We provide IT Staff Augmentation Services!

Network Security Engineer Resume

3.00/5 (Submit Your Rating)

Houston, TX

PROFESSIONAL EXPERIENCE:

  • Profound 9 years of experience in researching, implementing and administering network security solutions. Skilled in supporting and troubleshooting operational issues related to network security Infrastructure.
  • Strong experience in creating firewall policies as per the requirements on Palo Alto, Cisco ASA, and Checkpoint firewalls.
  • Design and Implementation of VoIP & Data Networks for new buildings, expansions, and remodels at a global level.
  • Knowledge and experience with data networking and security (Firewalls, IPS/IDS, ACLs, NAT, PAT)
  • Implemented firewalls using Cisco ASA, Cisco PIX, Check Point Provider - 1 / Site Manager-1 NGX R65, Firewall-1/VPN-1 NGX R65 Gateways, Secure Platforms
  • Experience with devices Palo Alto Network firewalls such as security NAT, Threat prevention & URL filtering.
  • Knowledge of Troubleshooting Ghosting, Networks Wireless Inventory Spyware/Malware
  • Firewall technologies including general configuration, risk analysis, security policy, rules creation and modification of Check Point Firewall Smart Domain Manager command line & GUI.
  • Installed and monitored performance of wired and wireless networks to maximize operations.
  • Working knowledge on transport design and integration of the Alcatel 7670 RSP-ESE / Tellabs 8600/8860 and DACS products.
  • Worked on ASR 901, 920 I & O, 903 cisco routers and Juniper 2200ACX for configuration and integration.
  • Seasoned professional in Check Point Firewall policy administration and support between various zones.
  • Experience in implementing and configuring F5 Big-IP LTM load balancers.
  • Maintained, upgraded, configured, and installed Cisco routers, Cisco Catalyst Switches and Load Balancer F5 LTM, ASM, APM and GTM.
  • Worked extensively on the SRX, Palo Alto, ASA, juniper, Palo alto Firewall’s.
  • Configuring and help strategize Azure cloud infrastructures.
  • Experienced with Ericsson and Alcatel-Lucent equipment.
  • Configuration, troubleshooting Checkpoint Firewall using R77.
  • Providing support for Checkpoint R77. 40 with GAiA and SPLAT.
  • Experience in risk analysis, security policy, rules creation and modification of Check Point/Nokia Firewall VPN-1 FW-1 NGX R65, R70 & R75 Provider-1/Site Manager-1 R65, R 70.30 & R75.40.
  • Advance level knowledge and experienced of Cisco network security (IDS, ASA 5500 Firewall), network redundancy (HSRP, GLBP and VRRP).
  • Configured UDLD, port-fast, uplink fast and other spanning tree features.
  • Pleasant Experience on Cisco UCS 6200 interconnects Cisco UCS B-series Blades and Cisco UCS 5100 series blade server chassis.
  • Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NATing, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP & Multicasting protocols
  • Juniper: EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240
  • Installed CISCO UCS rack servers to automate and accelerate deployment for all applications
  • Drive operational adoption of automation tools scripts / APIs, UCS Central, etc.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability and With the help NETSCOUT delivered breakthrough technology to capture and analyze network traffic at the packet level.
  • With the help of VIPRION efficiently managed the most demanding applications, offloads servers, and consolidates your Application Delivery
  • Having Knowledge about Network Monitoring tools like Solar Winds, Wireshark
  • Implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, and Route Maps.
  • Used the Linux and other Unix operating systems to enhanced TCP/IP protocol, to provide numerous services
  • Worked with AWS Networking and Amazon VPC, Implemented AWS Virtual Private Cloud: Subnets and Routing
