We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

4.00/5 (Submit Your Rating)

Oklahoma City, OK

PROFESSIONAL SUMMARY:

  • Cisco Certified Network Professional with 8 + years of experience, which includes expertise in the areas of Routing, Switching and Network Security devises.
  • Strong hands on experience in configuring, administering and troubleshooting of Cisco ASR, 7200, 3900, 3800, 2900, 2800, and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches .
  • Experience in configuring, troubleshooting and deploying of various IP Routing Protocols (RIP, EIGRP, OSPF and BGP) on both Cisco and Juniper devices.
  • Good Hands on experience in deploying, troubleshooting and configuring Cisco Meraki Layer 2 and Layer 3 switches like MS 225, MS 250 and MS 350.
  • Expertise in Perimeter security with hands on experience in Firewalls such as Cisco ASA, Juniper NetScreen OS and SRX, Palo Alto Networks and Checkpoint Next Generation Firewalls.
  • Experience working with Nexus 7010/Nexus 9300, 7018, 5020, 2148, 2248 devices.
  • Experience working on Juniper devises like MX series routers, SRX series firewalls and EX, QFX series of switches.
  • Good exposure on Pa - 5020, Pa-3020 series Palo Alto firewalls and Panorama Centralized management server
  • Experience in implementing Cisco ISE for wired and wireless users to keep the internal network secured.
  • Configuring and Troubleshooting Cisco ASA 5500 series firewalls and VPN solutions (Site-to-site and Remote Access such as Cisco Any-connect VPN client and SSL Clientless VPN)
  • In-depth knowledge and configuring HSRP, GLBP, PPP, SNMP, VRRP, PAP and CHAP.
  • Expertise in configuring and administering Juniper NetScreen ISG 1000 series, Branch SRX (550,650) and Datacenter SRX (3k, 5k series) Firewalls
  • Deployed Checkpoint NG23000 firewalls, configuring the various software Blades.
  • Hands on Knowledge/experience on F5 load balancers , its methods, implementation and troubleshooting on LTMs and GTMs .
  • Acquired strong skills in working with cloud-based WLAN technologies like Cisco WLAN, CISCO Meraki and Aruba wireless .
  • Hands on experience in managing IT Network infrastructure in Meraki Dashboard (Access points, Switches etc.).
  • Experience in configuring, upgrading and verifying the NX-OS operation system.
  • Experience configuring and troubleshooting Virtual Device Context and VPC in Nexus 7k series switches
  • Configured security policies like ACL , VPN , NAT , PAT, SSL , AAA (TACACS+ & RADIUS) , IPS/IDS.
  • Involved in physical stacking and racking of Network equipment in huge datacenter environment.
  • Good knowledge in working with Infoblox Grid manager to ensure high availability DNS, DHCP and IPAM services throughout the distributed network.
  • Experience with convert Cisco ASA rules over to the Juniper SRX based solution.
  • Responsible for Cisco ASA, Juniper SRX firewall administration across customer networks.
  • Having good hands on experience in working with monitoring and managing the nodes within the network using Network monitoring tools like SNMP, SolarWinds, Splunk .
  • Experience on configuring Active Directory, DNS and DHCP on Windows Server 2008 and 2012.
  • Actively add, remove, manage and monitor Cisco endpoints via Cisco Unified Communications Manager ( CUCM ) and Tandberg Management Suite ( TMS ) systems.
  • Provided support for VOIP applications, Call Manager, Call Center and other WLAN network equipment (Access Points, Cradle points and DSL Modems).
  • Experience with different Network Management Tools and Sniffers like Wireshark (ethereal), HP-Open view, RSA envision, and Cisco works to support 24 x 7 Network Operation Center.
  • Experience with Project documentation tools & implementing and maintaining network monitoring systems and experience with developing network design documentation and presentations using VISIO .

TECHNICAL SKILLS:

Cisco router platforms: 2600, 2811, 3640, 3700, 3825, 7200, 7204, 7206, ASR1002X, ASR9K

Cisco Switch platforms: 2900XL, 2950, 2960, 3560, 3750X, 4500X, 4510, 6509E, Cisco PIX 500 series, Nexus (2k,5k, 7k, 9k), CSU's/DSU's, Catalyst 6500, 7600, 4500

Juniper platforms: MX80, MX240, MX 480, MX960, M320 and T640 routers, EX 2200, EX 4200, EX 4500, MX-480, M Series, SRX210, QFX, Q-FABRIC, PTX series.

Aruba platforms: S2500 switches, 7200, 3600 series wireless controllers, Aruba IAP 105.

