We provide IT Staff Augmentation Services!

Sr. Security Engineer Resume

NashvillE

SUMMARY:

  • Certified Network professional with over 8 years of experience in Planning, Implementing, Configuring, Troubleshooting of networking system device.
  • Experience in the setup of OSPF, RIP, EIGRP and BGP routing protocols and tunnel installations.
  • Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches
  • Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.
  • Extensive hands - on experience with complex routed LAN and WAN networks, routers and switches
  • Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
  • Experience working on CISCO NEXUS data center infrastructure with 2000, 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2148, and 2248).
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.
  • Excellent knowledge of TCP/IP protocols IPV-4 and IPV-6.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks
  • Work as Layer 3 IP Network Engineer on ASR9k Edge router with IOS-XE Platform in a network lab environment.
  • Research and apply Cisco IOS-XE images to L3 Catalyst 3650 switches
  • Experience in physical cabling, IP addressing and Subnetting with VLSM, configuring and supporting TCP/IP, DNS, VOIP-Cisco Call Manager installing and configuring proxies.
  • Hands-on experience using Cisco Virtual Switching System (VSS).
  • Knowledge of advanced technologies like Multicasting, MPLS and MPLS-VPN
  • Design, configure, troubleshoot and implement wireless and/or data networking (LAN/WAN) solutions for mid-sized to enterprise-level clients
  • Worked on OTV to extend L2 VLANs between data centers over IP on Nexus 7010 switches
  • Research and apply Cisco IOS-XE images to L3 Catalyst 3650 switches
  • Supporting and running four Cisco catalyst Switches 4500, 6500, 3650, 3560, 3750 (inter VLAN routing and EIGRP)
  • Configuration of IPSEC, DMVPN and GRE tunneling technologies
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPSec/ GRE to GetVPN
  • Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing systems like remedy and Magic
  • Experience with DNS/DFS/DHCP/WINS Standardizations and Implementation
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.
  • Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol-based services
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
  • Troubleshooting of protocol-based policies on Palo Alto Firewalls and changing the policies as per the requirement and as per traffic flow
  • Implemented Zone Based firewall and Security Rules on the Palo Alto firewall
  • Successfully installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Installation, configurations and management Checkpoint firewall running on both Secure Platform and open servers
  • Worked on MX-80, MX-480, SRX-100, SRX-110, SRX-550 and EX-4200 Juniper routing devices
  • Administration of Juniper SRX and SSG series, Check Point VSX series, Cisco ASA series, Cisco PIX and Palo Alto Firewalls
  • Worked with several network engineers for the understanding of Juniper SRX firewalls along with the changeover to Palo Alto.
  • Security policy review and configuration in Palo Alto and Junipers firewall
  • Knowledge on Checkpoint VSX, Cisco ASA, Cisco PIX, Juniper SRX
  • Experience deploying BIG-IP F5 LTM, GTM Load Balancers for load balancing and traffic management of business application.
  • Setting up virtual servers and certificates for complete F5 Big-IP load balancers build, testing newly implemented project, and troubleshooting any issues.
  • Upgrading of the F5 load balancers both GTM and LTM from 10. version to 11.5.3 version
  • Managing data center and network by using solar winds, NPM, NTA, NCM and F5 load balancer and citrix load balancer
  • Access control server configuration for RADIUS & TACACS+.

PROFESSIONAL EXPERIENCE:

Confidential

Sr. Security Engineer

Responsibilities:

  • Working on to set up OSPF dynamic routing on Cisco ASA Firewalls by using and following their current network structure.
  • Experience in migration with both Checkpoint and Cisco ASA VPN and converting Checkpoint VPN rules
  • Installed Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series
  • Installation, configurations and management Checkpoint firewall running on both Secure Platform and open servers
  • Configured Checkpoint Firewalls Straight Out of the Box and deployed checkpoint Firewall rules and policies for the Datacenters.
  • Primary Installed and Configured Checkpoint Firewalls using Smart Console R75 and R70 and also to maintain, monitor and make production changes on R77.30 Checkpoint Firewalls
  • Expert in building configuring and deployment of F5 LTM load balancers (1500, 1600, 2000, i2600, 4500, viprion, etc.).
  • Worked on various OS upgrades (from 10.1.2 to 12.2.2 and above), hardware upgrades and intraplatform migrations from physical chassis to virtual hosts hosting stacked physical LTMs.
  • Comprehensive elementary configurations on the F5 Big-IP LTMs load balancer on prevailing network to divide traffic on web-servers
  • Currently working on implementing F5 ASM WAFs by studying the in-prod security policies (mode type) and the threat logs to minimize the encounters in future implementations.
  • Experience in working with Qualys threat vulnerability management, performing weekly network asset scans and generating threat reports & performing remediation. Also carried out asset management.
  • Working on MacAfee antivirus ePo deployments and OS upgrades
  • Day to day tasks involve working with palo altos on incident requests which involve t-shooting issues that include VPN, configuration, routing, etc. and change requests that include adding/ modifying security policies, rules, build/ deployment of firewall hardware upgrades, code upgrades, etc.
  • Experience in the setup of OSPF, RIP, EIGRP and BGP routing protocols and tunnel installations, trouble-shooting both connectivity issues and hardware problems on Cisco based networks
  • Proficiency in configuration of VLAN setup on various Cisco Routers and Switches, complex routed LAN and WAN networks
  • Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches along with CISCO NEXUS DC infrastructure with 2000, 5000 and 7000 series switches.

Confidential, Nashville

Security Engineer

Environment: Cisco Routers & Switches: 3500, 4500, 5000, 7000

Responsibilities:

  • Experience in configuring all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) and Supporting Panorama Centralized Management for Palo Alto firewalls to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration
  • Expertise in configuring and troubleshooting of Palo Alto, Juniper Netscreen & SRX Firewalls and their implementation.
  • Security policy review and configuration in Palo Alto and Juniper SRX Firewall in Confidential .
  • Implemented Zone Based Firewalling, NAT/PAT, wrote Access-list policies on protocol-based services and Security Rules on the Palo Alto Firewall, configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs and provided L3 support for routers/switches/firewalls
  • Configured and maintained IPSEC on PA-5050 Palo alto Firewalls.
  • Policy audit, Policy reviewing and cleanup of the un-used rule on the palo alto firewall using Tufin.
  • Implemented many number of security policy rules and NAT policy rules on palo alto, created Zones, palo alto Firewall interface and VLAN.
  • Hands on experience in configuring Checkpoint R7 .30
  • Configured Checkpoint Firewalls Straight Out of the Box.
  • Primary responsibility is also to maintain, monitor and make production changes on R77.30 Checkpoint Firewalls
  • Installed and Configured Checkpoint Firewalls using Smart Console R75 and R70
  • Worked on monitoring tools such as SOLARWINDS, WIRESHARK, Net Qos.
  • Experience in migration with both Checkpoint and Cisco ASA VPN and hands-on experience with converting Checkpoint VPN rules over to the Cisco ASA solution.
  • Configured Access lists (ACL), Monitored and Troubleshot Cisco's ASA Security appliances on ASA firewall for the proper network routing and experience with convert PIX rules over to the Cisco ASA solution along with migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Configuring, testing, troubleshooting multiple vendor device platforms like Cisco routing and switching: Cisco ASR9010, ASR901, ASR903, Catalyst Cisco 7609, 2960, and Juniper routing and switching devices: MX960, MX 480 and SRX5200
  • Implemented site to site VPN in Juniper SRX as per customer.
  • Expert in F5 Networks configuration, troubleshooting, installations, maintenance of devices such as LTMs, GTMs, Load Balancers, DNS/DHCP services and perform regular upgrades and patch work
  • Creating and implementing high availability, Virtual Servers, Nodes, Pools, Iapps and Irules on BIG-IP F5 in LTMs Virtual servers, Pools, Nodes with health, Profiles, SNAT, SSL, NAT, Traffic Policies and QoS.
  • Experience deploying BIG-IP F5 LTM 3600, 4200, 4500, 6950 and 8950 Load Balancers, GTM Load Balancers for load balancing and traffic management of business application along with Riverbed Virtual Services Platform (VSP)
  • Performed various inter platform migrations among numerous F5s such as 1500, 1600, 2000, i2600, 4500, viprion, etc.
  • Used tufin conduct policy management to maintain security policies in the network infrastructure.
  • Configured networks using routing protocols such as OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure
  • Well experienced in configuring with the technologies like VPN, WLAN and Multicast protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP. Act as Residential SDN engineer in support of client
  • Deliver advanced level technical support for Juniper Contrail SDN solution, including Installation, debugging, and maintenance issues
  • Experience with configuring Nexus 5000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000. performing cisco device code upgrades, replacing branch hardware with new 3900 routers and 2960 switches, installing and configuring DNS (BT Diamond), DHCP servers
  • Followed the change process as per IT policy It also includes the configuration of port channel between core devices and connected hardware
  • Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, trunking, Port \ Security, STP and RSTP.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links

