Sr Network Engineer Resume
Denver, CO
PROFESSIONAL SUMMARY:
- Network Security Engineer with 8+ years’ experience with expertise in managing networking protocols; deploying, administering and migrating firewalls, also troubleshooting and supporting enterprise level networks and Data Centers.
- Highly motivated with the ability to work independently or as an integral part of a team and committed to highest levels of professional e xperience in Networking and Security domain which includes designing, Deployment and providing network support, installation, operation and monitoring over a broad range of LAN / WAN Environment.
- Experience working in large - scale environments on high priority troubleshooting issues, several Proof of concepts for installations and Migrations to different vendor Equipment or implementing a new technology. Network Design, IDF and MDF architecture, Datacenter Architecture and support roles, IOS upgrades, downtime procedures, Migration projects to different vendor equipment.
- Experience working in complex environments which includes Layer 2 Switching, L3 routing, Network with perimeter and VPN firewalls, Load balancing and Access policies management in F5/NetScaler. Experience with Aruba Wireless LAN Controllers.
- Experience in installing, configuring, and maintaining Cisco Switches (2960, 3500, 3750, 3850, 4500, and 6500) in enterprise Environment and Nexus 2k, 3k, 5k, 7k and 9k in Data Center Environment.
- Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series).
- Experience in VSS, VPC, and VDC technologies. Experience working on Gateway redundant protocols HSRP, VRRP, and GLBP. Experience with Access, Distribution and Core Layer Architecture in Datacenter. Experience in Spine Leaf Architecture.
- Expertise in installing, configuring, and troubleshooting of Cisco Routers (3800, 3600, 2800, 2600, 1800, 1700, 800, ASR 9k).
- Expertise in installing, configuring and troubleshooting Juniper Routers (E, J, M, and T-series).
- Experience with cisco ACI and Arista Cloud Vision on a POC. Knowledge on Spine leaf Architecture in Data center. Worked on EVPN, VXLAN, VTEPS, Bridge Domains, MP-BGP etc.
- Experience and high-level technical knowledge in OSPF, EIGRP, RIP and BGP routing protocols. L1/L2 troubleshooting skills in Routing in complex environments. Worked with MPLS over BGP. Worked on upgrading Edge routers, failing over ISP circuits for maintenance.
- Virtualized and migrated 60+ legacy v10 appliances with over 5000 VIPs and 12000 pools t0 F5 TMOS v11 vCMP across 2 global data centers, including substantial iRules updates to support the new architecture. Basic Experience in Automation using iControl and Python v3 for configuration and backups in f5.
- Managed the firewalls, proxy servers, site to site and B2B VPNs, client SSL and IPsec VPN gateways for 50 networks with 9000+ users and hundreds of public web apps.
- Managed all web content functions for a 10 node, 300 VIP LTM environment, including SSL offload, URL/URI redirection, Application Security, and Authentication Policy
- Experienced in network and applications diagnostic and reporting tools such as Wireshark, TCPDump, SSLDump, firewall session logs, Splunk, etc.
- Developed and implemented security policy around the Cisco ACS (Authentication Control System), with RADIUS and TACACS authentication support against an Active Directory database, including device management, wireless and VPN applications.
- Worked on APM module with integration with RADIUS server and RSA secure ID for applications that require 2-factor authentications.
- Experience in configuring, implementing and troubleshooting F5 and Citrix Load Balancer in a large environment with sensitive applications.
- Configured F5 LTM, series 5000 series for the corporate applications and high availability. Implemented LTM and GTM in DMZ and Internal network. Worked on software versions up to 12.1.2. Proficient and high-level expertise using the F5 based profiles, monitors, VIP’s, pools, SNAT, SSL offload, iRules, virtual Servers, iAPPs. Migration experience from ACE to F5/ old F5 to New F5.
- Experience with manipulating various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters, Route-maps and route policy implementation.
- Extensive Knowledge of the implementation of Cisco ASA 5500 series - 5505, 5510, 5512-X firewalls with Firepower module. Palo Alto firewall policies, panorama and Checkpoint firewalls NG, NGX. Experience with convert Checkpoint VPN rules over to the Cisco ASA solution.
- Experience with Next Gen Firewalls PA 200, 500, 3020 and VM series firewalls for both Internet and internal traffic filtering. Experience with Panorama M100 series and maintaining up to 23 firewalls in large networks. Experience in SSL forward Proxy, URL filtering and Policies on PA Firewalls.
