We provide IT Staff Augmentation Services!

Network Security Engineer Resume

5.00/5 (Submit Your Rating)

Fort Worth, TX

PROFESSIONAL SUMMARY:

  • Strong professional 6+ years of experience in Network Planning, Implementing, Configuring, Troubleshooting and Testing of networking system on both Cisco and Juniper Networks.
  • Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system remedy.
  • Expertise in configuring switching protocols such as ARP, RARP, VTP, VLAN, STP, RSTP, PVST+, HSRP, GLBP, VRRP and Routing Protocols such as RIP, OSPF, BGP, IS - IS, and MPLS.
  • Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500 series switch.
  • Extensive hands-on experience with complex routed LAN and WAN networks, routers and switches.
  • Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
  • Experience in the setup of Access-Lists, and RIP, EIGRP, and tunnel installations.
  • Proficiency in configuration of VLAN setup over various Cisco Routers and Switches.
  • Experienced in troubleshooting both connectivity issues and hardware problems on Cisco based networks.
  • Enhanced level of experience with OSPF, BGP and TCP/IP.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
  • Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Sound knowledge in CISCO firewalls, CISCO PIX, ASA 5500 series and CISCO ASA as well as encryption techniques.
  • Worked on cisco routers and switches, deployed Checkpoint 2200 Gateways in distributed environment.
  • Expertise in the implementation of Layer 2 technologies including VLAN’s, VTP, STP, RSTP, Trunk and Port-security, expertise on working with Ether channel technologies (LACP, PAGP).
  • Experience setting up Cisco ASA firewalls Cisco ASA 5510, Cisco ASA 5512 & Cisco ASA 5505 with restricted security policies, NAT implantation, configured DMZ interfaces to restrict traffic flow.
  • Experience in implementing and troubleshooting of Palo Alto firewall PA 3000, PA 5000, PA 7000.
  • Experience in configuring and troubleshooting NAT and PAT.
  • Managed inventory of all network hardware, Management and Monitoring using SSH, Syslog, SNMP.
  • Excellent in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunk, STP, Inter-VLAN routing, LAN security.
  • Experience working with F5 Load Balancing in a Lab Environment. Hands on experience in troubleshooting and deploying of various IP Routing Protocols EIGRP, RIP v1/2, OSPF, IS-IS & BGP
  • Hands-on experience using Cisco Virtual Switching System (VSS).
  • Good knowledge on Bluecoat proxy server SG.
  • Knowledge of advanced technologies like VOIP, H.323, SIP, QOS, Multicasting, MPLS and MPLS-VPN.
  • Experience with 802.11x wireless technology.
  • Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-6400 load balancers.
  • Hands on Knowledge/experience on F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs.
  • Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248).
  • Hands-on Experience with CISCO Nexus 7000, Nexus 5000, and Nexus 2000 platforms.
  • Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
  • Expertise in configuring and troubleshooting of Palo Alto, Juniper NetScreen & SRX Firewalls and their implementation Experience in site-to-site and remote access VPN solutions.

TECHNICAL SKILLS:

RIP, RIP V2, EIGRP, OSPF, IS: IS, IGRP, HSRP, VRRP, GLBP, LACP, PAGP, DNS, SMTP, SNMP, FTP, TFTP, LPD/TDP, WLAN, 802.11/802.11 e, WEP, POP3 LADP, TNS.

LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, Ether channel, SDWAN, VLANS, VTP, STP, RSTP, 802.1Q, HSRP, DHCP.

WAN Technologies: Leased Line, Frame Relay, ISDN, PPP, HDLC, ATM, SONET, MPLS, T1, T3, OC Standard

Network Products: CISCO Routers 1700, 1800, 2500, 2600, 2800. CISCO High End Router 3600, 3800, 7200, 12010. CISCO Switches 1900, 2950, 2960. CISCO Campus Switches 3550XL, 4984 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507, Cisco Nexus (7K, 5K, 2K & 1K) switches

Juniper Platforms: SRX, MX, EX Series Routers and Switches

Security & VPN: Palo Alto Firewall, Cisco ASA (5505/5510) Firewall, AIP SSM, CSC SSM, FWSM, Fortigate, CISCO CSM, ACL- Access Control List, IPS/IDS, NAT, PAT, CISCO ACS, Check point (3200, 5800, 15400 and 15600) SonicWall, RSA SecureID, SRX, SSG series firewalls, Cisco ISE

