Network Engineer Resume
5.00/5 (Submit Your Rating)
SUMMARY:
- 10 years LAN/WAN/Security experience working within an Enterprise environment - primarily Department of Defense ( Confidential ) networks
- Extensive lead-level experience conceptualizing, managing, planning, and designing core infrastructure and security solutions to support mission critical operations
- Experience providing detailed root-cause analysis reports / assessments with the proper technical references
- Experience installing, upgrading, configuring and maintaining: Cisco 3560/3750-X/3850-X/6500 series switches, Cisco 19xx/29xx/43xx series routers, ASR’s and Cisco ASA firewalls
- A diverse knowledge and understanding of information security policies and industry established best practices
- Implementing and managing 802.1x port authentication standards across the network
- A natural-born leader, with an ability to motivate and inspire others to perform at their best
- Managing HAIPE Encryption Devices
- Day-to-day maintenance of both Cisco Unified Call Manager version 8.6 and Call Manager Express
- Excellent interpersonal and customer service skills with a blend of technical knowledge, documentation abilities, oral skills, and an overall ability to capture and articulate customer requirements to parlay them into solutions that can be easily understood by all pertinent parties
- One of the best at working well under challenging situations and at establishing good relationships with both internal and external customers
- Having worked on various types and sizes of networks has ensured that I have stayed abreast of the current relevant industry standards and trends and helps to refine my researching skills
EMPLOYMENT EXPERIENCE
Confidential
Network Engineer
Responsibilities:
- Responsible for providing daily oversight to the network engineering team that consists of four local nationals. The primary day-to-day functions encompass: resolving trouble tickets, providing support for the VoIP network, configuration management, and providing support to the existing network for the Ministry of Interior (MoI) that is composed of over 120 network links (microwave, fiber, and bridges) and approximately 1,250 network switches and routers.
- Provide standardized network configuration templates for the deployment of network devices to remote regions (to ensure consistency of network configurations throughout the Enterprise).
- Engage with end-users, 3rd party vendors, and various stakeholders to continually obtain feedback and other valuable information regarding the user experience from a networking perspective to better plan for future operational decisions.
- Attend weekly meetings with the Confidential NOC/JOC team and the Director of Engineering to share current project related information to “stay in sync” and to help rectify any potential issues that may have occurred.
- Provide on-going mentoring and training for the team to assist both their personal and professional growth and to encourage them to continually challenge themselves.
Confidential
Network Engineer
Responsibilities:
- Part of a team of engineers responsible for the successful migration to a new data center for Afghanistan’s Ministry of Interior (MoI). The existing network consisted of approximately 15,000 end users and 300 network devices (to include security devices, switches, routers, call-processing servers, wireless controllers, and access points).
- As the primary network engineer on the project, provided the overall integration planning for the Enterprise-wide network migration including the: planning, design, configuration, installation, maintenance, management, and coordination of all data, voice, and network infrastructure elements.
- Ensured that the network solution implemented was scalable and provided: high-availability, redundancy, and fault-tolerance for over 15,000 users while also ensuring that data both at rest and in-transit was protected and provided: confidentiality, integrity, and availability.
- Assisted with the plans for continuity of operations (COOP) in the event of any disruption of the primary communications by incorporating a complete comprehensive back-up and data recovery process. The plan provided a secondary off-site facility capable of taking over primary communications in the event of catastrophic failure at the primary site.
- Served as the project sponsor for the Network Working Group and communicated the project status to various stakeholders throughout the life of the project.
Confidential
Network Manager
Responsibilities:
- Was responsible for providing connectivity for several proprietary applications, some of which require VPN tunneling or firewall exemptions. When such technologies were required, responsible for submitting the proper documentation for approval to open specific ports for these applications.
- Utilized network-monitoring software daily to proactively monitor and sustain network operations - these toolsets included, but were not limited to: Solar Winds, Cisco Works, HP Open View and a Confidential server.
- Responsible for properly configuring and installing ASA 5505/5510 firewalls for clients that need remote access to our existing infrastructure from remote destinations.
- After assessing the current state and health of the network, created a 23-page network redesign guide with a detailed plan on changes that could optimize the network and make it more efficient and reliable. It was approved by all stakeholders involved and the implementation of the proposed solutions was a huge success.
- Attended required weekly meetings with local leadership to keep them informed of the health of the network as well as the status of on-going and future projects.
Confidential
Senior Network Engineer
Responsibilities:
- As part of the Network Operations (NET Confidential ) section for the Special Operations Command ( Confidential ), was responsible for configuring, monitoring and troubleshooting a network consisting of approximately 200 networking devices.
- Was responsible for assisting with the creation of vPCs (virtual Port Channels) on the Nexus 7K’s for the System Administrators.
- Network utilized DMVPN to interface with other camps located in the Special Operation Forces ( Confidential ) community. Confidential was utilized as the underlay (for transport through the Confidential ’s while Confidential was the protocol used for the overlay.
