We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

5.00/5 (Submit Your Rating)

Franklin Lakes, NJ

SUMMARY

  • Network Professional with 7 years of experience in Designing and troubleshooting LAN, WAN, MPLS in Branch, Campus and Data Center environments.
  • Experience in Networking, including hands - on experience in IP network design providing network Support, installation and analysis.
  • Expert level knowledge of troubleshooting, implementing, optimizing and testing of static and Dynamic routing protocols such as EIGRP, OSPF, BGP; ability to interpret and resolve complex route table problems.
  • Expert Level experienced in Wireshark for network analysis purposes and to Analyze packet traces.
  • Worked on IOS/NX-OS upgrade with different Cisco images, different Cisco device.
  • Hands on Experience testing iRules using Browser (IE), HTTP watch, curl, Scripts (shell/batch file/Perl) and host files.
  • Configuration and administration of firewalls, which includes Checkpoint, Juniper, and Cisco ASA firewalls.
  • Hands On experience Cisco IOS/IOS-XR/NX-OS, Juniper JUNOS for configuration troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPL.
  • In-depth knowledge and experience in LAN and WAN technologies including MPLS, SD-WAN, DIA, Point to Point (Dark Fiber).
  • Configuring and testing Multicast for both IPv4 and IPv6 routing in Data Environment
  • Technical Knowledge on Cisco DMZ, ASA 5585 and 5525 series firewalls.
  • Worked on Cisco Nexus 9000 family of switches whose hardware is based on Cisco ACI.
  • Trunks, VTP Ether channel, STP, RSTP and MST.
  • Strong hands on experience in installing, troubleshooting, configuring of Cisco ASR, 7200, 3900, 3800, 2900,2800, and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches
  • Extensive hand on experience with complex routed LAN networks, CISCO Routers and Switches.
  • Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Install, Configure, Deploy and Maintain Firewalls (Palo Alto, Cisco ASA), Cisco Routers and Switches, Citrix SD-WAN, autonomous Cisco WAPs and Meraki Networks
  • Implementing Security Solutions in Juniper SRX and NetScreen SSG firewalls.
  • Hands on experience in building Cisco ACI fabric (policy groups, switch profiles, etc.), tenants - VRFs, Endpoint Groups, Contracts
  • Deployment and integration of Catalyst 9300 and 9410 with Cisco DNA
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Provide consultation regarding segmentation, security and policy of the SDN network
  • Strong hands on experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 9k,7K, 5K, 2K series, Cisco router models like ASR 9K, ASR 1K, 7200, 3900, 2900, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3850, 3750, 3500, 2900 series switches
  • Working on Cisco IOS, Junos& NX-OS (7K, 5K&2K).
  • Strong hands on experience on ASA (5505/5510/5540/5585 ) Firewalls, Juniper (SRX 110/210/220/550 ).
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA(TACACS+ & RADIUS).
  • Worked aggressively on complex Palo Alto firewalls Environment.
  • Knowledge on firewalls like Juniper SRX, checkpoint VSX, IDS, IPS and encryption techniques.
  • Technology and Infrastructure consultant for Cisco and Juniper design and implementation projects. Specific tasks include installations, configurations, support and maintenance of routers and switches.
  • Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, MPLS QOS
  • Diverse industry exposure - Finance, Telecom, and IT consulting Markets.
  • Extensive experience in configuring Layer3 routing and layer2/3 switching of Juniper & Cisco based J2320,MX,EX,2950,2960,3600,3750,4500,6500,1700,1800,2600 and 3700 series routers & Switches.
  • Troubleshooting & implementation of Vlan, STP, MSTP, RSTP, PVST, 802.1Q, DTP, HSRP, VRRP, GLBP, LACP, PAGP, AAA, TACACS, RADIUS, MD5, VTP & SVI.
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • Experience configuring & troubleshooting routing protocols like RIP, OSPF, BGP, EIGRP.
  • Hands-on experience with Juniper SRX - Juniper SSL VPN
  • IOS/JUNOS upgrade for Cisco & Juniper routers/switches.
  • Experience in testing Cisco & Juniper routers/switches in laboratory scenarios and deploy on site for production.
  • Native communication skills and a team player, Effective inter-personal skills, adaptive to any environment, with the latest technologies and delivering solutions as an individual and as part of a team