  • Used Cisco 8540 Wireless Controller in order to provide centralized Control, and to troubleshoot high-scale deployments in service provider and large campus deployments
  • Configuring & Managing LAN, WAN, VPN and Firewall of Juniper MX Routers for End Users
  • Well versed in TCP/IP, DPI (Deep Packet Inspection), P2P (Peer-To-Peer) Detection, with good knowledge of Datacom, Firewall and NAT.
  • Performed configuration, troubleshooting, analysis, continuous improvement and standardization efforts in support of DCS / SCADA OT applications, databases, infrastructure and network devices.
  • Engaged with various teams across the business to ensure changes are specified, designed, tested, documented and implemented accordingly for DCS or SCADA systems, applications, databases and/or networks.
  • Maintaining all backhaul issues clear. Like MPLS services up, OSPF,IGRP, etc.
  • Successful completion and integration of IP Backhaul for several cellular Network with extensive experience on Edge Router like ASR 920 Series and ASR 903, Configuration and Troubleshooting.
  • Strong Experience on Juniper Networks' Secure Services Gateway (SSG) and Integrated Security Gateway (ISG) appliances
  • Developed redundant load-balancing design based on four Juniper MX 960 and two SRX 5600 using route leaking and policy routing.
  • Integrated network and phone systems with Alcatel, Mitel, and Brocade solutions for companies such as Porsche, Nestle, Cemex, Gyrodata, HP, Statoil, numerous school districts, and colleges
  • Administration and diagnostics of LAN and WAN with in-depth knowledge of TCP/IP, NAT, PPP, ISDN and associates network protocols and services.
  • Experience through Hand-on Experience with configuring T1.5, Gigabit Ethernet, Channelized T3 and full T3, OCX, ATM, Frame-Relay.
  • Unix/Linux systems administrator with experience configuring, monitoring, upgrading and maintaining systems hardware, software and related infrastructure.
  • Ability to configure and monitor security tools such as security information and event management (SIEM) QRadar, ArcSight.
  • Experience in implementing Next Generation Firewalls (NGFW) such as Bluecoat ProxySG and other vendors such as Palo Alto networks NGFW for URL filtering.
  • Configured and managed Nexus 2k fabric extender, 5K and 7K switch network at the client's location.
  • In-depth knowledge and experience in WAN technologies including OC3, E3/T3, E1/T1, Point to Point, MPLS and Frame Relay.
  • Used VIPRION to simplify your network by offloading servers and consolidating devices, saving management costs as well as power, space, and cooling in the data center.
  • Experience with Network Automation using Python, shell scripting.
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Experience securing and managing remote access using various VPN technologies like IPSec, SSL. Proxy SG for Content filtering and URL filtering.
  • Worked on network topologies and configurations, TCP/IP, UDP, Frame Relay, Token ring, ATM, bridges, routers, and Switches.
  • Python scripting experience to configure WiFi networks, to detect WiFi servers and connect. Tools such as WiFi phisher, WiFi jammer are used to validate the WiFi functionality
  • With the help of VIPRION shared the processing load not just within a blade, but across the entire chassis.
  • Support Windows 2003, 2008 and 2012 Servers Active Directory Security Platforms.
  • Managed all Windows 2003 Servers, Active Directory, DNS, DHCP, and WAN Switching.
  • Good knowledge and experience in Installation, Configuration and Administration of Windows, HTTP, FTP, DNS, NTP, DHCP servers under various LAN and WAN environments
  • Strong knowledge of Cisco and Juniper software (IOS/XR and JunOS) and hardware.

