We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

Philadelphia, PA

SUMMARY:

  • 8+ years of professional experience in Network engineering with Certified Network Engineer and certified network Security Engineer performing Network analysis, design, Implementing, capacity planning with a focus on performance tuning and support of large Enterprise Networks.
  • Strong knowledge in Cisco Routing, Switching and Security with Cisco hardware/software (heavy Cisco shop) experience.
  • Experience working on Cisco Catalyst Series 3750, 4500, 6800, 6500, 9300, 9400, 9500; Nexus 2000, 5000, 6000 and 7000 series switches.
  • Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.
  • Experience in layer - 3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2K series, Cisco router models like 7200, 3800, 2800, 2600, 2500, 1800, 4300, 4400, 4500, ASR 1000 and 9000 series.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP, GLBP for Default Gateway Redundancy
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • Proficient and high-level expertise using the F5 based profiles, monitors, VIP’s, pools, SNAT, SSL offload, iRules, virtual Servers, iAPPs. Migration experience from ACE to F5/ old F5 to New F5. Expert in TMSH.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series
  • Enterprise Routing experience using protocols RIP v1 & 2, EIGRP, OSPF and BGP
  • Expertise in installing, configuring and troubleshooting Juniper Routers (E, J, M and T-series)
  • Implementing security policies using Cryptography, ACL, SDM, PIX Firewall, IPsec, VPN, and AAA Security on different series of routers.
  • Firepower specialist for User Mapping and User Access Control, URL filtering and enforcement for both.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.
  • Experience with different Network Management Tools and Sniffers like Wireshark (ethereal), HP-Open view, RSA envision, and Cisco works to support 24 x 7 Network Operation Center.
  • Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).
  • Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers
  • Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analyses results and implement and delivering solutions as an individual and as part of a team.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.
  • Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Knowledge of JUNOS platform and worked with IOS upgrade of Juniper devices.
  • Hands on Experience wireless technology specially Cisco Wireless LAN controller model like 4400, 5508 Access Points 3500, 3700, 3800 Capwap /LapWAP/Standalone as well as Mobility Express.
  • WAN Optimization Hardware Exposure like Riverbed, CasCade, Flow monitor.
  • Experience working with Aruba and Cisco Wireless LAN controllers, Configuring and Provisioning AP’s, Virtual AP’s, RTLS, Wireless SSID’s, remote and campus AP’s, upgrading WLC, worked in Active/Active local Controllers and Master controller. Worked on RAP3 for remote access. support Quality Inspections and Operational Test (OT) events related to the 2GWLAN Aruba Networks Controllers, and Access Points. (Aruba 6000 controller, Aruba AP65,70,124,85,125) system.

TECHNICAL SKILLS:

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP

Networking Hardware: Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls, Wireless Cisco and Aruba.

Routing Protocols: OSPF, ISIS, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting

Security Technologies: PAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint

Network Monitoring: Solarwinds, Wireshark, HRping, Whatsupgold, Infoblox

Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR, IOS-XE, NX-OS

Routers: CISCO 4300, 4400, 4500,2600, 2800,3800,7200, Juniper M & T Series, ASR 1000

Load Balancers: F5 Networks (BIG-IP), Netscaler (Citrix)

Capacity & performance: Cascade Riverbed (Flow Monitor), WAN Killer

Switches: CISCO 2960,3750,3850, CAT 9300, CAT9400, CAT 9500,4500,6500,6800 Nexus 7k,5k,2k

Programming Languages: C, C++, Perl, Power Shell, Python

Simulation Tools: GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence

Firewalls: Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580 ), McAfee Web Gateway, Checkpoint, Palo Alto firewalls.

