Senior Network Architect Resume
3.00/5 (Submit Your Rating)
MI
SUMMARY:
Experienced Network Engineer with over 18 years of networking experience with large and complex network.
PROFESSIONAL EXPERIENCE:
Senior Network Architect
Confidential, MI
Responsibilities:
- Designed Confidential cloud hub networks which provided secure and fast direct connection to AWS and Azure
- Architected entire Cloud Hub in San Jose using MPLS (MP - BGP) on Cisco Nexus 7000 in multi-vrf env.
- Implemented Express Route for Confidential Azure using the Equinix co-location
- Very familiar with public cloud offerings from AWS (Amazon Web Service) and MSFT Azure
- Facilitated migration of 2000+ internal Apps into AWS VPCs and Azure VNETs
- Migrated another 200 apps into OpenStack private cloud providing DMZ capabilities
- Troubleshoot AWS VPC by using NACL and SG
- Built Cloud specific secure service rail to service anycast DNS, NTP, SSO, LDAP, Chef
- Migrated Cloud Hub connections from DMVPN to MPLSoverMGRE (MoM) configuration
- Troubleshoot complex network environment using Splunk and Cisco ASA multi-context environment
- Automated Cloud Hub VPC deployment using Ansible, NSOT and Tower
- Used DevOps method to keep configurations updated using GitHub
- Deployed virtual routers CSR in AWS to accomplish complex routing needs
- Achieved HA capabilities in AWS using CSRs in different Availability Zones
- Connected OpenStack environment to Cloud Hub location to build Private Cloud
- Configured SDWAN router Viptela to connect remote sites over the Internet
- Provided design and then built AWS GovCloud VPCs in US-West region
- Led a team of engineers from on boarding to day to day challenges in a complex network
- Implemented Cloud Service Provider routes (4000+ public) natively inside the enterprise
- Facilitated a huge performance gain by avoiding routing SfB and EXOL over the Internet
Principal/Staff Network Engineer
Confidential, Detroit, MI
Responsibilities:
- Designed and implemented dual ISP load sharing with geographical fault tolerance using BGP
- Migrated two data centers to Cisco Nexus 7000 core switches with multiple VDCs
- Extensive experience in Data Center design with Cisco 5k and 2k switches
- Configured OTV to extend layer 2 domain between two geographically separated data center
- Designed enterprise wide QoS using CBWFQ
- Designed Nexus 7000, 5000 and 2000 for 10 gig migration
- Worked extensively to secure all network devices with ACL, SSHv2, VACL, NTP, Protocol Security to meet the highest possible standard in the industry
- Architected EMC VMAX, VPLEX solution over DCI (Data Center Interconnect)
- Designed and Implemented Payment Card Industry Data Security network using state of the art technology involving the highest security in mind that is laid out in details by PCI standard
- Intimate knowledge of NERC-CIP security requirements with sensitive utility industry data and implement all of them on Cisco routers and switches
- Deployed Cisco application acceleration solution called Cisco WAAS in complex enterprise environment
- Configured and implemented Cisco load balancer ACE 47xx series product to replace F5
- Designed and implemented OSPF Network for a large private network which has a mix of Cisco and non-Cisco routers and firewalls
- Designed active-active application high availability solution that spans geographical location
- Used BGP to achieve failover in MPLS cloud as well as primary Internet circuit
- Designed and implemented full upgrade path from RIPv2 to EIGRP protocol.
- Worked with F5 load balancer (Big IP) to facilitate company wide application load balance
- Deployed latest Ciscoworks and its modules for company’s Cisco routers and switches
- Utilized Verizon Business MPLS network to connect remote sites
- Customized Industrial hardened router called Dymec (Dynastar) to enable remote substation connectivity
- Extensively used Network Node Manager to keep track of DTE LAN/WAN devices
- Designing migration path from RIPv2 to HA campus network design using EIGRP for entire DTE network (80+ remote sites).
Senior Network Engineer
Confidential, Detroit, MI
Responsibilities:
- Architected a complex network from ground up for new data center when company HQ relocated.
