We provide IT Staff Augmentation Services!

Network Architect Resume

Niles, OH


  • A dedicated Professional with expertise in Designing, Implementation, Administration, Operations and Troubleshooting of enterprise data networks as a Network Architect.
  • Worked on Cisco Catalyst series 2900, 3560, 3750, 4500, 4900, 6500 and Cisco 1800, 2600, 3600, 7200 , 7600 routers.
  • Worked on Nexus platform 7K, 5K series (5548, 5020 and 5010) and FEX (2248, and 2232) and deployed VPC, VDC and OTV and successfully implemented VSS on the cisco catalyst switches.
  • Wide experience on Cisco routing and switching platforms such as Nexus, ISR , and ASR .
  • Expertise understanding in implementing and configuring F5 Big - IP LTM-3900, and 6900 LOAD BALANCERS including maintenance and policies.
  • Strong working experience on Firewalls, ACS, Cisco ASA 5540 Series.
  • Proficient hands on experience in configuration & troubleshooting of routing protocols and deployment of OSPF, EIGRP, BGP and Policy routing on Cisco Routers.
  • Experience in implementing, maintaining and troubleshooting L2 switching tasks such as VLANs, VTP, VLAN Trunking using ISL and 802.1Q, STP, RSTP, PVST+, EtherChannel using LACP and PAgP, Inter-Vlan routing, CEF and DCEF .
  • Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology (LACP, PAgP).
  • Expertise in implementing Security policies like NAT, PAT, IDS, IPS, VPN and Access lists.
  • Experience in configuration of Cisco Meraki Wireless LAN Controllers and Wireless Security PEAP/WPA, LEAP/WEPand various EAP over PEAP Protocols including EAP-TLS, EAP-TTLS, EAP-PEAP-MSCHAP, EAP GTC., etc.
  • Configure and install Cisco ACE, Palo Alto firewalls.
  • Network Security: Knowledge of Firewalls - ASA, IPsec, IPS/IDS, & VPN.
  • Cisco Routers, Cisco Switches, Cisco IOS, eBGP, iBGP, EIGRP (IPv6), OSPF v3, QoS, Layer 2, Layer 3, IPv4, IPv6, MPLS, RIP v2 and RIP ng, Advanced IP Addressing and Routing, Configuration of secure routing solutions, WLAN, LAN and WAN, DMVPN (Dynamic Multipoint VPN), Cisco StackWise, VSS (Virtual Switch Services)
  • Proficient in using MS Visio for documentation


Routers: Cisco 1800, 2600, 2800, 2900, 3600, 3800, 3900, 7200, 7300, 7600, ASR

Switches: Cisco Catalyst 3560, 3750, 4500, 4900, 6500 & Nexus 2000, 5000, 6000 and 7000

Firewalls & Load Balancers: Cisco ASA series, Palo Alto, Juniper, IPSEC and SSL VPN, HTTP, IPS/IDS, IOS Firewall features, DMZ set up, F-5 (LTM, GTM, APM, AFM, ASM )

Routing: OSPF, EIGRP, BGP, RIP, VPN, MPLS, Ether Channels, Route Filtering, Cisco VoIP Gateways, Cisco ACS, Redistribution, Summarization.

Switching: VLANs, Dot1Q, VTP, STP, RSTP, VLAN Maps, HSRP, GLBP, CEF, DCEF, Port Security, Nexus OTV and Fabric path

LAN/WAN Technologies: Ethernet, Frame relay, HDLC, PPP, T1, T3, OC Standard, DSL, ISDN, Cisco Wireless MERAKI, WLC Flex 7500 series


Network Monitoring and Management Tools: WhatsUp Gold, Wireshark, GNS3, Solar winds


