We provide IT Staff Augmentation Services!

Iot Network Engineer Resume

3.00/5 (Submit Your Rating)

Dearborn, MI

SUMMARY:

  • 9 years of practical experience in the IT field as a network engineer, with proficient hands - on experience in the areas of Wi-Fi portfolio, Routing, Switching and Troubleshooting
  • Strong knowledge in configuring and troubleshooting routing protocols like RIP, OSPF, VOIP, IS-IS, SNMP, EIGRP and BGP.
  • Installing and Configuring Cisco switches 2960, 3560, 4500, 6500, 4900, 2900, 3750, Nexus 5000, Nexus 7000, 9000.
  • Hands-on expertise with routers 2600, 2900, 3600, 3900, 7200, 7600, ASR-901, ASR-903, ASR 5500, ASR-9010.
  • Implementation, working analysis, troubleshooting and documentation of LAN, WAN & WLAN architecture with excellent work experience on IP series.
  • Working knowledge with Load Balancers F5 LTM like 3900, 6900 for various applications
  • Working knowledge of Firewall, LDAP, AAA, TACACS/RADIUS, and IPSEC.
  • Proficient with TCP/IP and relative OSI models.
  • Security policy configuration including NAT, PAT, VPN, SSL-VPN, Route-maps and Access Control Lists.
  • Experienced in F5 LTM and GTM series 6400, 6800, 8800, 7250 (VIPRION) for corporate applications and their availability.
  • Exposure to multiple technologies and builds/troubleshooting: VSAN/NSX/SDN/VXLAN, etc.
  • Strong practical experience in IP addressing, Sub-netting, VLSM and ARP, proxy ARP, and ping concepts
  • Expertise in troubleshooting and configuring DNS, DHCP, TFTP, TELNET, SSH, FTP and NFS
  • Excellent hands-on experience in designing and implementing IP addressing that includes both IPV4 and IPV6
  • Implemented workflow actions to drive troubleshooting across multiple event types in Splunk.
  • Managing our ticketing and monitoring system provided by Solar winds
  • Specialize in migrating multivendor firewalls to next generation firewalls like Fortigate and Palo Alto Networks.
  • Implementation of Access lists, route maps, and distribute lists.
  • Strong fundamental knowledge in implementing Layer-2 level technologies including VLAN's, VTP, STP, RSTP and Trunking.
  • Technical support for improvement, up-gradation & expansion of the network architecture.
  • Working experience on tools and devices like Source Fire, Fire eye, Aruba, Cisco ASA, Cisco ISE
  • Working Experience in SONET, DWDM & ATM Networks.
  • Good understanding and working knowledge of ITIL standards.
  • Working Experience on web content filter and gateways like Blue Coat, Websense.
  • Comprehensive understanding of OSI Model, TCP/IP protocol suite (IP, ARP, ICMP, TCP, UDP, SNMP, FTP, TFTP).
  • Planning, Designing, Implementation of small, medium organizations including LAN, VLAN, WLAN and WAN on wired and wireless networks
  • Having vast experience in designing and configuring of Switches for VLANS and inter-switch communications

TECHNICAL SKILLS:

Routing: RIPV1, RIPV2, IGRP, EGIRP, OSPF, BGP, Route Filtering, Redistribution, Summarization, and Static Routing.

Switching: VLANs, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels, Transparent Bridging, CEF, DECF, Port Security, VSS Cisco 2960, 3560, 4500, 6500, 4900, 2900, 3750, Nexus 5000,Nexus 7000, 9000, WS-C4948, Juniper EX, QFX and Alcatel 7705 SA

Router:: Cisco 7600, 7606, 7609, 7613, 7200, 4400, 3900, 3800, 2900, 1900, ASR-901, ASR-903, ASR 5500, ASR-9010, And 7206 VX, Switches: Cisco Catalyst 6500, 4500, 3560, 3750, 2960, Nexus 7000, Nexus 6000, And Nexus 5000.

Network Security:: Cisco ASA5550/ 5540,NetScreen, Juniper SRX, Palo Alto, Checkpoints, AAA, Firemon, FREE RADIUS, CADA, LDAP, IPsec VPN, SSL VPN, IDS, IPS, Source Fire, Fire Eye, Cisco NAC (4.9.3), Cisco ISE, Aruba.

