We provide IT Staff Augmentation Services!

Network Architect /network Support Engineer Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • CCIE Certified Network Engineer with extensive experience in Information Technology Industry that includes Network Architecture, Network Support Engineering, and Windows System/Server Administration.
  • For over10 years Consultant responsible for leading and directing information - technology operations across broad disciplines, including hardware, software, development, testing, production support, project management, database technologies, customer satisfaction, vendor relationships, strategic planning, staff development, promoting change and improvement, and technology implementation.
  • Over 10 years of experience in Network Architecture, and deploying, managing, and maintaining VOIP, MPLS.
  • Deployed Voice over IP Solution for various customers, each with distinct requirements including but not limited to Cisco Communications Manager centralized cluster with remote sites running SRST functionality.
  • Executed several implementations of Cisco Call Manager Express and Unity Express.
  • Solid experience with UCCX, Call Manager, Jabber, CUCM, WebEx or similar Cisco technologies
  • Solved/Engineered call routing, number translation, pickup groups, and call handler issues.
  • Designed, tested and implemented cost effective customized Voice solutions for clients including full and fractional ISDN - T1 circuits.
  • Experience installing, configuring and troubleshooting the following Cisco security technologies: Cisco ISE, IPS/SourceFire, ASA, CSM, VPN, ACS, FTD, ACI, Trustsec, StealthWatch
  • Focused on the development and implementation of client s Cisco Identity Services Engine (ISE) Remediation and Integration with wired, wireless and virtual private network (VPN).
  • By implementing security policies for all devices seeking network access, client will create an environment that limits potential damage from emerging security threats and risks.
  • Cisco ISE will give client a powerful, identity based methodology for preventing unauthorized access and improving network resiliency.
  • Confidential a high level, the four areas are:
  • Publicly Accessible Ethernet Jack Inventory
  • Deployment of new ISE Environment
  • Wired/Wireless Security Policy Development and Integration with ISE
  • Wireless Adaptive IPS Deployment and Integration with Splunk installation, configuration, and testing of the wireless network infrastructure. Below are specific tasks:
  • Configure AAA and RADIUS attributes on WLCs to point to ISE
  • Validate existing wireless controller configuration
  • WLAN
  • Interfaces
  • Verify pilot/test authentication VLAN, and access VLANs including the IP subnets and default gateways
  • Ensure that baseline configurations of all network devices are saved
  • Configure up to five (5) authentication policies (e.g., machine/user authentication, PEAP,EAP-TLS) and external authentication servers (if required)
  • Configure Wireless policy and SSID development for up to five (5) networks including TTS,
  • Printers and Internal
  • Configure Peer to Peer Isolation
  • Configure up to fifteen (15) authorization profiles and policies (if required)
  • Configure up to Twenty (20) profiling policies and actions (if required)
  • Configure guest services, sponsor group policies, guest user policies, rules, and conditions (if required)
  • Configure user web authentication and redirect (if required)
  • Integrate ISE with ISE supported Mobile Device Management (MDM) platform
  • VPN Appliances for ISE & 802.1x
  • Configure and verify DNS and NTP settings on VPN Appliances
  • Configure AAA and RADIUS attributes on ASA Appliances to point to ISE
  • Validate existing VPN configuration
  • Finesse OS/FTD
  • Interfaces
  • ACLs/Dynamic Access Policies (DAP)
  • Authentication methods
  • Ensure that baseline configurations of all network devices are saved
  • Configure and verify VPN appliances (ASAs) based on templates specified during the design phase
  • Validate that agent/supplicant(AnyConnect) distribution with the right discovery host have been deployed to this site
  • Configure up to five (5) posture ACL, permitting relevant traffic policies
  • Verify pilot/test authentication VLAN, and access VLANs, including the IP subnets and default gateways
  • Perform migration of users to ISE-enabled VPN
  • ISE Policy and Services Configuration for VPN Access
  • Upgrade ASA VPN appliances (if applicable)
  • Configure up to fifteen (15) authentication policies (e.g., machine/user authentication, PEAP,
  • EAP-TLS) and external authentication servers
  • Configure up to Twenty (20) appropriate authorization profiles and policies
  • Configure up to fifteen (15) appropriate profiling policies and actions