Confidential, Niles, OH

Network Architect


  • Served as a project manager in the telecommunication department for the regions including Americas, Europe and Asia Pacific. Responsibilities included the design, implementation, and support of various platforms and technologies including Cisco Nexus 7010/7004/5596/5548/2248 switches, Cisco ASA 5585/5545 firewall pairs, and Cisco ASR 1006/1004 routers.
  • The core of the network consists of Cisco ASA 5585's and Nexus 7010's configured for Internal/External/Business Partner Virtual Device Contexts (VDC's), and Nexus 5596's configured to support double-sided Virtual Port Channels (vPC's). Approximately 20 virtual routing and forwarding tables (VRF's) are configured on the Nexus 7010's to support routing/security through the Cisco 5585 ASA's.
  • Configured three Virtual Device Contexts (VDC's) in addition to the Admin VDC. Features utilized include single sided Virtual Port Channels (vPC's) to support connectivity to Cisco 3750 switch stacks, peer gateway, peer switch, and VTP in client/server mode.
  • To Design, Maintain and troubleshoot issues in Datacenter Network in all areas which include switching, routing, Firewalls and Load balancer.
  • Project includes several migrations from Cisco routers to Juniper, Palo Alto, ASA firewalls etc. Design of DMZ trained in Spine Leaf Architecture.
  • Perform extensive traffic analyzing for the VMWARE infrastructure Dell Avamar Backup System.
  • Supervise a group of engineers, their responsible for maintaining our ticket system, working with customers, and planning solutions for SNOW ticket system.
  • Manage network and security team to provide solution's in a timely manner and execute reports to appropriate personal.
  • Implement, maintain, project manage and optimize WHATSUP gold, Cisco Prime, Cisco Wireless controllers, Nexus 9K Data center Environment, Cisco VOIP, and all the above to provide solutions to any member of the team and university.
  • Diagnose problems and troubleshoot the entire Meraki product line, including wireless access points, security appliances, and switches. Primarily troubleshooting advanced problems with LANs, VLANs, VPNs, NAT devices, Wireless, and VoIP Deployments.
  • Configuration and maintenance of Cisco Routers & Switches, Nexus Switches, Juniper and Palo Alto Firewalls, F5 BigIP Load balancers, Blue Coat Proxies and Riverbed WAN/MAN Optimizers.
  • Palo Alto design and installation (Application and URL filtering, SSL decryption, SSL Forward Proxy). Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls. Successfully installed PA-5000 series firewalls in Data Center as perimeter Firewalls.
  • Worked on Cisco ISE for user Authentication, Security Group Tags, MAC based authentication for Wireless and Wired users, 802.1X, EAP, PEAP etc.
  • Responsible for the IPAM (IP Address management) system for a very large WAN/LAN network (QIP) using Solarwinds IPAM and Infoblox DNS and DHCP servers. Experience with DHCP scopes, IP reservations, DNS host entries, pointers, delegations, Zones, DNSSec etc.
  • Implemented Firewall rules and NAT rules by generating network policies. Responsible for packet capture analysis, syslog and firewall log analysis. Implementation of the network mapping software like Solar Winds, WhatsUp Gold for mapping network diagrams for commissioned and decommissioned network devices.
  • Implementing network design standards for hardware and software. Developing and maintain Network Documentation (Visio diagrams, Excel spreadsheets, Word documents, etc.) Configure and troubleshoot network elements in a test/dev environment.

