We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

Santa Clara, CA

SUMMARY:

  • Result driven IT Professional with 9+ years of hands on experience in Network engineering, designing, integrating, deploying, maintaining and supporting broad range of communication systems.
  • Experience in configuring/Troubleshoot issues with the following types of core routers like Cisco ( 12404, 12010, 7200, 6500, 3500 and 4500 Series), to include: bridging, switching, routing, Ethernet, NAT, and DHCP.
  • Experience in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Experience in deploying Wireless Network Infrastructure and Wireless Survey Best Practices Advanced knowledge in TCP/IP suite and IPAM, routing protocols, such as OSPF, EIGRP, ISIS, and BGP.
  • Experience in network protocols, Firewalls and Communication Network design.
  • Experience in monitoring, debugging, and resolving Cisco infrastructure issues like routing, Network Hardware/Software failure, configuration, WAN outages, and performance issues.
  • Experience in WAN technologies like MPLS, Frame Relay/ATM network, PPP, HDLC, T1, DS3, ADCCP.
  • Good knowledge on IP Addressing, Subnetting, VLSM, and ARP, Ping concept.
  • Good knowledge on OSI model, TCP/IP, 802.1q
  • Experience in performing system administration for Red Hat Linux, Microsoft Windows 2008 Enterprise Server, Windows 2003 Standard/ Enterprise Server, Windows 2000 Standard/ Advanced Server, Windows98/XP/Vista/7.
  • Experience in working on latest cisco switches like Nexus 2000, 5000, 6000 and 7000 series switches while implementing advanced features like VDC, VPC, OTV and Fabric Path.
  • Skilled in Harmonic CTO office to architect next gen broadband technology/DOCSIS remote Phy solution.
  • Skilled in troubleshooting skills using Packet capture in Cisco devices and FW monitor and TCP dump in Checkpoint devices and analyzing them in Wireshark& NetScout.
  • Experience in configuring and Troubleshooting BIG - IP F5 load balancer LTM & GTM.
  • Experience in design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480).
  • Experience in developing, implementing, auditing Checkpoint firewall (R77.30)
  • Experience in creating Visio diagrams, LLD, HLD and runbooks for datacenter and branch networks.
  • Excellent interpersonal, communication and organizational skills with the ability to interact effectively with employees at all level of the organization.

TECHNICAL SKILLS:

Routing Technology: RIP, RIPV2, IGRP, EIGRP, OSPF, BGP, TCP/IP, Static and Dynamic Routing

Network Products: CISCO Routers 1700, 1800, 2500, 2600, 2800. CISCO High End Routers 3600, 3800, 7200, 12010, 12404. CISCO Switches 1900, 2950, 2950, 2960G. CISCO Campus Switches 3550XL, 4948 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507, Nexus 5000 Series

Antivirus & Endpoint protection: Cisco CSA, Symantec Enterprise Edition, MacAfee Enterprise Edition

Security & VPN: PIX 500 Firewall, ASA 5505 Firewall, AIP SSM, CSC SSM, FWSM, Fortigate, Cisco CSM, ACL-Access Control List, IPS/IDS, NAT, PAT, Cisco ACS, Juniper NetScreen firewall, Palo Alto Firewalls, Windows Patch Management (WSUS)

LAN Technology: Workgroup, Domain, HSRP, DNS, DHCP, Static, VLAN, STP, VTP, Ether Channel, Trunks

WAN Infrastructure: Leased Line, ISDN/Dial-Up, Frame Relay circuits, Metro Ethernet

WAN Technologies: HDLC, PPP, ATM, SONET, MPLS, VPN, IPsec-VPN

Wireless & WiFi: Canopy Wireless Device (point to point/point to multipoint), DLink Wireless (point to point), DLink Access Point, CISCO 1200 series Access Point, and Linksys Wireless/Wi-Fi Router

Operating Systems & Tools: Cisco IOS, Open IDM, Windows NT 4.0 (Desktop/Server), Windows 2000/2003/2008 Server, Outlook 365 Administration Windows XP/Windows 7/8, LINUX, Solaris, Active Directory, Apache Server, MS Exchange server, Tufin, AlgoSec, Skybox, Identity Access Management, GRC, Veritas Volume Manager, Amazon EC2, Rackspace, Microsoft Azure

