We provide IT Staff Augmentation Services!

Network Engineer Resume

5.00/5 (Submit Your Rating)

Long Beach, CA

SUMMARY:

  • 5+ years of professional experience in Network engineering, performing Network analysis, design, implementing, capacity planning with focus on performance tuning and support of large Networks.
  • Experience in Cisco Routing, Switching and Security with strong Cisco hardware/software experiences with high end Routers: Cisco 2600, 2800, 3600, 7200, 12000 Series; Catalyst Switches: 4500, 6500, 7600; Juniper: M320 & T640.
  • Determining the functionality with the DNS naming conventions and migrations from old load balancing environments to the F5 environment both 10.x and 11.x.
  • Experience in set up, configuration and management of Palo Alto Firewall,Cisco PIX, ASA, Juniper SA 2500, 4500, 6500.
  • Experienced Implementer of IT projects, ITIL, Helpdesks and Data Center Infrastructure Hardware and Software.
  • Experience with firewall rule automation tools such as Tufin or AlgoSec.
  • Hands and Feet support of all Data center requirements, ensuring uninterrupted Data Center services. Responsible for managing all aspects of Data Center facilities. handling the tape management and vendor escorting to the data center in case of any hardware replacements or repairs.
  • Having experienced in Agile Methodologies, Scrum stories and sprints experience in a Python based environment, along with data analytics, data wrangling and Excel data extracts.
  • Administration experience in storage to Multiprotocol Environments like CIFS and NFS in NetApp SAN/NAS environment.
  • Experienced in handling and installing Palo Alto Firewalls
  • Firewall technologies including general configuration, risk analysis, security policy, rules creation and modification of Checkpoint R65, R70, R77, Palo Alto and Cisco ASA.
  • Extensive knowledge with infrastructure network/security technologies including, firewalls, proxy (http/https) Analysis, Design, support of F5 Technologies, submitting designs/requirements for Peer reviews, creating Technical Design Documents for different Vendor support environments. Implementation/Deployment of LTM, ASM and APM F5 Devices
  • Worked on setting up the Ether - Channel interfaces between Cisco Switch's 6500, 3750 in line with NetOptics TAP devices for capturing the Network Traffic and is set to be monitored with the ForeScout CounterAct NAC Appliance.
  • Creating Service Now related Knowledge documents and Technical documentation on implementations
  • Worked with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for data center access architecture.
  • Worked Extensively on Access Control Policies consisting of VLAN switching through SNMP, Applying downloadable ACLs through Cisco ISE, and Configuring Standard and Extended ACLs locally and on the upstream switch's for Cisco NAC & Forescout NAC Solution.
  • Experience in adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications.
  • Designed and Implemented the Cisco Flexconnect WLAN architecture to support the needs of smaller WLAN deployments.
  • Experience in Layer 3 Routing protocol configurations: RIP, EIGRP, OSPF, BGP, & MPLS.
  • Experience with different Network Management Tools and Sniffers like SNMP, and Cisco works to support 24 x 7 Network Operation Center.
  • Strong knowledge of HSRP, VRRP Redundancy Protocols.
  • Worked extensively in Designing, Implementing & Managing LAN, WLAN & WAN solutions for different client setups. In-depth knowledge and experience in WAN technologies including T1, T3, ISDN, HDLC, Point to Point, ATM & Frame Relay.
  • Upgraded OS on F5 devices within the environment.
  • Experience in installing, configuring and troubleshooting of Checkpoint Firewall and Juniper SSG series.
  • Experience in Physical cabling, IP addressing & Subnetting with VLSM using QIP configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Staging, Lab & Production Environments.
  • Implemented MPLS/VPN services for various customers.
  • Experience in configuring VLANs, STP, VTP, PVST.
  • Experience in Layer 2 Routing protocol configurations: ATM/FRAME RELAY, IP services such as QoS and VPN technologies: IPSec& SSL.

TECHNICAL SKILLS:

Cisco Routers: Cisco GSR 12416, 12418, Cisco 7200vxr, Cisco 3640, Cisco 3600

Redundancy and management:: HSRP, RPR, NSF/NSR

Network Configuration:: Advanced switch/router configuration (Cisco IOS access list, Route redistribution/propagation).

Routing Protocols:: IGRP, EIGRP,RIP, OSPF, BGPv4, MP-BGP

WAN Protocols:: HDLC, PPP, MLPPP

Circuit switched WAN:: T1/E1 - T3/E3/OCX (Channelized, Fractional & full).