Confidential, Canonsburg, PA

IT Network Architect


  • Understanding of physical and financial power generation as well as Retail business functions. Project management & communication skills. Excellent interpersonal skills Provide support in establishing and maintaining the procedures for the Networks.
  • Advanced knowledge of OSI model, TCP/IP, Internet technologies, system security, firewall infrastructure, network architecture and Cisco network routing / switching (Layer 2 and 3) experience, including LAN and WAN, design and implementation which includes Layer 1 to Layer 7 experience.
  • Cisco Router ASR 1000 and 9000 series. Integrated Services 4000, 3900, 2900. 7600, 7300 and 7200 Series- configuration, implementation, maintenance
  • Cisco Firewall ASA 5500 - x series configuration, implementation, maintenance
  • Cisco Switch - Nexus 7k, 6k, 5k and 2k. and Catalyst 4500, 3700, 3500, 4900 and 6500 - configuration, implementation, maintenance
  • Cisco VPN configuration, implementation, maintenance Cisco Meraki Wireless and ACS configuration, implementation, maintenance Remote access maintenance and configuration. IP Camera and Server configuration, implementation, maintenance
  • Monitoring Systems: WhatsUp gold, Netscout and others Network Device/Warehouse Inventory Management Internet connectivity configuration, implementation, maintenance. UNIX scripting and log maintenance. Provide 24-hour on-call support, including evenings and weekends.
  • TCP/IP protocol analysis. VoIP protocol configuration and analysis. Network monitoring tools maintenance and configuration.
  • Diagnose problems and troubleshoot the entire Meraki product line, including wireless access points, security appliances, and switches. Primarily troubleshooting advanced problems with LANs, VLANs, VPNs, NAT devices, Wireless, and VoIP Deployments.
  • Diagnose and troubleshoot wireless, security, switching, and other various network ­related issues reported by Cisco Meraki customers and partners.
  • Collaborate with other Support Team members to fix network outages, misconfigurations, and complex networking issues of customers’ devices.
  • Experience in configuration of Cisco Wireless LAN Controllers and Wireless Security PEAP/WPA, LEAP/WEPand various EAP over PEAP Protocols including EAP-TLS, EAP-TTLS, EAP-PEAP-MSCHAP, EAP GTC., etc.
  • In depth working knowledge of CISCO devices like Nexus, ASA, Catalyst Switches 6500, 4500, 3750 Comfortable working with Catalyst IOS and NXOS.
  • Routing/WAN: EIGRP, OSPF, RIP, BGP, route redistribution, IP Routing, HDLC, PPP, VoIP. Switching: Vlan, VTP, STP, Ether channel, HSRP, VRRP, GLBP
  • MACD (Moves, adds changes) of Cisco IP phone extensions & IP Telephony features and services. Providing advance support for Cisco UC products, detailed RTMT trace log debugging and complex dial-plan troubleshooting.
  • Configuration and administration of Cisco ASA 5525/45-X, Juniper SRX 240/1400, Cisco 3945 routers, Cisco 3750 switches
  • Strong experience in Network security using ASA Firewall, Checkpoint, Palo Alto, Cisco IDS/IPS and IPSEC/SSL VPN. Work with process teams to test and refine network configurations.
  • Work with technical and business analysts within the organization to define and build required network profiles.
  • Independently develop appropriate solutions to network / application related issues.
  • Ensure change control procedures are followed.

Confidential, San Jose, CA

Sr. IT Network Engineer


  • In the process of Data center fabric migration, performed migration from legacy Catalyst 6513 Switches to Nexus 7010 switches adhering to ITIL change Management Procedure.
  • Physically deployed new Cisco Nexus devices, Catalyst and Nexus replacement blades.
  • Use acquired knowledge to suggest, edit, and write in-depth Knowledge Base articles.
  • Reproduce potential bugs and critical issues in house in order to report to engineering team.
  • Configured and maintained VPCs with 7010 and 5548 in the network. Also configured and maintained VDCs in 7010 switches, maintained VRFs in those separate VDCs .
  • Worked with Sup 2E for 7010 switch, F cards for L2 switching and few M cards for L3 Proxy routing purposes for F cards.
  • Used Fabric Extenders like 2248TP GE series for the top of the rack solution and used 5548P for the end of the row solution.
  • Scheduled maintenance of Nexus (2248, 5548, and 7010) switches so that there are no Orphan ports in the network, and all Users to be dual homed, so that they have enough redundancy.
  • Worked on OTV to extend L2 VLANs between data centers over IP on Nexus 7010 Switches, also, 3600, 7200, 7600 series Cisco routers.
  • Configured and maintained EIGRP, OSPF and BGP on Cis co Routers.
  • Used Cisco ASA 5540 firewall for Enterprise security, configured ACL’s for Internet requests to Server Farm in LAN and DMZ.
  • Provided VPN services to site-to-site and, Remote access VPNs using IPsec and GRE Tunneling mechanisms.
  • Performed network administration tasks such as creation and management of VLANS, Port security, Trunking, RPVST+ , Inter-VLAN routing, and LAN security.
  • Configured policy statements, and routing instances.
  • Performed Network Security Assessment and implemented security features such as network filtering, SSH, AAA, SNMP access lists, VTY access lists, EIGRP MD5 authentication, and HSRP authentication.
  • Maintained F5 BIG-IP LTM 6900 for providing application redundancy, load balancing and policies.
  • Used internal network monitoring tools (Solar Winds) to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption.