- Experience with McAfee Web Gateways and Bluecoat Proxies for the internet traffic. Expert in IPS sensors in DMZ and inside network and device level proxy configuration for Internet traffic. Experience in WCCP.
- Experience working with Aruba and Cisco Wireless LAN controllers, Configuring and Provisioning AP’s, Virtual AP’s, RTLS, Wireless SSID’s, remote and campus AP’s, upgrading WLC, worked in Active/Active local Controllers and Master controller. Worked on RAP3 for remote access. vS upport Quality Inspections and Operational Test (OT) events related to the 2GWLAN Aruba Networks Controllers, and Access Points. (Aruba 6000 controller, Aruba AP65,70,124,85,125) system.
- Developed and worked on QRadar monitoring platform, maintaining current QRadar installation and user interface.
- Expertise in SIEM tools like Splunk for logging and threat analysis along with Tenable suite for vulnerability management.
- Experience in working with creation of Access lists (ACL) & Network Address.
- Fi analytics from various vendors (Cisco Meraki, HPE /Aruba, D-Link and Netgear) .
- Managing and configuring Aruba Wireless devices and Cisco Access Points.
- Set up Microsoft Azure virtual appliances to meet security requirements over software based fuctions like firewalls.
- Acquainted with AWS cloud services and their deployment.
- Experience with WAN connectivity, MPLS circuits, leased Lines, Metro Ethernet, Site to Site IPSec tunnels, ISP circuits, Customer Edge configurations. Experience with SD-WAN solutions that include Viptella and Versa.
- Knowledge and operational experience with SDN, Cisco ACI, VXLAN, VTEPS, VNI, Bridge Domain, Arista Cloud Vision, EVPN, MP-BGP, Spine and Leaf Architecture.
- Knowledge of Cisco Meraki Cloud managed Switches (MS250, MS350, MS410) and SD-WAN (MX 65, MX100, MX400).
- Involved in troubleshooting network traffic and its diagnosis using tools like ping, trace route, Gigaton, Wireshark, TCP dump and Linux operating system servers.
TECHNICAL SKILLS:
Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP
Networking Hardware: Cisco Switches, Cisco Routers,ASA/Pix/PaloAlto/CheckPoint/Juniper firewalls.
Routing Protocols: OSPF, ISIS, EIGRP, RIP, MPLS, IS: IS, BGP, Multicasting
Security Technologies: PAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint
Network Monitoring: Wireshark, QRadar, SPlunk,Tenable Nessus,TCPReplay,WildFire
Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS-XE, NX-OS
Routers: 1800, 2611, 2800, 3600, 3845, 3900,4300, 4400, 4500, ASR 1000X, 7206VXR, Juniper M & T Series.
Load Balancers: F5 Networks (BIG-IP), Netscaler (Citrix)
Capacity & performance: Cascade Riverbed (Flow Monitor), WAN Killer
Switches: CISCO 2960,3750,3850, CAT 9300, CAT9400, CAT 9500,4500,6500,6800 Nexus 7k,5k,2k
Programming Languages: C, C++, Java, Power Shell, Python
Simulation Tools: GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence,Packet Tracer
Firewalls: Palo Alto firewalls, Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580 ),Checkpoint,.
AAA Architecture: TACACS+, RADIUS, Cisco ACS
Wireless: Cisco Meraki wireless Access points (MR66, MR74, MR84), Aruba Access points 200, 207,300,320, Wireless controllers 7280, 7240, Cisco Wireless controller 5508 and Cisco Aironet 3700 series.
Features & Services: IOS and Features, HSRP, GLBP, VRRP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR s, HLD and LLD documents, Dell equal logics
PROFESSIONAL EXPERIENCE:
Confidential, Denver, CO
Sr Network Engineer
Responsibilities:
- Configuration and Administration of Cisco and Juniper Routers, Switches and mixed vendor Firewalls.
- Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Configuration, Assigning DHCP profiles.
- Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
- Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices also configure 2k, 3k, 7k series Routers
- Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
- Experience with configuring FCOE using Cisco nexus 5548
- Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network.
- Installation and Configuration of Cisco Catalyst switches 6500, 3850 & 2960, 9300 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy it also includes the configuration of port channel between core switches and server distribution switches
- Migrated to Juniper EX series switches from Cisco 3500 series and 6500 series switches
- Experience with moving data center from one location to another location, from 6500 based data centers to Nexus based data center.
- Switching tasks include VTP, ISL/ 802.1q, IP Sec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP.
- Worked with HP switches, Extra hop, F5 Load Balancer.