  • Configure up to Twenty five (25) network authorization and change of authorization (CoA) policies
  • Configure up to five (5) dynamic VLAN ACLs (if applicable)
  • Configure default ASA system user or captive portal page to use ISE
  • Configure appropriate timers for re-authentication, reauthorization, success log-on screen, session timeouts, and remediation (if applicable)
  • Begin migrating users/endpoints and begin testing. All testing shall conform to the Testing and Acceptance document drafted and agreed upon during the Network Design and discovery.
  • Experience on Migration from SourceFire to FireAmp.
  • Experience on Cisco FirePower upgrade from Sourcefire.
  • Knowledge Management, Change Management, Asset and Configuration Management, Release and Deployment Management, Transition Planning and Support, Service Validation and Testing, Evaluation
  • Configure, validate, manage, and back up configurations of all NMTs
  • Configure, validate, and manage all Device settings (e.g., IP address, subnet mask, proxy settings, Windows Internet Name Service (WINS) primary and secondary Server address, default gateway address.
  • Work with/across global/regional/local IT teams by providing advanced/expert consultation for responsible services
  • Develop detailed designs, business cases, and communicate detailed architecture recommendations needed to support business critical systems and operations
  • Evaluate and propose technology solutions which will deliver highly secure and dynamic IT services
  • Experience with Service Delivery Management (SDM) or Technical Delivery Management (TDM)
  • Ability to lead complex projects, monitor the results, and make adjustments as needed to ensure goals are accomplished
  • Understand the business needs and deliver prompt, efficient, quality service to the business; works to anticipate, identify and meet end-user needs; drives outward results and ensures high-quality standards are met
  • Integrated Cisco Contact Center express with Cisco Unified Communications Manager.
  • Demonstrated thorough understanding of Voice Gateways (H323, MGCP), Protocols (H323, SIP, and MGCP), IP Contact Center technologies (ACD, IVR) and CTI application in providing solutions to customer.
  • Integrated the Cisco Unified Wireless IP Phones (792X series) with Cisco Unified Communications Manager and Cisco Unified Communications Manager Express using IEEE 802.11 over a Cisco access point.
  • Contact Center Enterprise (PCCE) experience
  • CVP scripting experience
  • Experience with Cisco Unity
  • Implemented Cisco Unified Communications Manager Applications like CUPS, IPMA, Extension mobility and Attendant console as per customer requirement.
  • 10+ years experience designing, implementing and supporting LANs, WANs, VLANs, VPNs), routing and switching experience utilizing Cisco, Juniper, and Force 10 Network devices.
  • Configure the broadsoft call manager
  • Configure broadsoft architecture design to meet client requirement.
  • Configure Subscriber Level Configuration Parameters
  • Enable SIP Authentication for a line
  • Configure a Multipurpose Key for “eventlist BLF”.
  • Configuration files be converted into a binary format, an extra step must be performed when using this feature
  • Configured via web GUI as well as via the Configuration File through TFTP or HTTP.
  • Hands on exposure on Remote Access VPN - Cisco ASA/Juniper
  • Strong understanding of encryption technologies, DLP, multi-factor authentication, email filtering, API integration and scripting.
  • 17+ years working with APIs and workflow integration
  • Experience with compliance with ARC’s policies and procedures, payment card industry (PCI) standards, and international organization for standardization (ISO27001) standards; assesses local (LAN) and wide area network (WAN) environments security posture and topology, reviews security relevant documentation, and preparing papers discussing results of analysis to help protect and secure ARC data, infrastructure, and systems and educate stakeholders on possible threats.
  • Provisioned and troubleshoot HLR, VLR, SGSN/GGSN registrations, and IP address assignment, DHCP services, Domestic/Roaming GSM/GPRS, Wi-Fi, Voice Mail and features. • Commissioned wireless voice and data, IP services, Access Point Names (APN), PAPN, security, and GPRS PDP context activation, VPN for medium to large-sized corporate and individual customer.
  • Trained guided and offered assistance to a team of front-line support staff on new features and products and prepared technical documents.
  • Gained through understanding of call center environment including call routing algorithms in ACD system.
  • SIP phones make TFTP requests to download configuration files and firmware images. TFTP is inherently insecure since files are sent unencrypted.
  • SIP phones make DHCP requests to get an IP address, gateway, boot server, and so on.