TECHNICAL SKILLS

Protocols& Standards: LAN, WAN, WLAN, VRF, VDC, TCP/IP, NAT, PAT, MPLS, DMVPN, IPv4, IPv6, VPN, L2TP, IPSec / ISAKMP, IKE, VoIP, VSS, OSPF, OSPFv3, EIGRP, BGPv4, VLANs, Layer 3, Switching, HSRP, GLBP, VRRP, QoS, TACACS+, RADIUS, 802.1X, PKI, LDAP, POE

Cisco Platforms: Nexus 9K,7K, 5K, 2K & 1K, Cisco routers (7600, 7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series) Huawei AR series Routers

Juniper Platforms: M, J and MX Series Routers, EX2300 and EX 3400 Switches.

Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, IPsec, VLAN, VPN and Wireless Technology

Firewalls: Checkpoint, Cisco ASA, Cisco ACI, Palo Alto, Juniper

Security Protocols: IKE, IPSEC, SSL-VPN

Load Balancers: F5 Networks (Big-IP) LTM 8900 and 6400.

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3

Network Tools: IBM ITNM, Splunk, Stealth Watch, Solar Winds, SNMP, Cisco Works, Wireshark

Networking Protocols: RIP, OSPF, ISIS, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA

Operating System: Windows 7/XP, Windows Server 2008/2003, Linux, UNIX

PROFESSIONAL EXPERIENCE

Confidential, Franklin Lakes, NJ

Sr. Network Security Engineer

Responsibilities:

  • Experience working with data center deployment where we converted from Cisco 6500 to Nexus.
  • Expert knowledge of Cisco ACI, NxOS and IOS, other SDN products Tiered Domains, QoS, data center network design, cloud infrastructure design and management, OSPF, BGP, VLAN Trunking
  • Experience working with Nexus 9k,7k,5k,2k devices.
  • Regular upgrade and maintenance of Infrastructure including Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, F5 BIG IP and Palo Alto Firewalls.
  • Worked on Palo Alto PA-5050 design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
  • Design and implementation experience in building Cisco ASA Firewalls, Palo Alto firewalls, F5- Load balancer, Juniper firewalls and FWSM Blade modules on Cisco Switches.
  • Configuring VIPs in LoadBalancers/NetScalers for Postal Infrastructure in support of Cisco ISE. Analyzing packet capture via Wireshark
  • Deployed SDWAN with cisco infrastructure for SaaS applications in the firm.
  • Deployment and integration of Catalyst 9300 and 9410 with Cisco DNA
  • Experienced working on network monitoring and analysis tools like, SOLAR WINDS, CISCO works and SDWAN by Riverbed steelhead, L3VPN over network, multi-tenant segment routing, Cisco ASA firewall 9.x, OSPFv3, EIGRP classic and name-mode (wide metrics), VxLan, SDWAN, VRF and VRF-lite, VMWare NSX VDC.
  • Worked in for the NextGen Datacenter Cloud Architecture, using Cisco ACI and Nexus 9K.
  • Advanced skills of designing, coding, and troubleshooting iRules Executed the F5 Viprion to deal with high traffic volume for L7 traffic on 2250 blade while Thunder 6630 using Viprionchassis
  • Configured Virtual Servers, Configure Nodes, and configuring the load balancing Pools and also used to work with configuring load balancing algorithms.
  • Participated in troubleshooting SDN/SD-WAN deployments
  • Deployed CISCO ACI Greenfield and Migrated from Legacy network.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card(module) for the Nexus 5000.
  • Configured Cisco ISR routers and Cisco Catalyst Switches using the following routing/switching technologies; IPsec, DMVPN, GRE, NHRP, Zone Based Firewall, ACLs, 802.1X, TACAS/RADIUS, EIGRP, SNMP, NTP, VLANs, and 802.1Q.
  • Support Zscaler network access from multiple sites.
  • Configuration and administration of firewalls, which includes Checkpoint, Juniper, and Cisco ASA firewalls.
  • Responsible for buildup of new customer environments on Cisco, Arista and F5 equipment including Cisco ASR1002-X and Arista 7100/7400 Series
  • Created different application policies in the ACI including Tenants, Application Network Profile (ANP), End Point Group (EPG), Contracts, Subjects, Filters & Labels.
  • Managing Cloud networks in VMware vCloud Director, engineering and administration of all virtual servers and network security.
  • URL filtering with Zscaler
  • Troubleshoot MPLS networks and assist our SD-WAN vendors in resolving network routing issues. Engineering new VLAN networks
  • Extensively worked with configuration of Network and Security devices such as Cisco routers and switches (Cisco 7K/3K/Nexus 9K/7K/5K), Firewall (Checkpoint 3K, 5K and Cisco FWSM), Load Balancers, DNS and IP Manager (Infoblox)
  • Having experience in Migration from Cisco ASA's to Fortinet’ s Fortigate firewalls
  • Worked on Blue Coat Proxy SG to safeguard web applications in extremely untrusted environments such as guest Wi-Fi zones.
  • Configured rules and maintained Palo Alto Firewalls & analysis of firewall logs using various tools
  • Involved in the Migration of policy from Cisco ASA firewall into Juniper SRX’s
  • Deployment and Management of Bluecoat proxies in forward proxy scenario as well as for security in reverse proxy scenario.
  • Provided administration and support on Bluecoat Proxy for content filtering and internet access to headquarters, remote site offices and VPN client user
  • Responsible Implementing NAT solution's on WAN applications with Cisco ASA based solution.
  • Designing and Deploying dynamically scalable, Highly available, fault tolerant and reliable applications on AWS
  • Migrated complex, multi-tier applications on AWS.
  • Defined and deployed monitoring, metrics and logging systems on AWS. Migrated existing on-premises applications to AWS
  • Monitored infrastructure with Nagios like Firewalls, Servers, Services, Network devices, applications, web portals etc. Resolution of tickets fresh & pending
  • Selecting appropriate AWS service to design and deploy an application based on given requirements.
  • Automated network implementations and tasks and designed monitoring tools using python scripting.
  • Dealt with creating VIP(virtual servers), pools, nodes and applying I Rules for the virtual servers like cookie persistency, redirection of the URL
  • Provided Load Balancing towards access layer from core layer using F5 Network Load Balancers.
  • Operations and management of company LAN, WAN, and wireless networks, including routers, switches, Access Points, Firewalls and another network i.e. Riverbed, Bluecoat, F5 LTM/GTM.
  • Supplied documentation, escalation, training and standard operating procedures as needed to allow for a smooth transition within the NOC.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing
  • DMZ environments to support new and existing application platforms.
  • Designed and installed new Branch network systems. Resolved network issues, ran test scripts and prepared network documentation.
  • Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240.
  • Troubleshoot wan related problems including OSPF, EIGRP, BGP, spanning tree switching and routing designs.
  • ExperienceSupporting EIGRP, OSPF and BGP based network by resolving level 2 & 3 problems of internal teams & external customers of all locations
  • Experience with configuring BGP, OSPF in Juniper M and MX series routers for branch/back office locations.
  • Experience in configuring all Palo alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments
  • Support Panorama Centralized Management for Palo alto firewall PA-500, PA-200 and PA3060, to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration
  • Helped team to deploy 100 APs with 15 Switches, Cisco Nexus, Cisco Meraki and 2 Wireless controllers.
  • Experience working with F5 LTM 3600/6400 and GTM 2200/4200 in data center
  • Configured Virtual Servers, Configure Nodes, and configuring the load balancing Pools and also used to work with configuring load balancing algorithms.