PROFESSIONAL EXPERIENCE:

Confidential - Santa Clara, CA

Sr. Network Security Engineer

Roles & Responsibilities:

  • Designed and support the consolidation of data centers utilizing Cisco 6500, Nexus 2K, 5K and 7K infrastructure.
  • Configure and maintain all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.
  • Worked on all software blades of Check Point Firewall. 24x7 on-call step-up support as a part of the safety operations team.
  • Worked on knowledge center management to investigate the information center sites for cabling necessities of assorted network instrumentation.
  • Worked on convert Palo Alto VPN rules over to the Cisco ASA solution. Migration with both Palo Alto and Cisco ASA VPN experience.
  • Involved in application level redundancy and accessibility by deploying F5 load balancers long-term memory.
  • Responsible for design and implementation/migration from Cisco wireless platform to Aruba wireless platform.
  • Worked on Implementation and troubleshooting of 802.11a/b/g/n technology with primary focus on Cisco Unified Wireless Network /Configure Aruba wireless Controller 7210.
  • Worked on shell scripts for CPU usage, Memory consumption and number of I/O to collect performance stats and troubleshoot issues if needed on Red Hat Linux.
  • Worked on converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.
  • Worked in a team to perform functional and scalability testing of the various L2 (VLAN, VTP, RSTP, LLDP, CDP, LACP.) and L3 (OSPF, EGRP) protocols/features and system management testing and Multicasting.
  • Managed deployment and testing of code updates for wireless systems, such as Aruba ClearPass, Aruba 7210 Controllers, and Aruba Airwave.
  • Managed a TACACS server for VPN user authentication and network devices authentication.
  • Worked on Shell and TCL scripting for automation testing of client roaming with WPA2, Dot1x, EAPFAST with PEAP, LEAP authentication techniques with client burst joining and clients' access point flapping scenarios.
  • Worked on Palo Alto firewalls PA250, PA4050, PA3020, PA5020, PA5050 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.
  • Worked on network management of circuit's mistreatment TDM and Frame Relay Managing and providing support to numerous project groups with regards to the addition of recent instrumentation like routers switches and firewalls to the DMZs.
  • Worked on enterprise outages effectively and driving towards the resolution. Coordination of fault escalations in conjunction with the first high-level technical management of high priority or technically complicated calls.
  • Worked on network hardware and technologies including routers, switches, firewalls, Ethernet, Fast Ethernet, Gigabit Ethernet, Frame Relay and Wireless devices.
  • Worked on verification of DOCSIS upstream logical channels, proprietary RF spectrum management algorithms, system high-availability, etc.
  • Supported vendors with product and service requirements based on Charter business needs and internal customer requests.
  • Deploy, scale and automate network across multiple global datacenters supporting Amazon Web Services (AWS).
  • Efficiently handled a workload of nearly 60 Layer 3 MPLS VPN provision orders which included, MPLS network resource reservation & VPNV4, EBGP configuration checking, Troubleshooting of EBGP sessions with customer carriers in the MPLS cloud which is made up of routers Juniper and Cisco housed in different datacenters (Cisco 7609 and Juniper M320).
  • Used Cisco ACI Fabric which is based on Cisco Nexus 9000 Series Switches and the Cisco Application Virtual Switch (AVS).
  • Worked on implementing lab for SDN using Cumulus Linux for test-driving part of DC migration to SDN.
  • Coordinating, documenting and managing cases and routing support calls with the Tier 1, Tier 2, and Tier 3 Support engineers at HPE and AT&T.
  • Configured best route map configurations in the new Cisco IOS XR Routing Protocol Language (RPL).
  • Supported EIGRP and BGP supported the network by partitioning level two & three issues of internal groups & external customers of all locations.
  • Performed troubleshooting on slow network property problems, routing problems that involves OSPF, BGP and distinctive the foundation reason for the problems.
  • Design & build Software-Defined Data Center environment, including VMware, VCenter, NSX and Cisco ACI.
  • Worked on Ether Channel, Spanning Tree, Trucking, ACLs, Syslog. Expertise within the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.
  • Configuration of VLAN setup on varied Cisco Routers and Switches.
  • Worked on allotted tickets to see the purpose of failure and resolve issues remotely utilizing obtainable tools and different Operation Center resources.
  • Analyzed and tested network protocols (Ethernet, TCP/IP) mistreatment Wireshark tool.
  • Worked on different ISP globally for any WAN circuit and BGP routing problems. Gap up cases for cerium routers, river bottom optimizer problems.
  • Worked on intensify issues effectively so as to satisfy client SLA's (service level agreements).
  • Perform downside management and root cause analysis for purchasers pro re nata.
  • Effectively used Microsoft VISIO/Office as technical documentation and presentation tools.
  • Configured Windows Clusters, Windows NLB, H/W Load Balancers (F5, NetScaler). Deployed, configured and troubleshooting runtime errors related to .Net applications on 7.0/7.5 Web Servers and Windows Server 2008/2008 R2 in Dev, QA & Pre-prod environments.