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Features & Services: IOS and Features, HSRP, GLBP, VRRP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR s, HLD and LLD documents, Dell equal logics

PROFESSIONAL EXPERIENCE:

Confidential, Philadelphia, PA

Sr. Network Security Engineer

Responsibilities:

  • Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.).
  • Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter Vlan routing, LAN security etc.
  • Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • End to End Implementation of Symantec DLP solution for clients which covers data in use, in motion and data at rest in Symantec DLP solution suite.
  • Configured Cisco ASA Firewalls (5515, 5545, 5555, 5585 series) and built new DMZ Environment for all Internal Servers.
  • Determining security needs, developing and implementing solutions, and creating and enforcing security policies.
  • Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution
  • Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS)
  • Cisco ASA security appliances including SourceFire, FirePOWER services and FireSight Management Console.
  • Firepower/Firewall TAC (Technical Assistance Center) Engineer
  • Recognized as in-office Firepower specialist on User Access Control and URL Filtering
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.
  • Managing and implementation of PORs (port open requests) based on the requirements of various departments and business lines.
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per the requirement of the company.
  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).
  • Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
  • Implementing IPsec and GRE tunnels in VPN technology.
  • Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
  • Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Configuration, Assigning DHCP profiles
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices configure 2k, 3k, 7k series Routers
  • Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer
  • Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network
  • Configuring and managing F5 ASM (Application security manager). Developed security policies.
  • Migrated to Juniper EX series switches from Cisco 3500 series and 6500 series switches
  • Well Experienced in configuring protocols HSRP, GLBP, PPP, PAP, CHAP, and SNMP.
  • Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers
  • Implement changes on switches, routers, load balancers (F5 and CSS), wireless devices per engineer’s instructions and troubleshooting any related issues
  • Experience in installing and configuring DNS, DHCP servers.
  • Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.
  • Performing network monitoring, analysis using various tools like Wireshark, & SolarWinds, Dynatrace, Extrahop tool helped for tracking root cause problems.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trucking, deployed port security when possible for user ports.
  • Used Extrahop for the detection of any abnormalities in the network, tracking file access in databases and storage for data security, and locate bottlenecks over the network
  • Involved in configuring Juniper SSG-140 and Cisco ASA firewall.
  • Experienced in configuring Guest access using Aruba ClearPass and Web Authentication
  • Strong hands on experience on, ASA Firewalls, Palo Alto Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, PPP, VPN, Checkpoint, Cisco ASA, AWS, TCL, Riverbed, Clustered SQL server 2014/2012/2008 R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003

Confidential, Philadelphia, PA

Sr. Network Security Engineer

Responsibilities:

  • Working in high availability Nexus Environment and provide Level 3 Network Support.
  • Configuring, upgrading and verifying the NX-OS operation system.
  • Converting PIX rules over to the Cisco ASA solution.
  • Basic and advance F5 load balancer and Cisco ACE configurations, general troubleshooting of the F5 load balancers .
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience
  • Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Maintained IT Security controls for SOC2 and corporate security policy.
  • Experience on working with IPsec VPN, Security profiles and SSL decryption on Palo Alto firewall
  • Worked on Python scripting for generation the firewall security policy through web visualization tool in checkpoint firewall.
  • Experience on working with IPsec VPN, Security profiles and SSL decryption on Palo Alto firewall
  • Cleaned Symantec Anti-virus environment and brought previously unprotected machines into compliance with security policy
  • Maintained IT Security controls for SOC2 and corporate security policy.
  • Provide real-time troubleshooting dealing with network configuration protocols, best practices for security, file and malware protection, and customer network integration of the Firepower product line
  • Verify Active Directory and Radius integration into Firepower for User Mapping and User Access Control.
  • Use tcp dump and Wireshark to trace packets across network and Firepower devices for implementation
  • Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS).
  • Converting CatOS to Cisco IOS Config Conversion on distribution layer switches.
  • Configured various Router interfaces like ATM interface, T3 & Channelized T1 interfaces
  • Configuring and troubleshooting CISCO catalyst 6509, 7609, 7613 with Supervisor cards, Cisco 3640, Cisco GSR 12416,21418(with PRP and RPR processors)
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.
  • Configuring HSRP between the 3845 router pairs of Gateway redundancy for the client desktops.
  • Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Working on HP open view map for Network Management System and Ticketing
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2Bnetwork connectivity.
  • To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Design and implement Catalyst/ASA Firewall Service Module for various LAN’s. responsible for managing Cisco routers, switches, HP switches, F5 load-balancers using SNMP MIBs for fault detection and for fault isolation.
  • Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity.
  • Integrate Microsoft active directory (LDAP) into checkpoint for identity awareness and user authentication.
  • Configure and manage LDAP User management with Checkpoint Smart Directory. Implemented the policy rules and DMZ for multiple clients of the state on the Checkpoint firewall.
  • Worked with several network engineers for the understanding of Juniper SRX firewalls along with the changeover to Palo Alto. Palo Alto Firewall Management-Panorama.
  • Experienced in handling and installing Palo Alto Firewalls
  • Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.
  • Implemented Access lists and policy mapping on Juniper router installed in each branch across all the states.
  • Worked on configuration commissioning and upgradation of the MPLS circuits for various branch offices. Disabling all unused ports and putting them in unused VLAN.
  • Implemented, analyzed and recommended appropriate system for the out of band management monitoring. Utilizing SolarWinds for primary and disaster recovery site.
  • Monitored and responded to network anomalies utilizing SolarWinds/Orion's software and recommended appropriate network solutions for issues.
  • Active team member coordinating IT stakeholders discussing best practice approaches through ITSM Change Management tools including Remedy.
  • Worked with multiple IT product vendors, outsourced teams, and temporary contractors to secure and support critical infrastructure servers and services.
  • Established and maintained great partnerships with internal server, storage, network, platform services (middleware & database) teams working on service request and change procedures.
  • Participated actively in proof of concept projects implementation which included storage and backup solutions from private cloud providers Amazon AWS & Microsoft Azure.
  • Check & troubleshoot VMware ESXi Host level connection issues with Cisco UCS fabric interconnects, Brocade switches, EMC VNX 5300, IBM Flash Storage 810 during storage vMotion/migration activities.
  • Installed, configured Cisco Meraki equipment and web-based monitoring platform for MR32 wireless access points.

