Network Operations Engineer Resume
SUMMARY
Confidential has over 20 years of IT experience in design, deployment, integration, and support of large enterprise - wide LAN/WAN networks comprising of mission critical applications. Confidential is experienced in several network protocols including: BGP, OSPF, EIGRP, IGRP, RIP, TCP/ IP, MGCP, SIP, SSH, IPSEC, DNS, DHCP, PPP, HTTPS, HTTP, WINS.
PROFESSIONAL EXPERIENCE
Confidential
Network Operations Engineer
Responsibilities:
- Confidential is the network engineer for supporting DOL Office of Chief Information Officer (OCIO).
- Confidential is involved in DOL Network Operations Tier 3 support task for new Unified Communications switch network environment which include Cisco Nexus 9508 Core switches, Catalyst 4507R closet switches, 3850X, 3560X and 2960X switches, and for legacy switch network environment which include Catalyst 6500 Series switches, 4500-E switches, and various Catalyst switches. Confidential also worked on Network Operation troubleshooting and monitoring for consolidated DOL VRF Network Infrastructure issues.
Confidential
Associate
Responsibilities:
- Confidential is the senior network engineer and Voice over IP (VoIP) network engineer for supporting Operations and Engineering tasks.
- Confidential is involved in Data Center Nexus switch migration and implementation task which include Dell PS SAN storage migration coordination, Oracle and SQL server migration coordination, VMware ESXi hosts migration coordination, Dell VRTX server migration coordination, Citrix VDI thin clients, etc. to Nexus 5500 switches, Catalyst 3750v2 switches, Catalyst 3850 switch from Cisco 6509 switch, and 4900M switches. Confidential also worked on the Cisco Unified Communication Manager (CUCM) and Cisco Unity Connection (CUC) migration and upgrade assessment to CUCM 11.5 and CUC 11.5 from CUCM version 8.6 and CUC 8.6.
Confidential
IP Network / UC Engineer
Responsibilities:
- Confidential is the IP Network and Unified Capabilities engineer for supporting DISA UC and Telemetry task which includes VoIP, VTC, and Extensible Messaging and Presence Protocol (XMPP) implementation. Confidential implemented Cisco Enterprise Session Controller (ESC)
- 10.5.2 clusters on the Cisco UCS servers with Cisco CUCM SME 10.5.2, CUCM 10.5.2, CuC 10.5.2, CUPS 10.5.2, Cisco CUBE SBC and VMware ESXi 5.5. Confidential also configured Oracle Acme Packet SBC and Cisco CUBE SBCs for CUCM 10.5.2 and CUCM 8.6 SIP Trunk implementation, and CUCM 8.6 and Avaya 5300 RTP/SRTP SIP Trunk implementation.
- Confidential is involved in UC Lab ESC implementation which is based on the FlexPod Datacenter with VMware vSphere solution developed by Cisco and NetApp. The ESC systems are configured by Confidential include NetApp FAS 2554 SAN Storage, UCS 5108 chassis with 2208XP IOM, UCS B200 M4 blade servers, UCS C240 M3 servers, UCS 6248UP Fabric Interconnectors, Nexus 9372PX switches, Cisco 3945 ISR routers, UCS Manager, etc.
Confidential
Lead Engineer / Associate
Responsibilities:
- Enterprise Services Center (ESC) Financial Management (FM) and Information Technology (IT) Support for Department of Labor (DOL) and Equal Employment opportunity Commission (EEOC) Confidential is the network Analyst for supporting FMIT Operations. Confidential is involved in network system assessment including reviewing existing network designs for Production and DR sites hosted in Century Link hosting sites, and Development and Testing Facility (DTF) hosted in Raging Wire site, and VPN solution between Booz Herndon Parkway Office and Raging Wire Development and Testing Facility (DTF).
- Confidential is the senior network engineer for supporting new AFTAC facility network implementation task for four networks (NIPR, .GOV, SIPR, and JWICS). Confidential is involved in network system design reviews including reviewing Master Equipment List, installations, configurations, and deployments. The deployed systems are Cisco 6500 Catalyst switches with VSS, Nexus 5596UP data center switches including L3 modules, Nexus 2248T Fabric Extenders, Cisco 2901 Routers with OOB management implementations, Cisco 3560 Access switches, Cisco 3945 Routers, Cisco 3750-X switches, Cisco ONS 15454 M6 with DWDM connections between buildings, etc. Confidential also provided additional support to AFTAC VoIP implementation team to avoid user impact and schedule delay for moving to new facility.
- Confidential is the Voice over IP (VoIP) network engineer for supporting a VoIP implementation task for a classified USMS program. For VoIP task, Confidential is involved in VoIP system designs, developing Bill of Materials, installations, configurations, and deployments. The deployed systems are Cisco UCS C200-M2 Servers, VMware ESXi 4.1 Servers, Cisco Unified Communication Manager Servers, Cisco Unity Connection Servers, Cisco IOS PRI Gateways, Cisco VG-224 Analog Gateways, Cisco ASA Firewalls, Cisco 3750X and 3560 PoE Switches, General Dynamics vIPer Phones, Cisco 7970G IP Phones, Cisco 7960G IP Phones, Cisco 7975G IP Phones, Cisco 7942G IP Phones, Cisco 6901 IP Phones and Cisco 7937 IP Conference Phones.