Packet Switched WAN:: ATM, FRAME RELAY, MPLS VPNs

Security Technologies: Cisco FWSM/PIX/ASDM, Nokia Checkpoint NG, Juniper SRX

Physical interfaces:: Fast Ethernet, Gigabit Ethernet, Serial, HSSI, Sonnet (POS)

Layer 2 technology:: VLAN, VTP, VMPS, ISL, dot1q, DTP, Spanning-tree, PVST

Layer 3 Switching:: CEF, MLS, Ether Channel.

CISCO ISE: . Cisco Integrated Services Engine (ISE) 2.3

Load Balance:: F5

Programming Languages: Python, Java, PERL, SQL and PL/SQL

Frameworks: Django, Python.

QOS:: CBWFQ, LLQ, WRED, Policing/Shaping.

Switches:: Catalyst 6500, MSFC, MSFC2, 7600, 3700, 3500

Operating Systems:: Microsoft XP/Vista/7, UNIX, Linux (Redhat, OpenSuse, Fedora)

AAA Architecture: TACACS+, RADIUS, Cisco ACS.

Automation Tools:: ServiceNow Orchestrator Tools

Security / Firewalls: Cisco ASA Firewalls, IPSEC & SSL VPNs, IPS/IDS, DMZ Setup, Palo Alto, Cisco NAC, ACL, IOS Firewall features.

Juniper: EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240

Hardware:: Cisco Cat Switches, Routers, Avaya VoIP phones, Cisco IP 796X/794X

PROFESSIONAL EXPERIENCE:

Confidential, Long Beach, CA

Network Engineer

Responsibilities:

  • Install wide range of network equipment.
  • Configured and installed routers, switches, wireless controllers and office extend controllers.
  • Keep network infrastructure up-to-date and secured .
  • Configures and performs advanced diagnostics on infrastructure components.
  • Identify and recommend needed and optimal infrastructure improvements.
  • Troubleshoot various network issues affect solutions and collaborate with staff and outside vendors to resolve complex problems .
  • Managing, monitoring network devices/nodes and pushing configuration scripts on tools like Solarwinds, PRTG, Cisco Prime Infrastructure and Cisco Prime LMS .
  • Maintained all network documentation for hardware configuration and licensing.
  • Understands and repairs LAN infrastructure including cable and fiber.
  • Understands and can configure and install LAN switch technology for bridging or routing.
  • Can perform hardware fault isolation and repair. Repairs switching and VLANs problems.
  • Evaluated complex computer systems to assess vulnerability and risk.
  • Understands and can configure and install Palo Alto technology for bridging Security into network
  • Provide technical Level III problem isolation and resolution for a Global Network.
  • Troubleshooting on User related Queiries

Confidential, Rancho Cordova, CA

Network Engineer

Responsibilities:

  • Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-around technical support for LAN/WAN.
  • Performed Troubleshooting, while maintaining trouble ticket tracking, following internal/external.
  • Responsible for Checkpoint firewall administration across our global networks. Strong knowledge of Cisco and Juniper software (IOS/SRX and JunOS) and hardware.
  • Utilized Remedy ticketing system to create, update, and track customer issues
  • Maximizing network performance by monitoring, troubleshooting network problems and outages, scheduling and conducting upgrades and collaborating with network architects on network optimization Configuration of routing and switching equipment.
  • Installing and Configuring Cisco switches 2960, 3560, 4500, 6500, 4900, 2900, 3750, Nexus 5000, Nexus 7000, 9000.
  • Configured VLAN trunking with Palo Alto interface.
  • Checking the health status & vulnerability of Network devices involves IOS upgrades on every quarter, verifying and reviewing the configuration with lastest version of IOS images and replacing the End-of-Life switches.
  • Working with Checkpoint Support for resolving escalated issues and replace branch hardware with new 2851 routers and 2960 switches.
  • Experienced in Troubleshooting for connectivity and hardware problems on Cisco
  • Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches
  • Expertise knowledge and experience in networking devices like Cisco Routers, Cisco Switches, F5 Load Balancers, Proxy and Firewalls
  • Applying downloadable ACLs through Cisco ISE, and Configuring Standard and Extended ACLs locally and on the upstream switch's for Cisco ACS
  • Configuration of layer 2 Cisco switches for VLAN and Trucking
  • Experience with Cisco DNA solutions ISE, NGFW, Prime, ESA, WSA, VPN and CWS implementations.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.
  • Worked with security products such as Cisco ISE
  • Configured Cisco 5500 series firewalls and Brocade 6510 switches.
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Strong knowledge of Cisco software IOS and hardware.
  • Responsible for service request tickets generated by the other teams in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support.
  • Configured and troubleshooting Riverbed WAN optimization software to improve the network acceleration at the user end.
  • Responsible for installation, troubleshooting of firewalls and related software, and LAN/WAN protocols.