Confidential, Manassas, VA

Sr. Network Engineer


  • Regularly interact with management, technical support, development support and Client Support.
  • Work with client community to understand business processes in order to determine network requirements.
  • Installed, Configured and maintained 2600, 3600, 7613 Cisco Routers and 3750, 4500 and 6500 series Cisco Switches. Performed VSS on cisco catalyst 6500 series switches.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
  • Experienced in handling Panorama firewall management tool to administer Palo firewalls. Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.
  • Maintenance of TACACS+ and RADIUS servers for AAA authentication and user authentication.
  • Configured and managed Cisco access layer routers and switches & carried out route redistribution & manipulated route updates using distribute lists, route-maps & administrative distance, and offset-lists. Configured routing protocols like EIGRP, OSPF & BGP and troubleshooting layer3 issues.
  • Migrated and implemented new solutions with Cisco ASA Firewall series 5505, 5510, 5512-X.
  • Supported the decommission process for each end of life device once all traffic was migrated to the Bluecoat standard.
  • Data center design, management and migration planning with different technologies.
  • Learned and Tested various BGP attributes like local preference, MED, Weight and replicated customer issues in the testing environment lab.
  • Configured PVSTP+ for loop prevention and VTP for Inter-VLAN Routing.
  • Implemented port aggregation & link negotiation using LACP and PAGP .
  • Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location of office on the switched network.
  • Configured and deployed BIG-IP LTM 6900 for providing application redundancy and load balancing.
  • Configured Client VPN technologies including Cisco’s VPN client via IPSEC .
  • Troubleshot issues and outages on Trunks and Router interfaces and firewalls extensively.
  • Involved in operations and administration of WAN consisting Ethernet Handoffs, T1, DS3 , and Optic Fiber Handoffs.
  • Provided technical assistance for LAN/WAN management & troubleshooting and complex customer issues using Network monitoring tool’s such as Solar winds.


Network Analyst, Los Angeles, C A


  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls
  • Post build configurations, security hardening, user management, validations, firmware/patches etc.
  • Configuration of Cicso catalyst switches and racking of servers, networking and interfaces.
  • Network configuration for interfaces, switch ports, ethernet cards, host names and netmasks details
  • Expertise in configuring and administering NFS, DNS, LDAP, DHCP, Mail Servers clients.
  • Work with engineering and management to diagnose and resolve critical and escalated issues.
  • Validating wireless designs and set expectations accordingly
  • Verifying performance on campus as expected (throughput, latency, etc.)
  • Assisting in troubleshooting wireless issues, includes work with clients AP's & devices i.e. laptops, tablets, smart phones, iPads, etc.
  • Creating reports on wireless coverage and address concerns.
  • Wireless infrastructure (WiSM 2.0, CPI 2.2) Cisco + Aruba, Optimized performance (802.11ac) and QoS options for VoIP and Video.
  • Familiar with shell scripts to run on Linux and Solaris environment for administration.
  • Supporting and resolving tickets/incidents assigned to UNIX group, validations and documentation.
  • Planning and provisioning of hardware, storage allocation and network configurations.
  • Windows 2008 based network creation and implementation in Los Angeles, California.
  • The project includes 35 nodes, layer 3 switch, Cisco 5900 Series Router Configuration and voice (VoIP) service establishment.
  • Basic Wired and Wireless Network establishment with layer 3 switch and controlled security camera guidance system, which are connected through Wi-Max Technology.
  • Secure VPN tunnel establishment and secure it with the Cisco PIX hardware firewall for two different regional campuses located in north and south respectively from Los Angeles.

Hire Now