We provide IT Staff Augmentation Services!

Network Security Engineer Resume

5.00/5 (Submit Your Rating)

SUMMARY:

Network and Security engineer with 7.5+ years’ experience. Strong on Palo Alto Next generation Firewalls, ACLs, VPN, Switching and Routing skills. A good team player, quick learner, self - starter, problem solver, professional and friendly. Ready to adapt into new security/network engineer role.

TECHNICAL SKILLS:

Firewalls: Palo Alto (3020,3050,3060,5050,5220,7050 & PA-VM on VMWare-ESXi platform - 7.0 till 8.1.6 OS), Juniper SRX, Netscreen & ASA, Basic knowledge on Checkpoint, Firepower and Fortigate

Routers: Cisco 7200, 3800, 2800 Series and Juniper Routers

Routing protocols: RIP V1 / V2, BGP, EIGRP, OSPF, VRF, HSRP and NSRP

Switches: Cisco (4500, 3750, 2950), Brocade (VDX 8770,6740, MLXe-4/16) and Foundry switches

Switching protocols: VLAN, STP, RSTP

Languages: C, C++ & Python

Log monitors: Log collectors, Splunk and Syslog servers

Networking tools: Palo Alto migration tool, VMWare vSphere, Wireshark, Skybox, APCON, nGeniusONE, MRTG, smoke ping, Net cool, Dotcom, NSM and Keynote

Ticketing tools: Service now, BMC Remedy, Tivoli and SDM

WORK EXPERIENCE:

Network Security Engineer

Confidential

Responsibilities:

  • Design, Deploy, replace, configure and maintain physical Palo Alto (PA) firewalls
  • Deploy, configure and maintain virtual palo alto firewalls on vmware ESXi platform
  • Design and Migrate/replace ASA firewalls with Palo Alto firewalls
  • Design, configure, maintain O365 project for all client locations across the world
  • Configure Global protect VPN, Client-less VPN, User ID mapping & redistribution.
  • Configure Log forwarding & security profiles like Antivirus, Anti-Spyware, Vulnerability protection
  • Configure custom App-ID, URL category
  • Working on segmentation projects like Migrate production networks behind PA firewalls
  • Merging panorama’s and firewalls. Moving firewalls from one panorama to other.
  • Install/upgrade software in PA firewalls, Panorama, Log collectors & wildfire devices
  • Configure L2 & L3 VLAN’s in Brocade (MLX & VDX) switches & PA firewalls
  • Configure log collectors, Splunk & server profiles to monitor traffic
  • Configure interface, VLAN, Virtual Routers (Routes), VSYS & Zones in PA firewalls
  • Configure Security, NAT, QOS & Application override rules.
  • Configure & manage Device Groups in Panorama
  • Reboot/Fail-over firewalls & panorama to resolve any issues
  • Assist/train team members/peers as needed.
  • Troubleshoot & resolve incidents using wire-shark, APCON, nGeniusONE, splunk & Palo alto TAC

Network Security Engineer

Confidential

Responsibilities:

  • Design, implement and troubleshoot network Security & routing/switching rules.
  • Maintaining and troubleshooting LAN/WAN networks, Cisco routers, switches, ASA Firewalls, and Firepower IPS
  • Deploying Firepower managed device.
  • Configuring policies in Firepower devices.
  • Install/upgrade licenses in Firepower devices
  • Install/upgrade IOS on Cisco Router & Switches
  • Configuration and troubleshooting of IPSEC VPN, ACL, NAT, Policies in ASA
  • Co-ordination with other technical teams.

Senior Network Security

Confidential

Responsibilities:

  • Design, implement and troubleshoot network Security & routing/switching rules.
  • Maintaining and troubleshooting LAN/WAN networks, Cisco routers, switches, Wireless controllers, ASA, Palo Alto, Checkpoint, FortiGate & Juniper firewalls
  • Configuring Syslog, NTP, QoS and TACACS+ on network devices
  • Install/upgrade IOS on Cisco Router & Switches
  • Configuration and Management of IPSEC Site to Site VPN, remote access VPN and firewall failover
  • Configuration and troubleshooting of IPSEC VPN, ACL, NAT, Policies in ASA, Juniper SRX, Palo Alto, Checkpoint and Fortigate firewalls
  • Performing firewall migrations.
  • Configuring policies on Blue coat proxy.
  • Coordinating with vendor TAC(Technical assistance center) to resolve issues.
  • BGP, OSPF Protocol configuration for routers in different geographies.
  • Configure SNMP for network monitoring.
  • Create, delete and manage VLAN and VTP
  • Performing RCA for incidents.

Senior Systems Executive

Confidential

Responsibilities:

  • Maintaining & Troubleshooting LAN/WAN networks, Cisco/Foundry Switches, Cisco/Juniper routers, Foundry load balancer, ASA and Net screen firewalls.
  • IP provisioning using IP control. switch port & VLAN configuration using NISapp
  • Configuring TACACS+ on different network devices
  • Decommissioning of server and related configuration
  • Performing firewall migrations.
  • Running delta to analyze the impact of configuration being pushed.
  • Troubleshooting OSPF, BGP alerts and VPN issues
  • Configuration and troubleshooting of IPSEC VPN, ACL, NAT, Policies in ASA and Net screen firewalls.
  • Centralized configuration and management of firewalls using Juniper Network and security Manager (NSM).
  • Coordinating with L3 team and vendor TAC (Technical assistance center) to resolve issues.
  • Log problem tickets for alerts, issues and chronic errors
  • Following change management process to implement changes
  • Run end to end incident resolution calls

Confidential

Network Administrator

Responsibilities:

  • Troubleshooting Switches and Routers for link/configuration issues.
  • IP Provisioning and Configuring VLAN's.
  • Configuring/troubleshooting routing protocol (RIP, EIGRP, OSPF) issues.
  • Troubleshooting and resolution of Network and security related incidents.
  • Designing, Implementing and troubleshooting Policy Based Routing.
  • Incident Management, change, problem management.
  • Coordinating with Service Providers like ATT, MCI, Sprint etc in times of issues/upgrade/changes for end to end resolution.
  • Coordination with the customers and network hardware vendors.
  • Interacting with clients while handling the bridge calls (when a High Severity issue is going on).

Confidential

Network Administrator

Responsibilities:

  • Troubleshooting basic networking issues, log incidents and escalate to next level.
  • Maintaining SLA, Metrics and performance aggregates.
  • Monitoring the performance and availability of client d Confidential centers/servers/network circuits/websites using keynote, dotcom, Akamai monitoring tool and log issues based on issue type in SDM tool.
  • Classify the issue (e.g. Severity level) based upon impact to the customer.
  • Performing immediate countermeasures to minimize the impact of the issue on the customer.
  • Run end to end incident resolution calls.
  • Create and manage Process Manuals and Documentation’s based on the ITIL standards.

We'd love your feedback!