Sr. Network Engineer Resume
Seattle, WA
SUMMARY
- 7 years of experience in Networking and Security, including hands - on experience in providing network support, installation and analysis for a broad range of LAN / WAN/MAN communication systems.
- Hands on experience in configuring Cisco Catalyst 2960, 3750, 4500, 6500 Arista 7050/7060/7260/7150/728 and Nexus 3000, 5000, 6000, 7000 series switches and Cisco 2600, 2800, 3600, 3800, 7200, 7600 series routers, Load Balancers & Cisco Firewalls.
- Experience with various LAN and WAN technologies and protocols like: - TCP/IP, VLAN, VTP, STP, EIGRP, OSPF, BGP, IKE/IPsec VPNs, NAT, DNS, MPLS and access list.
- Excellent knowledge and experience on multi-vendor platforms like Cisco, Juniper, Checkpoint, F5 Big-ip LTM load balancers, Bluecoat, Riverbed, Citrix, and VMware.
- Experience in implementing and designing new solutions with Cisco ASA Firewall series 5505, 5510, 5512-X and Palo Alto Firewall series PA-500, PA-2050.
- Extensive knowledge of Load balancing technology including algorithms and health check options.
- Experience directly managing routers, switches, load balancers and SSL accelerators in a high-availability infrastructure.
- Expert understanding of TCP as it pertains to packet inspection and network/application flows.
- Expert ability to troubleshoot issues and make recommendations for system changes, as needed, to resolve issues.
- Designing and implementation of DMVPN based IPSEC on all ATM centers Installation and configuration.
- Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
- Has a good experience working with the Trouble Tickets on F5 Load balancers on LTM module.
- Experience in configuring and troubleshooting BIG-IP F5 load balancer LTM creating virtual servers, nodes, pools and iRules on BIG-IP F5 in LTM module.
- Basic knowledge of Palo Alto Firewalls and Panorama centralized management.
- Working knowledge of IIS Server, DHCP Server, DNS Server, proxy server on Linux and windows. Implementation and administration of DNS, DHCP and WINS.
- Knowledge in OTV, Virtual Device context, Fabric path, Virtual Port channel and VSS cluster.
- Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view).
- Expertise in creating groups and pruning traffic flow using VLAN, VTP, ISL, 802.1Q.
- Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
TECHNICAL SKILLS
- Routers: Cisco 1800, 2600, 2620, 2900, 2901, 3900, 3925, 3945E, 4000, 7201, 7613
- Switches: Cisco Catalyst 2232, 2960, 3560, 4507R+E, 5596, 6509 - E, 7009 Nexus 2232, 5596, 7009, Arista (7050/7060/7260/7150/728 )
- Switching Technologies: LAN, Vlans, Trunking, Ether Channel, Port Fast, Up-link, VTP, PVST+, RPVST+, STP, RSTP, DTPMLPPP, IEEE 802.1q, MPLS, ISL and dot1q, SMTP, Inter-VLAN Routing, Multi-Layer Switch, Ether channels, MPLS, Transparent Bridging, Light weight access point
- Routing Technologies: RIP (Versions 1 & 2), IGRP, EIGRP, OSPF, PBR, BGP v, IS-IS Static Routing
- Load Balancers: F5 Networks (Big-IP) LTM 8950, GTM 6400, ASM, F5 Vipiron
- Network Management Tools: Wireshark, Net flow Analyzer, Cisco Works, Solar Winds, InfoBlox, Ethereal, Splunk, SNMP, GNS3, EMC Smarts
- Firewall: Bluecoat, Juniper Secure Access VPN Appliance, Cisco ASA firewalls, checkpoint R77, R76, Palo Alto, Cisco PIX, ASA.
- AAA Architecture: TACACS+, RADIUS, Cisco ACS
- OS products/ Services: Windows (98, 2000, XP, Server 2003/2008, Vista, Windows 7), Mac OS X, Unix and Linux
PROFESSIONAL EXPERIENCE
Sr. Network Engineer
Confidential, Seattle, WA
Responsibilities:
- Proactively monitored network health and activity through eHealth, Infoblox, Proteus, ServiceNow, Wireshark and Splunk.
- Deployment, configuration, and management of 802.1x solutions to include Cisco Identity Services Engine (ISE), ACS (Radius and TACACS+), and Cisco Prime Infrastructure.
- Update and modify KB network monitoring tool, Net Flow, Solar Winds and NETMRI for all new/old devices.
- Worked on automation of test environment using Shell, Python Scripting.
- Black listing and White listing of web URL on Bluecoat Proxy Servers.
- Performing URL filtering and content filtering by adding URL's in Bluecoat Proxy SG's.
- Experience in using Net Scout sniffer analysis for testing the performance of the network.
- Successfully put in Palo Alto PA 3060 firewalls to protect information Center and provided L3 support for routers/switches/firewalls.
- Performed on Palo Alto Firewall on network security software and hardware, security monitoring systems, encryption software, threat and vulnerability management services.
- Build and configure monitoring systems and other network related tools such as Introscope, Splunk, MRTG, Solar winds, and RANCID on a Linux/Windows 2003 platform.
- Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
- Experience implementing an intricate SDWAN solution for proof of concept projects.
- Integrated TACACS and LDAP for user authentication on webpage and device.
- Implemented Zone primarily based Firewalling and Security Rules on the Palo Alto Firewall Exposure to wild hearth feature of Palo Alto.
Environment: Juniper switches QFX5200, MX 240, MX 480, PTX1000, LB9 Quanta, OSPF & BGP, SNMP, DNS, Apollo Environment, python, Linux, Unix, Blade Runner workflows, Git Repo, Yaml Files, Brazil Workspace, IPAM, AWS Dashboard, Linux .