- Implement changes on switches, routers, load balancers (F5 and CSS), wireless devices per engineer’s instructions and troubleshooting any related issues.
- Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
- Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer.
- Experience with configuring Cisco 6500, 6800, 4500 VSS in Distribution layer of the Data center network.
- Created Server-less Architecture for on-premise Application Migration to AWS cloud.
- Configuring and managing F5 LTM (Local Traffic manager) in large scale environment.
- Configure and troubleshoot Juniper EX/SRX series switches.
- Network security including NAT/PAT, ACL, and ASA/SRX/Palo Alto/Fortinet Firewalls.
- Good knowledge with the technologies Site to Site VPN, DMVPN, SSL VPN, WLAN and Multicast.
- Well Experienced in configuring protocols HSRP, GLBP, PPP, PAP, CHAP, and SNMP.
- Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers
- Install, manage and monitored Large scale Palo Alto Firewalls through Panorama.
- Experience with communicating with different customers, IT teams in gathering the details for the project
- Experience in installing and configuring DNS, DHCP servers.
- Convert WAN links from TDM circuits to MPLS and to convert encryption from IP Sec/GRE to Get VPN.
- Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.
- Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.
- Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
- Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience
- Worked on Python scripting for generation the firewall security policy through web visualization tool in checkpoint firewall.
- Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2960, 3500, 7600, 3750, 3850 series, 6500 series) Cisco Routers (4800, ASR 9K, 800), Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Zscaler Proxy and Versa SD-WAN appliances.
- Conducted a POC on Versa and Viptella SD-WAN solution as a team and worked on evaluating the solutions.
- Configured SDWAN router Viptela to connect remote sites over the Internet.
- Experience in administrating Viptela SDWAN enterprise deployment and implementations of Network and Devices for SDWAN environment.
- Performing network monitoring, analysis using various tools like Wireshark, & QRadar with Wildfire tool helped for tracking root cause problems.
- Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trucking, deployed port security when possible for user ports.
- Used Extrahop for the detection of any abnormalities in the network, tracking file access in databases and storage for data security, and locate bottlenecks over the network
- Strong hands on experience on, ASA Firewalls, Palo Alto Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
- Implemented Zone Based Firewalls and Security Rules on the Palo Alto Firewall. Exposure to wildfire feature of Palo Alto. Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
- Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
- Worked with the Python 2 & 3 version.
- Dealt with Aruba wireless access points 200,300 series supporting 802.11 ac.
- Setting Aruba Access to link distribution switch system and then to WLAN controller.
- Installed and configured Meraki (MX80, MX60) Appliance via Meraki MX400 Cloud.
- Installed and configured Cisco Meraki (MR66, MR74, MR84) wireless Access points in the warehouses.
- Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, prevention where needed.
Environment: Cisco ASA Firewalls, F5 ADC, Cisco 3900,4300,4400,4500 Routers, Cisco Catalyst switches 6500, 3750, 3550, 2960,4500,6500,6800,9300,9400 Switches, Juniper SSG-140, Palo Alto Wildfire, Juniper EX series switches, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k, Nexus 2000 FEX, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting, ACL Configuration.
Confidential, Middleton, NJ
Senior Network Engineer
Responsibilities:
- Configure / Troubleshoot CISCO 4300, 4500, 3800 series routers and 4500, 3800, 6500 series switches for LAN/WAN connectivity.
- Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
- Experience in configuring VPC, VDC and ISSU software upgrade in Nexus 7010.
- Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.
- Actively involved in Switching Technology Administration including creating and managing VLANS, Port security- 802.1x, Trucking 802.1Q, RPVST+, Inter-VLAN routing, and LAN security on Cisco Catalyst Switches4507R+E, 6509-E and Cisco Nexus Switches 2232, 5596, 7009.
- Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP, MPLS
- Experience with deploying PIM Sparse-mode/Dense-mode multicasting in Campus locations.
- Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.
- Responsible for managing Cisco routers, switches, HP switches, F5 load-balancers using SNMP MIBs for fault detection and for fault isolation.
- Design, implement and administer IPv4 enterprise network infrastructure utilizing Juniper routers like Juniper MX80, MX 480 and MX960.
- Administer Riverbed WAN Optimization appliances.
- Responsible for improved application response and effective utilization of network resources using Riverbed Appliances on classified networks.
- Design and implement Catalyst/ASA Firewall Service Module for various LAN’s.
- Troubleshooting Cisco routers, APs, Switches, Fortinet Devices and Meraki appliances.