Redundancy Protocols: HSRP, GLBP, VRRP

VPN Technologies: Site-to- Site VPN, Remote Access VPN using Cisco ASA, Juniper SRX firewalls and Checkpoint

Firewalls: Cisco PIX 501, 510, 515E, Cisco ASA 5520, 5540, ISE appliance, Juniper SRX 240, 650, 3600, 5800, Fortinet Fortigate 7000, 5000, 3000, 900, Palo Alto firewalls PA 3020, PA 5050, Checkpoint, checkpoint 77.30, checkpoint 80.1 versions on NG23000, NG44000 firewalls, Sourcefire IPS/IDS, SDM

LAN Technologies: VTP, Inter-VLAN, VXLAN routing, STP, RSTP, PVST, 802.1x, TCP/IP, Trunks, Ethernet channel.

Routing Protocols: RIP, RIP 2, IGRP, EIGRP, OSPF, BGP, HSRP, VRRP

Switching Protocols: VTP, STP, RSTP, MSTP, VLANs, PAGP, LACP

Network Management: HP Network Node Manager, Sniffer, SolarWinds, Splunk, Wire Shark, SNMP

Operating Systems: Linux, Windows, Mac OS.

Load balancers: F5 LTM6400,8900 and GTM, ASM, APM and A10 Load balancer.

Security Protocols: IKE, IPsec, SSL, AAA, Access-lists, Prefix-Lists

Language skills: C, Python, SQL, Linux OS, JavaScript

Antivirus: Symantec Endpoint Security and McAfee Enterprise Security

PROFESSIONAL EXPERIENCE:

Confidential, Oklahoma City, OK

Sr. Network Engineer

Responsibilities:

  • Responsible for configuration, maintenance and troubleshooting routing protocols BGP, EIGRP and OSPF on Cisco Routers 7613, 7201, 2812, 2811 and 3945E.
  • Worked on the implementation of branch routers such as Juniper MX80, MX104, EX4500 switches and perform JUNOS upgrades.
  • Acquired hands on experience in supporting and troubleshooting 250 above remote locations within the VPN throughout US and Canada.
  • Deploying and decommission of VLANs on core Nexus 9k (9300), NX-7K (7010), Nx-5K (5020) and its downstream devices and Arista 7k series switches for application testing, also configure 2k, 3k,7k series Routers.
  • Worked on projects/WLAN/systems/issues of small to medium complex enterprise network.
  • Provided wireless operations support and maintenance for network systems as a primary team member.
  • Working with the firewalls PA-5020, PA-3020 series Palo Alto firewalls and Panorama, configuring firewalls Rules, troubleshooting the connectivity issues.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco devises such as firewalls and access points.
  • Actively add, remove, manage and monitor Cisco endpoints via Cisco Unified Communications Manager (CUCM) and Tandberg Management Suite (TMS) systems.
  • Hands on experience deploying and troubleshooting IP phone systems (Avaya wireless and Polycom).
  • Good Hands on experience in deploying, troubleshooting and configuring Cisco Meraki Layer 2 and Layer 3 switches like MS 225, MS 250 and MS 350.
  • Acquired knowledge in working with Meraki wireless access points MR 16, MR 18, MR 32, MR 42, MR 72 etc.
  • Working experience of deploying and troubleshooting Radius, TACACS, TLS, SSL (2048 & 4096), Two-factor authentication (2FA) with Symantec VIP.
  • Involved in physical stacking and racking of network equipment in huge datacenter environment.
  • Configuration on BIG IP (F5) Load balancers and monitored the Packet Flow in the load balancers.
  • Perform installs, configure and troubleshooting on state full inspection firewalls and inline/passive IPS/IDS sensors.
  • Worked on F5 BIG-IP LTM 8900, Citrix and NetScalar configured profiles, provided and ensured high availability.
  • Experience in providing Security using F5 BIG-IP APM and ASM.
  • Configure and Manage site-to- site IPSEC VPN with different partners. Troubleshoot remote access services like Cisco WLAN clients and for the users to access their enterprise network.
  • Knowledge of Intrusion Detection, DMZ, encryption, IPsec, proxy services, Site to Site VPN tunnels, MPLS/VPN, SSL/VPN.
  • Performed VRF on routers to separate router table into two routing tables.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert Cisco ASA to Juniper SRX solution.
  • Network Security including NAT/PAT, ACL, on ASA and Juniper SRX Firewalls.
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256with Juniper SRX 550Firewalls.
  • Optimizing and troubleshooting the Wi-Fi, Ethernet and infrastructure using Splunk, SolarWinds.
  • Experience in managing and resolving incident tickets generated by ticketing tool Service Now.

