, RIP, IGRP, OSPF, EIGRP and HSRP.

PROFESSIONAL EXPERIENCE:

Confidential

Network Architect /Network Support Engineer

Responsibilities:

  • Responsible for planning, designing, engineering configuration and troubleshooting complex data, video and voice networks. Demonstrated skills in Cisco Voice technologies using Cisco Call Manager, Unity and Speech connect and implement the technical architecture and physical design of the network, analyze existing voice and data networks and recommend solutions. Install and configure voice gateways as part of the IP telephony system. Install and configure LAN switches. Troubleshoot, maintain, upgrade, and provide solutions to complex hardware/software problems.
  • Designing and implementing Cisco VOIP products
  • Cisco Routing and Switching background w/QOS
  • Determines appropriateness of hardware/software changes and/or modifications related to VOIP on Cisco routers, switches, and call servers
  • Hands on experience with installing, upgrading and troubleshooting Cisco Unified Communications
  • Managing infrastructure of Large-size operational networks (4000+ routers/switches, 1000+ servers, 4000+ workstations) in a high-paced fluid environment
  • Lead Cisco VOIP deployment projects
  • Lead requirements gathering on Cisco VOIP projects
  • Provides reports and creates documentation for methodology, process, and procedure for current and future VOIP infrastructure deployments
  • Self-motivated and desired to succeed
  • Strong understanding of TCP/IP and ability to install and troubleshoot LANs and WANs
  • Strong written and oral communication
  • Test and Turn Up trunks, PRI’s, and network links in Cisco Router/Voice Gateways
  • Perform complex assignments; demands familiarity with principles, theories, concepts and technologies as well as applied knowledge of established procedures, policies and practices