- Maintained the “day-to-day” operations of the campus network while constantly looking for ways to make the network more efficient.
Confidential
Information Assurance Officer
Responsibilities:
- As the Information Assurance Officer (IAO), was responsible for providing technical security assistance and guidance to the 727 th EACS in accordance with the applicable Confidential and Confidential regulations and doctrine.
- Ensured that the Information System Security Plan, Con Confidential (Concept of Operations), and other documents were adhered to, reviewed, and updated as necessary.
- Responsible for ensuring devices adhered to Confidential (Emission Security) guidance IAW AFPD 33-2 as well as ensured that no portable electronic devices were introduced into secured areas or classified processing equipment.
- Ensured the adherence to and compliance of required controls and other measured variables to maintain both the Confidential (Authorization to Operate) and C&A (Certification and Accreditation) packages.
- Prepared my local area of responsibility for the Confidential (Command Cyber Readiness Inspection) by providing: formal and informal training, informative guides, slideshows, and other sources of pertinent information to keep staff vigilant and aware of their responsibilities regarding operational security.
- Responsible for ensuring that network devices, operating systems and software were hardened in compliance with DISA’s STIGS (Security Technical Implementation Guides) by performing random audits and utilizing the Confidential tool (Assured Compliance Assessment Solution).
- When needed, provided support and assistance for the C-2 (Command and Control) platform - BC3-T (Battlespace Command and Control Center-Theater) system.
Confidential
Senior Network Engineer
Responsibilities:
- As the senior network engineer lead, was responsible for providing: installation, maintenance, troubleshooting, architectural design modifications and implementations for the entire tier-2 network.
- Ensured all network diagrams were properly created and updated per the United States Air Forces Central Special Instructions for Communicators ( Confidential SPIN-C).
- Provided and documented proper risk assessments, site surveys and change request documentation prior to making any network modifications.
- Attended and participated in scheduled NOSC meetings as required by the local communications squadron commander.
- Supervised, mentored, and led two network personnel daily, ensuring that they possessed the proper tools, knowledge, and confidence to complete any mission successfully.
- Part of a team responsible for managing over $47 million of communication equipment for the Confidential network at Al Dhafra Air Base consisting of approximately: 120 routers, 450 switches, 80 Confidential, 80 wireless access points, 8 firewalls and other networking devices.
- Responsible for all "moves-add-changes" for over 2,350 VoIP phones across four enclaves (NIPRNET, SIPRNET, BICES and CENTRIX-S) in both Call Manager and Call Manager Express.
- Assisted with the successful base closure of Thumrait, Confidential Base which consisted of ensuring that the network was gracefully de-commissioned, and all equipment accounted for prior to being dispositioned locally or shipped back to the United States.
Confidential
Network Engineer
Responsibilities:
- Was part of a team of network engineers responsible for supporting the Network Operations and Security Center (NOSC) by maintaining the Confidential -Kandahar network.
- Our team successfully “migrated” the Confidential network on Kandahar to the Confidential Network (for both NIPR and SIPR) which was a huge undertaking. With a small network team, planned, designed, and successfully executed the phased migration of over 2,200 user accounts and 3,700 devices.
- Utilized various network-monitoring software daily to proactively monitor the health and status of network operations. These toolsets included but were not limited to: Solar Winds, Cisco Works, HP Open View and a Confidential Server
- Responsible for the maintenance of system baselines and configuration management items while also ensuring that network diagrams were maintained utilizing Microsoft Visio and Network Atlas.
- As the Confidential Responsible Officer (CRO), was responsible for the proper keying /re-keying and management and configuration of 73 Confidential . Ensured the key material was properly managed and destroyed on the Simple Key Loaders (SKLs). Coordinated with the Confidential manager to receive additional Confidential keys for encryption devices. Responsible for ensuring destruction reports were promptly and properly completed on the Standard Form 153.
Confidential
Network Administrator
Responsibilities:
- As a member of the LAN Team, responsible for managing, configuring, and maintaining the day-to-day operations of an Enterprise level Marine Expeditionary Forces network (from the core and below), consisting of NIPRNET, SIPRNET and CENTRIX. Local Area Network was composed of 15 Area Distribution Switches and over 300 access-level switches.
- Monitored network availability, capacity, and reliability with network management tools.
- Diagnosed and troubleshot network performance / degradation issues and outages. Upon completion, responsible for reporting corrective actions taken to Systems Control (SYSCON).
- Responsible for maintaining: GRE tunnels, Confidential key-chains, VLAN and VTP administration, QoS, ACL statements and other network configurations on networked devices as required.
- Familiar with System Center Configuration Manager (SCCM) for software deployment.
- Was responsible for ensuring all machines added to the domain had all components of McAfee’s Host Based Security System (HBSS) including: the McAfee Agent, HIPs, Policy Auditor, Asset Baseline Monitor (ABM), Data Loss Prevention (DLP), Rogue Asset Detection, and Virus Scan Enterprise.
- Responsible for fabricating Confidential or CAT-6 cables to industry standards.