Network Management: Wire shark, SNMP, Ethereal, Solar Winds, Net cool, Science Logic, Log Logic, PRTG, Blue Coat, Websense, Cisco NAC, ISE, Active DirectoryOperating Systems: Windows (98, ME, 2000, XP, Sv2003, Sv2008, Sv2012, Vista, 7, 8), Ubuntu, Linux, Kali Linux.

Software s: VMware ESX 5.x, VMware Workstation, vCenter Server, System Center 2012 R2, MS SharePoint, C++.

PROFESSIONAL EXPERIENCE:

Confidential, Dearborn, MI

IOT Network Engineer

Responsibilities:

  • Working knowledge in VLAN, VTP, Inter VLAN Routing, STP, OSI Model, TCP/IP, DHCP, HSRP, NAT, ACL.
  • Worked as a part of network team where my daily tasks included configuring, monitoring and troubleshooting of TCP/ IP networks.
  • Planning and configuring the routing protocols such as OSPF, EIGRP, RIP, and Static Routing on the routers.
  • Planning, designing and configuration of various Cisco ISE strategies (Standalone, Distributed Setups).
  • Starting up a new IoT team to help support the network needed to run IoT products
  • Configuring user's roles and policies for authentication using Cisco NAC and monitoring the status of logged users in network using Cisco ISE.
  • Installed Cisco ISE 2.3 and 2.4, ISE integration with DNA
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server
  • Configuring and deploying Cisco NAC & Cisco ISE
  • Perform CRQ's with no impact to LAN/WAN while integrating new Network Access Control(NAC) equipment
  • Edge network access will use Cisco ISE to profile clients and automatically place them in a secured area of the
  • Network security policies should assume the IoT devices are unsecured.
  • Gateways should run a security agent/anti-virus
  • Network sessions should be encrypted on any type of wireless network
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs
  • 802.11a/b/g/n wireless networking and Cisco wireless implementation and management.
  • Experience in physical cabling, IP addressing and Subnetting with VLSM, configuring and supporting TCP/IP,
  • DNS, installing and configuring proxies. .
  • Working on Cisco NAC & ISE to authorize users based on protocols PEAP and EAP-TLS, also manage and monitor user's access privileges.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Worked extensively on device profiling, authentication and authorization mechanisms using AAA, RADIUS, 802.1X, Policy buildups for Posture Compliance Policies and Rules for checking the devices coming onto Network, Remediation Process, Access and Controls, and Segmenting the Global Networks for NAC Solutions for both Cisco and Fore scout NAC Appliances.

Environment: Cisco ISE 2.2. 2.3 and 2.4, DNA, AAA, NAC, LAN controllers 5508.

Confidential, North Carolina

Enterprise Network Engineer (Cisco PDI technical advisor)

Responsibilities:

  • Security - ASA, ISE, Content Security products like ESA & WSA and CWS
  • IoT & Wireless - Wireless LAN Controllers, Network connectivity i.e. Cisco’s Ruggedized Industrial router and switches configuration and functionality
  • Review Networking designs, project plans and implementation plans to offer guidance based on best-practices and Cisco Validated Designs
  • Support online tools for system sizing, compatibility and design.
  • IPv4/IPv6 routing (BGP/OSPF/EIGRP/RIP) as well as MPLS networking (VPN/VRF and VRF-Lite)
  • Educate Partners to locate and use documentation, tools and processes associated with solid planning principals.
  • Working with Cisco Partners with APIC-EM implementation, Prime infrastructure and understand the features like Discovery, Path Trace
  • Install APIC and ACI on cisco 9k
  • Implement Cisco ACI utilizing APIC and Nexus 9k to create private cloud facilities
  • Worked on integrating existing Layer 2 and Layer-3 networks with ACI
  • Deployed Cisco ACI across two data centers
  • Configuring and deploying Cisco NAC & Cisco ISE
  • Provide second/third level technical support for ACI (Application Centric Infrastructure)
  • Deploying IWAN solution with the built in IWAN App in the APIC-EM appliance.
  • Responsible for deploying, configuring, maintaining, and monitoring the ACS servers network.
  • Performing various operations in ACS through the ACS administrative interface.
  • Defining an administrator in ACS, assign a password and a role or set of roles that determine the access privilege, the administrator has for various operations.
  • Providing ACS configurable options that determine the IP addresses from which administrators can access the ACS administrative web interface and the session duration after which idle sessions are logged out from the system.
  • Responsibilities in preparation, planning, design and implementation of purchased solutions into a customer's existing networking environment
  • Planning, designing and configuration of various Cisco ISE strategies (Standalone, Distributed Setups).
  • Deployed Intelligent WAN (IWAN) in both Hybrid and Dual-ISP branches to provide an increase in bandwidth capacity, security and reliability
  • Software-Defined Networking (SDN): Hands-on experience and expert knowledge of Cisco Intelligent WAN (IWAN)
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Assist partners with plans and executions of highly complex system upgrade and migration activities.
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server
  • Perform CRQ's with no impact to LAN/WAN while integrating new Network Access Control(NAC) equipment
  • Worked Extensively on Access Control Policies consisting of VLAN switching through SNMP, applying downloadable ACLs through Cisco ISE, and Configuring Standard and Extended ACLs locally and on the upstream switches for Cisco NAC & ForeScout NAC Solution
  • Educate Partner on lifecycle support services available from Cisco Systems, Inc.
  • Analyze and troubleshoot issues encountered during staging and implementations (could include building simulated networks in test labs to resolve complex problems and compatibility issues)
  • Work with engineering, technical marketing, TAC and documentation groups to add or correct documentation; publish tech-tips and best practices and drive product & process improvement initiatives based on lessons learned from Partner cases.
  • Work with Business Unit teams on deal reviews, Partner mentoring and practice-building projects and service offering opportunities.
  • Mentoring the partner technical engineer on executing the Voucher Guidelines for ISE Trustsec activation, ISE Wireless guest management activation.
  • Participated in special strategic studies to define the overall products strategic evolution and roadmaps for Cisco’s Controller product portfolio that will meet customers’ requirements and enhance their user experience.
  • Applying downloadable ACLs through Cisco ISE, and Configuring Standard and Extended ACLs locally and on the upstream switch's for Cisco ACS
  • Supporting follow on project that will provide our customers with a single user experience when deploying and operating different Cisco controllers (APIC, APIC-EM) as well as workflow simplification.
  • SDN - Acted as the lead engineer for several Proof-of-Concept verification projects for Cisco IWAN for 3-path sites (2 MPLS and one Internet at each site) for dual hub and various types of spoke sites. The projects included complex routing, network failover during blackout and brownout (network impairment), multicast routing, QoS, access to shared customer services, Internet breakout at the hub and spoke sites, and interoperability between IWAN sites and legacy non -IWAN sites during migration to IWAN
  • NFV - Currently involved as an advisory engineer in an NFV Proof-of-Concept verification project for a multi-vendor virtual networking environment consisting of routers, switches, firewalls and WAN optimizers.

Environment: Cisco IWAN, DMPVN, MPLS, APIC EM, DNA, IOT, Cisco ISE, ACI, SDN, ASA, ESA, WSA, Trustsec, F5,

Confidential, Detroit MI

Sr. Network Engineer

Responsibilities:

  • Troubleshoot and coordinate the resolution of connectivity related issues
  • Reviewing current network diagram
  • Serve as the customer’s go-to resource for all matters related to the Palo Alto next-generation firewall.
  • Used F-5Load balancers to increase capacity (concurrent users) and reliability of applications.
  • Deliver best practices guidance for managing Palo Alto Networks firewalls.
  • Installation, configuration and maintenance of Cisco Routers like 2600, 2800 and 3600 series.
  • Provide industry-leading service and platinum-level support to HTTS ACI customers
  • Experience with the Configuration on BIG IP F5 Load balancers and monitored the packet flow.
  • Configured High availability and implemented it on F5 Load balancer.
  • Responsible for Designing & Implementations of Data Center /ACI solutions/ Virtualization solutions like EAP using Cisco ACI, Nexus 9k/7k/5k/2k/1k .Design Cisco Data Center /Application Rollouts with ACE, FWSM, & ASA.
  • Worked on Cisco's Application Centric Infrastructure (ACI) implementation (Nexus 9K, APIC)
  • Duties include training on SDN/NFV, open flow, Red Hat Open stack, Install, build and run IaaS Cloud (AWS Cloud) Design and deployment.
  • Implemented an SDN like architecture in the research lab using Open Daylight/HP VAN SDN controller on Open Stack. Involved in the complete software development cycle of "Zero touch provisioning"
  • Configuring and troubleshooting F5 BIGIP LTM load balancing and implementing, Creating I rules, Virtual servers, Pools, Nodes with health, Profiles, SNAT, SSL, NAT, Traffic Policies and QoS.
  • Plan, build, deploy, and maintain ACI data center lab utilized by internal parties
  • Work with internal/external customers including partners by delivering the ACI Jumpstart program to help customers and speed up technology adoption
  • Responsible for the deployment, implementation, and stability of Meraki infrastructure
  • Performed on staging of devices on Meraki dashboard before deployment
  • Recreate customer topologies with a variety of Cisco Meraki equipment to identify bugs and troubleshoot.
  • Network Troubleshooting (WireShark, River Bed) Operations
  • Worked on WAN Accelerator "River Bed "for optimization of the bandwidth and file sharing on the WAN Circuit.
  • Used "River bed" for Data Protection and Disaster Recovery for securing the backups and archives on WAN.
  • Working knowledge of CCTV systems and installation
  • Worked with a team of developers on Python applications for RISK management.
  • Worked on Python Open stack API's.
  • Used Python scripts to update content in the database and manipulate files.
  • Installed basic business level CCTV systems
  • 7k to 9k architect migration and implementation engineering process
  • Analyzed data traffic, and in-depth evaluation of QOS, MTU, and in/out line card queuing factors.
  • Created and implemented effective methods of procedure (MOPs) and action plans for post-sales project
  • Installation, Configuration, Troubleshooting, Administration of Sophas.
  • Sophas UTM /VPN /Firewall / Endpoint / Sophos Intercept /Sophos Clean
  • Network engineer for client upgrades using Sonicwall / Sophos / Cisco Hardware Onsite and remote level 2/3 systems administration
  • Deploying Sophos Cloud and providing end point management
  • Installed and managed Sophos firewall, VPN connectivity, Web application filtering.
  • Configuring Cisco Router and ASA 5505 firewall, Configuring suphos firewall (UTM)
  • Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Nexus 9k, 7k, 5k, and Catalyst 6500 switches
  • Configuration of Port Channels and VPC on Nexus 9K, 7K, and 5K.
  • Open stack SME and worked closely with developers on APIC ML2 Plugin integration with ACI
  • Creating and managing Active Directory sites and services
  • Managing the delegation of control on the Active Directory to various team as per their job functions
  • Migration of resources done in batches of a specific number of resources everyday using Active Directory Migration Tool.
  • Provide timely troubleshooting measures for all of our customers to ensure a satisfactory resolution is provided, including third parties. Configure, Support, update and install Checkpoint, Fortinet Firewalls, Firemon, and DLP systems. Provide monitoring of all Checkpoint firewalls and there logs / traffic
  • Automated virtual private server (VPS) deployments and configurations using scripting and version control solutions developed with Bash, PHP, SQL and Git for all major Linux distributions
  • Worked extensively on device profiling, authentication and authorization mechanisms using AAA, RADIUS, 802.1X, Policy buildups for Posture Compliance Policies and Rules for checking the devices coming onto Network, Remediation Process, Access and Controls, and Segmenting the Global Networks for NAC Solutions for both Cisco and Fore scout NAC Appliances
  • Customer reservation plugin including features like finding the best driver to make the trip and integration with payment system, mango pay. It was a LAMP Environment. .
  • Migrate from legacy routing architecture utilizing Firewalls as routing devices and implement Cisco ASR with DMVPN for data center to data center connectivity over multiple providers and Internet links for backup redundancy
  • Provide expert level support on Vyatta router, VPN and firewall features
  • Configuring, troubleshooting and managing Networks of over 1000 devices by monitoring health of routers, switches and load balancers and working with team to fix any configuration or hardware.
  • Configuration and troubleshooting of various routing protocols like RIP, EIGRP and OSPF.
  • Configuration of layer 2 Cisco switches for VLAN and Trucking
  • Assist customers in their network design queries related to IOS-XR devices.
  • Configuring and monitored different monitor modules F5 BIG-IP LTM F5 and DNS traffic Management.
  • Configure IPV4/6, SR-IOV, VXLAN, and Bonding (Failover/Load Balancing)
  • VCenter and VCloud experience to build clusters for VXLAN networks.
  • Project Manage various security projects relating to QRadar. Maintain QRadar system and content.
  • Install and configure Qradar SIEM solution, from Q1 Labs. Write custom DSM for a custom application due to compliance standards
  • Configure QRadar for Hippa compliance reporting
  • Understanding the need of VXLAN and its design considerations, Importance of VTEP and its

    functionality as well as a case study on deployment scenario are part of the project. Current issues of VXLAN regarding compatibility and security are also studied.