Confidential

Network Architect /Network Support Engineer

Responsibilities:
  • Extensively worked on Application and Infrastructure layer KPIs on URLS(http get/post), WSDL call, Servers, Network, firewalls, Load-Balancer.
  • Worked with multiple systems including Windows Server 2008 R2, Systems Administration Server Installation and Support, Active directory migration, Data Recovery Service and Data Backup, Spyware and Virus Removal, Network Service and Monitoring, Virus, Spyware, Malware Removal and Internet Security Solutions.
  • Configuration, installation, upgrade migration, and implementation of Active Directory 2003 & 2008R2.
  • Configuration, installation, and migrationof VMware virtualization
  • Configuration, installation and upgrade TACACS.
  • Integrated Cisco Contact Center express with Cisco Unified Communications Manager.
  • Demonstrated thorough understanding of Voice Gateways (H323, MGCP), Protocols (H323, SIP, and MGCP), IP Contact Center technologies (ACD, IVR) and CTI application in providing solutions to customer.
  • Integrated the Cisco Unified Wireless IP Phones (792X series) with Cisco Unified Communications Manager and Cisco Unified Communications Manager Express using IEEE 802.11 over a Cisco access point.
  • Implemented Cisco Unified Communications Manager Applications like CUPS, IPMA, Extension mobility and Attendant console as per customer requirement.
  • Configure the broadsoft call manager
  • Configure broadsoft architecture design to meet client requirement.
  • Configure Subscriber Level Configuration Parameters
  • Enable SIP Authentication for a line
  • Configure a Multipurpose Key for “eventlist BLF”.
  • Configuration files be converted into a binary format, an extra step must be performed when using this feature
  • Configured via web GUI as well as via the Configuration File through TFTP or HTTP.
  • Hands on experience with Aruba wireless controllers, Aruba Airwave, and Aruba ClearPass
  • Designing, installing, configuring, and troubleshooting of Aruba Wireless environment;
  • Installation and Configuration of Kerberos, SPNs. Application utilization and integration with Kerberos.
  • Provide technical support in the resolution of technical issues for Confidential ISS NIPS solution
  • Responsible for new IPS deployments, upgrade execution and IPS retirement.
  • Provisioning, Monitoring and management of Firewall/Intrusion Detection / Prevention System using tools
  • Experience with solarwinds setting up of custom views to web based monitoring.
  • On-boarding of enterprise assets (servers, network, storage and backup) to solarwinds platform
  • Configuration of threshold and monitoring parameters for proactive and predictive monitoring
  • Monitoring Alerts - utilization of CPU / Memory and Disk space usage of servers
  • Application monitoring - IIS traffic monitoring, SQL (Query monitoring) and Exchange -Mail box monitoring
  • Monitoring of Network devices - Routers, Switches, Load balancers, ASA Firewall
  • Configuring SAM - Application Monitoring for various application based usages. Scan node for applications at intervals by configuring polling intervals
  • Setting up of dashboard views / custom views for specified user views based on requirements.
  • Manage Enterprise Intrusion Detection / Intrusion Prevention Systems Confidential ISS, McAfee Intrushield etc.
  • Installation, Configuration, and Upgrade of IIS 5, IIS 6, and IIS 7. (Apache, Weblogic or similar web systems environments depending on application or project needs.
  • LAN and WAN technologies, dynamic routing (OSPF, BGP-4, MPLS (RSVP/LDP) and QoS (RED, WFQ) etc), remote access via VPN, network security standards and best practices, circuit resiliency and failover mechanisms between diverse data centers.
  • Experienced UCCE engineer who is familiar with scripting
  • Experience working with Verint call recording platform
  • Knowledge of eGain reporting platform
  • Working knowledge of RMG Symon wallboards
  • Working knowledge of VoiceTone network IVR
  • Experience working on voice and data networks and integration points
  • Excellent interpersonal, communication, presentation and written skills
  • 15 Years of expertise on Cisco contact center and unified communications platforms
  • 15 Years of experience in Contact Center functionality and Business imperative
  • Strong knowledge in Cisco ICM scripting, including script monitoring
  • Extensive experience in SIT, Backend Database, Performance, Security, User Acceptance (UAT)
  • Specific to project:
  • Experience in software QA processes and standards
  • Strong knowledge in Cisco ICM scripting, including script monitoring
  • Expert level experience with Cisco ASA products
  • Experience with the architecture, deployment, and operations of Cisco ISE
  • Experience building the network access manager (NAM) client with an ISE back-end, for both wired & wireless, using EAP-TLS certs
  • Experience installing, configuring and troubleshooting one or more of the following Cisco security technologies: Cisco ISE, IPS/SourceFire, ASA, CSM, VPN, ACS, FTD, ACI, Trustsec, StealthWatch
  • Cisco ISE architecture includes the following components:
  • Nodes and persona types
  • Cisco ISE node—A Cisco ISE node can assume any or all of the following personas: Administration, Policy Service, Monitoring, or pxGrid
  • Configure Cisco ISE node with the Monitoring persona functions as the log collector and stores log messages from all the Administration and Policy Service nodes in a network.
  • Provides all the configuration, authentication, and policy capabilities that are required for network model, and the secondary Cisco ISE node functions in a backup role.
  • Centralized authentication, authorization, and accounting (AAA) operations between clients and the primary Cisco ISE node are performed using the RADIUS protocol.
  • Ability to split the load in this way directly reduces the stress on each Cisco ISE node in the system
  • Deployments, each node can perform its own specific operations, such as network admission or device administration, and still perform all the AAA functions in the event of a failure.
  • Centralized logging for large Cisco ISE networks
  • Centralized management model helps maintain a consistent, synchronized AAA policy.
  • Configure and ensure that Cisco ISE can interoperate with network switches and that functions from Cisco ISE are successful across the network segment.
  • Experience with remote access and VPN technologies
  • Expert level experience with SourceFire IPS & Defense Center/ Cisco FirePower & FireSight
  • Experience with Firewalls - Fortinet/FortiGate, & Palo Alto and/or other next generation firewall solutions
  • IPS/IDSs - Cisco traditional IPS, Cisco FirePower, and FortiGate IPS
  • Expert level understanding of Network Security Architecture (Internet Edge, Data Center Edge, Policy Enforcement Design)
  • Expert level understanding of F5 LTM
  • Experience in in F5 ASM architecture and deployment strategies
  • Experience with PCI network controls, PCI compliance and assessments
  • Strong experience in creating HPNA policies, diagnostics and reports
  • Experience with Opsware Network Automation
  • Experience with HP technologies, HP products
  • Experience with Network Automation HPNA

