We provide IT Staff Augmentation Services!

Lead Network Engineer Resume

3.00/5 (Submit Your Rating)

TECHNICAL SKILLS

Operating Systems: Solaris 8, 9, 10, Red - Hat Linux 10,11 IBM AIX 5.1, 5.2, 5.3, Fedora, Opera, Microsoft Windows XP-10, 2012, NT, XP, Vista, Windows Server, 2003 Exchange, Symantec Norton Anti-Virus Norton Ghost, pcAnywhere, Trend Micro Anti-Virus, VMware

Hardware: IBM FastT 700 tape library, Sun E420R, Sun E220R, Ultrium Tape Library 3583, Compaq desktops, Confidential desktops, Gateway desktop

Software: MQ 5.3, VNC Viewer, Terminal Service Client, SSH clients, Casemaker Telemail operations, LDAP operations and Tivoli Storage Manager, C++, Java, Foglight, Wireshark Monitoring, Apache, UNIX Systems Monitoring, Remedy,Work Load Manager, Oracle10g

Technologies & Protocols: DNS, DHCP, RIS, Remote Desktop, SIP, IIS, VPN, NAT, H.323,TCP, IP, ICMP, VLAN, 802.11x, 802.1X,VPN, FTP, HTTP, HTTPS. SSL, BGP,MPLS, SSH, Spanning Tree.

Connectivity & Hardware: Juniper SSG, Juniper SRX, Sonicwall (All Models), Cisco ASA (all models) Palo Alto (All Models) Fortinet (All Models) Adtran 1335,1234, Radware, Cisco Pix 501, Edgemarc, IAD, Cisco 1841, 2500, 2800,3845, ASR, Catalyst 1900 G 9000, Routers, Switches, Wireless, Ethernet, Fast Ethernet, Gigabit Ethernet, Netopia 3347, Polycom 330, 650, 4000 Cisco IP phone 7960, VG224

PROFESSIONAL EXPERIENCE

Confidential

Lead Network Engineer

Responsibilities:

  • The core responsibilities of this position include overseeing all aspects of IT Infrastructure including data center and network operations, end-user support, help desk operations, back office systems, Information Security and change management.
  • As a lead engineer, I am responsible for all network projects related to the corporate infrastructure and partner facing initiatives. Superior technical ability combined with exceptional communication skills. Able to maintain composure under stress, willing to work flexible hours, while leading a team of engineers within a fast-paced environment.
  • Managed dynamic team of engineers responsible for large fully redundant, partial mesh LAN/WAN environment with dedicated MPLS, E-line, internet circuits to call centers and AWS. Extensively involved in creating, managing and troubleshooting VPN tunnels (site to site and client to site) for enterprise customers using Cisco PIX/ASA, Netscreen, SRX, F5 ASM, Palo Alto, Sonicwall and Fortinet firewalls.
  • Managed dynamic team of engineers responsible for large fully redundant, partial mesh LAN/WAN environment with dedicated MPLS, E-line, internet circuits to call centers and AWS. Extensively involved in creating, managing and troubleshooting VPN tunnels (site to site and client to site) for enterprise customers using Cisco PIX/ASA, Netscreen, SRX, Palo Alto, Sonicwall and Fortinet firewalls.
  • Responsible for maintaining a strict SLA and reporting to business, partners, and customers uptime, performance and change requests. Develop new documentations, tools, trainings and procedures to improve the quality of services of Network Operation Center (NOC). Interface with external groups such as Product Managers, Provisioning Engineers, NOC, and customers to complete projects and implement new procedures.
  • Extensive usage of packet sniffers like TCPDump, Snoop, fw monitor and debugs to analyze network traffic and solving complex application communication problems.
  • Working experience with centralized authentication / authorization service (RSA SecurID).
  • Responsible for managing and forecasting budgets based on current and projected needs.
  • Responsible for determining and managing network projects that support and promote business objectives.
  • Install, configure and maintain F5 LTM load balancers
  • Performed complete redesign of large remote call center’s LAN environment including implementation of Core 6500 distribution layer switches, Cisco ASR’s and Nexus fabric switching with a extended ACI overlay back to the backbone.
  • Manage and maintain large environment of Cisco routers ASR’s, 3800/3900 and 3750V2, 3850 and Nexus 9K series switches
  • Manage and maintain Cisco ASA 5520 with embedded IPS modules.
  • Manage and maintain Juniper firewalls, Cisco ASA’s and Palo Alto firewalls. Experienced using ticketing system for incidents, problem and change management; Such as Service Now, Jira and Remedy.
  • Excellent customer facing communication skills.
  • Expert level understanding of core networking technologies.
  • Cisco Nexus spine and leaf data center switching architecture.
  • Responsible for creating and maintaining several partner site-to-site VPN’s.
  • Redesigned and Implemented large wireless and F5 LTM environment.
  • Managed Cisco and Aruba wireless environments.
  • Installed, configured and managed Riverbed 1050 and 2050 WAN optimization.
  • Create & maintain all network configuration items to ensure swift recovery in the event of an outage.
  • Evaluate security device logs for possible breaches in security, auditing, and troubleshooting.
  • Review all service and non-service affecting outages to determine best practices and recommended improvements to reduce future potential service interruptions.
  • Troubleshoot data circuit outages including Metro-E, T1, MPLS, and AVPN circuits.
  • Follow standard operating procedures, carried out team responsibilities, tasks and time-lines.
  • Responsible for maintaining a strict SLA and reporting to business, partners, and customers uptime, performance and change requests. Develop new documentations, tools, trainings and procedures to improve the quality of services of Network Operation Center (NOC). Interface with external groups such as Product Managers, Provisioning Engineers, NOC, and customers to complete projects and implement new procedures.
  • Extensive usage of packet sniffers like TCPDump, Snoop, fw monitor and debugs to analyze network traffic and solving complex application communication problems.
  • Working experience with centralized authentication / authorization service (RSA SecurID).
  • Manage all network aspects of privately owned $100 million Avaya / Cisco-centric call-center company. Performed complete redesign of large remote call center’s LAN environment including implementation of Core 6500 distribution layer switches, Cisco ASR’s and Nexus fabric switching with a extended ACI overlay back to the backbone.
  • Manage and maintain large environment of Cisco routers ASR’s, 3800/3900 and 3750V2, 3850 and Nexus 9K series switches
  • Manage and maintain Cisco ASA 5520 with embedded IPS modules.
  • Manage and maintain Juniper firewalls, Cisco ASA’s and Palo Alto firewalls.
  • Responsible for creating and maintaining several partner site-to-site VPN’s.
  • Owner of entire network lifecycle starting with general needs assessment, product evaluation, procurement, implementation and resource management, ROI analysis, day-to-day support and maintenance, and ultimately upgrade paths and replacement strategies.
  • Responsible for data infrastructure between call centers and corporate the
  • Relationship manager and technical liaison for external consultants, outsourced development staff, facilities and construction staff, and overall building management
  • Vendor relationship and purchasing management for all network related projects.
  • Research and implement new network technologies and hardware as needed by the business.
  • Worked unpredictable hours to accommodate after-hours changes and break fix scenarios.
  • Developed expert level knowledge of the business to enhance advisory opportunities and department value additions.
  • Maintained and supported a high-performance environment with an execution focus
  • Driven efficiency and effectiveness throughout Call Center Audit Services.
  • Extensive involvement in enterprise transformation efforts, initiatives, and activities, providing expertise and recommendations.
  • Solved problems and worked efficiently in a ticket-driven environment.
  • Effectively communicate with all levels of management as well as outsourcers and vendors.
  • Key contributor to data center infrastructure design including disaster recovery, preventive maintenance, local and wide area networks, servers and hardware selection and roadmap, physical security, storage, remote and Internet access, physical access, etc.
  • Evaluate and recommend infrastructure solutions to best meet the business needs of the company.
  • Lead/drive a balanced staffing effort which includes off-shoring, outsourcing and other methods to provide high quality, cost efficient services to the business.
  • Developed IT and support processes that are innovative and easily adopted.
  • Owner of outage management and escalations process.
  • Overall Support owner at 10 call center locations.
  • Work closely with Security team to develop policies and procedures for employees and systems.
  • Developed and maintained relationships with business leaders to ensure their support expectations are set at the appropriate levels and being met.
  • Responsible for contract, SOW, professional services negotiations.
  • Member of IT Leadership council.
  • Able to analyze complex user needs presented by the employee community and recommends technical solutions.