Confidential, Sacramento, CA

Network Engineer

Responsibilities:

  • Supervisor customers/clients in Data Centre on cabling of equipment, racking of severs and powering up system as per established agreements and Data Center/Co-location operational standards.
  • Experience Palo Alto, Network Security, Juniper Firewalls, SSL VPN, Checkpoint, RSA, Cisco Nexus, Cisco ACE, Cisco Wireless.
  • Strong expertise in development of web based applications using Python, Django, HTML, XML, Angular JS, CSS, DHTML, JavaScript, JSON and JQuery.
  • Worked Extensively on Access Control Policies consisting of VLAN switching through SNMP, Applying downloadable ACLs through Cisco ISE, and Configuring Standard and Extended ACLs locally and on the upstream switch's for Cisco NAC & Forescout NAC Solution.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
  • Managing enterprise BGP setup by configuring and troubleshooting BGP related issues. My responsibility was also to add new BGP peers for remote branch offices and business partners.
  • Experience with implementing and supporting various Palo Alto Firewall modules such as Wildfire, Threat Prevention, URL Filtering and Antivirus.
  • Scaling of IGP and BGP in the core.
  • Assumed a mentoring/ role for new ISP Engineering hires. Including Fireworks, Bidmaster, WFMT, TIRKS, WMS (E1, F1), Spec completion, NED, NBIE, and RSVP.
  • Configured VLAN trunking with Palo Alto interface.
  • Execute carrier specific TR-069 and TR098/TR111/TR181 test plans via Motive ACS requiring the testing of Remote Procedure calls for setting parameter values for DSL Modems to support customizable LAN/WAN DNS, Port Forwarding, UTC compliant time zone specifications, captive portal management, LAN/WAN static IP address management/mapping, Wi-Fi WEP 64 and 128 bit encryption, WPA - 128 Bit AES encryption, PA-PSK, WPS, remote access credential management, MAC address credential management.
  • Palo Alto user-identification implementation with KIWI servers user Palo Alto user-id agents.
  • Experience in Cisco ACS 4.x and 5.x, CSM, ACE and F5 GSLB load balancers.
  • Develop, monitor and enforce Data Center/Co-location Access Policies Analyzes existing operations and makes recommendations for the improvement and growth of the Data Center Infrastructure.
  • Integrating Panorama with Palo alto firewalls, managing multiple Palo Alto firewalls using Panorama.
  • Experience in working with Python ORM Libraries including Django ORM.
  • Engaged on designing and perform the configuration of a Cisco Identity Services Engine (ISE) server in order to migrate of services from Cisco Secure Access Control System (ACS) version 4.2 (used for Wireless Client Access), Cisco Secure ACS Agent, Cisco Network Admission Control (NAC) Guest server version 2.0.3 and Cisco Secure ACS version 5.5.0.46 (Used for Terminal Access Controller Access Control System (TACACS+) to Network Devices) to the new Cisco ISE server.
  • Palo Alto App ID migration from the legacy based port rules for PA 5060, 7050.
  • Planning, designing and configuration of various Cisco ISE & Forescout NAC deployment strategies (Standalone, Distributed Setups) and rollout to production environment.
  • Redo the entire Data Centre Cat5 network.
  • Designed, documented and implemented the LAN and WLAN infrastructure to support Confidential 's EPIC deployment project.
  • Develop ITSM Work Instructions mapped to IIL framework and existing processes and CMDB in Service-Now.
  • Integrating Palo alto firewall with Active directory for user-identification.
  • Creating Virtual Servers, Nodes, Pools, Iapps and Irules on BIG-IP F5 in LTM module.
  • Used load balance applications based on F5 LTM 5250v.
  • Configured and Implemented Cisco Identity Services Engine (ISE) with connectivity to Microsoft Active directory for Authentication including Based Authentication.
  • Experience in working with installing Nexus 7010 License upgrade.
  • Installation of Palo alto user-id agent on Active directory.
  • Experience configuring Virtual Device Context in Nexus 7010.