Confidential, Princeton, NJ
Senior Network Engineer
Responsibilities:
- Assisted in troubleshooting LAN connectivity and hardware issues in the network of more than 1000 hosts.
- Studied and analyzed client requirements to provide solutions for network design, configuration, administration, and security.
- Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
- Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
- Monitor performance of network and servers to identify potential problems and bottleneck.
- Performed RIP & OSPF routing protocol administration.
- Interacted with support services to reduce the downtime on leased lines.
- Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issue Other responsibilities included documentation and support other teams
- Configured OSPF over frame relay networks for NBMA and point to multipoint strategies
- Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
- Troubleshooting of Cisco 2800,2900, 3900, 7200, 7600, ASR9k, CRS, GSR 12k Series routers
- Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
- Configure BGP features such as as-override, Local pre, EBGP load sharing on client connections
- Configured and resolved various OSPF issues in an OSPF multi area environment between multiple branch routers.
- Working with Fortinet Firewall to create policy, HA and monitor malicious traffic.
- Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.
- Configuring HSRP between the 3845 router pairs of Gateway redundancy for the client desktops.
- Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.
- Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path
- Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
- Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 & 6000 series.
- Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
- Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
- Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost-effective network solutions to accommodate customer requirements and project scope.
- Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and trouble shooting.
- Worked with Load balancing device like F5 Big-IP local traffic manager (LTM) 1600
- Responsible for implementing QOS parameter on switching configuration.
- Knowledge and experience of 802.11 a/b/g/n Ethernet standard for wireless Technology.
- Troubleshooting Cisco routers, APs, Switches, Fortinet Devices and Meraki appliances.
- Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.
- Worked towards the key areas of the project to meet SLA’s and to ensure business continuity. Involved in meetings with engineering teams to prepare the configurations according to the requirement.
- Creating change tickets according to the scheduled network changes and implementing the changes.
Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/ 0/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K, Checkpoint, Cisco ASA, Fortinet Firewall.
Confidential, San Jose, CA
Network Engineer
Responsibilities:
- Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches.
- Worked on Nexus 5548, Nexus 2248, Nexus 2232, Cisco 12418, 12416 Cisco 7200VXR, Cisco 6513, and Cisco OSR, Cisco 4507 Routers, Cisco 6500, 4500, 3750 & 3560 switches.
- Configured and deployment of routing protocols RIP, OSPF, EIGRP & BGP over Cisco Routers in Production environment and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure.
- Worked on design, configuring and managing of Blue Coat Proxy Servers. Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS). Configured Cisco Access Control Server (ACS) to enforce security policy in User Groups.
- Installed and maintained Cisco 7500 and 7200, 12000 backbone routers with HSRP and various IGP routing protocols such as RIP, EIGRP, and OSPF.
- Performed/Upgraded configuration of Cisco switches, routers, terminal servers, CSU/DSUs, WAPs, VPN, Remote Access and network management tools.
- Participated in TCP/IP networks planning, Implementation and Management with subnets.
- Involved in implementation of overall security system including access-list and NAT design for various Cisco access lists, a RADIUS/TACACS+ AAA server, a Linux syslog server and network monitoring using SNMP.
- Designed, Configured and implemented VPN tunnel with IPsec and GRE and Cisco ASA based security infrastructure.
- Designed and configured LAN networks with Access layer switches such as Cisco 4510, distribution layer switches such as 6513 and a routed core.
- Configured HSRP, Spanning tree Root guard, BPDU guard, and STP/RSTP features.
- Administration of network devices holding various servers of Windows, Linux/Unix platforms (physical & virtual servers).
- Supported major access to all firewalls and protocols through AAA by using Cisco Secure Access Control Server (ACS). Design, Configuring and troubleshoot F5 LTM load balancing.
- Configured & managed Security Devices that includes Juniper (Net screen) Firewalls, F5 BigIP Load balancers, Blue Coat Proxies and Plug Proxies. Used pulse secure VPN secure login & single sign in across the production environment.
- Creating the Security policy in ASM for Detect and Prevent the various application base attacks based on anomaly and apply those security policies in the HTTP/HTTPS VIP in LTM.
- Worked with enterprise level Wi-Fi configuration, troubleshooting, IP routing, network design, architecture and protocols and topologies.
- Designed and implemented WAN IP infrastructure using frame relay, T1/T3, DSL technologies.
- Configured OSPF redistribution and authentication with T3 LSA filtering and to prevent LSA flooding.
- Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path.
