Senior Advisory Network/system Engineering Resume
4.00/5 (Submit Your Rating)
SUMMARY
- Experienced network engineer capable of enhancing network design and capabilities during WAN and LAN operations.
- Developed and implemented customer engagement business plans, network technology analysis templates, performance measures, and benchmarking studies.
- Widely skilled in Planning, developing, coordinating, and performing market research (from a technological perspective) on a wide range of Information Technology products, services and solutions to assist program managers in making effective decisions in determining appropriate IT product offerings and services.
- Well versed in Cisco and Juniper networking device configurations and deployments. A passionate/enthusiastic Network Engineer.
PROFESSIONAL EXPERIENCE
Confidential
Senior Advisory Network/System Engineering
Responsibilities:
- Designed and deployed Policy based routing in order to address issues that occur during acquisition integration. Due to the magnitude of acquisitioned infrastructure and financial dependencies requiring apps to resources (databases/servers) c maintain communication with little to no down time, re - IP was not always feasible. During this instance PBR (sometimes with NAT) where used in order to provide reachability when 2 seemingly identical IP networks exist.
- Enriched network performance and throughput by implementing BGP route filtering and performance enhancements to ensure that the quickest/media friendly path was taken through the network. This Resulted in the elimination/reduction of asymmetric routing and reduced loss of time sensitive connections and services on a case by case bases.
- Formulated Enterprise edge configuration standards and conduct network audits test that identified non compliment equipment or configuration short comings. Developed standards fo
- Developed deployments plans and failure testing guide-lines for WAN/FW networking equipment. These guide-lines where utilized during scheduled outages & site turn ups—newly deployed sites.
- Assisted in the deployment of Cisco Jabber services enterprise wide by identifying all firewall policies required for UCS servers communicating through several DMZ zones.
- Resolve network tickets and conducted change request using the Remedy tool & MOP (method and operational procedures) tool sets.
- Scheduled and attended meetings with Vendors to identify network enhancements that can benefit the network.
- Identify and resolve any network misconfiguration that does not comply with RFC1918 or SONA
Confidential
Network Architect Consultant
Responsibilities:
- Designed and Deployed a Service Provide MPLS 100G backbone --within a DWDM fiber channel infrastructure—using ASR9K allowing intercommunication and data replication between NIH data centers. Designed and deployed VPLS pseudo wires in order to facilitate long local data replication.
- Deployed and configured ASR9k as a collapsed MPLS PE/CE devices operating with NV Edge for High availability and NV-Satellite to increase port density. Constructed policy based BGP routing and utilized firewalls as meet me points in order to monitor and control access between Routing Domains within a MPLS VRF architect.
- Built a per service VRF architect allowing traffic segmentation end to end across the CIT WAN infrastructure. Services consisted of: Development, Testing, Emergency services, Wireless, DMZ, Management, and a per DC traffic implementation. VRF services where further divided into departments and sub departments for network isolation in order to meet department security requirements. This lead to over a 100 VRFs designed and deployed throughout the CIT infrastructure with a strict import export rule set for sub-department communication
- Designed and deployed VPLS solutions for customers wishing to manage & maintain L2 & L3 routing connection and services. Psuedo Wires where built using L2VPN in order to maintain L2 adjacencies between NIH data Center that required PPP L2 connections for data replication. L2Transport with dot1q tagging where utilized to extended L2 STP domain to from the Nexus 5k to ASR9K during these instances.
- Conducted site surveys and interacted with customers in order to identifying current services, security requirements, and communication enhancements that CIT MPLS infrastructure could offer. Identified client’s current network short comings and how CITs new infrastructure can address those identified short-comings. Designed LAN infrastructure and how Customer networks would get integrated into to CITs WAN.
- Developed documents and step by step deployment plans. Documents consisted of: Viso diagrams for Traffic flow & hardware installation, VRF import & export policies, Configuration scripts that can be used to deploy smaller sites.
- Conducted Change management and briefed managers on potential impacts and methods used to illuminate or reduce these impact.
Confidential
Network Architect Consultant
Responsibilities:
- Prepared Complex proposal documentation consisting of performing vendor capabilities comparison and cost analyst, in-depth lab testing identifying key points of interest, methods and procedural hardware and software implementation procedures to include rollback disaster mitigation steps, and provide support and guidance during implementations.
- Created Network performance baseline for identifying, alarming, and recording anomalies within the network performance standard.
- Created Configuration Templates that enabled swift deployment of Enterprise equipment adhering to the JVE configuration standard. This also allowed for individual with limited network knowledge to deploy complex network configurations with little to no issues.
- Design and deployed SNMPv3, enterprise wide, in order to establish a standard for real-time device monitoring and reporting. Mitigating outage and quickly providing alerts for Network Engineering personal.
- Identified mis-configured OSPF routing configuration resulting in transit routing across Enterprise Domain, inconsistent LSA repopulation and unstable neighbor relationships. Proposed the deployment of iSPF solution that would reduce OSPF routing overhead and increase network stabilization as well as redefining OSPF cost relationship and summarization between OSPF neighbors.