  • IP addressing and design schemas for a variety of IP Pools using DHCP scope or local IP pools for NAC Controls.
  • Hands on experience in installation and maintenance of various Aruba products and extending support to Enterprise customers and partners worldwide.
  • Worked on setting up the Ether-Channel interfaces between Cisco Switch's 6500, 3750 in line with NetOptics TAP devices for capturing the Network Traffic and is set to be monitored with the ForeScout CounterAct NAC Appliance.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN.
  • Created applications required to meet customer requirement and rolled out Service-Now on time and under budget.
  • Designed and configured the commands for QoS and Access Lists for Nexus 9K.
  • Experience with: IDS/IPS Platforms, local and global Load Balancing, Firewalls, IDS and IPS (Cisco, Checkpoint), DNS, DHCP, NTP, IPAM NAC (Network Access Control) Platforms PKI, RADIUS, RSA, TACACS, auditing and assessment tools such as Tufin and Qualys, Network monitoring and troubleshooting tools.
  • Palo Alto SSL decryption installation and configuration on PA 3060,5060, and 7050.
  • Worked on manage Enterprise Network Infrastructure as a Tier 3 Support Engineer.
  • Involved in Configuring and implementing of Composite Network models consists of Cisco7600,7200,3800 series routers and Cisco 2950, 3500,5000,6500 Series switches.
  • Upgraded and supported entire ISP LAN, VoIP, and Video Network for over 2000 customers.
  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
  • Configuring and troubleshooting F5 BIGIP LTM load balancing and implementing, Creating irules, Virtual servers, Pools, Nodes with health, Profiles, SNAT, SSL, NAT, Traffic Policies and QoS.
  • Managing cabled LAN and wireless access, with switching technologies.
  • Palo Alto upgradation and degradation.
  • Experience in Aruba wireless technologies.
  • Networks include Cisco, Avaya, Brocade, Enterasys and Oracle Acme Packet technologies in small business to enterprise level networks.
  • Responsible for service and support of Corporate Headquarters WLAN and LAN (1500+ users) and the LaVergne Data Center.
  • Configuring VTPs, trunking, inter-vlan routing, port fast, uplink fast, and backbone fast on access layer switches and configuration of NAT.
  • Excellent Hands on experience with Cisco ISE and the Migration of Wireless and TACACs to ISE.
  • Planned and installed Frame Relay WAN links to the branch offices.
  • Configured routes on Palo Alto firewalls 3060, 5060, 7050.
  • Implemented a backup for the existing WAN connection using site to site IPsec VPN tunnels.
  • Configuring and troubleshooting OSPF routing protocol on the corporate network.
  • Worked on the migration of Frame Relay based branches to MPLS based VPN for customer’s WAN infrastructure.
  • Knowledge about setting up Python REST API Frame work using Django.
  • Developed ITIL, Service-Now materials for classroom and web based .
  • Worked on PIX firewall, ASA firewall. Did PIX OS upgrade from 6.3 to 7.0 (x)
  • Has done the Configuration on BIG IP (F5) Load balancers and also monitored the Packet Flow in the Load balancers.
  • Palo Alto integration with VMware Virtual Desktop infrastructure.
  • Hands on experience on using ATM tool lookup for checking and quick configure review of F5 LTM devices.
  • Administration of ASA firewalls in the DMZ and FWSM in the Server Farm to provide security and controlled/restricted access.
  • Dealt with Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
  • Assisting customers to deploy better indoor/outdoor (including VOIP/RTLS, Bridge and Mesh) solutions by leveraging Arubas best practices in order to minimize operational hurdles.
  • Troubleshoot WLAN problems in a Cisco WLC-based environment in Nisssan's Smyrna, TN. Infiniti roduction facility
  • Planning for upgrade of IOS on devices and performing the upgrade.
  • Installation and support of LINUX (RedHat, CentOS ), UNIX, NetFlow, Syslog Python,VM experience, Infoblox DNS security and Wireshark.