Environment: Cisco ASA, MX, Palo Alto Firewalls, F5 Load balancers, RADIUS and TACACS+ servers, Meraki Layer 2 and Layer 3 switches like MS 225, MS 250 and MS 350, Nexus 9k, 7K, 5K devices, Meraki wireless access points MR 1ga6, MR 18, MR 32, MR 42, MR 72 routing protocols BGP, EIGRP, OSPF and BGP, ACL, WLAN, Cisco Routers 7613, 7201, 2812, 2811 & 3945E, Cisco ISE and Juniper MX80, MX104, Splunk

Confidential, Seattle, WA

Sr. Network Engineer

Responsibilities:

  • Experience working with Nexus 7018/7010, 5020, 5548, 2148, 2248 devices.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Involved in upgrading switches from 6500 E to 4500-X
  • Implementation of BGP to optimize WAN routing on the core and edge routers.
  • Mutual redistribution of OSPF and BGP routes using route maps.
  • Involved in upgrades to the WAN network from existing 7200vxr with ASR1004 and 3845/3945 routers.
  • Proficiency in configuring Cisco ASA 5540, 5580, AAA authentication, Palo Alto Firewall
  • Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K
  • Responsible for Checkpoint firewall management and operations across our global networks.
  • Configured access and trunk ports and implemented granular control of VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets across the network than with previous generation of switches.
  • Designed and implemented Cisco ISE and worked on Cisco IOS-XE advanced version of IOS and helps future proofing and improved security.
  • Working with Checkpoint Support for resolving escalated issues.
  • Upgrading branch network connectivity with total refresh of the network infrastructure with new 3845 routers and 2960 switches.
  • Configuration and troubleshooting on HSRP, VRRP, GLBP, RSTP, MST related issues coming in network environment.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Implementation and configuration of GLBP/HSRP on multilayer switches for first hop redundancy
  • Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-6400 load balancers.
  • Managed F5 BigIP LTM appliances to load balance server traffic in critical serval access silos.
  • Configuration of Virtual Servers, Nodes, and load balancing Pools
  • Upgraded load balancers from Radware to F5 BigIP v9 which improved functionality and scalability in the enterprise. Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls
  • Experience with migration juniper SRX 240 to Palo-Alto 5050 and configured firewall rules.
  • Configuration and extension of VLAN from one network segment to their segment between Different vendor switches (Cisco, Juniper)
  • Configuring IPSEC VPN on SRX series firewalls
  • Convert Campus WAN links from point to point to MPLS and to convert encryption from IPSec/GRE to Get VPN.
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
  • Experience with configuring BGP in the data center and using BGP as a WAN protocol and manipulating BGP attributes
  • Performed basic security audit of perimeter routers, identifying missing ACL's, writing and applying ACL's
  • Troubleshooting and installing of CRS, ISR 4k, GSR, ASR9000 and Nexus devices.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling.

Environment: Cisco 2800, 2921, 3845, 7200, 7500 Series Routers, Juniper SRX 240, Palo-Alto 5050, Cisco catalyst series Switches 2960G, 3750G, 4503, 6513, Cisco ISR 4431 router, Cisco PIX/ASA Firewalls, Cisco ISE, BGP, OSPF, STP, VLANs, HSRP, PAGP, WAN, Site to Site and Remote Site VPN, AAA, RADIUS, DHCP, DNS

Confidential, Louisville, KY

Network Engineer

Responsibilities:

  • Responsible for Crossroads rollout of LAN/WAN, problem determination and diagnosis, provide project leadership (onsite, offsite)
  • Working with local IT personnel on troubleshooting, problem determination, diagnosis of performance issues, bandwidth issues, throughput traffic prioritization to improve overall application response time cross WAN.
  • Configuration and installation of LAN switches and wireless network infrastructure equipment and cabling all uplink and user network connections.
  • Working with the DIRM Networking team and NC FAST IT staff to review current VLAN configuration, IP routing and firewall access control for existing networks, and applying the necessary network and security access rules to the installed equipment.
  • Configuring & managing around 500+ Network & Security Devices that includes Juniper SRX Firewalls, F5 BigIP Load balancers and Nexus Devices
  • Worked with network services like DNS, DHCP, DDNS, IP4, IP6, IPSec, VPN etc.
  • Worked with F5, CISCO ACE 4710 Load balancers, GSS and Wireless networks.
  • Deployed Cisco Catalyst 6500, 4500, 4000, 3750, 3850, 3560 switches
  • Installed and monitored extreme networks S - series, 7100 stackable switches and E4G-400, 1800 router to support VMware machines in NCFAST.
  • Deployed and configured Cisco ASR 1000, 7000, 9000 series routers
  • Also worked with Extreme networks wireless devices like Access points AP3705, AP3610.
  • Experienced working with Nexus OS, IOS, CATOS and Nexus 7K, 5K & 2K Switches
  • Deployed Juniper switches EX4500 and EX4200, routers M7i and M10i and JUNOS
  • Deployed Cisco 2500 and 5800 Series Wireless Controllers and Access Points
  • Working with Cisco ASA 5525 firewalls with current and demonstrated expertise with ACL security in a multi-VLAN environment
  • Experience in working with load balancer for converting CSS to F5
  • Experience in working with LTM and GTM for scaling and securing DNS infrastructure during high volumes.
  • Configured Multiprotocol Label Switching (MPLS) VPN with Routing Information Protocol (RIP) on the customer's stage.
  • Worked and performed troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, and BGP ability to interpret and resolve complex route table problems.
  • Experience with Security- Firewalls, NAT / PAT, IPSEC, S2S.
  • Experience with ALG (RTP, RTSP and FTP, DNS, HTTP), DHCP
  • Back up a Cisco IOS to a TFTP server and Upgraded and restored a Cisco IOS from TFTP server.
  • Configured and perform trouble shooting on Dell Power Connect Switch 5548 used to connect VM Servers and Flex Systems.
  • In-depth expertise in the implementation, optimization, troubleshooting and documentation of LAN/WAN networking systems.
Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960/6500 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco Nexus 7K/5K/2K, Cisco ASA5510, Checkpoint, windows server 2003/2008: F5 BIGIP, LTM, OSPF, EIGRP, RIP, BGP, VLAN, VPN, Checkpoint, Juniper SRX