- Confidential is the VoIP engineer for supporting GSA President-Elect Transition Support Team (PTST) task. For PTST task, Confidential is involved in developing high-level network design, detail network design, and Bill of Materials (BOMs), and implementation for PTT data and voice networks.
- Confidential is the network and security engineer for supporting NIPRNet Gateway task. For NIPRNet Gateway task, Confidential is involved in source selection testing support for Enterprise Mail Security Gateway (EMSG). Confidential is also involved in Access Control List testing with Juniper Router, Agilent N2X, and Spirent SmartBits for FLM-ANT (Filter List Management - Anti Network Terrorism) and FLM-TR (Filter List Management - Tech Refresh).
- Confidential works for Navy Marine Corps Intranet (NMCI) Program Management Office as an Engineering support Subject Matter Expert (SME). Confidential involved in Maritime Operation Center (MOC) solution development support and Next Generation (NGEN) Defense Information Systems Network (DISN) Transport Early Transaction Activities (ETA) support.
- Confidential provided support for EPA eRuleMaking data center move for development, test and COOP environments as a part of the contract transition from Lockheed Martin to Confidential . Confidential ’s responsibilities are planning and execution of network circuit move, network connection tear down and setup, and network infrastructure device reconfigurations
- Confidential was the network lead engineer for supporting GSA President-Elect Transition Support Team (PTST) task. For PTST task, Confidential is involved in developing high-level network design, detail network design, and Bill of Materials (BOMs) for PTT data networks.
- Confidential is the network and security engineer for supporting NIPRNet DMZ task and Releasable (REL) DMZ Log Aggregation task. For NIPRNet DMZ task, Confidential is involved in developing requirements for NIPRNet DMZ concept implementation. Confidential is also involved in Cisco Security Monitoring, Analysis, and Response System (CS-MARS) implementation for auditing requirements of REL DMZ device Log Aggregation.
- Confidential was the chief network and security architect for designing and deploying TTB’s network infrastructure and network security system. The task involved implementing Cisco switches (6500s), Intrusion Detection Systems (IDS), redundant firewalls, virtual LANs (VLANs), and VPN devices for the TTB network. Confidential is involved in IPv6 migration and VoIP Pilot test plan. Additionally, Confidential designed and implemented TTB’s VoIP Pilot systems which included Cisco CallManagers, Cisco Unity, and Cisco Voice Gateways. Confidential performed VOIP Toll bypass pre-deployment assessment for TTB network infrastructure.
- Confidential provided support in designing and implementing the TECII network architecture for MDA. The task involved deployment of network security devices, routers, and switches to support mission critical voice and data traffic. Additionally, it involved developing installation procedures for the TECII Network Management Systems which comprised of HP OpenView NNM, CiscoWorks RWAN including Internetwork Performance Monitor (IPM), PanaVue,
- Tripwire, and Sun StorEdge Enterprise Backup systems.
- Confidential designed, implemented, and supported CMS Next Generation Desktop (NGD) Mirror Site network and security infrastructure. Confidential implemented Cisco PIX firewalls, routers, switches, IDSs, VPN, and Netscreen devices for the NGD network. Additionally, Confidential configured Jacada Integration Layer Servers, and Windows Integration Host servers.
- Confidential provided technical expertise for deploying the new network infrastructure for AHRQ. Responsibilities included design and review of the AHRQ’s current network infrastructure and deployment of Cisco routers and switches.
- Confidential provided extensive support in design and deployment of Department of State’s Interagency Collaboration Zone (ICZ) network. The task included designing an e-commerce collaboration infrastructure and deployment of Cisco routers, switches, and firewalls. Confidential also provided ongoing support in troubleshooting several complex network and applications issues.
Confidential
Sr. Network Engineer
Responsibilities:
- While employed at Confidential, Confidential supported the Department of State PDA Project.
- Responsibilities included Cisco router and switch configuration, writing of technical procedures, and providing technical support for Public Diplomacy ALMAtization (PDA) installation engineers.
- Additional responsibilities for this project included designing and reviewing of over 200 overseas PDA post networks, and improving the bill of material processes.
Confidential
Sr. Network Engineer
Responsibilities:
- Confidential provided level 2 and 3 technical support for routers, switches, DHCP, and DNS servers for the Department of State’s PD (Public Diplomacy) wide area network. Also conducted an automatic route failover study and configured internetworking devices for Department of State overseas posts.
- Confidential executed and tested Cisco Voice over IP and Cisco Gigabit switches for the Department of State Enterprise Network Management Configuration Control Office. Also provided IRE Security Center Configuration Support and configured Cisco routers for providing DDR connections to two overseas posts.
- Confidential performed Cisco router configuration and implemented unclassified Department of State’s ALMA worldwide deployment project systems, involving more than ten countries.
Confidential
Principal Systems Development Specialist
Responsibilities:
- Confidential performed LAN/WAN support for the corporation’s network.
- Managed production servers and Cisco routers redundancy system, and also studied and tested the proxy server and revised Y2K issues for Cisco routers, Novell systems, and Windows NT operating systems.
Confidential
Project Manager, Information and Network Systems
Responsibilities:
- Confidential designed, implemented, and administered the corporate network. Configured and managed Internet servers, Web servers, an Exchange server, and an FTP server.