TECHNICAL SKILLS:

Routers: Cisco (1800, 2500, 2600, 2800, 3600, 3750, 3800, 7200, ASR 9000).

Cisco Switches: (2900, 3500, 4000, 4500, 5000, 5800, 6500, 9000 Nexus 2k, 3k, 5kand 7k), MSFC, MSFC2.

Routing Protocols: (BGP, OSPF, EIGRP, IGRP, IGMP, RIP), TCP/IP, Multicasting (PIM), Wireless Protocols, SIP / RTP, DIAMETER / RADIUS

Management Tools: SNMP, Syslog, HP Open View NNM, Sniffer, and Wireshark ARUBA

LAN Protocols: VLAN, PVLAN, VTP, Inter-VLAN routing, ISL, dot1q, STP, IS-IS, RSTP, MSTP, ISL PVST, LACP, HSRP, GLBP, VPC, VDC, Ethernet, Port security.

WAN Technology: Frame Relay, WiSM Module in 6509, X.25, L2VPN, L3VPN, E1/T1/DS1/DS3, MPLS

Network Management: SNMP v2, v3, Cisco Works, 3Com Network Analyzer, MRTG, Solarwinds, Infoblox. Aruba

AAA Architecture: TACACS+, RADIUS, Cisco ACS.

Operating Systems: Linux, UNIX, DOS, VMware, Windows XP/2007/8, Windows 2003 server and Windows 2008 server

Firewalls: Check Point R65/R70/R75, ISA 2004/2006, Palo Alto PA-500/PA-2K/PA-3K/PA-5K, ASA 5585/5520/5510

Network Security: Knowledge of Firewall, ASA, Cisco FWSM/PIX/ASDM, Cisco ISE, Sourcefire IPS/IDS, Cisco NAC, IPsec, Nokia Check Point NG, IPS/IDS(Snor), VPN

Application Protocols: DHCP, DNS, FTP, HTTP, SMTP, TFTP

Documentation: Microsoft Office, Visio

PROFESSIONAL EXPERIENCE:

Confidential, Houston, TX

Network Security Engineer

Responsibilities:

  • Configured, troubleshoot, and upgraded Checkpoint Firewalls for managed clients, which included network and/or resource access, software, or hardware problems.
  • Experience with monitoring and logging tools like Splunk and Solarwinds
  • Created network design, engineering, monitoring and troubleshooting router, switches and firewalls
  • Configuring and troubleshooting all LAN and WAN technologies issues, VPN, load balancers, firewalls, DNS, DHCP, SNMP, etc.
  • Worked extensively in configuring, Monitoring and Troubleshooting Checkpoint R77.XX security appliance, Failover DMZ zoning & configuring VLANs / Routing / NATing with the firewalls as per the design.
  • Supporting EIGRP and BGP based company network by resolving level 2 &3 problems of internal teams & external customers of all locations.
  • Implemented Zone Based Firewalling and Security Rules on the Checkpoint Firewall.
  • Installed checkpoint and F5 load balancers in VMware workstation and VSphere.
  • Involved in troubleshooting software, hardware and network problems.
  • Responsible for Cisco ASA firewall administration across our global networks.
  • Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series
  • Configured GLBP load sharing between VLANs.
  • Configured L2/L3 Ether-Channels to increase bandwidth on core and distribution switches.
  • IOS Upgrade in CISCO 6500 switch and 2800, 3845, 3945 routers.
  • Primary responsibility is to design and deploy various network security & High Availability products lick Cisco ASA other security products.
  • Support customer with the configuration and maintenance of ASA firewall systems.
  • Worked on Cisco Firewalls, Cisco ASA 5500(5510/5540) Series.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Predominantly set up, configured and maintained a Windows server and Network Equipment on a TCP/IP network.
  • Working knowledge of configuring routing protocols such as RIPv2, EIGRP, OSPF and BGP.
  • Worked on INFLOBOX for Network Device Monitoring. Setting up Infoblox for local DNS and DHCP Configurations.
  • Worked with Firemon policy manager to configure and monitor the firewall changes.
  • Created firewall access rules and NAT rules for cisco ASA 5585
  • Configuring and troubleshooting routing protocols (EIGRP, OSPF, BGP), (AnyConnect, IPSEC and EZVPN), MPLS, and NAC configurations.
  • Designing, building and operating large scalable networks.
  • Understanding and managing incident management while delivering high levels of customer service that aligns to our Internal and Customer service levels.
  • Created Ipsec tunnel from business to Scada Network.
  • Created tech plan and backup plan for checking physical devices
  • Ensuring processes meet business requirements and system goals.
  • Implement strategies to ensure scalability, availability, and security
  • Building capabilities for monitoring, alerting, automation, and self-healing networks
  • Creating and maintaining network documentation, network maps, and network processes.
  • Network design and implementation on Visio 2016
  • Network capacity planning and management with senior Network engineer
  • IP and device configuration management
  • Network security and vulnerability assessment with team member