Sr. Network Engineer
Confidential, Dallas, TX
Responsibilities:
- Responsible for fitting the infrastructure surroundings with majority of Cisco ISE & Palo Alto appliances except for varied different instrumentality.
- Efficiently exploitation ServiceNow tool for generation of tickets, distribution severity to incidents, following up with incident standing and troubleshooting incidents.
- Excellently used Splunk to research and monitor incident management and incident resolution issues.
- Perform 24x7 log monitoring - review and analyze system security logs.
- Monitored & analyzed system logs on Symantec Endpoint Protection anti-virus, Symantec Data Center Security & Credant Encryption servers.
- Responsible for implementation/installation of LAN/WAN/SAN, Aruba Switches Aruba Wireless AP’s and Aruba Virtual Controllers.
- Installing and configuring CISCO Wireless LAN Controllers (WLC) with active/ standby state with controlling more 100 Cisco access points.
- Hands-on experience and expert knowledge of Cisco Intelligent WAN (IWAN).
- Hands on Experience in wireless RF site surveys and RF spectrum analysis.
- Good Experience in performing wireless site surveys using Air magnet software.
- Working on Cisco 4400, 5500 series wireless controllers, Cisco 1130, 1140, 1200 3702, 3602 and 2600 Series Access point.
- Experience working on Cisco Nexus 9k, 7k, 5k, 2k, Cisco Catalyst 6500’s, 4500’s &VPC, VDC, VRF
- Administration of Cisco Meraki Network switches, routers and teleworker gateways.
- Support, Trouble shoot and upgrade small Aruba Wireless Networks Confidential 2,200 remote dialysis clinics across the United States.
- Policy provisioning, access to specific segments of the networks through Cisco ISE.
- Engineered, configured and deployed routers using Cisco ISE.
Environment: Nexus 2k/5k/7k/9k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, HP (7510,7506) switches, Brocade VPX, ICX series switches, Palo Alto Firewalls, Viprion 2400 Bluecoat proxy server, LAN, WAN, WLAN, OSPF, RIP, SNMP, BGP, LDAP, IGMP, SSH, EIGRP, HSRP, PPP, VPN, Checkpoint, Cisco ISE.
Network Engineer
Confidential, Atlanta, GA
Responsibilities:
- Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
- Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
- Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
- Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
- Configuration 7609, 7606 with OSPF and catalyst 6500, 4500, 3550 switches with various VLAN.
- Worked on Cisco switches (6509, 6513, and 4510) for LAN requirements that include managing VLANs, Port Security and troubleshooting LAN issues.
- Work with Cisco product teams and SVS Lab to refine UCCE roadmap for smoother resolution of security vulnerabilities.
- Management of roughly 800 nodes through Solar Winds Orion network performance monitor
- Performed LAN operations and troubleshooting which involves working on VLANs, inter-VLAN routing, Trunking, STP, RSTP, port aggregation & link negotiation.
- Worked on Cisco Firewall ASA 5500(5510/5540) Series. Performed Security operations in terms of pushing new policies and deploying new rules.
- Tier3 implementation and day2 service management for Cisco UCCE 7.5, 8.x, 9.x, 10.5.3 (CVP, ICM, VXML gateways).
- Provide advanced help desk support for Cisco UC/UCCE products as well as providing support from RTMT traces and/or CVP logs.
Environment: Palo Alto, BMC Remedy, Cisco 3560/2950/2924/6509/6513/5500 Switches, Arista (7050/7060/7260/7150/728 ), Cisco 1800/2800/2500/2600/2800/1600/3800/3900/7204/7606 routers, Cisco ASA 5540, BIG-IP LTM 8900, QOS, Policy-maps, Class-maps, Vlans, Avaya, Transition/Migration, Wi-Fi, STP, RSTP, PVSTP, VTP, HSRP, Ether Channel, BGP, OSPF, EIGRP, MPLS, ATM, PPP, HDLC. SNMP, DNS, DHCP, InfoBlox, Solar Winds, Syslog, Checkpoint, F5 Load balancer, Nexus 7K,5K,2K,9k, Juniper 3600, 5600, Cisco AP’s, LAN, WAN.
Network Administrator
Confidential
Responsibilities:
- Managed LAN/WAN infrastructure using dynamic routing protocols (EIGRP,OSPF,BGP)
- Created VLAN using trunk link, access link, and creation of VTP mode
- Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair
- Created Private VLANs & preventing VLAN hopping attacks & mitigating spoofing with snooping & IP source guard.
- Configured and implemented IPSEC/GRE VPN
- Installed MacAfee anti-virus software
- Created standard access lists to allow SNMP, NTP and logging servers.
- Configured Cisco Wireless access points using LEAP and Cisco Radius for authentication, greatly increasing Wireless security
- Maintained complex LAN/WAN networks with several VLANS
- Worked with configuring IP Multicast, STP, HSRP
- Knowledge of LAN, WAN, TCP/IP, UDP and OSI models
- Configured PIX/ASA firewall version 8.4 by using NAT, ACL and SECURITY LEVEL
- Managed work stations, servers, applications and installed printers on the network
- Consistent network design deployed across all nodes throughout county consisting of core Cisco 7600 routers, distribution layer Catalyst 6500 switches, WAN aggregation Cisco 7600 routers, and access layer Catalyst 2900/3500/3750/3850 switches.
- Identified additional Network operations requirement and improvement opportunity.
Environment: OSPF, BGP, Private Vlans, Gre / site to site vpn, Dhcp Snooping, IP source guard, Wireless Access Points, Vlan, Catalyst 2900/3500/3750/3850 switches, Cisco 7600 routers.