  • Configure IP phones and Cisco SIP Proxy Server be configured to use port 5060 for signaling and for phones and gateways to be configured to use a specific port range for media, and for all of these ports to be secured.
  • Configure SIP Trunking connects Enterprise customer premise equipment (CPE) such as Key Systems, TDM PBX, and IP-PBXs, to Service Provider’s broadband networks. SIP Trunking consolidates access connectivity by removing TDM or ISDN lines and enabling calls to be carried over IP-based access
  • Configure and manage SIP Trunking connects Enterprise customer premise equipment (CPE) such as Key Systems, TDM PBX, and IP-PBXs, to Service Provider’s broadband networks. SIP Trunking consolidates access connectivity by removing TDM or ISDN lines and enabling calls to be carried over IP-based access
  • Experience in data security solutions like Symantec DLP/ Varonis / Imperva
  • SIP Trunking connects Enterprise customer premise equipment (CPE) such as Key Systems, TDM PBX, and IP-PBXs, to Service Provider’s broadband networks. SIP Trunking consolidates access connectivity by removing TDM or ISDN lines and enabling calls to be carried over IP-based access
  • Experience in designing and implementing highly available infrastructure solutions using VMware Vsphere (ESX, VCenter, VMotion, HA, DRS, Converter)
  • Experienced in deploying and supporting Citrix NetScaler VPN solutions
  • Experienced in troubleshooting issues related to NetScalers
  • Experience in Configuring Citrix Netscaler for load balancing
  • Experience in Migrating Citrix NetScaler
  • Research threats and attack vectors that impact Palo Alto Network's applications and infrastructure.
  • Migrate firewalls to Palo Alto Networks
  • Install, configure and operationalize advanced Palo Alto Networks features
  • Build custom security policies and application signatures.
  • Maintain the Palo Alto Networks solution and provide guidance on code upgrades, etc.
  • Assess new and existing applications and system deployments for vulnerabilities and design flaws, and prioritize remediation efforts based on risk. Manage tooling and vendors in this area. Reporting.
  • Perform analyses against large data sets to identify potentially malicious behavior
  • Serve as a liaison and security advocate to the IT Applications Team
  • Provide technical and operational security support to IT, Engineering, Legal, and business units
  • Actively manage the security activities associated with secure software development, including forming peer code reviews, to address risks
  • High level of direct customer interaction, often working independently with customers.
  • Regular interaction with peers and managers inside and outside of own work group.
  • Technical lead within a sales team to ensure Brocade preference.
  • Understand customer business needs and to be able to reflect business benefit through proposed solution using a consultative approach.
  • Communicate and demonstrate Brocade solutions to customer base.
  • Conduct or participate in customer meetings related to solutions, systems architectures, design and overall deployment.
  • Assist with the implementation and installation of Brocade technology Confidential customer sites and systems integrator lab environments.
  • 10 years of hands on experience with eGain Chat (v11 or higher) in a large scale distributed environment.
  • Experience with eGain email/Chat, Provides technical support to front end web development teams for integration to eGain platform.
  • Configure eGain Superchat empowers businesses to proactively engage customers beyond text chat with unified auto chat, video, voice, and cobrowse. Superchat also allows consumers to hop across media channels or use them together, for instance, video chat and cobrowse. Also, businesses
  • Configure eGain OpenCEH Platform a common platform for managing service processes and knowledge across multiple channels, contact centers, and departments.
  • Configure eGain Web Services API enables customer and partner innovation by customizing, extending, and leveraging eGain OpenCEH Platform capabilities
  • Configure eGain Widgets (Mobile and Web) consist of a range of powerful, lightweight mini-applications that enable “always-on” access to the interaction capabilities and vital business information and content in your eGain deployment from mobile devices and web interfaces
  • Knowledge base, interaction records, users and user groups, reports, dashboards, and real-time monitors shared by products
  • Custom-created activities and fields to match the needs of any business
  • Pre-built adapters for easy access to information in external data and content sources and email systems
  • Ability to set up multiple entry points for chat with related queues and resources for each
  • OEM integration with Cisco contact center products