Authentication: RADIUS, TACACS+, Digital s

Monitoring Tools: Wireshark, Cisco Works, Cisco WAN Manager, SolarWinds, Wireshark, Infoblox, Nmap, Nessus, PRTG Packet Sniffer

Servers: Domain servers, DNS servers, WINS servers, Mail servers, Proxy Servers, Print Servers, Application servers, FTP servers, Avocent Console server.

Operating Systems/Application: Windows 2000/2003/2008 / XP/7, LINUX, Solaris, Red Hat, Active Directory, UNIX, Junos, Cisco packet tracer, Cisco IOS, Cisco UCS, VMware, VISIO

Languages: C, Perl and Python Storage (SAN & NAS)

EMC, HP, NetApp: VNX, VMAX, XTREMIO, 3Par and EVA

PROFESSIONAL EXPERIENCE:

Confidential, Fort Worth, TX

Network Security Engineer

Responsibilities:

  • Experience with configuring Cisco 6500 Virtual switching system in Distribution layer of the Data center network.
  • Configured BGP with ISP providers and implemented EIGRP/OSPF as IGP for internal campus routing.
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Worked closely with Service providers for maintaining circuits based on MPLS technology.
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer.
  • Worked extensively on Cisco ASA 10/5540/5555 ) Series, experience with conversion of PIX rules over to the Cisco ASA solution.
  • Designed and Implemented policies and zones on Palo Alto 7050,5050 and 5020 Internet firewalls for incoming and outgoing traffic.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports.
  • Designing F5 solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BigIP Load Balancers.
  • Installed and Configured the F5 BIG-IP LTM, configure virtual servers and associate them with pools for internal web servers.
  • Performed a wide range of network administration duties including installations, debugging, maintenance, upgrades, and support for various network devices.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Performed Migration of Cisco catalyst switches IOS configuration to Juniper MX routers JUNOS platform.
  • Documented and maintained all the network changes, topology diagrams and implementations through MS VISIO tool.
  • Worked extensively with Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches and configured routing protocols like OSPF, EIGRP and BGP.
  • Configured Cisco ASA 5555-X in HA Pair, migrated all the site to site VPN’s from cisco routers, Palo Alto firewalls and netscreen firewalls to Cisco ASA.
  • Responsible for configuring Site to Site VPN’s and Remote access ANYCONNECT services.
  • Migrated Juniper Netscreen (Screen OS) SSG firewall configuration to Palo Alto 7050 PANOS platform.
  • Worked on Arista 70XX DC switches, configured VLAN, MLAG’s and Port channels for redundancy.
  • Responsible for configuring Virtual Servers and Configuring Load balancing methods in F5 LTM worked on creating iRules and iApps.
  • Network deployment; responsible for coordinating deployment and configuring the routers, switches, radios, and monitoring devices sent to the field maintenance; \
  • Responsible for Firmware and Software upgrades/maintenances for all devices on the network
  • Verified network connectivity and routing. Documented work for routers switches and firewalls for data center.
  • Implemented P2P line activation for more than 2 locations via VPN tunnel.
  • IOS upgrade on ASR100 and ISR4431 routers including DR and increase encryption level on IPSec tunnel over MPLS connection more than 2 locations.
  • Created additional site-to-site IPsec VPN to connect SD-WAN to Zscaler for cloud based Security.
  • Designed and architected solution for the large bank networks environments for core, distribution and access layer switches of the bank networks. Working in Networking Lab before Implementation task in data center.
  • Configured, upgraded and troubleshot load balancer, ISR4431, ASR1000, 7206 routers, Layer 2 and Layer 3 switches like 2960, 3650, 3850, 3750, nexus 7010, catalyst 6504, and 4948 switches using Routing and switching protocols like BGP, OSPF, MPLS, STP, SNMP, Port mapping, DNS, SSH, ACL, and documentation work for 5510, 5520, 5540 ASA Firewall.
  • Configured AAA and TACACS+ after deploy in new devices for security reasons.
  • Responsibilities include resolving NOC tickets, Customer Service Representative tasks, Problem
  • Hands on experience with L2/L3 technologies, such as: SVI, LACP, VPC, VPC+, VRF, VLAN, RIP, OSPF, EIGRP, HSRP, VRRP, OTV, Fabric Path and MPLS technologies
  • Managed storage (NAS and SAN) related issues, performed backup-restore operations using legato networker and HP data protector and performed troubleshooting on tape libraries remotely. Maintained client information under high level of confidentiality when dealing with backups and restore operations.