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, PPP, VPN, Checkpoint, Cisco ASA, AWS, TCL, Clustered SQL server 2014/2012/2008 R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003

Confidential

Network Engineer

Roles & Responsibilities:

  • Managed and configuring Cisco Switches and Routers independently.
  • Provided Technical Support and solutions for Network Problems.
  • Worked on creating and managing user accounts to all team members in partner environment.
  • Managed VPN, IPsec, Endpoint-Security, status policy, and Application control, IPS, Monitoring, Anti-Spam, Smart Provisioning and DLP using Checkpoint Firewalls.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling.
  • Design, support and configure Cisco legacy wireless and WLSE networks and devices using Cisco Prime.
  • Worked on troubleshot WAN, LAN, security, access, and Cisco wireless connectivity using BBSM for guest wireless access and Sniffer software for troubleshooting, Cisco Works, HP OpenView, Tivoli or related tools.
  • Maintenance and configuration of Cisco ASR1000 series and 7200VXR routers at data center and deployment of 3900, 3800, 2951 and 2821 for branch connectivity.
  • Configuring and implementing F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic.
  • Used troubleshooting and configuring terminal servers.
  • Worked on cisco switches and routers: IP addressing, WAN configurations, LAN cabling in compliance with CAT6 standards.
  • Implementation of Active Directory infrastructure and Network fundamentals, protocols (such as TCP/IP, DHCP, DNS), Group Policy and Profile Management.
  • Configured and troubleshooting link state protocols like OSPF in multiple areas.
  • Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Configurations of SSL/VPN connections, troubleshooting CISCO ASA firewalls, and related network security measures.
  • Involved in complete LAN, WAN, Extranet redesign (including IP address planning, designing, installation, pre-configuration of network equipment, testing, and maintenance) in both Campus and Branch networks.
  • Configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Extensively worked on Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Configuring ASA Firewall and accept/reject rules for network traffic.
  • Designing, implementing LAN/WAN configurations on Cisco 5K, catalyst 6500 switches.
  • Modify and implement ACL changes on store routers and assist the user when there are any issues using Network Authority. (Authentication to this is also done through TACACS).
  • Maintenance of layer2 switching tasks which advocate VLAN, VTP, STP, RSTP, PVST, RPVST, configuring of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.
  • Performed Network Security Assessment and implemented security improvements such as network filtering, SSH, AAA, SMTP, SNMP access lists, VTY access lists, EIGRP MD5 authentication, and HSRP authentication
  • Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
  • Worked on packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems.
  • Worked on Cisco ISE to prevent unauthorized access to the network.
  • Cisco ISE supports AAA, 802.1X and mobile device management.
  • Deployed and maintained routing protocols such as OSPF, EIGRP, BGP, GRE, MPLS/VPN, HSRP and static routes on Cisco routers and switches and Juniper routers
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Deploying Service Packs and Security patches bi-monthly on BGIT Application servers (Product Studio and VSTFS)., which include windows 2008, 2012 R2 and MS SQL server 2008 and 2012R2 Servers
  • Implementing, configuring, and troubleshooting various routing protocols like RIP, EIGRP, OSPF, and BGP.
  • Integrate with business owners and Scheduled Windows servers patch using patch management and install Windows service pack.
  • Performing network monitoring, providing analysis using various tools like Wireshark, Solar winds.
  • PCI compliance responsibilities; provide all documents, Configs, diagrams for PCI audit.

