Chief/lead Engineer Resume
SUMMARY:
- I have lived and breathed Technologies for 17 years and everything that I have learned, I have done so the best way; completely hands on . I have first - hand experience in most sophisticated technologies which included all testing and proof of concept of each and every one of them and I have a passion to grow. I entered college at the age of 17 and finished my 4 year degree in 3 years with a 4.0 GPA Average.
- Have been in forefront of any new technology hands on such as MPLS, was one of the very first one to build a MPLS cloud thirteen years ago
- You can imagine passion for job and new technologies. You name it and have done it and have done it successfully. What you see above is just a fraction of what has been accomplished
- Chief Engineer/Architect with over sixteen years of experience in Network Engineering, and technical leadership
- Engineering, Re-engineering, troubleshooting and design of large scale Network infrastructures
- Worked with the most sophisticated technologies in the world. Even though Cisco is Foremost Authority but have worked with other vendor’s products such Big IP, Nokia, Nortel, Juniper and others IP V6 deployment and transition
- As a technical manager, I have managed up to eighteen high level engineers on a hands-on basis along with vendor management and negotiations and technology implementation
TECHNICAL SKILLS:
WAN expertise includes but not limited to: ATM, Frame-Relay, ISDN, T1, T3, X.25, SMDS, POS (Packet over SONET), WAAS, Optical WAN such as OC3, OC12, OC48, DWDM GSS, WAAS etc
Routing protocols: RIP, IGRP, EIGRP, OSPF, ISIS, BGP and MPLS and VPLS, VTAM, APPN, HSRP, VRRP, GLBP, ETC, Multicast routing ASM, SSM, QOS for low latency. etc.
Switching Technologies: VTP, RSTP, PVST, ISL, 802.1Q, 802.d, 802.1.w, VSS and VPC (Virtual Port Channel), OTV ON NEXUS platforms, etc.
Bridging Technologies: SNA, RSRB and DLSW+, remote access and Intranet VPN and Enterprise Wireless connectivity
Security: Cisco ACE and FWSM (Firewall Services Module
Network Security Products: PIX firewalls, ASA appliances, Juniper Netscreen, Juniper SRX series, Checkpoint, WebSense, Cisco’s IronPort, ASA appliances, Intrusion detection and prevention system (IDS, IPS), SideWinder, TripWire and extensive experience with Cisco CSA, NAC ( Confidential ), MARS, FWSM (Firewall Services Module), ACE, DDoS Guard, layer 2 and layer 3 MPLS VPN, IPSEC VPN, Cisco’s Iron Port etc
Cisco hardware: All switches and router platforms including but not limited to the, 7200, 7600, 12000 GSR, BPX, IGX, ASR, ISR and VXR series routers and CSR-1 and CSR-3 carrier class routers, Nexus 7000 and 5000 series switches
Cisco content switches: CSS 11000 AND 11500 series, F5 load balancers, Cisco AVVID ( Cisco Unified communication) UCC /VOIP such as Cisco Call Manager, Cisco Polycom Cisco IP/TV video servers (Video on Demand). Cisco VOP (UCC), Nortel/Avaya Voip, Proxy and AAA (Cisco ACS) servers as well as Network management tools, such as DHCP, DNS, HP OpenView, Cabletron Spectrum, CiscoWorks, MRTG, CACTI, ORION, Fluke, OPnet, Network General Sniffer, Concord e-Health etc
EXPERIENCE:
Confidential
Chief/Lead Engineer
Responsibilities:
- Lead engineer for a team of 13 high level engineers.
- The major project was troubleshooting one of a very complex network of Metro North. This network consists of sophisticated Cisco 6400 series ATM switches with BVI interface, Cisco 2610 and Nortel 8600 switches. Implemented QOS techniques such as diffserve for low latency.
- First order of business was to troubleshoot the TVM network communication which was due to routing failures because of routing protocol mis-configuration such as RIP and OSPF redistribution etc.
- The second phase was to re-engineer the corporate backbone traffic with the TVM Network, along with optimizing Network security and Performance using UCC /VOIP infrastructure, Cisco’s IPS 4200 series, MARS and NAC ( Confidential ) 3355 series appliances. Cisco 11500 series Content switches and CSM (Content Switch Modules), Cisco Nexus 7000 series 18 slot (7018), Cisco Nexus 5000 series, IT cloud virtualization using VmWare ESX servers with Cisco ACE and FWSM (Firewall Services Module), Cisco Ace (Multiple Context Mode) for load balancing and resource allocation for best application performance in a virtualized environment involving ESX servers, Cisco ASA and Juniper SRX series, migrated all IPSEC branch connectivity to MPLS VPN, Riverbed Stillhead WAAS
Confidential, Washington, DC
Network Engineering Manager
Responsibilities:
- Managed 16 high level engineers, designing a switched backbone using Cisco Catalyst 6500 series switches with supervisor 720, Cisco 3745 series Multi access routers, PIX 525 firewalls and FWSM, NAC appliances, Cisco 6500 series switches with a variety of WAN technologies such as T1, T3, migration of WAN connectivity to redundant MPLS clouds, Content switching for load balancing through the entire network using Cisco 11000 series Content switches and CSM (Content Switch Modules).