Environment: Cisco switches - 2948/ 3560 / 4500 / 3560/ 3750/3550/3500/2960/ 6500 and Cisco routers - 1200 / 3640 / 7200 / 3845/ 3600/ 2800, Cisco Nexus 7K/5K, Cisco ASA 500, Cisco ISE, F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, TCL, SQL Server 2005 Integration services packages.

Confidential, Birmingham, AL

Network Security Support Engineer

Responsibilities:

  • Assisted in troubleshooting LAN connectivity and hardware issues in the network of 100 hosts.
  • Studied and analyzed client requirements to provide solutions for network design, configuration, administration, and security.
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
  • Created a backup and recovery policy for software application and verified peripherals are working properly.
  • Monitor performance of network and servers to identify potential problems and bottleneck.
  • Performed RIP & OSPF routing protocol administration.
  • Interacted with support services to reduce the downtime on leased lines.
  • Maintenance and Troubleshooting of connectivity problems using Ping, Trace route.
  • Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issue Other responsibilities included documentation and support other teams
  • Configured OSPF over frame relay networks for NBMA and point to multipoint strategies
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Configured BlueCoat Proxy SG Web Application Reverse Proxy for securing and accelerate public web applications.
  • Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 & 6000 series.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost-effective network solutions to accommodate customer requirements and project scope.
  • Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and trouble shooting.
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Responsible for implementing QOS parameter on switching configuration.
  • Involved in Design and Implementation of complex networks related to extranet clients.
  • Troubleshooting the Network Routing protocols (BGP, EIGRP and RIP) during the Migrations and new client connections.
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost-effective network solutions to accommodate customer requirements and project scope.
  • Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and trouble shooting.
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Worked with Load balancing device like F5 Big-IP local traffic manager (LTM) 1600
  • Responsible for implementing QOS parameter on switching configuration.
  • Involved in Design and Implementation of complex networks related to extranet clients.
  • Knowledge and experience of 802.11 a/b/g/n Ethernet standard for wireless Technology.
  • Worked with other team members in testing of the network architecture.
  • Troubleshooting the Network Routing protocols (BGP, EIGRP and OSPF) during the Migrations and new client connections.
  • Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.
  • Worked towards the key areas of the project to meet SLA’s and to ensure business continuity. Involved in meetings with engineering teams to prepare the configurations according to the requirement.
  • Creating change tickets according to the scheduled network changes and implementing the changes.
  • Responsible for configuring, testing, implementing network security solutions, creating & testing ACL’s on Cisco ASA, Juniper NetScreen and Palo Alto Networks PA-3060 application firewalls.
  • Use tcp dump and Wireshark to trace packets across network and Firepower devices for implementation
  • Adding devices, configuring SNMP traps on network devices, health monitor, modifying device configurations to enable monitoring through Cisco Prime Infrastructure GUI.
  • Work,resolve tickets and resolve incidents on priority basis by analyzing, troubleshooting infrastructure based on alerts information reported by Cisco Prime infrastructure, Solar winds Orion suite.