Confidential, LA, CA

Sr. Network Security Engineer

Responsibilities:

  • Implemented and troubleshot firewall rules in Cisco ASA 5540, 5580, Check Point R77.20 Gaia and VSX as per the business requirements.
  • Worked on Gaia Versions 77.10, 77.20, R65 implementing new and additional rules on the existing firewalls for a server refresh project.
  • Upgrade of Check Point firewalls and management servers from Splat R75.30 to Gaia R77.20.
  • Replaced aging Checkpoint firewall architecture with next generation Palo Alto 5000 series appliances serving as firewalls and URL and application inspection in Panorama management tool.
  • Designed MPLS VPN and QoS for the architecture using Cisco multi-layer switches.
  • Upgrade of Check Point firewalls and management servers from Splat R75.30 to Gaia R77.20.
  • Provided support for 2Tier and 3Tier firewall architecture, which includes various Check Point, Cisco ASA firewalls and Palo-Alto firewalls.
  • Configuration and Administration of Cisco and Juniper Routers and Switches
  • Designated support Azure for Azure stack and cloud/Azure networking and Configuring and troubleshooting Azure Vm's, storage, Virtual networks and back end technologies.
  • Experience with designing and configuring secure Virtual Private Cloud (VPC) through private and public networks in AWS
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
  • Performed Wireless Site Survey, Design, Installation of WiFi in Hilton Hotels for Confidential . Airmagnet, Cisco, Ruckus.
  • Configured IPsec tunnels with Palo Alto to enable secure transport and cloud based/site-site VPN to both Azure and AWS.
  • Implemented and Maintained Routing Protocols EIGRP, BGP and OSPF in the Network.
  • Exhibit superior talents in supervising wireless migration of more than 40 sites with multiple WLAN controllers and APs
  • Established IPsec VPN tunnels between branch offices and headquarter using Cisco ASA Firewall.
  • Configuring and troubleshooting Network Security Appliances - IPSec VPN
  • Pleasant Experience with NETSCOUT’s service assurance solutions help assure “always on” network, applications and service
  • Managed complex wireless network strategies and imparted support to operational wireless computer networks.
  • Experience in AWS Cloud Front, including creating and managing distributions to provide access to S3 bucket or HTTP server running on EC2 instances.
  • Support Data Center Architecture - Network, Server, Storage Area Network
  • Responsible for Check Point, Cisco ASA, CISCO ISE and Palo Alto firewalls (5050) configuration and administration across global networks.
  • Provided support for 2Tier and 3Tier firewall architecture, which includes various Check Point, Cisco ASA, Cisco ISE firewalls and Palo-Alto firewalls.
  • Configured ACLs, NAT tables and inter VLAN policies on PAN 5050 firewalls.
  • Designed MPLS VPN and QoS for the architecture using Cisco multi-layer switches.
  • Provided support for 2Tier and 3Tier firewall architecture, which includes various Check Point, Cisco ASA firewalls and Palo-Alto firewalls. current working knowledge of operational technology (OT/IT) and Industry Standards and best practices that are applicable to PCN or OT environments. Common secure network architectures used in PCN or OT environments as well.
  • Configure /Break fix and any known Infrastructure issues in Azure cloud and on hybrid Premises.
  • Served on project team tasked with planning and updating power, capacity hardware and other data center upgrades.
  • Worked in Data center environment with Cisco UCS 6200 interconnects Cisco UCS B-series Blades and Cisco UCS 5100 series blade server chassis and implemented RAC mounted servers
  • Configured Cisco 1000v switches for virtual VMware servers in the cisco UCS environment
  • Drive operational adoption of automation tools scripts / APIs, UCS Central, etc.
  • Configured ACLs, NAT tables and inter VLAN policies on PAN 5050 firewalls.
  • Experience with web application vulnerability scanning tools
  • Analyzes telecommunications problems and needs (e.g. VoIP (SIP), intelligibility, clarity, etc.) to determine the most appropriate means of reducing, eliminating and/or avoiding current and future problems and improving communications.
  • Configured AWS Identity and Access Management (IAM) to securely manage AWS users & groups, and use policies & roles to allow or deny access to AWS resources.
  • Resolved the and collaboration gaps are barriers in most enterprises with the help of NetBrain.
  • Experienced in driving and implementing secure development practices in to SDLC (SSDLC)
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto firewalls (5050).
  • Configuration of Palo-Alto PA 5000 series firewalls for outbound traffic via Blue Coat proxy server.
  • Worked on Gaia Versions 77.10, 77.20, R65 implementing new and additional rules on the existing firewalls for a server refresh project.
  • Profound experience in Data center migration, Sound knowledge migrate data center from Checkpoint R77 to Palo alto and vice a versa.
  • Creating migration policies implementing to server.
  • Working on SOC tier II and tire III, IT department and security Engineer.
  • Troubleshooting and Configuration of Cisco ASA 5580, 5540, FWSM, firewalls for all the agencies connecting to Citynet. And with the help of NetBrain provided Network security and error free paths
  • Managed all network and devices including Cisco routers (ASR 9000), switches, VPNs, SSL, Check Point, Cisco PIX, Cisco ASA, Cisco FWSM as well as content delivery networks (F5 Big IP LTM, ASM, APM and GTM 1600 and 3400 load balancers) enterprise environment.
  • SIEM tuning and log analysis of alerts
  • Hands on experience in installing, configuring, maintaining, and troubleshooting Cisco Switches, Cisco Routers, Juniper EX Switches, Juniper Routers and Cisco Nexus Switches.
  • Involved in configuring Juniper SSG-140 and Check point firewall
  • Pleasant experience with the Juniper firewalls.