Environment: Cisco Switches - 2948/3560/4500/3560/3750/3550/3500/ and Cisco routers - 1200/3640/7200/3845/3600/2800, Cisco Nexus 7K/5K, Cisco ASA 500, Cisco ISE,ACS, F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP,TCL, SQL Server 2005 Integration Services Packages

Confidential - Seattle, WA

Network Security Engineer

Roles & Responsibilities:

  • Daily analysis off network traffic for trends and or malicious activities, created vulnerability report with action plans.
  • Primary responsibility for the Core Security of the Network. Managing the entire Network Security Products deployed in the network such as Checkpoint (GAIA R 75.40/77.20 ).
  • Configuring VLAN, Spanning tree, VSTP, SNMP on Juniper EX series switches.
  • Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
  • Worked on Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering)
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/Switches/firewalls.
  • Worked on converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.
  • Ensured all team members understand and are onboard with the SOC mission statement and goals.
  • Ensured the team has quarterly/annual objectives and goals.
  • Ensured the team performs quality analysis of security events via routine audits/coaching.
  • Ensured the team provides customers accurate and insightful analysis of security events in a timely manner.
  • Ensured all team members providing top notch customer service via routine audits/coaching.
  • Ensured all work within team is being recorded in a work order, copiously notated, and ensuring the requests are addressed in timely fashion.
  • Ensured SOP processes and procedures are accurate, efficient, update-to-date, and scalable.
  • Evaluated the capabilities of McAfee Network Access Control by constructing checks and benchmarks for McAfee products, WSUS servers, Internet Explorer proxies, and encryption status alerts.
  • Deployed VMs in Windows Azure for testing in SIT & QA environments.
  • Created VMs with SQL Server 2012 in Windows Azure for QA test requirement. Utilized the existing VMs VHDs for build VM for Dev Apps in Windows Azure.
  • Used AD Domains and Virtual Networks in Windows Azure test environment.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Plans, coordinates, implements and supports the LAN / WAN hardware, software and Internet /Intranet integration network connectivity, diagnose network failures and resolve any problems.
  • Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
  • Provide support and for 2Tier and 3Tier firewall architecture, which includes various Checkpoint, Cisco ASA firewalls and Palo-Alto firewalls.
  • Configuration of Checkpoint R77.30 series firewalls and implementation for outbound traffic via blue coatproxy server.
  • Worked on technical performance of advanced services (telephony, high speed data, and the hybrid-fiber coaxial plant). F5 LTM: Configuration, Solution Designing and Managing F5 BIG IP LTM Load Balancer
  • Worked on level-2 team on migration project of CMA's from one Provider-1 to other Provider-1.
  • Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1.
  • Used McAfee ePolicy Orchestrator to monitor and identify potential intrusions and attacks for the Cyber Security Operations Center (CSOC).
  • Deployed a Syslog server to allow proactive network monitoring.
  • Implemented VLANS between different departments and connected them using trunk by keeping one VLan under server mode and rest falling under client modes.
  • Built and support VRRP / Cluster based HA of Checkpoint firewalls.
  • Worked on Checkpoint Platform including Provider Smart Domain Manager. Worked on configuring, managing and supporting Checkpoint Gateways.

