We provide IT Staff Augmentation Services!

Network Engineer / Security Engineer Resume

5.00/5 (Submit Your Rating)

Miami, FL

PROFESSIONAL SUMMARY:

  • Around 8 years of experience in Cisco/Juniper Networking, Security which includes designing, Deployment and providing network support, installation, and analysis for a broad range of LAN / WAN protocols.
  • Hands On experience Cisco IOS/IOS - XR/NX-OS, Juniper JUNOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, EIGRP, RIP, BGP v4.
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
  • Good knowledge of Confidential Firewalls and the Panorama Network Security Management Box.
  • Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.
  • Datacenter experience create new cable run list (L1), document runbook and Solution planning and upgrading, architect VXLAN, ACI and ASA cluster firewall with NAC, ISE
  • Experience in NS2/NS3 and other network Simulators.
  • Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 9K, 7010, 5000 series to provide a Flexible Access Solution for a datacenter access architecture
  • Experience with Spine Leaf Architecture, EVPN, VXLAN, VTEPS, VNI, BGP. Experience with Overlay and underlay technologies. Basic Knowledge on scripting in Python and Ansible.
  • Responsible for Check Point (Secure Platform R70) and Cisco ASA firewall administration across global networks.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Implemented and maintained Sourcefire intrusion detection/ prevention (IDS/IPS) system and hardened protection standards, IDS/IPS signatures on Firewall for Fine-tuning of TCP and UDP services.
  • Implemented traffic filters using standard and extended access-lists, distribute-lists and route maps.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.
  • Proficiency in Cisco ASAs, ISRs, Catalyst/Nexus, HP Switches, Cisco Meraki, Aruba, EIGRP, OSPF, BGP.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Participated in troubleshooting SDN /SD-WAN deployments
  • Provide consultation regarding segmentation, security and policy of the SDN network
  • Deployed, Managed, monitored and supported Bluecoat Proxy for content filtering, internet access between sites and VPN client users, forward proxy scenario and reverse proxy scenario for security and worked on adding URLs in Bluecoat Proxy SG's for URL filtering.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
  • Worked extensively on Cisco ASA 5500(5510/5540) Series. Experience with Confidential 5K series. Migration from ASA to PA.
  • Acquired knowledge in working with Meraki wireless access points MR 16, MR 18, MR 32, MR 42, MR 72 etc.
  • Experience with SSL decryption, APP ID, Threat ID, URL filtering in PA firewalls.
  • Worked on upgrading Aruba controllers and Access points in troubleshooting the onboarding devices with the networks.
  • Experience on WAN Optimization Technology, Riverbed.
  • Worked on Cisco Firewalls Cisco ASA 5500(5510/5540) Series and Checkpoint R75, 76, NGX R70 Firewalls.
  • Worked with Automation script with Python module like Chef & Ansible.
  • Experience on Fortinet FortiGate Appliances including 3200D, 1500D, 1200D running Latest 5.2 FortiOS
  • Configuring Cisco Wireless Controllers and AP’s.
  • Configuring the Network Admission Control (NAC).
  • Configuring Cisco WAAS.
  • Excellent customer management/resolution, problem solving, debugging skills and capable of quick learning, effectively analyze results, and implement and delivering solutions as an individual and as part of a team.
  • Hands on Experience testing iRules using Browser (IE), HTTP watch on F5 load balancers.
  • Provided support that included resolving day-to-day operational issues with tickets generated by a server.
  • Good understanding of SNMP, IP SLA and Network Monitoring with experience in tools like PRTG.

TECHNICAL SKILLS:

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP, SDN, SDWAN

Networking Hardware: Cisco Switches, Cisco Routers, ASA/Pix firewalls, IronPort

Routing Protocols: OSPF, IGRP, EIGRP, RIP, MPLS, IS: IS, BGP, Multicasting

Security Technologies: PAP, CHAP, Cisco PIX, Blue Coat

Network Monitoring: Cisco Works 2000, Wireshark, HRping, Riverbed

Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR

Routers: CISCO 2600, 2800,3600,3800,7200, Juniper M & T Series, Cisco CRS-1, CRS -3, GSR

Load Balancers: Cisco CSM, F5 Networks (BIG-IP)

Capacity & performance: Cisco works

Switches: CISCO 2900, 3500,4500,5000,6500, Nexus 7k,5k,2k

Programming Languages: C, C++, Perl, Power Shell, Python

Simulation Tools: GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence

Firewalls: Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580 ), McAfee Web Gateway, Checkpoint, Confidential firewalls.

