Cyber Security Specialist Resume
Washington, DC
SKILLS:
- QFX, VCF, palo alto NGFW
- JUNOs
- Cisco IOS
- Network Engineering
- Project Management
- Network Security & Implementation F5 Big - IP
- Network Operations
- SDLC
- ScreenOS
- Business System Analysis Requirements Engineering
- Technology Management
- Carriers Network Infrastructure Load Balancing
- Management of Virtual Team
- Security Mitigation (CERT)
- Telecommunications Technologies
TECHNICAL SKILLS:
Juniper Network Platform: Space (Network & Security Director), NSM, M series, MX Series, QFabric, EX4500, EX2200, vSRX, SRX-5600, SRX-5500, SRX-240, SSG, F5 LTM (appliances & VE)
Cisco: 7606, 6500
Network Operating Systems: Network Security Manager (NSM), F5 Big-IP (TMSH), JUNOs, ScreenOS, Cisco IOS, Packet Capture and Analysis with Wireshark, Network and Protocols tester (IXIA), TCPDump.
Network Monitoring Tools: EM7, HPOV
WAN: MLPPP, DS-3, T1, OC-3, OC-12
Routing Protocol: (OSPF, Confidential, MP- Confidential ), MPLS, VRF, Policy based routing, ACLs, RSVP, LDP, L2 and L3 VPNs
Layer 2 Protocols: LACP, Etherchannel, Spanning Tree, IRB, 802.1q
WORK EXPERIENCE:
Cyber Security Specialist
Confidential, Washington, DC
Responsibilities:
- Implementing Cloud enabled applications and services on virtualized systems which includes network, and security services, servers, host VMs. Working in DevOp environment to deploy cloud services through vCenter (VMWare) and VDI environment, Nutantix, Juniper Space and Security Director, Juniper HW, Juniper vSRX, Panorama, Palo Alto NGFW, WildFire, Windows, Active Directory, Linux, F5 LTM / GTM, and any other virtualized system and services.
- Deployed resource group(s) on VMware ESXi host to include virtual NGFW, Active Directory Services, Load Balancers, microsegmentation, policies framework for East - West, North-South, inter resource group communications, and Internet services. Implemented load balancing and global availability using F5 VE LTM and GTM.
- Implemented Threat Prevention or IPS using Juniper Security Director (Threat Policies & SkyATP), Palo Alto NGFW (Threat Prevention, Virus Protection, URL filtering, and WildFire)
- Work in agile development cycle using Kanban board (Jira).
- Plan and develop backlogs of Epics which includes Stories (tasks).
- Collaborate with team members on board and work through stories in Sprint.
Sr. Network Engineer
Confidential, Silver Spring, MD
Responsibilities:
- Analyze legacy network and virtualized systems and provide baselined documentation of existing network (switching, routing, security - zone, and load balancing systems), redesign and implementation NWSTG network - utilizing Juniper QFX3500, EX4500 and EX4200 series as L2/L3 core and access switches (10 GigE, 1 GigE, and 1 GigE copper).
- Implement as edge router using MX-80s with Confidential peering(s) on multiple VRF and routing-instance with policy routing, utilize SRX-5600 as firewall cluster, configuration of routing -instance, security zones, security policies, NAT (Source, Destination, and Static), deploy F5 Big-IP as load balancer, implement high availability (HA) on aggregation switches an access switches using Virtual Chassis, HA on firewall with SRX-5600 cluster (Active/Standby), and HA on load balancer using F5 LTM to host server farm with aggregated Gigabits interfaces and high availability. F5 LTM provides load balancing for database servers, web servers, mail servers, and FTP servers, utilize F5 Local Traffic Manager (LTM) features such as Persistence, SNAT, Failover, and custom monitors.
- Provide support for F5 LTMs in two data centers and development including code upgrade and applying Hotfix. Work with security team by facilitate security scan by setting up port mirroring of hosts and/or network (Vlan) and provide access to the network for scanning purpose.
- Confirm and troubleshooting firewall implementations and issues on Juniper SRX-5600 and Netscreen 5400 - by setting of up flow filter, Port Mirroring /Analyzer (vlan or port), collect and analyze data using network sniffer (Wireshark).
- Support migration of virtualized systems and hosts to the new network by activated Vlan, ports, and assign interface into appropriate virtual routing-instance provide routing between routing instance, assignment interface to security zone, and create security policies based on traffic profiles. For JUNOs devices, implemented connectivity (routes) and security (policies) on NSM and CLI.
Business System Analyst / Project Manager
Confidential, Middletown, NJ
Responsibilities:
- System Project Manager and Lead System Analyst in support of Operation Support Services (OSS) for automation of test turn -up and troubleshooting of Confidential & Confidential Network and Service Offerings. This included project managements of all phases of development, (SDLC), assessment of system impact and providing estimation of project cost, requirement analysis and design, performing gap analysis (as needed) and providing necessary mitigation to keep project on track, author design documents for clients (users and interfacing systems).