  • Work with log source owners to configure log sources for QRadar
  • Planning and implementation of IP addressing scheme using sub-netting and VLSM.
  • Designing Networks for voice and data networks over LAN and WAN.
  • Designing, Implementing and Managing WLAN Distribution Network.
  • Working on cable modems and CMTS (cable modem Termination Systems).
  • Working on Wi-Fi Portfolio by Configuring and Troubleshooting Wireless Access Points (WAP) and Wireless Controllers (WLC) for limited connections issue In Wireless Local Area Network (WLAN)
  • Involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup.
  • Configuring user's roles and policies for authentication using Cisco NAC and monitoring the status of logged users in network using Cisco ISE.
  • Configuring and Troubleshooting WLC to manage ESS for the widespread Comcast WLAN.
  • Implementation on Policy Base Routing (PBR)

Environment: NAC, WLAN, Palo Alto, ASA, checkpoint, F5, Nexus 5k, 6k,, 7k, 9k,.VPN, ACL.

Confidential, Norfolk, VA

Network Engineer

Responsibilities:

  • Troubleshooting firewall and ACL related connectivity issues.
  • Designing, Installation and configuration on Checkpoint, ASA, Net Screen and Juniper Firewalls.
  • They improve the overall performance of applications by decreasing the burden on servers associated with managing and maintaining application and network sessions, as well as by performing application-specific tasks using F-5 load balancer.
  • Worked with business owners to determine best placement for CCTV cameras.
  • Installing/Upgrading CCTV DVRs, NVRs, IP Cameras.
  • Assisted in the designing, implementation and configuring new objects for existing and new applications on F5 LTM and GTM guests.
  • Configuring and managing F5 ASM (Application security manager). Develop security policies.
  • Configuring and administering Viprion (F5) - configuring vCMP guest.
  • Troubleshooting the issues with the application owners hosted on the F5 environment in the 3- tier environments.
  • Juniper Contrail SDN deployment assistance to the senior engineering team.
  • Worked on Firewall traffic, Port forwarding, VPN, SDN, creating and modifying LAN, WAN,

    CELL interfaces.

  • Installing the F5 TMOS upgrades and Hot-fix installations depending on Business need.
  • Automated tasks using scripting Perl, Python and Bash Scripting.
  • Assist in identifying customer-specific requirements and provide solutions.
  • Answer questions about the product capabilities, features and configuration.
  • Assist customer team with the design and placement of Palo Alto Networks devices.
  • Implemented URL filtering and SSL Decryption in Palo Alto Firewall environment.
  • Configured security profiles and security profile groups in Palo Alto Firewall environment
  • Troubleshoot and configured Palo Alto Networks Panorama Systems.
  • Configured trunk and access ports, and implemented granular control of VLANs and VXLANs using NXOS to ensure virtual and flexible subnets that can extend further
  • Develop and maintain network configuration, documentation, industry best standards and practices.
  • At the end of the engagement AGCS had a Single Forest Single Domain Active Directory model operating with the uniform security model and processes throughout the organization
  • Participate in technical discussions (internal and external).
  • Designing, Installation and configuration of ACL's and firewall Filters on Cisco and Juniper Routers.
  • Configure Multi-protocol Label Switching (MPLS) on Cisco IOS XR Software
  • Troubleshooting MPLS circuits, VPN and SSL VPN connectivity.
  • Designing, Installation and configuration of MPLS circuits, VPN and SSL VPN connections on checkpoint Firewalls, Juniper & Net Screen VPN Boxes.
  • Configuring, troubleshooting and managing secure web content gateways and filters like Blue Coat and Web sense.
  • Enabled VXLAN on Nexus 1000v VSM and configured a port-profile for VXLAN VTEPs.
  • Virtualization: Evaluation of VMWare NSX VXLAN, Linux OVSDB, VMWare virtual SAN, EMC Scale IO, Open stack
  • Designing, deploying, and maintaining NSX infrastructure.
  • Integrating Symantec DCS with NSX, providing server hardening.
  • Working on Active Directory to add users to new groups and change user's policies
  • Working on RSA 2 Factor, AAA & Radius
  • Working on IPS and IDS (source fire and fire eye)
  • Working on tools and devices Aruba & CADA to assign roles, policies to devices and users.
  • Configuring and deploying Cisco NAC & Cisco ISE
  • Working on Cisco NAC & ISE to authorize users based on protocols PEAP and EAP-TLS, also manage and monitor user's access privileges.
  • Preparing document manuals for the new work procedure, keeping records of work done and updating work logs and trackers.
  • Promoting team work by helping peers in daily work and improve the entire productivity output

