Network Security Engineer Resume
SUMMARY:
Network and Security engineer with 7.5+ years’ experience. Strong on Palo Alto Next generation Firewalls, ACLs, VPN, Switching and Routing skills. A good team player, quick learner, self - starter, problem solver, professional and friendly. Ready to adapt into new security/network engineer role.
TECHNICAL SKILLS:
Firewalls: Palo Alto (3020,3050,3060,5050,5220,7050 & PA-VM on VMWare-ESXi platform - 7.0 till 8.1.6 OS), Juniper SRX, Netscreen & ASA, Basic knowledge on Checkpoint, Firepower and Fortigate
Routers: Cisco 7200, 3800, 2800 Series and Juniper Routers
Routing protocols: RIP V1 / V2, BGP, EIGRP, OSPF, VRF, HSRP and NSRP
Switches: Cisco (4500, 3750, 2950), Brocade (VDX 8770,6740, MLXe-4/16) and Foundry switches
Switching protocols: VLAN, STP, RSTP
Languages: C, C++ & Python
Log monitors: Log collectors, Splunk and Syslog servers
Networking tools: Palo Alto migration tool, VMWare vSphere, Wireshark, Skybox, APCON, nGeniusONE, MRTG, smoke ping, Net cool, Dotcom, NSM and Keynote
Ticketing tools: Service now, BMC Remedy, Tivoli and SDM
WORK EXPERIENCE:
Network Security Engineer
Confidential
Responsibilities:
- Design, Deploy, replace, configure and maintain physical Palo Alto (PA) firewalls
- Deploy, configure and maintain virtual palo alto firewalls on vmware ESXi platform
- Design and Migrate/replace ASA firewalls with Palo Alto firewalls
- Design, configure, maintain O365 project for all client locations across the world
- Configure Global protect VPN, Client-less VPN, User ID mapping & redistribution.
- Configure Log forwarding & security profiles like Antivirus, Anti-Spyware, Vulnerability protection
- Configure custom App-ID, URL category
- Working on segmentation projects like Migrate production networks behind PA firewalls
- Merging panorama’s and firewalls. Moving firewalls from one panorama to other.
- Install/upgrade software in PA firewalls, Panorama, Log collectors & wildfire devices
- Configure L2 & L3 VLAN’s in Brocade (MLX & VDX) switches & PA firewalls
- Configure log collectors, Splunk & server profiles to monitor traffic
- Configure interface, VLAN, Virtual Routers (Routes), VSYS & Zones in PA firewalls
- Configure Security, NAT, QOS & Application override rules.
- Configure & manage Device Groups in Panorama
- Reboot/Fail-over firewalls & panorama to resolve any issues
- Assist/train team members/peers as needed.
- Troubleshoot & resolve incidents using wire-shark, APCON, nGeniusONE, splunk & Palo alto TAC
Network Security Engineer
Confidential
Responsibilities:
- Design, implement and troubleshoot network Security & routing/switching rules.
- Maintaining and troubleshooting LAN/WAN networks, Cisco routers, switches, ASA Firewalls, and Firepower IPS
- Deploying Firepower managed device.
- Configuring policies in Firepower devices.
- Install/upgrade licenses in Firepower devices
- Install/upgrade IOS on Cisco Router & Switches
- Configuration and troubleshooting of IPSEC VPN, ACL, NAT, Policies in ASA
- Co-ordination with other technical teams.
Senior Network Security
Confidential
Responsibilities:
- Design, implement and troubleshoot network Security & routing/switching rules.
- Maintaining and troubleshooting LAN/WAN networks, Cisco routers, switches, Wireless controllers, ASA, Palo Alto, Checkpoint, FortiGate & Juniper firewalls
- Configuring Syslog, NTP, QoS and TACACS+ on network devices
- Install/upgrade IOS on Cisco Router & Switches
- Configuration and Management of IPSEC Site to Site VPN, remote access VPN and firewall failover
- Configuration and troubleshooting of IPSEC VPN, ACL, NAT, Policies in ASA, Juniper SRX, Palo Alto, Checkpoint and Fortigate firewalls
- Performing firewall migrations.
- Configuring policies on Blue coat proxy.
- Coordinating with vendor TAC(Technical assistance center) to resolve issues.
- BGP, OSPF Protocol configuration for routers in different geographies.
- Configure SNMP for network monitoring.
- Create, delete and manage VLAN and VTP
- Performing RCA for incidents.
Senior Systems Executive
Confidential
Responsibilities:
- Maintaining & Troubleshooting LAN/WAN networks, Cisco/Foundry Switches, Cisco/Juniper routers, Foundry load balancer, ASA and Net screen firewalls.
- IP provisioning using IP control. switch port & VLAN configuration using NISapp
- Configuring TACACS+ on different network devices
- Decommissioning of server and related configuration
- Performing firewall migrations.
- Running delta to analyze the impact of configuration being pushed.
- Troubleshooting OSPF, BGP alerts and VPN issues
- Configuration and troubleshooting of IPSEC VPN, ACL, NAT, Policies in ASA and Net screen firewalls.
- Centralized configuration and management of firewalls using Juniper Network and security Manager (NSM).
- Coordinating with L3 team and vendor TAC (Technical assistance center) to resolve issues.
- Log problem tickets for alerts, issues and chronic errors
- Following change management process to implement changes
- Run end to end incident resolution calls
Confidential
Network Administrator
Responsibilities:
- Troubleshooting Switches and Routers for link/configuration issues.
- IP Provisioning and Configuring VLAN's.
- Configuring/troubleshooting routing protocol (RIP, EIGRP, OSPF) issues.
- Troubleshooting and resolution of Network and security related incidents.
- Designing, Implementing and troubleshooting Policy Based Routing.
- Incident Management, change, problem management.
- Coordinating with Service Providers like ATT, MCI, Sprint etc in times of issues/upgrade/changes for end to end resolution.
- Coordination with the customers and network hardware vendors.
- Interacting with clients while handling the bridge calls (when a High Severity issue is going on).
Confidential
Network Administrator
Responsibilities:
- Troubleshooting basic networking issues, log incidents and escalate to next level.
- Maintaining SLA, Metrics and performance aggregates.
- Monitoring the performance and availability of client d Confidential centers/servers/network circuits/websites using keynote, dotcom, Akamai monitoring tool and log issues based on issue type in SDM tool.
- Classify the issue (e.g. Severity level) based upon impact to the customer.
- Performing immediate countermeasures to minimize the impact of the issue on the customer.
- Run end to end incident resolution calls.
- Create and manage Process Manuals and Documentation’s based on the ITIL standards.