- Troubleshooting issues related to Cisco Routers, Switches, and ASR, Nexus 5K, 2K, ASA5595, ACE 4710, MPLS and critical network links by coordinating with the vendor.
- Troubleshoot the Network Issues onsite and remotely depending on the severity of the issues.
- Used network analyzers like Wireshark, TCPdump sniffer for packet analysis.
- Performed Break Fix support through driving to different buildings, identifying the root cause of the hardware issues with switches, routers.
- Involved in Local Area Network (LAN) design, troubleshooting, and maintenance as per company’s requirements.
- Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
- Performed replacements of failed hardware and upgraded software.
- Configured VLANS to isolate different departments.
- Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
- Configured IPSEC VPN on SRX series firewalls.
- Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company.
- Performed scheduled Virus Checks & Updates on all Servers & Desktops.
- Implementing Routing using the following protocols; IS-IS, OSPF, BGP on Juniper M series routers.
- Design, installation and troubleshooting networks with hand-on experience with OSPF, ISIS, BGP, VPLS, Multicast, VPN, MPLS, & Traffic engineering.
- Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.
- Worked in setting up Inter-VLAN routing, redistribution, access-lists and dynamic routing.
- Involved in configuring and implementing of Composite Network models consists of Cisco 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.
- Implemented various Switch Port Security features as per the company’s policy
- Configured RIP, and EIGRP on 2901 and 3925 Cisco routers.
- Provided technical support for expansion of the existing network architecture to in corporate new users.
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.
- Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.
Environment: Cisco 3925, 2620, 1900 routers, Cisco 3750, 2950 Switches, Routing protocols: EIGRP, RIP, OSPF, BGP, FHRP: HSRP, Sniffing Tools: TCPdump, Wireshark, Port Security, SRX Firewall, VLAN, 802.1Q Trunking, Cisco ASA 5500.
Confidential
Network Support Engineer
Responsibilities:
- Provided technical support for expansion of the existing network architecture to in corporate new users.
- Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company
- Configured STP for loop prevention on Cisco Catalyst Switches
- Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.
- Worked in setting up inter-vlan routing, redistribution, access-lists and dynamic routing.
- Involved in configuring and implementing of Composite Network models consists of Cisco 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.
- Implemented various Switch Port Security features as per the company’s policy
- Configured VLANS to isolate different departments.
- Configured IPSEC VPN on SRX series firewalls
- Design, installation and troubleshooting networks with hand-on experience with OSPF, BGP, VPLS, Multicast, VPN, MPLS, & Traffic engineering.
- Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches
- Worked with snipping tools like Wireshark,SPlunk to analyze the network problems.
- Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
- Performed replacements of failed hardware and upgraded software
- Performed scheduled Virus Checks & Updates on all Servers & Desktops.
- Implementing Routing and Switching using the following protocols; OSPF, BGP on Juniper M series routers.
- Involved in Local Area Network (LAN) implementation, troubleshooting, and maintenance as per company’s requirements.
- Configured Remotely Cisco routers, switches and ARUBA access points.
- Managed Aruba wireless access controllers and troubleshooting Aruba Access points
- Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity.
- Integrated Microsoft active directory (LDAP) into checkpoint for identity awareness and user authentication.
- Configure and manage LDAP User management with Checkpoint Smart Directory. Implemented the policy rules and DMZ for multiple clients of the state on the Checkpoint firewall.
- Worked with several network engineers for the understanding of Juniper SRX firewalls along with the changeover to Palo Alto. Palo Alto Firewall Management-Panorama.
- Experience working with ASR 9000 series switches with IOS-XR.
- Involved in configuring Juniper SSG-140 and Check point firewall.
- Provided Layer-3 redundancy by implementing HSRP and GLBP for High availability
- Implementation and Configuration (Profiles, iRules) of F5 Big-IP LTM-6400 load balancers
- Worked on configuration commissioning and upgradation of the MPLS circuits for various branch offices. Disabling all unused ports and putting them in unused VLAN.
- Implemented, analyzed and recommended appropriate system for the out of band management monitoring. Utilizing QRadar for primary and disaster recovery site.
- Monitored and responded to network anomalies utilizing SolarWinds software and recommended appropriate network solutions for issues.
Environment: Cisco 4300,4400,4500, 3800 series routers and Cisco 3560, 4500,6500 series switches, Juniper EX4200, EX3200 Switches, Juniper MX80, MX480, MX960 Routers, F5 ADC, ASR 9000, Juniper SSG-140, Cisco Nexus Switches 2232, 5596, 7009, Checkpoint Firewall.