Confidential, Lansing, MI

Network Engineer

Responsibilities:

  • Involved in conversion of PIX firewall to ASA firewall.
  • Dealt with implementation, deployment related to Cisco devices and applying security policies.
  • Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers and related issues.
  • Planning for upgrade of IOS on devices and performing the upgrade.
  • Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IP Networking.
  • Configured Juniper MX480s, EX8200s, EX4500s, EX4200s, and SRX5800s from scratch to match design.
  • Possess a good experience working with the Trouble Tickets on F5 Load balancers, including Cisco CSS, Brocade ADX and both F5 LTM and GTM products.
  • Switching experience includes Cisco Catalyst switches: CISCO 3750, 4500, 6500 series switches.
  • Managing enterprise BGP setup by configuring and troubleshooting BGP related issues. Responsible for adding new BGP peers for remote branch offices and business partners.
  • Worked as part of a team to manage Enterprise Network Infrastructure as a Tier 3 Support Engineer.
  • A comprehensive Technical Configuration/Requirements document approved Managed Services suppliers such as Cisco, Juniper, and Riverbed.
  • Involved in Configuring and implementing of Composite Network models consists of Cisco7600, 7200, 3800 series and ASR 9k, GSR 12K routers and Cisco 2950, 3500, 5000, 6500 Series switches.
  • Configured networks using routing protocols such as OSPF, BGP and manipulated routing updates using route - map, distribute list and administrative distance for on-demand Infrastructure.
  • Experienced with Juniper: EX-2200, EX-4200, EX-4500, MX-480, and M Series, SRX210, SRX240.
  • Configured BIG IP (F5) Load balancers and also monitored the Packet Flow in the Load balancers.
  • Configured OSPF and BGP on Juniper M and MX series Routers.
  • Configured VLAN, Spanning tree, VSTP, SNMP on EX series switches.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
  • Administration of ASA firewalls in the DMZ and FWSM in the Server Farm to provide security And controlled/restricted access.

Environment: 3750, 3550, 3560, 2924, 6509-V-E, 6513, 6504, 6503, 6506, 6500 series switches, 7206, 2611, 6748, 6708, 2960, T1 Controllers, Juniper MX, EX and SRX, F5 Load balancers, ASA firewalls, Fiber and Ethernet cabling.

Confidential

Network Engineer

Responsibilities:

  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF and BGP.
  • Configured RIP and EIGRP on 2600, 2900 and 3600series Cisco routers.
  • Experience with designing and deployment of MPLS Traffic Engineering.
  • Configuring RIP, OSPF, EIGRP BGP, MPLS, QOS, ATM and Frame Relay.
  • Design and deployment of MPLS QOS, MPLS Multicasting per company standards.
  • Maintenance and trouble - shooting of LAN, WAN, IP Routing, Multilayer Switching.
  • Worked on different phases of testing such as Sanity Testing, Functionality Testing, Smoke Testing, System Testing, Installation Testing, Compatibility Testing, Regression Testing, Stress Testing and UAT Testing.
  • Writing Test cases & Test scripts for the application functionality
  • Testing routers and modems, troubleshot issues related to broadband technologies for Residential and Business Customers.
  • Configuring VLAN, spanning tree, VSTP, SNMP on Cisco switches.
  • Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wire shark.
  • Performed on-call support for installation and troubleshooting of the configuration issues with routers and switches.
  • Co-ordination with Hardware vendors, software vendors and service Providers.
  • Assisted in backup, restoring and upgrading the Router and switch IOS.
  • Attended Team meetings and provided comments on existing network and the recommendations to improve the current network Performance.
  • Maintaining the health of 250+ wireless Access points in two locations.

We'd love your feedback!