Confidential, NYC, NY

Sr. Network Security Engineer

Responsibilities:

  • Staged firewall rules in Check Point smart dashboard during the day time to install during window time.
  • Configuration and Maintenance of Check Point R65, R75.40 Gaia Firewalls.
  • Configuration of ACLs in Cisco 5580 series ASA firewall for Internet Access requests for servers in LAN and DMZ and for special user requests as authorized by management.
  • Monitored firewall logs in Check Point smart view tracker and captured packets in command line during troubleshooting.
  • Responding appropriately to Service Request and Incident tickets created by the Network Operation Center personnel and other different teams including Data Backup, Data Storage, Microsoft Exchange
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX SSL Security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Worked on the project of F5 LTM, ASM, APM and GTM code upgrade.
  • Implemented proxy rules in Bluecoat Proxy SG using Blue Coat director.
  • Implemented and Maintained Routing Protocols EIGRP, BGP and OSPF in the Network.
  • Provided support for 2Tier and 3Tier firewall architecture, which includes various Check Point and Cisco ASA firewalls.
  • Responsible for security assessment of Cisco ASA 5500-X series Next-Generation Firewalls, IDS Sourcefire.
  • Configure Deploy, and Troubleshoot Greenville Health System's Wireless Network utilizing Cisco WCS, wireless.
  • Uses network infrastructure tools (CA Spectrum, Solar Winds IPAM, TCPDump, Packet Capture, Wireshark) for troubleshooting, isolation and corrective action of network outages.
  • Expert working knowledge including the ability to setup, configure, upgrade, manage and troubleshoot Cisco routers, switches, VPN concentrators, firewalls, 802.11 wireless access points and load balancers.
  • Datacenter upgrade project utilizing Cisco Nexus datacenter switches (Nexus 7000, 5000, and 2000) utilizing best practice design (multiple VDC, vPC, VPC+ VRF Fabricpath, OTV, FEX, UCS FI etc).
  • Experience configuring and troubleshooting on Citrix NetScalar Load Balancer.
  • Experience on a mesh 6500 and 5500 series routes and switches to support the core trading system.
  • Integration, Testing, Verification and Software upgrade of Ericsson's Multi Server Proxy (MSP) Solution in AT&T's Core Network for optimizing HTTP, MMS and video traffic.
  • Providing ongoing customer support throughout implementation as well as driving new solutions development for MSP.
  • Maintained wireless IPS infrastructure and coordinated with management, customers and peers regarding wireless network innovations.
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access, Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Configuration, Troubleshooting and Maintenance of Palo alto Firewalls PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series
  • Design, Review and implement of IT security devices (SOC),
  • Configurations of telecommunications hardware and software to ensure the desired performance of telecommunications equipment.
  • Adding security policies and security rules on checkpoint and ASA firewall.
  • Implemented and Maintained Routing Protocols EIGRP, BGP and OSPF in the Network
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Provided Load Balancing towards access layer from core layer using F5 Network Load Balancers (LTM, ASM, APM and GTM) .
  • Profound working experience on some Network Management tools like Infoblox and Qradar.
  • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Performed Switching Technology Administration including VLANs, inter-VLAN Routing, Trunking, STP, RSTP and Port Aggregation & Link Negotiation.