Confidential

Sr. Network Security Engineer

Responsibilities:

  • Involved in Configuration of various Cisco Routers & L2/L3 Switches and implementing OSPF and BGP on the routers
  • Configuring, upgrading and deployment of Nexus 7010, 5596 and 2248.
  • Designing and installing new branch network systems. Resolving network issues, running test scripts and preparing network documentation.
  • Deployment of Cisco DNA Center to provide future Design, Provisioning, and Automation of Wireless network and MPLS.
  • Creating and installing command scripts, updating dACL's, installing certificates and creating NAD groups. Apart of a small team that moved Cisco ISE from monitoring mode into enforcement across the entire postal infrastructure. Creating ISE policies to correspond with the various devices on the Postal network.
  • Working with Cisco Nexus 2248 Fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.
  • F5 Load balancing troubleshooting and incident resolution, including failover management, packet and log analysis, and escalation to additional resources as appropriate to ensure timely resolution
  • Working as a Network SME for the NextGen Datacenter Cloud Architecture, using Cisco ACIand Nexus 9K.
  • Involved in FortiManager Support and Configuration
  • Troubleshoot VoIP issues using debug, traces, Real-Time Monitoring Tool (RTMT), Dialed Number Analyzer (DNA)
  • Provide Infrastructure Network Security by monitoring network authentication logs of all the users using Cisco ISE(Identity Security Engine).
  • Hands on experience with Cisco switches (6500, 3750, etc) and Cisco routers (7200, 2900, 2800, etc.). Fortinet firewalls (30D - 300E), SD-WAN technology (VeloCloud), 4G hardware.
  • Experience in Fortinet 100D, Fortinet 60C, Fortinet 60E, Fortinet 60D, Fortinet 200E (HA), this includes the whole UTM (app control, Web Filter, IPS, DoS, DDoS, etc.
  • Design, Installation and consolidation of local server farms in multiple branch locations with Cisco 4500-X at distribution and 4948’s replacing the 3750’s at access level.
  • Worked as a part of data center deployment where we converted from Cisco 6500 to Nexus.
  • Ensuring problems are satisfactorily resolved in a timely manner with focus in providing high level of support for all customers.
  • Conducted provisioning and Repair on Cisco Routers 920, 9k's and 2900, 3650, 3850, 4500, Nexus 2K. Nexus 3K, Nexus 5K, Nexus 9K Switches.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms
  • Working with wireless technologies troubleshooting and configuration.
  • Establishing VPN Tunnels using IPSec encryption standards and configuring and implementing site-to-site VPN.
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Configure BGP features such as AS-Override, Local preferences, EBGP load sharing on client connections
  • Configured and resolved various OSPF issues in an OSPF multi area environment between multiple branch routers.
  • Engaged in the Cisco DNA Voucher Operations Program as a DNA Mentor to provide mentoring service to sales eligible Cisco Partners.
  • Experience with partners on installation and configuration problems and issues related to SDN-NFE, DNAC.
  • Involved in the Migration of policy from Cisco ASA firewall into Juniper SRX’s
  • Deployment and Management of Bluecoat proxies in forward proxy scenario as well as for security in reverse proxy scenario.
  • Experienced provisioning SD-WAN service as automated failover solution for MPLS VPN by Cisco Meraki MX 80 Firewall.
  • Provided administration and support on Bluecoat Proxy for content filtering and internet access to headquarters, remote site offices and VPN client users
  • Responsible Implementing NAT solution's on WAN applications with Cisco ASA based solution.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.
  • Manage Network with over 5000 devices via SolarWinds, SD-WAN/UNMS, AirControl, ticket system, and other
  • Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Provided Level 3 support to customers, resolving issues by attending to conference calls.
  • Involved in Implementation of Palo alto firewalls in standalone, Vwire, active/passive & active/active modes
  • Performed Setup of Central Panorama console to manage Palo Alto firewalls 3020,3050,5020 & VM-200 models
  • Migrate to SD-WAN using Silver-Peak EdgeConnect devices while decommissioning MPLS Circuits
  • Working on HP open view map for Network Management System and Ticketing.
  • Deployed and configured Cisco ASR 1000, 7000, 9000 series routers.
  • Involved in L2/L3 Switching technology administration including creating and maintaining VLANs, Port security, Trunking, STP, Inter VLAN Routing, LAN security.