Environment: Aruba, Juniper, Source fire and Fire eye, Sonet, VMware, F5 LTM and GTM, ASA, Cisco ISE

Confidential, Columbus, OH

Network Engineer

Responsibilities:

  • To Implement Local Area Network Solutions and its remote support.
  • Manage Network Equipment (Cisco 3500 Router, Juniper FW SSG 550 Cisco Switches and operation of a Polycom HDX 8000 Telepresence System.
  • Network Troubleshooting, basic system & Network Security support 24x7.
  • Network Implementation solutions & support.
  • Configured F5 hardware load balancers to work with Web Logic Server.
  • Experience of VoIP allows dynamic interconnection between users on any two domains on the Internet when a user wishes to place a call.
  • Provided very consistence performance in CSAT and schedule adherence.
  • Installation, configuration and maintenance of Cisco Routers like 7600, 7200 and juniper mx series.
  • Had hands on VoIP systems employ session control and signaling protocols to control the signaling, set-up, and tear-down of calls
  • Operating, administrating, managing & testing of carrier Ethernets
  • Installation, configuration and maintenance of Palo Alto, Cisco ASA 5500, Juniper SRX and ISG Firewalls
  • Troubleshooting server connectivity issues for client intranet,
  • Networking: TCP/IP, Troubleshooting client network connectivity in SIMS Buildings, DNS Troubleshooting, Remote Access - Virtual Private Network (VPN).
  • Network Security Implementation & Support.
  • Password resets/unlocks, Giving pseudo Privileges, Providing LAN and Wan Support.
  • Interacting with the clients by creating tickets for the issue and dispatching to the correct queues for resolution.
  • Involved in the creation and closing of IMAC (Add, Move, Change Requests) tickets.
  • Calling back the client to check if the issue has been resolved.

Environment: ASA, Routers and Switches, F5, DNS, VPN, TCP/IP.

Confidential

Network Engineer

Responsibilities:

  • Provide support to the customers.
  • Provide and maintain strong, professional relationships with the clients and customers.
  • Provide help in installing Internet, Security, Network, Wireless Network, Email client software, installation of Routers and basic computer troubleshooting.
  • Logging of calls from customers onto a database and following escalation procedures to resolve problems or issues.
  • Working with optical cables couplers, SONET, DWDM and ATM Networking.
  • To deal with local network issues like - configuring wired & wireless network, implementing security solutions by designing Firewall, VPN rules.
  • Working on Wi-Fi portfolio like Installing and configuring WAP, WLC is for wireless networks and managing the WLAN Ad Hoc.
  • Configuring and Troubleshooting Distribution Systems for WLAN connectivity.
  • Consistently Highest Performance & Quality Deliverables (CSAT, FCR, Quality, Paid %)
  • Achieved highest number of Completely Satisfied Surveys in 3 months
  • Received many customer Satisfaction certificate
  • Vendor coordination
  • Maintaining ITS VOICE Infrastructure.
  • Participating in the weekend maintenance activity.
  • Analyzing health check reports of their SBCs.
  • Creating Network Analysis documents.

Environment: LAN, WAN, RIP, OSPF, BGP, EIGRP, VLAN, MPLS, ASA 5500, Nexus 7000 Series, STP, VTP, and HSRP.

We'd love your feedback!