Confidential

Responsibilities:
  • Working on PIX (506, 515, 525, 535), ASA (5505/5510) Firewalls.
  • Implementing security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA(TACACS+ & RADIUS)
  • Dealt with monitoring tools like network packet capture tools like Wire-shark, Jabber etc.
  • Installation, Configuration and Administration of Windows Servers 2000/2003, Active Directory, FTP, DNS, DHCP, TFTP, Linux OS under various LAN and WAN environments
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate
  • Network Redesign for branches/Campus Locations.
  • Changing both the voice and data environment.
  • Replacing branch hardware with new 2851 routers and 2960 switches.
  • Performing security audits of perimeter routers, identifying missing ACL’s
  • Troubleshooting of complex LAN/WAN infrastructure including routing protocols EIGRP, OSPF & BGP
  • Lab testing & validation prior to implementation of Nexus 7K, 5K & 2K connecting to blade servers
  • Settings of the networking devices (Cisco Router, switches) co-coordinating with the system/Network administrator during implementation
  • Designing, installing, configuring, and troubleshooting of Aruba Wireless environment
  • Hands on experience with Aruba wireless controllers, Aruba Airwave, and Aruba ClearPass

Confidential

Responsibilities:
  • Configuring network access servers and routers for AAA Security
  • Documentation and change control
  • Worked on troubleshooting of complex LAN/WAN infrastructure
  • Administration of Cisco 11.x and 12.1 versions
  • Monitoring all Cisco equipment’s using Cisco Works
  • Involved in SNMP Network management.
  • Knowledge of Networking concepts: DNS, DHCP, SMTP, SNMP, TCP/IP. Scripting technologies
  • Configure network encryption systems, SNMP computer management platforms, secure voice equipment, 802 wireless radios, and secure computing equipment.
  • Working on various scanning and Sniffing tools like Ethereal
  • Upgrading and backups of Cisco router configuration files
  • Implementing and maintaining backup schedules
  • Experience with Vulnerability scanning tools (Nessus / Nexpose)
  • Experience with Next Generation Anti-virus products (specifically Carbon Black)

Confidential,Sunrise,FL

Network Architect/Network Support Engineer

Responsibilities:
  • Systems management, infrastructure and architectural design and integration and related components and applications
  • Involved in conceptualizing, planning, designing and implementing complete and integrated information technology solutions
  • IT systems management, infrastructure, architectural design, integration of related components and applications
  • Configuration, Implementation, and upgrade of"Access Control" technologies.
  • Configuration and installation of AD/DNS, IIS, Clustering, ISA
  • Configuration and installation of Cloud-based service delivery
  • Configuration, installation, and migration of Server Clustering
  • Installation and “Continuous Integration” with Cruise Control (or Hudson, Jenkins, Anthill Pro)
  • Experience with configuration and deployment of .NET container based applications
  • Configuring and managing a continuous integration server (through Cruise Control)
  • Windows OS principals and administration for XP and Windows 7, Server 2000 and 2008, including TCP/IP, DOS, registry, scripting, enrolments and GPO settings.
  • QA VXML Scripting/Code
  • Build dashboards through windows servers
  • Act as a resource for on-going SQL planning and deployment
  • Developed architects for the technology support resulting in more participation in planning and improved
  • Managed escalations and sub-cases to ensure timely and high quality resolution of all issues.
  • Developed and implemented strategies for providing facilitative support resulting in fewer incidents, increased availability, or accelerated deployments
  • SCCM 2007 deployment and infrastructure knowledge including troubleshooting, design, and implementation experience.
  • Configure and install various network devices and services (e.g., routers, switches, firewalls, load balancers, VPN, QoS)
  • Perform network maintenance and system upgrades including service packs, patches, hot fixes and security configurations
  • Monitor performance and ensure system availability and reliability
  • Monitor system resource utilization, trending, and capacity planning
  • Provide Level-2/4 support and troubleshooting to resolve issues
  • Work within established configuration and change management policies to ensure awareness, approval and success of changes made to the network infrastructure
  • Select and implement security tools, policies, and procedures in conjunction with the company’s security team

Hire Now