Confidential, Detroit, MI

Sr. Network Engineer

Responsibilities:

  • Configuring ACL to allow only authorized users to access the servers.
  • Maintain effective communications with vendors, peers and clients in resolution of trouble-tickets, equipment
  • Deployed and configured Cisco DNA Center 1.1.7 into the Data Center.
  • Worked on Great exposure to SDN and Network virtualization technologies like Cisco ACI.
  • Experience with Cisco ACI (Application Centric Integration) technology implementation.
  • Troubleshoot Hardware, Cisco IOS, install and configure Cisco routers and switches.
  • Participated in on call support in troubleshooting the configuration and installation issues.
  • Incorporate Cisco Nexus 9K NXOS to ACI fabric to work in concert with existing Nexus 7000s and ASRs for Multi-protocol Label Switching (MPLS)
  • Working Knowledge of SD-WAN technologies Such as Meraki, OpenStack and Silverpeak
  • Subject Matter Expert on implementing and deploying the company's first SD WAN Solution (Cisco Meraki, CloudGenix).
  • Update customer networks by configuring routers, switches, and incorporate the SDWAN into the network design.
  • Migration of the firewall rules from Cisco ASA 55xx to Palo Alto firewalls.
  • Worked on mitigation of DOS/DDOS attacks on Cisco ASA and Palo Alto firewalls.
  • Configured and implemented enhanced VPC, OTV and Fabric Path between Nexus 7K and 5K series switches for data center operation.
  • Successfully integrate and validate Openstack Liberty with Cisco ACI platform ML2 plugin as the next generation network infrastructure for Cisco Cloud.
  • Improve scalability and ease of deployments of the Openstack underlay network by migrating from Standalone Nexus to Cisco ACI platform .
  • Worked in Configuration and extension of VLAN from one network segment to other segment between different vendor switches (Cisco, Juniper)
  • Provided Technical support in terms of upgrading, improving and expanding the network for Managed Services Customers.
  • Worked on SD-WAN solution. Configured policies, encryption methods for WAN traffic.
  • Worked on Time to time upgrade of network connectivity between branch office and regional office with multiple link paths and routers running HSRP, EIGRP in unequal cost load balancing to build resilient network based on the customer requirements.
  • Configured network using routing protocols such as OSPF, BGP and troubleshooting L2/L3 issues.
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
  • Configured Client VPN technologies including Cisco’s VPN client via IPSEC.
  • Configure switch VLANs and inter-switch communication. Build and setup network Laboratory.
  • Actively involved in troubleshooting on network problems with Wireshark, identifying and fixing problem

Confidential

Network Engineer

Responsibilities:

  • Responsible for the configuration, implementation and operation of Cisco 3745 routers Cisco 6509 and 3560 L2/L3 switches
  • Removed Cisco 3600 and 2600 series routers and Cisco 2900 series switches from the current infrastructure and replaced them with the Cisco 6509 or 3560 L2/L3 switches.
  • Served a platform for other services that are required within the data center or cloud environment using Cisco ACI .
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco ASA Firewalls, NAT and Juniper SRX firewall.
  • Configured RSTP, MST and used VTP with 802.1q trunk encapsulation. Provided port binding and port security wherever required. Provided router redundancy through HSRP.
  • Configured ether channels using PAgP and LACP.
  • Designed ACLs, VLANs, troubleshooting IP addressing issues and taking back up of the configurations on switches and routers.
  • Designed SD-WAN (Viptela& Versa) technologies to optimize efficiency and scalability across Enterprise LAN and WAN environments.
  • Deployed SDWAN with cisco infrastructure for SaaS applications in the firm.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices using Cisco ACI.
  • Experience with Cisco DNA solutions ISE, NGFW, Prime, ESA, WSA, VPN and CWS implementations
  • Involved in testing and production support of cisco ACI Data center in network centric mode.
  • Responsible for Checkpoint firewall management and operations across our global networks.
  • Working with Checkpoint Support for resolving escalated issues
  • Created effective network security by migrating from Check Point FW-1 NG to ASA 5510 Firewalls
  • Provided testing for network connectivity before and after install/upgrade
  • Switching related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet and Gigabit Ethernet channel between switches.
  • Experience in Cisco switches and routers: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay and ATM).
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external
  • Escalation procedures and customer notifications.
  • Configured Cisco Routers for OSPF, IGRP, RIPv2, EIGRP, Static and default route.
  • Worked on HSRP and GLBP for first hop redundancy and load balancing.
  • Configured the Cisco router as IP Firewall and for NATting.
  • Prepare, update, and maintain technical and logistical network documentation

Confidential

Network Support Engineer

Responsibilities:

  • Involved in Configuring and troubleshooting multi-customer network environment.
  • Involved in network monitoring, alarm notification and acknowledgement.
  • Implemented new/changing existing data networks for various projects as per the requirement.
  • Worked on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path, and Community, MED.
  • Installed and maintaining Windows NT Workstations and Windows NT Server.
  • Involved in SD-WAN project for successful evaluation of POC to proceed with production implementation. We primarily focused on implementing SD-WAN technology using ViptelavEdge 2000 and Cisco ENCS 5400 devices.Provided technical support to LAN & WAN systems.
  • Creating or Modifying Firewall rules on Cisco 5555, 5520, Juniper SRX and Palo alto VM-300 devices.
  • Expert in configuring and troubleshooting of VPN gateways and proxy servers.
  • Hands on Experience in Managing Data Center starting from installation to decommission.
  • Installation and configuration of Juniper M 120 multi service edge router and also MX 10 and MX40 series routers in datacenter.
  • Assistance provided with initial installation and configuration for SDA (ISE, DNAC+Assurance, Stealth watch, APIC-EM, Catalyst 9k and programmability) Assessment for the newly implementing customers.
  • Knowledge of TCP/IP protocol stack, network analysis tools, load balancing technologies, and network services (DNS, DHCP, SNMP, etc).
  • Hands on expertise with Cisco Catalyst routers/switches, Cisco Nexus equipment, Infoblox appliances, Cisco wireless, Riverbed/Cascade monitoring, and Solar winds
  • Experience with Palo Alto Network Firewall, Cisco ACI, Cisco ASA and Checkpoint Firewall.
  • Provide direct day to day support for various technologies such as: WAN technologies (MPLS, Frame Relay, etc.), Data Center infrastructure (VLANs, trunks, teaming, L2 & L3, etc.), Campus switching, Load Balancer and Virtualization, Routing protocol support (BGP, IEGRP & OSPF), VPN technology support, VoIP communications and infrastructure, enterprise wireless, RADIUS services, enterprise DNS / DHCP and other various enterprise technologies and services.
  • Monitored performance of network and servers to identify potential problems.
  • Performed RIP, OSPF, BGP, EIGRP routing protocol administration.
  • Preparedfeasibility report for various upgrades and installations.
  • Other responsibilities included documentation and support other teams.

We'd love your feedback!