TECHNICAL SKILLS:

Network: Cisco UCS 5108 (Chassis) & M200/M230 (Blades), Cisco 6248 (Fabric Interconnect) Dell Servers and PowerEdge blades, IBM Servers and BladeCenters, Client Servers, BladeSystems and Proliant servers, Client Procurve switches, Cisco Nexus 1000v virtual switches, Cisco 6500 series, Nexus 5k/7k/9K. Zero/Thin client solutions such as Wyse, Cisco, Teradici and Panologic.

Experience with IOS: XR, .

Security: ISS IPS Site Protector, ISS Proventia, Cisco PIX, VPN, Cisco ASA, Juniper, NetScreen/CheckPoint/Fortinet/Fortigate Firewalls AirDefense Mobile/Enterprise Wireless IPS (layer2). Nessus, Backtrack, Metasploit and multiple other security and pen testing utilities, 1K-7K, CSS/ACE/GSS,, VSS,MPLS, Experience with configure and deploy Aruba wireless.

Experience in Wi: Fi Isolated Chambers, Ixia Veriwave, IxChariot and Ixia chassis

Experience on Global delivery environment: 20 Years of experience in 802.11 Wireless/Wi-Fi a/b/g/n/ac standards, 17 Year of experience in utilize tools including wireless and Bluetooth packet sniffers and network protocol analyzers to help determine root cause and provide debugging information to engineering teams

Networking: TCP/IP and OSI Networking Models, Routing, IP Addressing, WAN Technologies, Access Control Lists (ACL), VoIP, IIS, DNS, DHCP, ADS, RAID, NIS. GUI/Front End Visual basic 6.0, Excel VBA Macro, Asp Professional Runner. GUI/Back End MS SQL Server, MS Access.

SQL Server, Visual Studio. Network Security: Vpn-1/Firewall-1, Advanced Black Ice firewall. Mail Server, Exchange Server 2003, 2008 Daemon mail server. Management Tools VNC, VMware, Sphere client Backup professional, OTRS ticketing Tool, Cisco prime, DMVPN,Nexus,Network Segmentation, Nexus 7000, Nexus 5000, Nexus 2000, Nexus 1000,Nexus 1K-7K, CSS/ACE/GSS, Cisco product knowledge- 2600 series, 1602 s, Cisco WLC s, Clearpass and wireless experience Confidential Motorola and Coke.Advanced knowledge of the following technologies Nexus, VPC, VSS, OSPF, BGP, RIP, DMVPN, IPSLA, MPLS, SIP, IOS, IOS-XE, F5, Multicast/PIM, VRF, IPSEC on IOS-XE, PFR, WCCP, WAAS, CUBE, QOS

Platforms: Microsoft Windows Server NT / / (R2), Windows XP-8.1; Active Directory, Exchange, IIS, SQL (R2). Various Linux flavors including, SUSE, CentOS, Red Hat, Ubuntu. Bigfix / IBM Tivoli Endpoint Manager,IBM Qradar.

Virtualization/Cloud: VCE Vblock, NetApp FlexPod, VMware vSphere / ESX(i) 3x-5x, vSphere vCenter 3.x-5.x, VDI/VMware View/Horizon Infrastructure, shield, Converter, VMware cloud Director, VMware SRM, cops, Hypericin, fabric, NSX (SDN), villi, VMware ThinApp, vMA, Xen Server, Microsoft Virtual Server (Hyper-V).

Storage: NetApp FAS / Filers, NetApp VSC/SMVI, EMC VNX5700/VNXe/Unisphere/Powerpath, IBM V7000, DS4300, hardware and software RAID, FC, FCoE, iSCSI, CIFS, Client, NFS, CIFS, NAS and SAN clusters using Cisco MDS fabric switches, DCNM/Fabric Manager, QLogic, EMC Emulex HBA's.

Disaster Recovery/Backup: NetApp DFM (Data Fabric Manager), SMVI (Snap Manager Virtual Infrastructure), VSC, Snap Mirror and Snap Vault. EMC VSI, Computer associates ARCserve BrightStor for Windows, Windows / XP backup and restore technologies, EMC Retrospect Backup, vRanger Pro, VCB, VMware VDR, Mimosa/Nearpoint, NetApp Snap Mirror and Snap Vault, Symantec BackupExec, Mozy Pro online backup, Tivoli and a variety of other backup/DR technologies, Data Center Virtualization, ACE, GSS, ANM, and WAAS.

Operating Systems: Windows 9X/XP/7, Windows Server 2003, 2008, UNIX, Shell Scripting, UCCX - Scripting,Redhat Linux Enterprise Edition5, Knowledge of scripting languages (shell scripting, PERL, Rules files, regular expressions, JavaScript and/or Impact policy language, 14+ years HTML 5 and Django/Python web application development

Cisco IP Telephony: CUCM (4.X-7.X), Gatekeepers, Voice Gateways, Cisco Unity, Cisco Unity Connection, CME, Cisco Presence, Cisco IP Communicator, Cisco IP Soft Phone, Cisco 792X,794X,796X IP Phones, IPCC Express.