Confidential

Network Engineer

Responsibilities:

  • Extensive background in Amazon AWS Cloud Services with focus on connectivity via ATT Netbond and Verizon SCI. Designed, built, and deployed all Amazon AWS network infrastructure connectivity needed for the highly successful migration of our digital platform from Allconnect's data center(s) to AWS.
  • Managed dynamic team of engineers responsible for large fully redundant, partial mesh LAN/WAN environment with dedicated MPLS, E-line, internet circuits to call centers and AWS. Extensively involved in creating, managing and troubleshooting VPN tunnels (site to site and client to site) for enterprise customers using Cisco PIX/ASA, Netscreen, SRX, Palo Alto, Sonicwall and Fortinet firewalls.
  • Responsible for maintaining a strict SLA and reporting to business, partners, and customers uptime, performance and change requests. Develop new documentations, tools, trainings and procedures to improve the quality of services of Network Operation Center (NOC). Interface with external groups such as Product Managers, Provisioning Engineers, NOC, and customers to complete projects and implement new procedures.
  • Extensive usage of packet sniffers like TCPDump, Snoop, fw monitor and debugs to analyze network traffic and solving complex application communication problems.
  • Working experience with centralized authentication / authorization service (RSA SecurID).
  • Responsible for managing and forecasting budgets based on current and projected needs.
  • Responsible for determining and managing network projects that support and promote business objectives.
  • Install, configure and maintain F5 LTM load balancers
  • Performed complete redesign of large remote call center’s LAN environment including implementation of Core 6500 distribution layer switches, Cisco ASR’s and Nexus fabric switching with a extended ACI overlay back to the backbone.
  • Manage and maintain large environment of Cisco routers ASR’s, 3800/3900 and 3750V2, 3850 and Nexus 9K series switches
  • Manage and maintain Cisco ASA 5520 with embedded IPS modules.
  • Manage and maintain Juniper firewalls, Cisco ASA’s and Palo Alto firewalls.
  • Responsible for creating and maintaining several partner site-to-site VPN’s.
  • Redesigned and Implemented large wireless environment.
  • Managed Cisco and Aruba wireless environments.
  • Installed, configured and managed Riverbed 1050 and 2050 WAN optimization.
  • Create & maintain all network configuration items to ensure swift recovery in the event of an outage.
  • Evaluate security device logs for possible breaches in security, auditing, and troubleshooting.
  • Review all service and non-service affecting outages to determine best practices and recommended improvements to reduce future potential service interruptions.
  • Troubleshoot data circuit outages including Metro-E, T1, MPLS, and AVPN circuits.
  • Follow standard operating procedures, carried out team responsibilities, tasks and time-lines.

Confidential

Network Security Sr. Advisor

Responsibilities:

  • Management, administration and provide Senior level technical support for the Confidential SecureWorks's Managed Security Services Firewall offerings such as Checkpoint firewalls (IPSO/SPLAT), Cisco PIX/ASA (6.x,7.x, 8.x and 9.x), Juniper SRX (JUNOS) Proventia, Palo Alto, Fortinet, Netscreen and Sonicwall firewalls to enterprise-level customers.
  • Worked closely with system admins, Application owners, and network engineering teams in determining remediation intrusion.
  • Managing and troubleshooting firewall management consoles NSM (NetScreen Security Management), SiteProtector (IBM ISS Proventia management console) Panorama (Palo Alto Security Management) and FortiManager (Fortinet Security Management).
  • Conducted continuous monitoring on base events using SEIM /ArcSight ESM to determine internal or external escalations.
  • Conducted continuous monitoring on base events using SEIM /ArcSight ESM to determine internal or external escalations.
  • Duties include device installation, management, troubleshooting, and maintenance/upgrades for all firewall platforms (Cisco PIX/ASA, Netscreen, SRX, Palo Alto, Fortinet and Sonicwall)
  • Extensive work with High Availability technologies on all major firewall platforms using VRRP, HSRP and CARP.
  • Extensively involved in creating, managing and troubleshooting VPN tunnels (site to site and client to site) for enterprise customers using Cisco PIX/ASA, Netscreen, SRX, Palo Alto, Sonicwall and Fortinet firewalls.
  • Analysis of network topologies to assist customers with security recommendations for their network.
  • Develop new documentations, tools, trainings and procedures to improve the quality of services of Security Operation Center (SOC). Interface with external groups such as Product Managers, Provisioning Engineers, SOC, and customers to complete projects and implement new procedures.
  • Extensive usage of packet sniffers like TCPDump, Snoop, fw monitor and debugs to analyze network traffic and solving complex application communication problems.
  • Working experience with centralized authentication / authorization service (RSA SecurID)

We'd love your feedback!