We provide IT Staff Augmentation Services!

Network Engineer Resume

2.00/5 (Submit Your Rating)

Rtp, NC

OBJECTIVE:

  • Seeking a challenging position of network engineer which will give me an opportunity to prove potential in me and educate me more in the field of networking and to help reach the goal of the organization and its growth.

SUMMARY

  • 6+ years of experience in Networking and Security, including hands - on experience in providing network support, installation and analysis for a broad range of LAN/WAN/MAN communication systems.
  • Hands-on experience in Routing, IP Subnetting, VLSM, TCP/IP.
  • Hands-on experience on FortiGate 300E, Palo Alto PA-3020/PA-500 series.
  • Palo Alto Rule changes PA-3020/PA-500, templates, object creation, planning, configuration changes, OS upgrades, CLI troubleshooting.
  • Worked on FortiGate Firewall 300E. Worked on Forti Token for 2 factor authentications for VPN Access.
  • Worked on FortiMail Email Security, Forti Client, Forti Analyzer.
  • Proficient in AWS services like VPC, EC2, S3, ELB, AutoScalingGroups (ASG), EBS, RDS, IAM, Cloud Formation, Route 53, Cloud Watch, Cloud Front, Cloud Trail.
  • Used security groups, network ACL’s, internet gateways and route tables to ensure a secure zone for organization in AWS public cloud.
  • Used IAM for creating roles, users, groups and also implemented MFA to provide additional security to AWS account and its resources.
  • Configuring rules and maintaining Palo Alto Firewalls & Analysis of Firewall logs on PA-3020.
  • Worked on Cisco IOS for configuration & troubleshooting of routing protocols: OSPF, EIGRP, RIP, BGP.
  • Hands on experience in configuring Cisco Catalyst 2960, 3750, 4500, 6500 and Nexus 3000, 5000, 6000, 7000 series switches and Cisco 2600, 2800, 3935, 7600, 7200 series routers
  • Worked on 1134AC Optical Line Terminal (OLT), Panorama Element Management System (EMS).
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Configured and implemented VPC (Virtual Port Channel) and enhanced VPC on nexus 5k’s and 7k’s.
  • Knowledge on ACI (Application Centric Infrastructure), APIC technologies, Spine-and-leaf Architecture.
  • Configured and maintained the Extreme Wi-Fi Access point, Aruba Wi-Fi Access points.
  • Working experience on tools and devices like Source Fire, Fire eye, Aruba, Cisco ASA, Cisco ISE
  • Designing and implementation of PON (GPON).
  • Managed successful delivery of massive security response portfolio including Splunk and Cisco ISE.
  • GPON Service Test i.e. VLAN Configuration, profile.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS) and deploying GRE Tunnel.
  • Worked on Active Directory, Windows Server 2008, 2012 R2.
  • Worked with different protocols like DHCP, DNS, NTP, LDAP, HTTP, SFTP and others.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST, STP features: Port Fast, Backbone fast, Uplink fast, BPDU Guard.
  • Implementation of HSRP, VRRP, GLBP for Default Gateway Redundancy.
  • Experience in Network Management Tools and sniffers like SNMP, Pulseway RMM Monitoring Tool, StealthWatch (SMC), Wire shark and Cisco works to support 24 x 7 Network Operation Center.
  • Knowledge in documentation and updating client’s network documentation using Visio, Dia.

TECHNICAL SKILLS

Routing Protocols: RIP, IGRP, EIGRP, OSPF, IS-IS, BGP.

Windows Server: Windows Server 2008, 2012 R2, 2016, Active Directory.

WAN Protocols: HDLC, PPP

Security Technologies: Firepower Threat Device (FTD), ISE (Identity Service Engine), FortiGate 300E, Forti Mail, Forti Token, Forti authenticator, Forti Analyzer Palo alto PA-3020, PA-500, Barracuda Web Filter, Barracuda Email Security.

CABLING: Fiber Optic Cables, CAT 5, CAT 6, COAX, CAT 3, Twinax, Voice and Data Cabling, Crimping, installing and design.

Cisco Routers: Cisco 2500,2600,2800,3600,3945,7200,7600

Redundancy and management: HSRP, VRRP, GLBP, RPR, NSF/NSR, Wire shark, Solar Winds, SNMP

(G-PON Gigabit-Passive Optical Network): 1134AC Optical Line Terminal (OLT), Panorama Element Management System (EMS).

Layer 2 technology: VLAN, RTP, STP, RSTP, PVST+, MST, PVLAN, Optimizing STP (Port Fast, Uplink Fast, Backbone Fast, Root Guard, BPDU Guard)Layer 3 Switching: CEF, MLS, Ether channel (PAGP & LACP, Load Balancing)

Operating Systems: Windows Servers 2008, 2012, 2012 R2, 2019, RHEL, CENTOS, Windows 7, 8, 10.

Scripting Languages: Python, Perl.