Environment: Catalyst 6500/3750/3550/3500/2950 switches, Nexus 7K, 5K switches, Cisco 7200/3600/ 2800/2900 series routers, TACACS, EIGRP, RIP, OSPF, BGP, VPN, Cisco Prime, ISE, EtherChannel, vPC, Juniper QFabric, Juniper EX series switches, Cisco UCS, F5 load balancers, Palo Alto and Cisco ASA firewalls, Outlook/Office 365

Confidential, NYC, NY

Sr Network Engineer

Responsibilities:

  • Configuring and troubleshooting multi-customer ISP network environment.
  • Involved in network monitoring, alarm notification and acknowledgement.
  • Implementing new/changing existing data networks for various projects as per the requirement.
  • Troubleshooting complex networks layer 1, 2(frame relay, ATM, Point to Point, ISDN) to layer 3 (routing with MPLS, BGP, EIGRP, OSPF and RIP protocols) technical issues.
  • Providing support to networks containing more than 2000 Cisco devices.
  • Review, analyze the priorities, approve and execute majority of changes in the network infrastructure. These included configuration changes on Cisco Catalyst 4500, Nexus 5K Switches and few Juniper Ethernet switches such as EX2200/2300.
  • Configure and troubleshoot RIP, OSPF, eBGP, iBGP and implement rate limit filter on Juniper MX480, MX240 routers to limit bandwidth utilization
  • Worked with design team on configuring F5 BigIP Load Balancers to implement same for web/database applications.
  • Hands on Experience testing iRules using Browser (IE), HTTP watch on F5 load balancers.
  • Managed the F5 Big-IP GTM/LTM appliances to include writing iRules.
  • Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Performing troubleshooting for IOS related bugs by analyzing past history and related notes.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc.)
  • Identify, design and implement flexible, responsive, and secure technology services
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configured switches with port security and 802.1x for enhancing customers security.
  • Implemented various Switch Port Security features as per the company’s policy
  • Configured RIP, and EIGRP on 2901 and 3925 Cisco routers.
  • Provided technical support for expansion of the existing network architecture to in corporate new users.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions.

Environment: Juniper firewalls 5GT, 208, SSG 5, SSG 140, 550, NSM, IDS/IPS, Vulnerability Assessment tools like Nessus, Red Hat Enterprise Linux, Solaris, Juniper SSL VPN’s, Juniper EX2200/2300 switches, Catalyst 4500, Nexus 5K core switches.

Confidential

Network Engineer

Responsibilities:

  • Provided estimated bandwidth requirements for data replication, to best determine adequate timing for migration service levels
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalysts.
  • Switches Replace branch hardware with new 2851 routers and 2960 switches.
  • Experience in working with Cisco Nexus 5000 series switches for data center.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Assisted in network engineering efforts consistent with the infrastructure of an Internet Service Provider and support of such network services. Helped in designing and implementation of VLAN for the new users.
  • Installation and Configuration of various types of Personal Computers and Printers. Installation of different operating systems on Intel based PC's.
  • Troubleshooting of personal computers. On line Support to customers concerning their computer problems.
  • Assisted with troubleshooting all network issues with routers and switches when necessary and consulted with on call tech as needed for client.
  • Monitor, troubleshoot, test and resolve Frame Relay, ATM, MLPPP, PPP, and Dial-up.
  • Wrote IOS and CAT OS upgrade procedures and Pre/Post checks for customer production upgrades Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches
  • Worked with snipping tools like Ethereal (Wireshark) to analyze the network problems.
  • Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
  • Performed replacements of failed hardware and upgraded software
  • Performed scheduled Virus Checks & Updates on all Servers & Desktops.

Hire Now