Confidential, Allentown, PA

Security Engineer

Environment: Cisco Switches: 2000, 3500, 4500, 5000, 7000, 7010, 9000

Responsibilities:

  • Working on to set up OSPF dynamic routing on Cisco ASA Firewalls by using and following their current network structure.
  • Monitor, operate and support network security devices such as cisco ASA, juniper and checkpoint VSX firewalls
  • Working on as security devices such as Cisco ASA series, checkpoint VSX, juniper SRX & SSG series, Palo Alto firewalls
  • Participated with other network in the management and configuration of Cisco ASA, juniper and Palo Alto firewalls
  • Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol-based services
  • Troubleshooting of protocol-based policies on Palo Alto Firewalls and changing the policies as per the requirement and as per traffic flow
  • Security policy review and configuration in Palo Alto and Junipers firewall in Confidential
  • Configured VLAN trunking with Palo Alto interface
  • Work in groups with other engineers to solve customer network complications.
  • Implemented Zone Based firewall and Security Rules on the Palo Alto firewall
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
  • Security policy review and configuration in Palo Alto and Junipers firewall in Confidential
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing
  • Implemented design and deployment of checkpoint Firewall rules and policies for the Datacenters deployment of day-to-day management of Checkpoint VSX1
  • Performed Checkpoint Firewalls upgrade of 20 firewalls from Juniper SSG320M and SSG140 to Checkpoint R77.30
  • Managed Checkpoint Firewalls using Multi Smart Domain Manager Set up point to point OSPF connection on juniper SRX and SSG series firewalls
  • Configuring rules and Maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls
  • Configured network access servers and routers for AAA Security (RADIUS/ TACACS+)
  • Worked on wired LAN changeover Cisco to juniper where over 300 pieces of hardware and approximately 10,000 cables were replaced
  • Expert in installation, configuration and management of complex cisco firewall management and monitoring systems
  • Installation, configurations and management Checkpoint firewall running on both Secure Platform and open servers
  • Managing data center and network by using solar winds, NPM, NTA, NCM and F5 load balancer and citrix load balancer
  • Hands on experience in F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs
  • Provide Tier II load balancer expertise on F5, BigIP Local Traffic Managers (LTM).
  • Designing F5/ support for migration work of applications and websites from Cisco CSS load balancers to the F5, BigIP load balancers.
  • Comprehensive elementary configurations on the F5 Big-IP LTMs load balancer on prevailing network to divide traffic on web-servers
  • Upgraded load balancers from Radware to F5, BigIP v9 which improved functionality and scalability in the enterprise
  • Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NATing, sub-netting, also including DNS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, WISM, STP (Spanning tree Protocol), RTSP & Multicasting protocols
  • Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route-feedback, BGP attributes) on Cisco Routers 7613, 7201, and 3945E.
  • Configured networks using routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure
  • Experience working on CISCO NEXUS data center infrastructure with 2000, 5000 and 7000 series switches by enabling networked devices to communicate effectively
  • Hands-on knowledge in configuring cisco 3500, 4500 series switches to implement information sharing and resource allocation for increased productivity
  • Helping them to set up point to point OSPF connection on their Cisco and juniper routers like MX, EX, ASR series routing devices with their current network
  • Worked on to pre-configure router in data center for new connection as network design structure.
  • Working on troubleshooting, implementing and configuring new devices and helping them to build new data center and moving devices from one data center to another by moving all devices
  • Tested JUNOS images on juniper MX router platforms covering various protocols and technologies
  • Successfully installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls
  • Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010
  • Deployed VXLAN on the Nexus 9000 to map the physical VLANs to the Virtual Overlay VLANs.
  • Deployed the Nexus 9000 Application Virtual switch to support network telemetry applications and 9000 Core with VPC and 3172 TOR.
  • In corporate Cisco Nexus 9000 NXOS to ACI fabric to work in concert with existing Nexus 7000s for Multi-Protocol Label Switching (MPLS)
  • Used monitoring tools for design, implementation, tuning and troubleshooting of various network issues such as OSPF, BGP, LDP, MPLS, Layer3 VPNs