Environment: Routing and Switching, VMware, Windows platform servers, Cisco/Juniper routers and switches, OSPF, BGP, MPLS, EIGRP routing protocol, WAN Optimization, NEXUS 2K,5K,7K, 1000v, Cisco 6500, 3750, 3550, Juniper EX switches, Juniper MX routers, Arista, VLANS, SNMP, NAT, Infoblox, HSRP, VLAN trunking 802.1Q, F5 Networks Big IP, CISCO ASA, Juniper netscreen, DELL Sonic wall, Palo Alto and Checkpoint firewall, EMC VNX, VMAX and AWS.

Confidential, Newark, NJ

Network Deployment Engineer

Responsibilities:

  • Responsible for designing network infrastructure and implementing RIP, EIGRP, OSPF, BGP routing protocols on various networking devices and performed troubleshooting on Remote infrastructure management of campuses in different locations.
  • Worked closely with Service providers for maintaining circuits based on MPLS technology.
  • Built site-to-site IPSEC VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Performed Troubleshooting and escalation management of day-to-day issues for campuses. Deployed network devices based on new designs in Datacenter infrastructure.
  • Actively worked on Switching tasks that includes VTP, ISL/ 802.1q, IPSec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
  • Implementation of name resolution using DNS in TCP/IP environment
  • Expert in F5 Networks configuration of devices such as LTMs, GTMs, Load Balancers, DNS/DHCP services.
  • Worked on implementation of the basic F5 ASM, F5 Fire pass and VE, F5 APM.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Hands of experience on Zscaler Proxy for access management and Web filtering.
  • Managed Zscaler cloud proxy to restrict access to harmful content.
  • Globally rolled out Zscaler to replace Websense as the web filtering solution experience as a NOC Engineer involving monitoring client networks and alerting those clients to any failures on their networks and resolving incidents within ticketing system.
  • Palo Alto SSL decryption installation and configuration on PA 3060,5060, and 7050.
  • Configuring OSPF, RIP, EIGRP protocols and IP sub-netting, Routers and Switches Supported and maintained networking devices, cabling and standalone systems as part of job duties.
  • Maintained Infoblox for IP assignments and reservations for both private and public ranges.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPSec/GRE to GetVPN.
  • Expert in configuring Cisco Routers, Catalyst Switches, Nexus Switches.
  • Upgrade Cisco 6500, 3750, 2960s, Nexus 5000, Nexus 2000, Nexus 7000 switch IOS software.
  • Worked extensively with Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches.
  • Strong Knowledge in working with F5 Load Balancers and their Implementation in various Networks.
  • Worked extensively on Cisco ASA 5555-X Series, implemented site to site VPN’s and any connect services.
  • Implemented Palo Alto 7050 Firewall in HA Pairs as an internet firewall, configured rules and Zones based on traffic.
  • Configured and managed Cisco VSS in Distribution layer of the Data center network and arista 7010/7060 series switches.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Monitored network for optimum traffic distribution and load balancing using Solar winds.
  • Implemented security measures to keep networks running and secure. Configured extended ACLs to filter traffic and gave restricted access to certain users.
  • Administered Access control threat prevention and data protection services through Zscaler Services Platform.

Environment: Routing and Switching, VMware, Windows platform servers, CISCO routers and switches, OSPF, BGP, MPLS, EIGRP routing protocol, WAN Optimization, NEXUS 2K,5K,7K, 1000v, CISCO 6500, 3750, 3550, Arista, VLANS, SNMP, NAT, Infoblox, HSRP, VLAN trunking 802.1Q, F5 Networks Big IP, CISCO ASA, DELL Sonic wall, Palo Alto and Checkpoint firewall, EMC VNX, VMAX and AWS.