- Designed Wide Area Network for new plants using Cisco routing protocol
- Implemented security using state of the art Checkpoint firewalls
- Utilized Cisco 6509, Cisco 6506 catalyst switches as MDF core switches.
- Deployed Cisco 4009, Cisco 4006, Cisco 4500 catalyst switches as IDF access switches.
- Used Cisco EIGRP protocol to route traffic with existing data center in Georgia.
- Configured GRE tunnels over IPSec routes to achieve VPN High Availability (VPNHA).
- Implemented Cisco QoS technology to maintain proper bandwidth requirements.
- Designed and implemented Nokia IP 380, 350 firewall for the new data center.
- Designed Local Area Network to accommodate VOIP as well as data using Layer 2 and Layer 3 switches. Also used POI switches for Voice applications.
- Designed alternative WAN configuration replacing three 2600 routers with two 2800 routers using Cisco GLBP technology.
- Created two Nokia clusters to achieve failover between two Nokia boxes (4 all together).
- Checkpoint Firewall-1 development, configuration and support for a WAN VPN environment.
- Used ANX tunnel to transport EDI traffic to different large auto partners (including GM, Ford and Chrysler).
- Completely familiar with ANX TunnelZ implementation process.
- Used VRRP as well as HSRP to achieve zero single point of failure throughout the network.
- Fully installed and configured Cisco ASA 5520 for remote office users for SSL client login and WebVPN login.
- Migrated plant circuits from frame to MPLS.
- Migrated plant circuits from frame to Internet circuits.
- Managed a large hub and spoke network spanning multiple continents.
- Deployed remote Network sites using IP Circuit and IPSec GRE VPN tunnels via Cisco technologies and network equipment.
Technology Analyst
Confidential, Charlotte, NC
Responsibilities:
- Completed a large enterprise Windows 2000 migration from A to Z. We have tested our migration in a lab environment extensively.
- Executed post migration activities such as Group Policy implementation as well as delegation of administration using Organizational Unit
- Developed Architecture Concept, Migration Concept and Administrative Concept documents for five large sectors of Compass Group who joined our AD environment as Child Domain.
- Written role-based administrative policy for the enterprise
- Directed the migration from Windows NT 4.0 to Windows 2000 and Exchange 5.5 to Exchange 2000 for the 122,000 US employees. Compass USA is a global 500 Company with 13 Billion in FY02 revenue and 344,000 employees worldwide.
- Worked under and met regularly with CIO and VP level management to develop and deliver technical direction and content as well as detailed outlines of migration strategies and paths.
- Developed proposal of Exchange Installation on SAN-NAS solution by EMC and Hitachi.
- Proposed best practices on Windows 2000 Active Directory, Domain Controller management in a complicated wide area network with multiple remote sites
Confidential, Charlotte, NC
Lead Corporate Trainer
Responsibilities:
- Lead Corporate Trainer for Windows 2000 Course Work
- Taught Windows 2000 Active Directory implementation course
- Taught Windows Networking course
- Taught A+ Certification courses
- Technical Instructor for all MOC courses
Support Engineer
Confidential, Charlotte, NC
Responsibilities:
- Provided technical support to independent software vendors, corporate customers, consultants and others regarding computer software applications, systems and services
- Supported Windows NT 2000 and Windows 4.0 Server in Enterprise level which included deployment of Windows NT 2000 and Windows 4.0 server in a large corporation setting
- Assisted network administrators with Installation and troubleshooting of Windows 2000 and Windows NT 4.0 networking and domain components
- Utilized Confidential ’s state-of-the art firewall Internet Security and Acceleration Server 2000
- Implemented Windows 2000 Dynamic Domain Name Server ( Confidential ), Windows Internet Name Server (WINS), Confidential Proxy 2.0 Server, Windows Routing and Remote Access Server, IP Security, RADIUS Server, and Confidential Server
- Extensively used the networking and IPRAS/VPN portion of Confidential Windows 2000 Server/Advanced Server and Confidential Windows NT 4.0 Server
- Planned and deployed Windows 2000 Active Directory in large corporate environments with multi-level domain structures
- Developed and trained other engineers and customers on Confidential Internet Security and Acceleration Server 2000