Environment: Firewalls ASA, MPLS, VPN, iRules, Nodes, Pools, VIPs, Monitors, SSL profiles, SAN Wireshark, SolarWinds, WNMS, OMCR, L3 Support, Checkpoint, Cisco ASA, DNS Server, IDS/IPS, NATs, IPSEC, SSL, ACL. STP/VTP/VLAN, BGP, OSPF, static routers.

Confidential, Houston, TX

Network Security Consultant

Responsibilities:

  • Designing, Implementing and Troubleshooting Cisco 3750, 3550, 3560, 2924, 6509-V-E, 6513, 6504, 6503, 6506, 6500 series switches, GSR, ASR routers with Cisco IOS and IOS-XR.
  • Worked on 2600, 3500, 7613, ASR 9000 Cisco Routers and 4500, 6500 and ASR9000 series Cisco Switches.
  • Supported core network consisting of Cisco 7200 series routers running multi area OSPF.
  • Worked on 2600, 3500, 7613 Cisco Routers and 4500, 6500 and ASR9000 series Cisco Switches.
  • Fine tuning of Firewall policies based on Information security policy.
  • Implemented and Maintained Routing Protocols EIGRP, BGF and OSPF in the Network.
  • Implemented SCADA, DCS, programmable logic controller (PLC), HMI, remote terminal unit (RTU) or related industrial control systems
  • Performed data center engineer functions related to day to day support of mobile messaging applications subscribed to by customers in many countries. Some support activities were off hours as well as intra-day in support of internal and external customer requirements.
  • Designed and deployed Partner IPSEC VPN tunnels.
  • Secured network access with Cisco Secure (RADIUS/ TACACS+) and Configured network access servers for AAA Security
  • Configured Remote User VPN, Site to Site VPN, and Remote Access VPN, Easy VPN, SSL VPN for Client based and Clientless applications.
  • IOS upgrading of 1900, 2900, 3500 series Cisco Catalyst switches and 2500, 2600, 3600, ASR 9000 series Cisco routers using TFTP
  • Good Experience in Troubleshooting and monitored routing protocols such OSPF, EIGRP & BGP.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA(TACACS+ & RADIUS).
  • Worked on Check Point cluster and installed policies on the multiple context environment.
  • Implementation and configuration of VPN Tunnels.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Implemented Network packet level monitoring using Wireshark, Solarwinds.
  • NAC products test against the NIH requirements, helped draft a Test/Evaluation plan, set up lab to test all 3 products. Documentation of test results. Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay)
  • Used Reverse-proxy Firewall for the smooth flow of the traffic between clients & Servers.
  • Offered users with wireless network technical support and handled indoor and outdoor site surveys.
  • Developed Python scripts to automate audit and analysis. Configuring site to site to VPN connectivity.
  • Maintained and configured all Extended Access Lists securing VLAN 802.1q trunks to W2003/8 servers, STP, OSPF, Port-Channels, Classes, Group, Objects, Load-Balancing, ACS, Wireless
  • Remotely configured the Network. In-depth Knowledge of Ipv4
  • Profound working experience on some Network Management tools like Infoblox, Qradar, and Solar wind
  • Upgrading Imperva WAF (Web application firewall) and fixing hot fixes and patches