Confidential

Lead Network Engineer

Responsibilities:

  • Performed proactive monitoring, hardware Deployment in complex data center Infrastructure Network and installation of Software Applications on various Operating Platforms.
  • Responsible for the configuration of Cisco Routers (7000, 5300, 4000, 2500, 3000, 2600) using RIP, IGRP, OSPF, EIGRP, BGP
  • Managed office network with Cisco devices with network devices including 2500 and 3600 series routers and 6500, 3500, 2900 series switches
  • Worked extensively in Configuring, Monitoring and Troubleshooting Palo Alto with ACL, NAT, Object Groups, Failover, Multi-Contexts and ZScaler.
  • Extensive experience in configuring and implementing OSPF and BGP.
  • Configuration and troubleshooting F5 LTM, GTM series like 6600, 6800 for different applications and monitoring the availability.
  • Configuring failover for redundancy purposes for the security devices. Implemented the stateful & serial failover for PIX/ASA firewalls, Checkpoint Clustering and load balancing features.
  • Responsible for Palo Alto, Zscaler and Cisco ASA firewall administration across our global networks Maintenance and configuration of Cisco ASR1000 series.
  • Supported core network consisting of Cisco 7200 series routers running multi area OSPF.
  • Perform advanced troubleshooting using Packet tracer and tcp dump on firewalls.
  • Configured EIGRP and OSPF as interior gateway protocol with route filtering and route redistribution, installed and maintained Cisco 3600, 2600 and 7200 backbone routes with HSRPAssisted teams in Managing Arista provisioning tool for implementing spine/leaf architecture.
  • Performed WAN testing with the ISP providers.
  • Arranged equipment demonstrations and ran equipment checks and trials to ensure safety and effectiveness for various data center components.
  • Assisted Technology Director and various Business units in framing ideas for upgrading services and developing plans for new infrastructures, presales discussions and material handling.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Deployed the switches in high availability configuration with HSRP.
  • Configured UDLD, port-fast, uplink fast and other spanning tree features.
  • Monitored network for optimum traffic distribution and load balancing using Solar winds.
  • Implemented security measures to keep networks running and secure. Configured extended ACLs to filter traffic and gave restricted access to certain users.
  • Created and maintained documentation and Visio diagrams as it relates to network configuration, network mapping, processes, and service records.

Environment: Cisco routers and switches, Site to Site VPN’s, OSPF, BGP, MPLS, EIGRP routing protocol, WAN Optimization, NEXUS 2K,5K,7K, 1000v, Cisco 6500, 3750, 2950 series, Juniper Net Screens, F5 BigIP, SNMP, NAT, TCP/IP, VLAN and Cisco firewalls (PIX and ASA).

Confidential

Network Administrator

Responsibilities:

  • Implemented Cisco Secure Access Control Server (ACS 3.0) for TACACS+/RADIUS
  • Knowledge with redistribution of routing protocols and Frame-Relay configuration
  • Implementation of TCP/IP and related Services-DHCP/ DNS.
  • Experience with connectivity of Cisco Networking Equipment with F5 Load Balancer.
  • Experience with GTM F5 BigIP component to provide high availability with providing services across data centers.
  • Experience with Using LTM F5 BigIP component to provide 24“7 access to applications
  • Implementing and configuring F5 LTM's for VIP's and Virtual servers as per application and business requirements.
  • Maintain the security standards across the security devices as per the security policies. IDS/IPS Signature updates and CSM Management.
  • Configured, maintained and troubleshot routing protocols such as OSPF, EIGRP and BGP.
  • Assisted with escalation procedures and customer notifications.
  • Configured Cisco Routers for OSPF, IGRP, RIPv2, EIGRP, Static and default route.
  • Experience in Configuring Site-to-Site and Remote Site VPNs, NAT/PAT policies
  • Maintenance and Troubleshooting of connectivity problems using PING, trace route.
  • Experience in designing and troubleshooting of EIGRP routing issues DMVPN Technology, Performance Routing PFR, Ethernet.

We'd love your feedback!