Environment: VSTP, VRRP, SNMP, VLAN, WAP, UNIX, Linux, F5 Load Balancer, FTP, BPDU Guard, Wi-Fi, CSOC, WSUS, ASR9000 Devices, Check Point Firewall (GAIA R 75.40/77.20 ), VPN, Palo Alto Firewalls, Juniper Firewalls, NATing

Confidential - Seattle, WA

Network & Security Engineer

Roles & Responsibilities:

  • Provide initial fault isolation, proactive maintenance and monitoring of Company's Network Equipment.
  • Perform monitoring and support of internal network security.
  • Provide support to internal users and external clients on various hardware and software issues.
  • Designed and implementation of Active Directory& Conversion of local file and print servers in remote offices; maintenance of the Active Directory infrastructure.
  • Implemented rules on Juniper SRX 550 at the server farm.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Worked on Network Security management platforms like Junos Space and Palo Alto Panorama.
  • Provided firewall policy configuration and services with Juniper SRX 240 & 650 service gateways.
  • Understanding the JUNOS platform and worked with JUNOS upgrade of Juniper devices.
  • Installation & Configuring of Cisco 6500, 4500, 2800, 1800 and 1700 series router.
  • Configure and troubleshoot VLAN, VPN, VTP, STP and Trunks.
  • Installed and configured DNS, DHCP Client/Server.
  • Extensively worked on Cisco Firewalls, Cisco ASA 5500(5510/5540) Series.
  • Worked on F5 and Brocade ADX series load-balancer and Nexus series switches.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures.
  • Used Network design, Installation, troubleshooting and suggesting them suitable backup system.
  • Worked on Juniper J series j230, M 320 routers and EX 3200 series switch.
  • Building configurations for Juniper EX 3300 and EX 4200 switches with features like port security, VLANS, VTP, and PVST+.
  • Involved in writing iRule syntax using TCL language and also in rule management such as loading rules.
  • Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
  • Configuring various advanced features (Profiles, monitors, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
  • Worked on physical and virtual networks to provide functionality on additional layers on VMware NSX.
  • Monitoring servers like domain controllers, exchange servers and connectivity.
  • Managed network connectivity and network SSL Security, between Head offices and Branch office
  • Responsible for Internal and external accounts and, managing LAN/WAN and checking for SSL Security Settings of the networking 3750 devices (Cisco Router, switches) co-coordinating with the system/ Network administrator during any major changes and implementation.
  • Created subnets (on these switches) from the given Class B and Class C addresses to support the VLANs.
  • Gathering application information which are using Splunk tool and analyze their bandwidth traffic.
  • Responsible for developing and deploying Solar Winds which includes WAN/LAN and server monitoring reporting, and alerting and Configure Orion alerts.
  • Implemented inter-VLAN routing (on Juniper EX 3300 and EX 3400 switches) among the VLANs to allow Communication on larger internetworks.
  • Implemented extended ACLs on Juniper SRX and 3750 to allow communication between the required networks, and to restrict other communications.
  • Monitored system logs and root's email for important messages such as errors and warnings or hardware failure errors.
  • Troubleshooting problems pertaining to Performance Tuning, Network Administration and Application Conflicts.
  • Worked on architecting and configuring secure VPC through private and public network in AWS.
  • Troubleshoot on security related issues on JUNIPER SRX/PIX, Checkpoint and IDS/IPS.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
  • Monitored MS SQL Server for performance and network issues.
  • Created and Rebuild the Clustered & Non-Clustered indexes at regular intervals for better performance.
  • Installed SQL Server service packs based on the errors and flaws that are found in the application.
  • Deploy, scale and automate network across multiple global datacenters supporting Amazon Web Services (AWS).

Environment: Router series (2800, 3800, 7200) and switch series (3750, 3550, 4509E, 6509E), SRX 550firewall, Palo Alto (PA-5000/PA-4000/PA-2000), Juniper EX, Routing Protocols (EIGRP, OSPF, BGP), Switching protocols (VTP, STP), Site to Site VPN, Remote Access VPN

Confidential

Network Engineer

Roles & Responsibilities:

  • Created and designed network layout as well as documented network system design with detail information using Visio.
  • Performed IOS upgrades/Password recover on 2900, 3500 series Cisco Catalyst switches and 1800, 2600, 3600 series Cisco routers using TFTP.
  • Responsible for Cisco ASA firewall administration across global networks and for check points.
  • Implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, and Ether channel, STP, RSTP and MST.
  • Configured STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.
  • Configured Cisco IOS Feature Set, NAT and samples Network management protocol (SNMP) for Network security implementation.
  • Involved in troubleshooting aspects of complex network infrastructure using routing protocols like EIGRP, OSPF and BGP.
  • Implemented redundant load balancing technique with internet applications for switching and routing.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
  • Support Network Technicians as they require training & support for problem resolution including performing diagnostics & configuring network devices.
  • Documented the company's design, implementation and troubleshooting procedures.
  • Performed routine network maintenance checks as well as configure and manage printers, copiers, and other miscellaneous network equipment.
  • Performed scheduled Virus checks and updates on all servers and desktops.
  • Worked on maintaining and troubleshooting RIP, OSPF and EIGRP routing protocols.
  • Configured RIP and EIGRP on 2600, 2900and3600 series Cisco routers.
  • Implemented VTP and Trunking protocols (802.1q and ISL) on 3560, 3750 and 4500 series Cisco Catalyst switches.
  • Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, Frame relay, NAT, DHCP, TCP/IP).
  • Configured Access List (Standard, Extended, and Named) to allow users all over the company to access different applications and blocking others.
  • Configured STP for loop prevention and VTP for Inter-VLAN Routing.
  • Troubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment.
  • Worked on network-based IT systems such as Racking, Stacking and Cabling.
  • Designed and deploying solutions for frozen requirements using Cisco Routers and Switches for the network infrastructure to meet the requirements.
  • Provided technical support on hardware and software related issues to remote production.
  • Troubleshoot problems on a day to day basis and documented every issue to share it with design teams.
  • Configured ASA 5525, 5540 and 5550 to ensure high-end security on the network with ACLs and Firewall.
  • Used AWS cloud services like EC2, S3, RDS, ELB, EBS, VPC, Route53, Auto scaling groups, Cloud watch, Cloud Front, IAM for installing configuring and troubleshooting on various Amazon images for server migration from physical into cloud.
  • Worked on Nexus platform7018, 5K series (5548, 5020 and 5010) and FEX (2248, and 2232) and deployed VPC, VDC and OTV and successfully implemented VSS on the Cisco switches.
  • Deployed catalyst switches 6500, 4508, 4500 and 3750 in the distribution and access layer.
  • Implemented a VoIP and hoc network with SIP Proxy Server and multiple Clients, capturing the Installed and maintained Wireless Access Points throughout the building.
  • Configured and managing layer-2 technologies like VLANs, STP, VTP & port-security.
  • Provided technical assistance for LAN/WAN management & troubleshooting complex client issues.
  • Used internal network monitoring tool (Solar Winds) to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption.
  • Implemented VLANS between different departments and connected them using trunk by keeping one VLAN under server mode and rest falling under client modes.
  • Performed RIP, OSPF, EIGRP routing protocol administration.
  • Worked with the data center planning groups, assisting with network capacity and high availability requirements.
  • Configured networking with route tables, access control lists, firewalls, and NAT, HTTP and DNS
  • Monitored data flow and troubleshooting in wireless systems for multiple clients using the cisco ISE platform and also configuring a small wireless system for VOIP and wireless activity.
  • Implemented and execution of new and/or upgraded networking systems through well-defined plans, procedures, documentation, deadlines and accountability.
  • Switched related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.
  • Implemented security migrations from Cisco ASA firewalls to Pa 5000/3000 series firewalls
  • Involved in providing access to user machines and partners outside our network by SSL and IPsec VPN tunneling.
  • Performed monitoring of various applications and web servers to maintain quality of service and network stability.

Environment: Catalyst Switches - 3750, 4500, 4508, 6500, Cisco Routers - 2600, 3600, 7613, Switches - 3750, 4500 and 6500 series and Cisco Firewall ASA 5585-X, Solar Winds, Checkpoint Firewall, Routing Protocols (EIGRP, OSPF, RIP), Switching protocols (VTP, STP, GLBP, HSRP)

Hire Now