Systems: Windows NT/2000/XP/Vista and Blackberry Enterprise Server.

Networks: Cisco routers 3600, 3700, 3800/2800 ISR series and CME/SRST router, switches (LAN, WAN, 2950, 3550, 3560 and 3750 series).

Security: Cisco ACS, TACACS. 802.1x, WPA.

Protocols: H323. SIP, MGCP, SCCP, RTP, TCP/IP, SNMP, RIP, IGRP, OSPF, EIGRP and HSRP.

PROFESSIONAL EXPERIENCE:

Confidential

Network Architect /Network Support Engineer

Responsibilities:

  • Responsible for planning, designing, engineering configuration and troubleshooting complex data, video and voice networks. Demonstrated skills in Cisco Voice technologies using Cisco Call Manager, Unity and Speech connect and implement the technical architecture and physical design of the network, analyze existing voice and data networks and recommend solutions. Install and configure voice gateways as part of the IP telephony system. Install and configure LAN switches. Troubleshoot, maintain, upgrade, and provide solutions to complex hardware/software problems.
  • Designing and implementing Cisco VOIP products
  • Cisco Routing and Switching background w/QOS
  • Determines appropriateness of hardware/software changes and/or modifications related to VOIP on Cisco routers, switches, and call servers
  • Hands on experience with installing, upgrading and troubleshooting Cisco Unified Communications
  • Managing infrastructure of Large - size operational networks (4000+ routers/switches, 1000+ servers, 4000+ workstations) in a high-paced fluid environment
  • Lead Cisco VOIP deployment projects
  • Lead requirements gathering on Cisco VOIP projects
  • Provides reports and creates documentation for methodology, process, and procedure for current and future VOIP infrastructure deployments
  • Self-motivated and desired to succeed
  • Strong understanding of TCP/IP and ability to install and troubleshoot LANs and WANs
  • Strong written and oral communication
  • Test and Turn Up trunks, PRI s, and network links in Cisco Router/Voice Gateways
  • Perform complex assignments; demands familiarity with principles, theories, concepts and technologies as well as applied knowledge of established procedures, policies and practices

Confidential

Network Architect /Network Support Engineer

Responsibilities:

  • Extensively worked on Application and Infrastructure layer KPIs on URLS(http get/post), WSDL call, Servers, Network, firewalls, Load-Balancer.
  • Worked with multiple systems including Windows Server 2008 R2, Systems Administration Server Installation and Support, Active directory migration, Data Recovery Service and Data Backup, Spyware and Virus Removal, Network Service and Monitoring, Virus, Spyware, Malware Removal and Internet Security Solutions.
  • Configuration, installation, upgrade migration, and implementation of Active Directory 2003 & 2008R2.
  • Configuration, installation, and migrationof VMware virtualization
  • Configuration, installation and upgrade TACACS.
  • Integrated Cisco Contact Center express with Cisco Unified Communications Manager.
  • Demonstrated thorough understanding of Voice Gateways (H323, MGCP), Protocols (H323, SIP, and MGCP), IP Contact Center technologies (ACD, IVR) and CTI application in providing solutions to customer.
  • Integrated the Cisco Unified Wireless IP Phones (792X series) with Cisco Unified Communications Manager and Cisco Unified Communications Manager Express using IEEE 802.11 over a Cisco access point.
  • Implemented Cisco Unified Communications Manager Applications like CUPS, IPMA, Extension mobility and Attendant console as per customer requirement.
  • Configure the broadsoft call manager
  • Configure broadsoft architecture design to meet client requirement.
  • Configure Subscriber Level Configuration Parameters
  • Enable SIP Authentication for a line
  • Configure a Multipurpose Key for “eventlist BLF”.
  • Configuration files be converted into a binary format, an extra step must be performed when using this feature
  • Configured via web GUI as well as via the Configuration File through TFTP or HTTP.
  • Hands on experience with Aruba wireless controllers, Aruba Airwave, and Aruba ClearPass
  • Designing, installing, configuring, and troubleshooting of Aruba Wireless environment;
  • Installation and Configuration of Kerberos, SPNs. Application utilization and integration with Kerberos.
  • Provide technical support in the resolution of technical issues for IBM ISS NIPS solution
  • Responsible for new IPS deployments, upgrade execution and IPS retirement.
  • Provisioning, Monitoring and management of Firewall/Intrusion Detection / Prevention System using tools
  • Experience with solarwinds setting up of custom views to web based monitoring.
  • On-boarding of enterprise assets (servers, network, storage and backup) to solarwinds platform
  • Configuration of threshold and monitoring parameters for proactive and predictive monitoring
  • Monitoring Alerts - utilization of CPU / Memory and Disk space usage of servers
  • Application monitoring - IIS traffic monitoring, SQL (Query monitoring) and Exchange -Mail box monitoring
  • Monitoring of Network devices - Routers, Switches, Load balancers, ASA Firewall
  • Configuring SAM - Application Monitoring for various application based usages. Scan node for applications Confidential intervals by configuring polling intervals
  • Setting up of dashboard views / custom views for specified user views based on requirements.
  • Manage Enterprise Intrusion Detection / Intrusion Prevention Systems IBM ISS, McAfee Intrushield etc.
  • Installation, Configuration, and Upgrade of IIS 5, IIS 6, and IIS 7. (Apache, Weblogic or similar web systems environments depending on application or project needs.
  • LAN and WAN technologies, dynamic routing (OSPF, BGP-4, MPLS (RSVP/LDP) and QoS (RED, WFQ) etc), remote access via VPN, network security standards and best practices, circuit resiliency and failover mechanisms between diverse data centers.
  • Experienced UCCE engineer who is familiar with scripting
  • Experience working with Verint call recording platform
  • Knowledge of eGain reporting platform
  • Working knowledge of RMG Symon wallboards
  • Working knowledge of VoiceTone network IVR
  • Experience working on voice and data networks and integration points
  • Excellent interpersonal, communicationpresentation and written skills
  • 15 Years of expertise on Cisco contact center and unified communications platforms
  • 15 Years of experience in Contact Center functionality and Business imperative
  • Strong knowledge in Cisco ICM scripting, including script monitoring
  • Extensive experience in SIT, Backend Database, Performance, Security, User Acceptance (UAT)
  • Experience in software QA processes and standards
  • Strong experience with deployment of LIMS, SCADA, EDMS, ERP, LMS and/or other laboratory and manufacturing systems in a QA/Validation role.
  • Works with Gap Assessments and Remediation Plans
  • Strong knowledge in Cisco ICM scripting, including script monitoring
  • Expert level experience with Cisco ASA products
  • Experience with the architecture, deployment, and operations of Cisco ISE
  • Experience building the network access manager (NAM) client with an ISE back - end, for both wired & wireless, using EAP-TLS certs
  • Experience installing, configuring and troubleshooting one or more of the following Cisco security technologies: Cisco ISE, IPS/SourceFire, ASA, CSM, VPN, ACS, FTD, ACI, Trustsec, StealthWatch
  • Configure Cisco ISE node with the Monitoring persona functions as the log collector and stores log messages from all the Administration and Policy Service nodes in a network.
  • Provides all the configuration, authentication, and policy capabilities that are required for network model, and the secondary Cisco ISE node functions in a backup role.
  • Centralized authentication, authorization, and accounting (AAA) operations between clients and the primary Cisco ISE node are performed using the RADIUS protocol.
  • Ability to split the load in this way directly reduces the stress on each Cisco ISE node in the system
  • Deployments, each node can perform its own specific operations, such as network admission or device administration, and still perform all the AAA functions in the event of a failure.
  • Centralized logging for large Cisco ISE networks
  • Centralized management model helps maintain a consistent, synchronized AAA policy.
  • Configure and ensure that Cisco ISE can interoperate with network switches and that functions from Cisco ISE are successful across the network segment.
  • Experience with remote access and VPN technologies
  • Expert level experience with SourceFire IPS & Defense Center/ Cisco FirePower & FireSight
  • Experience with Firewalls - Fortinet/FortiGate, & Palo Alto and/or other next generation firewall solutions
  • IPS/IDSs - Cisco traditional IPS, Cisco FirePower, and FortiGate IPS
  • Expert level understanding of Network Security Architecture (Internet Edge, Data Center Edge, Policy Enforcement Design)
  • Expert level understanding of F5 LTM
  • Experience in in F5 ASM architecture and deployment strategies
  • Experience with PCI network controls, PCI compliance and assessments
  • Strong experience in creating HPNA policies, diagnostics and reports
  • Experience with Opsware Network Automation
  • Experience with HP technologies, HP products
  • Experience with Network Automation HPNA

We'd love your feedback!