Confidential, Santa Clara, CA

Data Center & Security Engineer

Environment: Cisco Switches: 1900, 2900, 4500, 6500, 3750, 3550, 5000, 7000, ASR1k

Responsibilities:

  • Configuring rules and Maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Design, implement and administer enterprise network infrastructure utilizing Juniper routers across locations.
  • Migrated juniper firewalls to Palo Alto network firewalls and carried out troubleshooting and configuration of the same.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Network security including NAT/PAT, ACL, and ASA Firewalls.
  • Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as Firewalls and URL and application inspection
  • Adding Rules and Monitoring Checkpoint Firewalls traffic through Smart Dashboard and Smart View Tracker applications.
  • Update & Follow Up Checkpoint IPS Signature Packages occasionally.
  • Configured Checkpoint issues, Site-to- Site VPN.
  • Administered Checkpoint Firewalls of R65 and R70 clusters.
  • Experience in migration with both Checkpoint and Cisco ASA VPN.
  • Hands-on experience with converting Checkpoint VPN rules over to the Cisco ASA solution.
  • Configured, Monitored and Troubleshot Cisco's ASA Security appliances
  • Involved in configuring Juniper SSG-140 and Check point firewall and in TACACS+ implementation
  • Hands on Experience testing I Rules using Browser (IE), HTTP watch for f5 load balancers
  • Routine Administration (Design, Implementation & Operations support) of Citrix, BIG-IP and F5 load balancers
  • Worked on the new DMZ extension architecture which included BigIP and F5 load balancers (LTM/GTM and ASM experience)
  • Processed load balancing, port translation, and SMTP configurations, while working directly with project managers and customers
  • Implementation and Troubleshooting Cisco Routers such as Cisco 1900, 2900, Cisco ASR 1k and Cisco 9k.
  • Experience working with ASR 9000 series switches with IOS-XR
  • Experience with migrating from Cisco ASA 8.2 version to Cisco ASA 8.4 Version
  • Configuring Cisco Switches Such as 4500, 6500, stack switches 3750.
  • Configuration and Administration of Cisco and Juniper Routers and Switches
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer
  • Troubleshoot traffic passing managed Palo alto firewalls via logs and packet captures.
  • Involved in Palo alto firewalls Administration, Rule modification and Rule Analysis.
  • Configure and Juniper EX and MX series switches and routers
  • Worked on Network Layer technologies including Routing & Signaling protocols, Layer3 VPN and Multicast supported by juniper core and edge, MX series routers
  • Maintaining day to day activity includes change management on Palo alto firewalls, log analysis and troubleshooting of network issues.
  • Experience working with JUNOS OS on juniper routers and Switches
  • Configured LDP, OSPF, and BGP for new deployments of core/edge routers (Cisco and juniper).
  • Implemented antivirus and web filtering on Juniper SRX 240 at the web server
  • Migrated Juniper EX series switches to Cisco 3500 series and 6500 series switches
  • Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data Environment
  • Implemented Zone Based firewall and Security Rules on the Palo Alto firewall
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
  • Successfully installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls
  • Security policy review and configuration in Palo Alto and Junipers firewall in Confidential
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing
  • Created documents for various platforms including Nexus 7k, ASR1k enabling successful deployment of new devices on the network
  • Experience configuring Virtual Device Context in Nexus 7k series switch.
  • Experience with configuring Nexus 5000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000.
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing Protocol OSPF, EIGRP, BGP with access control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between experience with communicating with different with different customers, IT teams in gathering the details for the project
  • Serve as part of a team of network engineers responsible for network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches across multiple offices

Confidential, Mooresville, NC

Network Security Engineer

Environment: Cisco Switches: 6500, ASR 9KFirewalls: Cisco (5585, 5510)

Responsibilities:

  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5585 Security appliance
  • Configured cisco ASA 5510 firewall to establish logical separation between Legacy network & lab environment.
  • Performed network monitoring, troubleshooting, implementation and maintenance of juniper and checkpoint firewalls
  • Migrating the policy from cisco ASA firewalls into Palo-Alto & vice versa.
  • Maintaining day to day activity includes change management on Palo alto firewalls, log analysis and troubleshooting of network issues.
  • Implemented Zone Based firewall and Security Rules on the Palo Alto Firewalls
  • Implemented antivirus and web filtering on Juniper SRX 240 at the web server
  • Configuring rules and Maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Migrated juniper firewalls to Palo Alto network firewalls and carried out troubleshooting and configuration of the same.
  • Replaced aging Checkpoint firewall architecture with new next gen Palo Alto appliances serving as Firewalls and URL and application inspection
  • Regularly performed firewall audits around Check Point firewall solutions for customers.
  • Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-3600 load balancers
  • Routine Administration (Design, Implementation & Operations support) of Citrix, BIG-IP and F5 load balancers
  • Worked with VMware hypervisor and virtualization monitoring tools.
  • Operational support and troubleshooting of production wireless network issues
  • Provided technical support case escalation for customer wireless infrastructure
  • Experience with converting cisco catalyst 6500 switches to Cisco Nexus in the data Center environment
  • Associate. Responsible for design, installation, configuration, administration and troubleshooting of LAN/WAN network infrastructure and security using Cisco and juniper routers
  • Experience in Configuring, upgrading and verifying NX-OS operation system with OSPF, BGP
  • Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP, MPLS
  • Implemented Access lists and policy mapping on Juniper routers installed in each branch across all the locations.
  • Worked on external customer wireless network infrastructure
  • Experience working with ASR 9000 series switches and routers with IOS-XR
  • Worked with a team on planning, designing, configurations, deployments and support of LAN/WAN/WLAN infrastructure
  • Participated in the evaluation of vendor hardware, software, and wireless communications products
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access
  • Experience working with ASR 9000 series switches and routers with IOS-XR
  • Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.

Confidential

Network Engineer

Responsibilities:

  • Experience in software development using python scripting
  • Experience in working with cisco ASA firewalls
  • Implement Cisco IOS Firewall IDS using 2600 series router
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
  • Configured and debugged policy based routing for special traffic, route filtering with route maps, route redistribution.
  • Configured VLAN Trucking 802.1Q, STP, and Port Security on Catalyst 6500 switches.
  • Performed OSPF, BGP routing protocol administration.
  • Worked on F5 load balancers and ASA firewalls
  • Router memory & IOS upgrade with TFTP.
  • Network Assessment and Documentation (including technical, operational, and economic assessment)
  • Responsible for designing and implementation of customers network infrastructure
  • Help negotiate hardware, software, and circuit contracts for customers
  • Redesign customers office copper and fiber cable plant for scalability
  • Build and maintain Visio documentations for Clients
  • Was Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support.
  • Ensured network, system and data availability and integrity through preventative maintenance and upgrade.

Confidential

Network Technical Support

Responsibilities:

  • Managed network connectivity and network security, between Head offices and Branch office
  • Worked on Cisco routers 7200, 3800, 2800 and Cisco switches 4900, 2900
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols OSPF, RIP & BGP
  • Configured BGP for CE to PE route advertisement inside the lab environment
  • Spearheaded meetings & discussions with team members regarding network optimization and regarding BGP issues
  • Implemented the concept of Route Redistribution between different routing protocols
  • Switching related tasks included implementing VLANS, VTP, STP and configuring on Fast Ethernet channel between switches
  • Responsible for configuring GLBP between multilayered switch networks
  • Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series
  • Responsible for Configuring SITE-TO SITE VPN on Cisco ASA 5500 series firewall between Head office and Branch office
  • Hands on Experience working with security issue like applying ACL's, configuring NAT and VPN
  • Documented and Log analyzed the Cisco ASA 5500 series firewall
  • Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security
  • Responsible for Validate existing infrastructure and recommend new network designs.
  • Implementation of TCP/IP Networking & related services HCP/DNS/WINS
  • Network Monitoring and Network Efficiency Analysis.
  • Configure and maintain Site-to-site VPN and VPN concentrators solution for Remote users

Hire Now