Confidential, East Brunswick, NJ

Network Engineer(Python Developer)

Responsibilities:

  • Working with EDVT unit of Cisco Systems on the ASR 9000 series platform including the world’s highestdensity routers including line cards with bandwidth of up to 400 Gigabit per slot.
  • Provided service to other departments, which comprise of the Development Test group, Platform Testgroup, MDVT (Mechanical Design Verification Test) group, EDVT (Electronic Design Verification Test)Group and ODVT (Optical Design Verification Test) group.
  • Developed a fully automated continuous integration system using Git, Gerrit, Jenkins, MySQL and custom tools developed in Python and Bash.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems and also manipulating BGP attribute.
  • Migrating URL filtering policies from Bluecoat to Palo alto.
  • Designed, validated and implemented LAN, WLAN & WAN solution to suite client’s needs.
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • Provided quality technical support including software issues, hardware compatability and ISP connection problems.
  • Service Catalog and Request Workflow Design and Configuration for facilitating end users to create Service Requests to order catalog items
  • Performed troubleshooting, fixed and deployed many Python bug fixes of the two main applications that were a main source of data for both customers and internal customer service team.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Debugging, impact analysis, and implementing fixes on Wireshark open source code bugs found on Bugzilla and submitted changes for revision through GitHub.
  • Reviewing, analyzing, approving and executing all changes in the network. All Configurations of Cisco Routers and Switches.
  • Extensively used Python modules such as requests, urllib, urllib2 for web crawling.
  • Performed Troubleshooting and monitored routing protocols such RIP, OSPF, EIGRP & BGP.
  • Design OSPF Areas for reliable Access Distribution and for Core IP Routing.
  • Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K.
  • Responsible for Automate testing of hardware prototypes Cisco ASR 9000 series over temperature,Voltage, and frequency margins to ensure the electrical design is robust prior to going to productionbuilds.
  • Developed GUI using webapp2 for dynamically displaying the test block documentation and other features of Python code using a web browser.
  • Worked on Network design and support, implementation related internal projects for establishing connectivity between the various field offices and data centers with help of Ciscoworks and Solarwind.
  • Worked on F5 BIG-IP LTM 8900, Citrix NetScaler Configured profiles.
  • Worked with security management tools and applications, such as, Qualys, LogRhythm, Symantec, Barracuda, Parity, Tufin.
  • On daily basis worked with Juniper SRX 650 and Palo Alto 5050 Firewalls.
  • Worked on F5 Networks configuration of devices such as LTMs, GTMs, Load Balancers, DNS/DHCP services.
  • Worked in project for graphical front-end command-line debuggers such as GDB, DBX, WDB, Ladebug, JDB, XDB, the Perl debugger, the bash debugger, GNU Make debugger, or the Python debugger. DDD displays data structures as graphs and plots.
  • Implemented WLANS using FHSS and DSSS technologies.
  • Test/debug test scripts (UNIX) to fully-automate EDVT testing. Includes scripts to drive automation of environmental chambers, power supplies, power cycling boxes, and traffic generation equipment like IXIA and Spirent Traffic Generators.
  • Developed a Front-End GUI as stand-alone Python application.
  • Performed system level performance testing conducted (Diagnostics and Cisco IOS XR) on line cards used in the ASR (Aggregation Switching Routing) 9000 2nd Generation series Cisco Routers to detect component and design margin faults at extreme levels of operational temperature and supply voltage.
  • Performed support, configuration, testing and documentation for ISE rollout for CenterPoint Energy which includes making configuration changes in access and distribution layer switches, wireless controllers and ISE nodes.
  • Monitoring and Troubleshooting Data center Network including Devices like router, various switches and firewalls. Data Center Routers, Data Center Switches, Data Center Firewalls, Data Center Wireless devices, Load Balancers, WAAS, Steel Head (Riverbed).
  • Implemented Positive Enforcement Model with the help of Palo Alto Networks.
  • Configured the routers to run L2/L3 traffic on fully loaded chassis.
  • Configured and administered Viprion (F5) - configured vCMP guest.
  • Good knowledge on Python Collections, Python Scripting and Multi-Threading.
  • Executed Power cycle test with board level diagnostic software to detect the faults in the UUT.
  • Experience of testing Single-mode Fiber and Multi-mode Fiber (MMF).
  • Experienced of working with Telecommunications Energy Efficiency Ratio (TEER) project for Cisco Systems.
  • Desigened and Developed application using Python, Django, MySQL and Linux.
  • Designing solutions to enhance IT service requests in Service Request Management module by developing JavaScript programs and workflows.
  • Analyzing network side logs using LFA, RTT & wireshark to troubleshoot the issue observed in our scripts or reporting Customer back if it is a UE issue .Performing Regression testing in Automation and analyzing logs for any failure.
  • Experience with deploying Cisco 6509 VSS in the Server distribution and User Distribution layer Redesigning the 5000 User large office location from the Access, Distribution, Core and WAN infrastructure.
  • Migration Network, Firewall and F5 Load Balancer infrastructure from one data-center to another data center.
  • Worked on security policies of juniper SRX and Palo Alto and policy cleanup of firewalls.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX)which acts as a remote line card (module) for the Nexus 5000.

We'd love your feedback!