- Implemented testing methodologies on new networking gears, and on Confidential & Confidential service offerings (MLPPP, VPLS, and Metro Ethernet) These included requirements for automated testing on DS-1 and DS-3 circuits, CPE, edge routers, PE routers and EGS routers (Juniper T640/M320 and Cisco IOS-XR), Metro Ethernet routers (Juniper MX 480/960), Network Terminating Equipment.
- Participated in review of Project Scope and system impact analysis, Engineering Design Review Document (EDRD), Field of Use (FOU), and Network Management Technical Process (NMTP) for network design and network services in Confidential & Confidential
- Tracked and participated in development testing, unit testing, system test, and pre-deployment test.
- Develop Functional Requirements (FR) and NFR for integrated diagnostic testing of Confidential & Confidential network services, which includes ATM/Frame Relay networks, Layer 3 IP network devices and services including MLPPP, DS-1 and DS-3 access, and Metro Ethernet (MPLS, L3/L2 VPN, VPLS, and Ethernet OAM 802.1ag and 803.3ah).
- Project Manage in area of analysis, requirement, design, development and testing of system software features, author interface agreement documents between systems (XML, WSDL, and Web services), authors technical requirement documents and test plans.
Sr. Network Engineer
Confidential, Arlington, VA
Responsibilities:
- Performed end-to-end testing of network services on edge routers including VOIP trunks for transport of TDM to IP, Layer 2 and Layer 3 VPN, customer access - Frame Relay (DS-3, DS-1) for data and voice services, implemented and integrated testing of L2/L3 network hardware and configurations in production lab, provided baseline configurations for network devices, certified networking hardware (Cisco/Juniper/Extreme) with new software code.
- Regression tested new code releases in production lab prior to deployment in productions.
- Mitigated security vulnerabilities, installed software patches and tested vulnerabilities against new codes on Juniper and Cisco network devices (JUNOs and Cisco IOS), provided Method of Procedure (MOP) for code upgrade, hardware installation, and modification configurations of routers in the production network to network operation personnel. Interfaced with vendors in evaluating hardware and worked with vendors in implementing test setup in the lab.
- Authored test plans, executed and documented test results, presented test results and recommendations to the managements, engineering team, network operation personnel, and implementation team.
- Designed network supporting Internet Service Providers (ISP) and partner ISP products and services, tested and certify networking products which includes Layer 2 and Layer 3 switches, Gigabit Ethernet switches, high-end router, and network access server, design IP network supporting SS7 signaling gateways over IP network, designed network supporting Cisco 5400 and Cisco 5800 for wholesale dial aggregation service (OSPF and Confidential ), utilized Confidential attributes for authentication, aggregate, load-balancing, and control inbound and outbound routes advertisements, established standard configuration for routers and switches for deployment, implemented load balancing for ingress of traffic into IP backbone on T3, OC-3 and OC-12 POS interface, performed traffic engineering for access network which included ingress into router/switches and egress into Confidential IP backbone, implemented L2TP for access to intranet via dial-up connection over public IP network, tested and validated network design in production lab, coordinated with network operation on network issues and regression testing of new code.
- Designed ATM/Frame Relay network for Confidential ATM/FR network transport and customer facing circuits, evaluated ATM switches, provided capacity planning for Confidential ATM/Frame Relay network backbone and customer's access, provided technical consulting to sale on customer network design, designed and implemented prototype of networking products that utilizing Confidential ATM/FR network, configured network prototype of new networking products and plan for product deployment, developed provisioning guideline for configuration ATM/FR physical ports, logical ports, circuits, NNI, and UNI, developed SLAs for domestic and international ATM/Frame Relay services, draft requirements for vendors for networking product (RFI), worked with vendors in evaluating networking equipment for Confidential ATM/IP network, coordinated implementation and worked with network operation team to ensure successful products deployment.
Confidential, Denver, CO
Network Engineer
Responsibilities:
- Utilized routing protocols such as OSPF, RIP, Confidential and configuration features on Cisco IOS, responsible for network planning and installation of LAN and WAN networks from data center, users' data jacks, network wiring closets, Layer 1, 2, and 3 connectivity and configurations as well as WAN connections to HQ via Frame Relay and ISDN DDR as backup, coordinated with engineers and technicians during all phases of installation, administered security policy on PIX firewall, implemented tunnels for remote office.
- Developed network end-to-end test plans and validated network components, performance, and connectivity prior to production, troubleshot networking issues involving switched Ethernet, token ring, WAN connectivity (Frame Relay, ISDN, leased line connection, and asynchronous connections), and firewall.
Confidential, Mclean, VA
Associate
Responsibilities:
- Implemented company-wide remote access service supporting client/server technology, maintained and administered UNIX/LINUX servers, administered Checkpoint FW-1 firewall policies, maintained and updated DNS registry, presented training to support personnel on new IT initiatives in Confidential & Confidential .