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Features & Services: IOS and Features, HSRP, GLBP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR s, HLD and LLD documents, Dell equal logics

PROFESSIONAL EXPERIENCE:

Confidential, MIAMI, FL

Network Engineer / Security Engineer

Responsibilities:

  • Hands on Confidential Nuage routing experience. Implemented BGP on internet Peering routers. Worked on OSPF and BGP extensively in multi data center, multi-vendor equipment that includes Nuage, Cisco and Juniper
  • Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.
  • Change control / ITIL Service Controls / PCI compliance. Coordinating with various teams to perform Network Changes.
  • Migrated to Juniper EX series switches from Cisco 3500, 3700 series and 6500 series switches. Worked on setting up Cisco ASR as edge routers. Worked on BGP for inter Data center connectivity.
  • Experience in upgrading IOS in the Data center switches and routers. Worked on change controls and cut overs during weekend on routing, switching and security.
  • Monitor performance of network appliances and WAN utilizing using network analyzer like River Bed, Wireshark, Solar Wind.
  • WAN Optimization Hardware Exposure like Riverbed, CasCade, Flow monitor.
  • Developed the network on Network simulator NS2. Implemented lab setup for multiple deployments and tested.
  • Worked on SD-WAN solution. Configured policies, encryption methods for WAN traffic. Worked on L1/l2 issues with customer and Confidential professional services.
  • Documenting the network design using Microsoft Visio and GNS3.
  • Identification of Vicious Data Injections in WSN Using EADA NS2.
  • Installed, configured Cisco Meraki equipment and web-based monitoring platform for MR32 wireless access points.
  • Installed and Configured Firepower Management Center within new core network.
  • Installed and configured firepower IDS/IPS and came up with the baseline configuration for the organization
  • Performed virtualization and deployed various VMs using VMware ESXI 6.5
  • Extensive experience in cloud management systems and integrated with Azure for AD.
  • Configured Cloud Computing Engineering, concepts, service models (IaaS, PaaS, etc)
  • Involved in working with Data Center hardware and management software.
  • Performed Virtualization (compute, storage, network) e.g. VMWare, KVM.
  • Update customer networks by configuring routers, switches, and in corporate the SDWAN into the network design.
  • Worked with Confidential firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.
  • Install, manage and monitored Confidential Firewalls in Panorama.
  • Strong hands on experience on, ASA Firewalls, Confidential Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • Implemented Zone Based Firewalls and Security Rules on the Confidential Firewall. Exposure to wildfire feature of Confidential . Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Confidential design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPN's on Confidential Firewalls.
  • Worked on issues with IPS/IDS servers, Zscaler and Bluecoat Proxies.
  • Configuration and Administration of Cisco and Juniper Routers and Switches
  • Working with Juniper JUNOS on M and MX series routers.
  • Instrumental in the planning and architecture development of SDN based virtual enterprise gateways (infrastructure as a service -IaaS) reducing the customer time to deployment from months to days.
  • RESTful API, Multi-vendor OSS Integration experience
  • Network Management of IP and WAN networks (includes HP-OV, SNMP, and CLI knowledge).
  • Configuring IP Networking: Security Settings, QoS, Routing Protocols (OSPF, ISIS, BGP), signaling protocols like RSVP, LDP etc.
  • Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.
  • Worked in setting up Inter-VLAN routing, redistribution, access-lists and dynamic routing.

Environment: Cisco 3500, 3700, 3900 series Routers, Cisco ASA Firewalls, F5 ADC, Cisco ACI, VMware, Aruba, VTP, Juniper SSG-140, Confidential Wildfire, Juniper EX series switches, Cisco Firepower, Bluecoat, Aruba Wireless, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k, Nexus 2000 FEX, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting, ACL Configuration.

Confidential, Piscataway, NJ

Sr. Security Engineer

Responsibilities:

  • Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Configuration, Assigning DHCP profiles
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices and also configure 2k, 3k, 7k series Routers.
  • Acquired strong skills in working with cloud-based WLAN technologies like 802.11ac/b/n/g Cisco WLAN, CISCO Meraki and Aruba wireless.
  • Hands on experience in managing IT Network infrastructure in Meraki Dashboard (Access points, Switches etc.).
  • Working on network monitoring and analysis tools like, SOLAR WINDS, CISCO works and RIVER BED and Wireshark.
  • Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
  • Experience with configuring FCOE using Cisco nexus 5548
  • Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network
  • Managing and configuring Aruba Wireless devices and Cisco Access Points
  • Configuring and managing F5 ASM (Application security manager). Developed security policies.
  • Configure and troubleshoot Juniper EX series switches.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x
  • Designed & Deployed Cisco ISE and Provided comprehensive guest access management for Cisco ISE administrators.
  • Support Open config introduction into provisioning systems.
  • Involved in writing test automation for network manageability feature such as ZTP (Zero Touch Provisioning), various Open config Models, Netconf over TCP.
  • Configured Cisco ISE for Domain Integration and Active Directory Integration.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Performing network monitoring, providing analysis and network topologies using various tools like NS3, Wireshark, SolarWinds etc.
  • Redundancy &Management HSRP, VRRP, Wireshark, SolarWinds, SNMP, CISCO Works, GNS3, Riverbed.
  • Performed WLAN validation of newly installed APs using Netscout SurveyPro analytical software
  • Hands on Experience working with security issue like applying ACL's, configuring NAT and VPN
  • Responsible for design and implementation/migration from Cisco wireless platform to Aruba wireless platform.
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP.
  • Worked on integrating existing Layer 2 and Layer-3 networks with ACI.
  • Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
  • Well Experienced in configuring protocols HSRP, GLBP, PPP, PAP, CHAP, and SNMP.
  • Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers
  • Perform WLAN testing of newly installed WLAN controllers and Aps. Interface daily with customers and NOC reporting production milestones and any issues
  • Configured & Implemented Cisco Firepower Services with Cisco ASA 5500-X advanced security defenses
  • Worked with HP switches, Extrahop, F5 Load Balancer,
  • Experience with communicating with different customers, IT teams in gathering the details for the project
  • Switching tasks include VTP, ISL/ 802.1q, IP Sec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP.
  • Configure and install Aruba wireless controllers 7210 and access points.
  • Implementing PCI policies and procedures, ITIL practice in customer infrastructures.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IP Sec/GRE to Get VPN.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trucking, deployed port security when possible for user ports.
  • Involved in configuring Juniper SSG-140 and Cisco ASA firewall. worked with Cisco Channel partners to build practices around Cisco ACI
  • Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.
  • Strong hands on experience on, ASA Firewalls, Confidential Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • Implemented Zone Based Firewalls and Security Rules on the Confidential Firewall. Exposure to wildfire feature of Confidential . Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Confidential design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPN's on Confidential Firewalls.

Environment: Cisco ASA Firewalls, F5 ADC, Cisco 3900 Routers, Cisco Catalyst switches 6500, 3750, 3550, 2960 Switches, Juniper SSG-140, Confidential Wildfire, Juniper EX series switches, Riverbed, Cisco Firepower, Aruba Wireless, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k, Nexus 2000 FEX, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting, ACL Configuration.

Confidential, Albany, NY

Sr. Network Engineer / Network Analyst

Responsibilities:

  • Configure / Troubleshoot CISCO 12000, 7500, 3800 series routers and 3560 series switch for LAN/WAN connectivity.
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
  • Designed and implemented support for streaming Open config models in model driven telemetry.
  • Performing standard network operations via ITIL standard with Incident Management and Change Management.
  • Experience in configuring VPC, VDC and ISSU software upgrade in Nexus 7010
  • Actively involved in Switching Technology Administration including creating and managing VLANS, Port security- 802.1x, Trucking 802.1Q, RPVST+, Inter-VLAN routing, and LAN security on Cisco Catalyst Switches4507R+E, 6509-E and Cisco Nexus Switches 2232, 5596, 7009.
  • Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP, MPLS
  • Experience with deploying PIM Sparse-mode/Dense-mode multicasting in Campus locations.
  • Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.
  • Design, implement and administer IPv4 enterprise network infrastructure utilizing Juniper routers like Juniper MX80, MX 480 and MX960.
  • Devised new VPN solution utilizing Cisco Firepower and Cisco AnyConnect
  • Designed perimeter security policy; Implemented Firewall ACL's; Allowed access to specified services; Enabled IDS/IPS signatures in Firewall & fine-tuned TCP & UDP.
  • Design and implement Catalyst/ASA Firewall Service Module for various LAN’s. responsible for managing Cisco routers, switches, HP switches, F5 load-balancers using SNMP MIBs for fault detection and for fault isolation.
  • Working on products for WiFi alliance and WLAN testing & pre and post deployment wireless security WEP, WPA, EAP
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Implemented Cisco ISE 1.2 for Wireless 802.1x Authentication and Authorization with Flex Connect
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 2504, 4404, 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Upgrading Cisco ISE appliances company wide. Recently rolled out OpenDNS including onsite VM appliances.
  • Experienced on Cisco ISE and advanced technologies like QOS, Multicasting, MPLS and MPLS-VPN and Bluecoat proxy server SG.
  • Troubleshoot Fortinet Firewall, issues, edited policies and created rules.
  • Fortinet Firewall administration configuration of FortiGate 3000, 3815 series as per network diagram
  • Understand OSPF configuration and authentication settings to migrate routing over to the Firepower platform
  • Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity.
  • Responsible for the secure development lifecycle environment form NX-OS to Application Centric Infrastructure (ACI) in Data center, implemented in the lab environment.
  • Used Cisco ACI Fabric which is based on Cisco Nexus 9000 series switches and Cisco Application Virtual Switch (AVS)
  • Implemented Cisco ACI infrastructure for supporting rapid application change by reducing complexity with a common policy framework that can automate provisioning and resource management.
  • Installed and configured latest Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per business requirements.
  • Integrate Microsoft active directory (LDAP) into checkpoint for identity awareness and user authentication.
  • Implemented Cisco and Aruba Wireless Controllers, Aruba Wireless Access Points at corporate site as a part of WLAN Infrastructure.
  • Rapid firewall security assessments through Python automation.
  • Successful Data Center Migration Planning and Successfully developed Python automation scripts to perform Cisco firewall rule assessments.
  • Created the AAA servers for LDAP and AD authentication in F5 APM.
  • Configure and manage LDAP User management with Checkpoint Smart Directory. Implemented the policy rules and DMZ for multiple clients of the state on the Checkpoint firewall.
  • Worked with several network engineers for the understanding of Juniper SRX firewalls along with the changeover to Confidential . Confidential Firewall Management-Panorama.
  • Configured and deployed Cloud Lifecycle Management (CLM) DNS solution to automate IP address assignment and DNS record updating for new servers created in the CLM environment
  • Experienced in handling and installing Confidential Firewalls
  • Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.
  • Performed configuration for end users on CUCM, IM&P, Jabber, WebEx, Telepresence Video Communication Server, SX80 and end points DX80's, SX20's and SX10's.
  • Configured and managed APM as an SSL VPN solution for remote management.
  • Provided Layer-3 redundancy by implementing HSRP and GLBP for High availability
  • Implementation and Configuration (Profiles, iRules) of F5 Big-IP LTM-6400 load balancers
  • Implemented Access lists and policy mapping on Juniper router installed in each branch across all the states.
  • Worked on configuration commissioning and upgradation of the MPLS circuits for various branch offices. Disabling all unused ports and putting them in unused VLAN.
  • Implemented, analyzed and recommended appropriate system for the out of band management monitoring. Utilizing SolarWinds for primary and disaster recovery site.
  • Monitored and responded to network anomalies utilizing SolarWinds/Orion's software and recommended appropriate network solutions for issues.

Environment: Cisco 12000, 7500, 3800 series routers and Cisco 3560 series switches, Juniper EX4200, EX3200 Switches, Juniper MX80, MX480, MX960 Routers, F5 ADC, FHRP: HSRP, GLBP, ASR 9000, Cisco Firepower, Juniper SSG-140, Cisco Nexus Switches 2232, 5596, 7009, Checkpoint Firewall, VLAN, 802.1Q Trunking.

Confidential, Columbus, OH

Network Engineer

Responsibilities:

  • Assisted in troubleshooting LAN connectivity and hardware issues in the network of 500 hosts.
  • Studied and analyzed client requirements to provide solutions for network design, configuration, administration, and security.
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
  • Trouble-shooting in python automation script and networking issue with remote connection.
  • Responsible for maintaining the entire Routing and switching domain
  • Monitor performance of network and servers to identify potential problems and bottleneck.
  • Performed RIP & OSPF routing protocol administration.
  • Knowledge on Implementation of Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a spine and leaf architecture.
  • Interacted with support services to reduce the downtime on leased lines.
  • Maintenance and Troubleshooting of connectivity problems using Ping, Trace route.
  • Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issue Other responsibilities included documentation and support other teams
  • Configured OSPF over frame relay networks for NBMA and point to multipoint strategies
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Implemented security policies using ASA 55XX Firewall as well as Fortinet firewall IPS/IDS, AAA Security (TACACS+, RADIUS) on different series of routers
  • Configuring rules and Maintaining Confidential & Analysis of firewall logs using various tools. Build Cisco UCS 6200 series fabric interconnect. Recommend and design equipment configurations for LAN/WAN/VOIP deployment on Cisco, ADTRAN, Fortinet, F5, Redware and Bluecoat.
  • Troubleshooting of Cisco 2800,2900, 3900, 7200, 7600, ASR9k, CRS, GSR 12k Series routers
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Configure BGP features such as as-override, Local pre, EBGP load sharing on client connections
  • Configured and resolved various OSPF issues in an OSPF multi area environment between multiple branch routers.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.
  • Configuring HSRP between the 3845 router pairs of Gateway redundancy for the client desktops.
  • Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 & 6000 series.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures. configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and trouble shooting.
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Worked with Load balancing device like F5 Big-IP local traffic manager (LTM) 1600
  • Responsible for implementing QOS parameter on switching configuration.
  • Involved in Design and Implementation of complex networks related to extranet clients.
  • Knowledge and experience of 802.11 a/b/g/n Ethernet standard for wireless Technology.
  • Plan and implement complex network changes as per ITIL specifications.
  • Hands-on experience in the network management of circuits using TDM and Frame Relay network, performing configuration and provisioning management, fault management and performance monitoring.
  • Deliver IT Services Management (ITSM) solutions based on ITIL best practices that focused on the people, process, and technology, and information perspectives of providing business solutions within the IT infrastructure.
  • Troubleshooting the Network Routing protocols (BGP, EIGRP and OSPF) during the Migrations and new client connections.
  • Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/ 0/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K, Checkpoint, Cisco ASA

Confidential

Sr Network Engineer

Responsibilities:

  • Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches.
  • Involved in Local Area Network (LAN) design, troubleshooting, and maintenance as per company’s requirements.
  • Worked with sniffing tools like Ethereal to analyze the network problems.
  • Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
  • Performed replacements of failed hardware and upgraded software.
  • Configured VLANS to isolate different departments.
  • Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
  • Configured IPSEC VPN on SRX series firewalls.
  • Used TFTP server to backup Cisco configuration files.
  • Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company.
  • Design, installation and troubleshooting networks with hand-on experience with OSPF, ISIS, BGP
  • VPLS, Multicast, VPN, MPLS, & Traffic engineering.
  • Involved in configuring and implementing of Composite Network models consists of Cisco 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.
  • Implemented various Switch Port Security features as per the company’s policy
  • Configured RIP, and EIGRP on 2901 and 3925 Cisco routers.
  • Provided technical support for expansion of the existing network architecture to in corporate new users.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/ 0/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K,Checkpoint,Cisco ASA, Nexus 5k and 7k, NX-OS, Meraki, BIG-IP, LTM/GTM, ADC, Citrix NetScaler, Juniper EX4600, EX3400, EX4300, ACX1000, JunOS, Infoblox, DNS, DHCP, Web Application firewall (WAF), POP3, HTTP, NNTP, ICMP, SNMP, FTP, SSH, Wireshark, NAC, Cisco ACE 4710, OSPF, Frame Relay, MPLS, BGP,VLAN, IPSec, QOS,RIP.

Confidential

Network Engineer

Responsibilities:

  • Used TFTP server to backup Cisco configuration files.
  • Provided technical support for expansion of the existing network architecture to in corporate new users.
  • Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company
  • Configured STP for loop prevention on Cisco Catalyst Switches
  • Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.
  • Worked in setting up inter-vlan routing, redistribution, access-lists and dynamic routing.
  • Involved in configuring and implementing of Composite Network models consists of Cisco 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.
  • Implemented various Switch Port Security features as per the company’s policy
  • Configured VLANS to isolate different departments.
  • Configured IPSEC VPN on SRX series firewalls
  • Design, installation and troubleshooting networks with hand-on experience with OSPF, BGP, VPLS, Multicast, VPN, MPLS, & Traffic engineering.
  • Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches
  • Worked with snipping tools like Ethereal (Wireshark) to analyze the network problems.
  • Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
  • Performed replacements of failed hardware and upgraded software
  • Implementing Routing and Switching using the following protocols; OSPF, BGP on Juniper M series routers.
  • Involved in Local Area Network (LAN) implementation, troubleshooting, and maintenance as per company’s requirements.

Environment: Cisco 3750, 2950 series switches, Cisco 2620, 1900 series routers, VLAN’s, 802.1Q Trunking, HSRP, Sniffing Tools: Ethereal, Wireshark, Routing Protocols: OSPF, BGP. TFTP Server

We'd love your feedback!