- Implementation of BGP routing with a fault tolerant and zero down-time and highest level of security design in mind.
- Designed and re-engineered security and Performance using Cisco’s IPS 4200 series, MARS and Confidential (NAC) 3355 series security appliances and 3395 NAC Super Manager. Migrated all IPSEC branch connectivity to MPLS VPN.
Confidential, Washington, DC
Lead Network Engineer Consultant
Responsibilities:
- Working with Federal Government such as Confidential and corporate clients such as Confidential in providing Engineering and Technology solutions.
- Advising client on various technologies and network security issues.
- Develop strategies on existing and future projects including selection of Vendor solutions and resource management.
- Some of tasks examples are performance analysis of network infrastructure to migrate to a high performance MPLS backbone and re-designing security environment using Cisco PIX firewalls and intrusion detection.
Confidential, Irvine, CA
Manager, Network Engineering
Responsibilities:
- Managed projects supervising 15-16 engineers on a hands-on basis.
- Re-structured and re-designed Western Digital international and national network infrastructure in Europe, Asia and the United States.
- The technical environment consisted of high End GSR 12000, 7500, 4500 Cisco routers, Layer3 switching using Cisco 6500 series switches to build a switched MPLS backbone.
- Network protocols used: TCP/IP, IPX/SPX, and DecNent.
- WAN technologies used were ATM, Frame-Relay, T1 and ISDN. Routing Protocols and technologies used were OSPF, BGP, EIGRP and MPLS.
Confidential, Pleasanton, CA
Lead Consulting Architect
Responsibilities:
- Re-engineering re-design of the Bank’s backbone and security infrastructure with state of the art PIX Firewall and IDS intrusion detection systems
- The technical environment consisted of high End GSR 12000, 7500, 4500 Cisco routers, Layer3 switching using Cisco 6500 series switches to build a switched MPLS backbone.
- Network protocols used: TCP/IP, IPX/SPX, and DecNent. WAN technologies used were ATM, Frame-Relay, T1 and ISDN.
- Routing Protocols and technologies used were OSPF, BGP, EIGRP and MPLS.
Confidential, Washington, DC
Manager, Network Engineering
Responsibilities:
- Managed projects supervising 15 engineers on a hands-on basis.
- As the technical manager and project lead responsible for planning and development of all aspects of goals and strategies.
- Re-engineered FCC's 5000 user network infrastructure that included over 300 high end GSR 12000, 7500, 4500 routers and Catalyst switches, PIX Firewalls, Cisco's TACACS, DHCP and DNS servers. Cisco VPN routers and concentrators.
- The WAN technologies included T1, ISDN, Frame-Relay and ATM. Routing Protocols and technologies used: EIGRP, RIP and BGP.
- Upon completion of re-designing the current environment, the second phase consisted of designing and implementing a new ATM backbone using Cisco's LS1010 and 5500 switches and 7500 series routers using Cisco's ATM LANE (LAN Emulation Technology) to facilitate the relocation of the agencies headquarters.
- After migration of all platforms to IP based devices, the infrastructure was redesigned by using Cisco’s Tag switching (MPLS) Technology over ATM.
- The task also included management and negotiation with various cabling and equipment vendors and solution providers such as Cisco Systems, Cabletron and 3Com.
Confidential, Washington, DC
Senior WAN/LAN Engineer
Responsibilities:
- Re-Engineered, troubleshot and supported Confidential 's 10,000 user FDDI Backbone.
- Duties Included testing, load analysis and performance Evaluation of network Infrastructure.
- Responsible for the installation and configuration of Cisco 4000 and 2500 series routers along with support and Installation of Novell and Unix Servers.
- Implemented new Frame-Relay Circuits to replace existing X.25 networks.
Confidential, Raleigh, NC
Network Architect
Responsibilities:
- Configured and designed routing architecture in a Cisco environment between Customers' Confidential (Computer Telephony Integration) call centers. Protocols used: TCP/IP, IPX/SPX.
Confidential, McLean, VA
Network Systems Engineer
Responsibilities:
- Design, troubleshoot and Configure Novell Netware servers primarily in Confidential Windows and DOS environment.