- Identified miss-configured Metro Ethernet VPN clusters Enterprise wide- to include VPNS across MPLS circuit connections--that contained heavy link saturation due to defragmentation that resulted in an unstable IPSEC associations. Conduct packet analysis and MTU manipulation resulting in an increase in network throughput and doubling the amount of available bandwidth within all the clusters. Also requested that MPLS POPs configuration support Giant frames in order to allow packets larger than 1500 bytes to traverse the MPLS network backbone.
- Managed a Metro Ethernet consisting of over 30 ASA (5505, 5525,5515) operating on IPSEC-VPN and providing long local connection of Enterprise Network infrastructure.
- Identified congested software/hardware queues’ resulting in out of bandwidth packet loss. Single handedly formulated a QOS scheme that prioritized critical applications providing a constant availability of customer essential information.
- Reconfigured L2 switching architect to identify better Root placement and reduce cpu process on congested switches.
- Managed Enterprise wide ATM transport WAN network connection and their inter-laced circuits.
- Maintain ISDN OSPF On Demand Routing and back links to ensure constant network availability.
- Configured Solar Winds Network configuration manager to provide configuration compliance and swift remediation of non-compliant network equipment.
- Maintained a constant watch for Cisco Security and alerts providing an increase in awareness of possible threats on the network. Managed Cisco ACS (TACACS) and Microsoft AD (Radius) servers for device integration.
Confidential, Washington, DC
Lead Network Engineer/Subject Matter Expert
Responsibilities:
- Interface with department managements to introduce new strategies in network configuration and deployment of key protocols and operations. Participated in protocol selection and device configuration standard to be implemented Enterprise wide across the FBI network.
- Single handedly deployed 90% of all FBI HUB Network infrastructures housing Division wide server Farms and key personnel. Resulting in VSS Core redundancy and EIGRP DMVPN IGP across a Multi technology EGP Architect. WAN consisted of MPLS VRF Tunneling (for key sites), BGP, & PPP Ethernet connections.
- Assisted in the design of network configuration standards, and devised a plan that allowed for quick deployment of complex network configuration via a hierarchical implementation. Guide consisted of deploying protocols such as: SPAN, QOS LLQ, VSS, DMVPN, SNMP, TACACS, ACL, MPLS, NTP, STP-PVST w/prioritization, VTP, GRE, EIGRP with broadcast control, router on a stick, route summarization, Broadcast redirects, NSF, Ether-channel load sharing/Balancing, & Net-flow v9.
- Lead and Trained 25 individuals on the configuration and deployment of numerous Cisco IOS equipment housing complex network configurations located at over 900 remote CONUS locations supporting over 10,000 users. Equipment consisted of, but where not limited to: 6509/E, 4506/7/18/10/E, 3750v1/2, 3550 & 2912catalyst switches; 7200, 3945/25, 3845/25, 1006 ASR routers, 4345 IPS (Intrusion Prevention Systems).
- Lead and Trained individuals on configuring and troubleshooting First Hop Redundancy (FHRP) protocols VSS and HSRP; STP optimization; Reverse telnet, CAT-OS conversion to IOS, L2 and L3 load sharing & balancing, Disaster recovery steps for all routers and switch types within the organization, packet capture and analysis, and QOS voice traffic prioritization. Trainings include lab-based scenarios and pilot sites used to ensure teams where well prepared for their deployment.
- Conducted network reliability and Q&A (Quality & Assurance) assessment against all newly deployed devices network wide. Test where conducted utilizing Cisco IPSLA & Netflow protocols. Test included: CPU maintaining stable processes; IP response times & delay detection, line-rates reliability, interface erroneous counters detection, and total bandwidth utilization on all inter-connect devices.
- Analyzed and gather Network deployment and Utilization information that occurred during /after site deployments. Displayed gathered information as a Service Deployment Data sheet to illustrate, to key corporate personnel, optimal usage of all network resources available. As well as any Network short comings.
Confidential
Lead Network Technician
Responsibilities:
- Interfaced with ISP to resolve complex network circuits issues that lead to an increases in network performance, and expand network architect to meet customer requirements.
- Maintained and Administered a DOD secured network operating on a FDDI infrastructure. Implemented a Multi-link bundle consisting of 3 DS1 (T1). Increasing throughput to that of a DS03 (T3) over PPP Ethernet circuits.
- Assigned and administered VOICE Circuit Switched network via PBX TDM with noise/tamper filtering competence and maintained connections to Public Switched Telephone Network/ Central Office (PSTN/CO). Granting all customers telecommunication capabilities while maintaining a resilient/trusted connection.
- Design implemented and deployed a network DMZ area via 2 Cisco ASA 5510/15 firewalls, in accordance with DISA STIGS, hosting multiple redundant Web & Database servers for intranet access.
- Identified a collision heavy network and implemented Spanning-Tree protocol to eliminate network shortages and provide a more reliable frame switching backbone.