Environment: Cisco 6500/5000/4500/3500/2950 switches, Arista 7k, Fortinet 60D, Cisco 7600/7200/3800 routers, EIGRP, RIP, VTP, RSTP, OSPF, TFTP, Tcpdump, NetMRI, Wireshark, Cisco EMAN, NetQOS, SAN, Firesight, Firepower, Alcatel-Lucent, Nagios, Nexus 5k and 7k switches.

Confidential

Network Engineer

Responsibilities:

  • Participated in planning, designing, installing and configuring new Firewall policies.
  • Created and tested Cisco router and switching operations using OSPF routing protocol, Cisco ASA Firewalls, and MPLS switching for stable VPNs.
  • Responsible for Data center operations, monitoring and maintaining the network devices 24/7.
  • Supported core network consisting of Cisco 7200 series routers running multi area OSPF.
  • Worked on network-based IT systems such as racking, stacking, and cabling
  • Managed service providers/vendors relationships from a project and technology perspective.
  • Worked with the basic communication protocols like TCP/IP.
  • Proactively monitored including a weekly review of log files, reports, weekly Knowledge Base updates, etc. to determine the health and performance of Secures appliances.
  • Worked on Routing and Switching issues including BGF, OSPF, RIP, VLAN's.
  • Design and Implementation of VoIP & Data Networks for new buildings, expansions, and remodels at a company platform.
  • Implement telecommunications systems (e.g. voice, network, data, outbound dialers, etc.).
  • Performed IP address planning, designing, installation, configuration, testing, maintenance, and troubleshooting in complete LAN, WAN development.
  • Profound working experience on some Network Management tools like Infoblox, Qradar, Solar wind, HP Open view.
  • Implemented and Maintained Routing Protocols EIGRP and OSPF in the Network.
  • Configured and Maintained the Local Network using 2900, 6500 series Switches and 2800 series Routers. Configured and installed the 3600 series Router.
  • Implemented strategies for operating systems, virus protection, mail systems and Internet Access services
  • Performed scheduled Virus Checks & Updates on all Servers & Desktops.
  • PowerShell scripting and execution for account termination, Distribution List creation, Security Groups
  • Resolved all computer related problems, monitored and maintained system functionality and reliability by identifying ways to prevent system failures
  • Created and implemented filters on the Routers for security purposes.
  • Installed and managed network devices including Hubs and Switches.
  • Provide hardware and software support to end users

Confidential

Network Administrator

Responsibilities:

  • Configured OSPF and BGP on Juniper M and MX series Routers.
  • Security policy review and configuration in Palo Alto and Junipers Firewall in US offices and Datacenter
  • Racking, Stacking, configuring, Nexus 5K and 2K and 7K.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
  • Configuring ACL on ISE for making policies.
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
  • Scripting experience with Perl.
  • Configured networks using routing protocols such as RIP, OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure.
  • Implemented Hot Standby Router Protocol (HSRP) by tuning parameters like preemption.
  • Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LANs of network.
  • Responsible for day to day management of Cisco Devices, Traffic management and monitoring.
  • Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.

Environment: CISCO routers and switches, Routing (RIP, OSPF, EIGRP, BGP), Access Control Server, Nexus (2k,5k, & 7k), VLAN, Trunk Protocols, STP, Ether-channel, Cisco ASA Firewall, Server environments (DHCP, DNS), MCSE

We'd love your feedback!