We provide IT Staff Augmentation Services!

Network Engineer - Intern Resume

3.00/5 (Submit Your Rating)

TECHNICAL SKILLS

Programming Languages: Python, C, C++, Java

Frameworks: Flask, Django, Twisted, PyUnit, Robot

Libraries: NumPy, Pygame, Requests, Pandas, Scikit - learn, PySpark, SQLAlchemy, Pillow, SciPy, Yosai

Automation Tools: Puppet, Selenium, JIRA, Ansible, Nagios, Graphite, Solarwinds, CVS

Web Tools: JavaScript, PHP, HTML, CSS, jQuery, Nginx, Apache, JSON, XML, Active Directory, AWS

Additional Skills: HTTP, MySQL, Git, REST, sOaP, Docker, Firewall, JUnit, Kafka, Splunk, Redis, ETL

Networking Tools: Riverbed Modeler, Wireshark, GNS-3, TShark, Cisco Packet Tracer, NS-2, TCPDump

Operating Systems: Windows - Desktop/Server, Linux, Junos, Cisco - IOS, ONE, NX-OS, Arista - EOS

Other Skillset: Pen Testing, SDN, ELK Stack, VMware ESXi, CodeAnalyst, PyLint, cProfile, Tableau, Matlab

PROFESSIONAL EXPERIENCE

Network Engineer - Intern

Confidential

Responsibilities:

  • Performed unit tests, integration tests and API-level test cases and test suites for CR-8000 product.
  • Created backup VoIP network for Application Engineers using Python (PJ-SIP), Asterisk PBX and Xlite.
  • Configured dynamic routing, traffic management & data migration.
  • And firewall script for local Linux server.
  • Configured and monitored Firewall - Cisco ASA 5512x, Routers - Cisco 3945 and Switches - Dell 5548.
  • Troubleshoot & monitored the network with CLI scripts and developed the disaster recovery plan of network.
  • Other skills used - Eclipse, ASDM, EIGRP, Wireshark, Enterprise DNS & DHCP services, Active Directory, VMware ESXi, VCenter, vSphere, JUnit, VLAN, VPN, Selenium, Carbonite and SharePoint.

Technical Assistant

Confidential

Responsibilities:

  • Worked in a team of four at Image Acquisition division.
  • Applied skills to achieve precise and optimized outcomes for a better work flow in DocuTrack in student application evaluations using Oracle Database.
  • Handled student database in Filemaker Pro and uploaded optimized student transcripts into Oracle IPM Server.
  • Experience in handling the Enterprise CPM using OnBase, PeopleSoft, File Maker Pro 13 and Nolij applications.

Dynamic Encryption and Decryption of Files Using Python

Confidential

Responsibilities:

  • Any file can be encrypted and decrypted using a symmetric cipher, AES.
  • Dynamic keys used for Hashes (MD5)
  • AES mode used is Cipher block chaining and initialized vector used to generate Unicode for python scripting.
  • Visitors can choose between the given options for a questions.
  • And ballot results will be displayed live.
  • Feedback given by voter is obtained and saved at backend dynamically and sent through an email to administrator.
  • Feedbacks sent by multiple voters can be queried by administrator from the SQLite3 database.
  • From the enormous dataset files, useful data is educed and saved in JSON format.
  • Index traces of HTTP GET responses were mined for statuses.
  • All the analysis of mined data is derived in graphical illustrations.

File Management System Using Python

Confidential

Responsibilities:

  • Used to remodel any document.
  • Different document types handled by this application are .doc, .docx and .txt.
  • This application can edit the file, insert new data, copy the whole or specific contents and replace the text.
  • A virtual network is secured internally and externally from certain attacks.
  • Done by enforcing user permissions and designed a firewall on the network configured.
  • Attackers were blocked from access.
  • Few MITM attacks, file transfers, port scanning’s and ping flood were implemented and blocked.
  • TCP flags were configured accordingly to filter the packets.

Simulation of Multicasting Multimedia Traffic in a Controlled Network

Confidential

Responsibilities:

  • OSPF and PIM-SM Multicasting is done in a Riverbed Modeler.
  • Load Balancer is used to handle packet flow.
  • Audio and Video multimedia is transferred.
  • Quality of Service is implemented at application level by assured forwarding of DiffServ.
  • Various packet streaming parameters & network behavior were analyzed to compare.

We'd love your feedback!