PROFESSIONAL EXPERIENCE

Confidential, RTP, NC

Network Engineer

Responsibilities:

  • Hands-on experience with modern Cisco data center platforms: Nexus 9300, 7000, and 5500 series, switches and Cisco Fabric Extenders, configured trunk ports, virtual port channels, and interfaces.
  • Worked on Cisco FTD (Firepower Threat Device), FMC (Firepower Management Console), ISE.
  • Configured and Managed RHEL, CENTOS, SUSE operating systems and worked on OpenStack deployments and troubleshooting.
  • Planned, designed and configured various Cisco ISE strategies (Standalone, Distributed Setups).
  • Added devices to Splunk server for monitoring, authentication failures and security/threat investigations and to Generate reports and graphs from available data depending on the issue.
  • Configured user's roles and policies for authentication using Cisco NAC and monitoring the status of logged users in network using Cisco ISE.
  • Worked with Kali Linux and Pentesting applications which includes OpenVAS, Nessus, BurpSuite, Dradis, Nmap.
  • Configured and Managed Cisco UCS B & C - Series servers. Worked with Cisco Integrated Management Controller (CIMC), Data Center Network Manager (DCNM).
  • Installed Cisco ISE 2.3 and 2.4, ISE integration with DNA
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server
  • Configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Experience configuring VPC (Virtual Port Channel) in Nexus 7010/7018.

Environment: Nexus: 9300,7000,5500: (FTD) Firepower Threat Device, FMC (Firepower Management Console): SMC (StealthWatch Management Console), StealthWatch Flow Collector (SFC): Routing protocols: OSPF, EIGRP, BGP: Horizon GUI: UCS C240M5/M4/M3: UCS B200 M5/M4/M3: CIMC: APIC (Application Policy Infrastructure Controller).

Confidential, Mesquite, NV

Network Engineer

Responsibilities:

  • Worked with HPE Aruba Layer 3 switches 5406zl, 5400 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, ether channel
  • Worked on FortiGate Firewall 300E, Forti Mail, Forti Token, Forti authenticator, Forti Client, Forti Cloud, Forti Analyzer.
  • Configured and implemented IPSEC VPN Tunnels, Global Protect VPN on Palo Alto firewall series PA-3020.
  • Configured the SSL VPN and IPSEC VPN on the Fortinet Firewall.
  • Worked on Agilysys POS (Point of Sales system).
  • Performed firewall firmware upgrades.
  • Managed AD Domain Controller, DNS, and DHCP servers and configurations.
  • Worked on Auvik Tool.
  • Aruba Clear Pass Server Authentication: 802.1X, AAA, Policy Management.
  • Hands experience in creating a port channel between two devices by using LACP negotiation to get enough bandwidth and redundancy, load balance.
  • Hands-on experience with VMware ESXi5.5, 6.0 and vCenter applications. Experience in VMware networking with VMware standard switch and Distributed switch.

Environment: CiscoRouters: 7200, 3800, 3945. Fortinet:300E: NexusSwitches: 5596, 7010 FortiToken: Firewall: FortiGate 300E, Palo alto PA-3020 Cisco Firewall: Cisco ASA 5510.5516. Switching: VTP, VLAN, PVST, Pulseway NOC Monitoring, Aruba Access point, HP Switch, Cisco ISE, Splunk.

Confidential, Warm Springs, OR

Network Engineer

Responsibilities:

  • Configured and maintained data security on the Palo Alto firewall PA-3020, 500.
  • Configured and implemented Security Policies on Palo Alto Firewalls & Analysis of log.
  • Configuration and implementation of Palo Alto firewalls.
  • Configured and maintained IPSEC on Palo Alto Firewalls
  • Created and maintained VLANs on 1134AC Optical Line Terminal (OLT).
  • Configured Extreme Access points of series AP-3935I, 3965I.
  • Administered Windows Server 2012 R2 Active Directory including Group Policy, creation and deletion of user accounts, managing access controls, and domain structure configuration.
  • Supported and configured on Extreme switch x x.

Environment: - Firewall: Palo alto PA-500: Cisco Catalyst Switches 6500, 2960x, 3750, 3850.Extreme WIFI Configuration AP 3935i, 3965i: Extreme Switch X620,440.1134AC, Optical Line Terminal (OLT).

Confidential, Charleston, SC

Junior Network Engineer

Responsibilities:

  • Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements
  • Configured site to site VPN technologies using IPSEC.
  • Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location.
  • Experience in troubleshooting the complex issues like packet drops and latency and bandwidth throughput and MTU violation issues.

Environment: Cisco Catalyst Switches 4500,3500,3750, 3850.Routing protocols: OSPF, EIGRP, BGP Switching: VTP, VLAN, PVSTP+ and 802.1Q trucking. VOIP protocols: SIP and SCCP. Sniffer tools: Ethereal and sniffer pro.

We'd love your feedback!