Network Engineer, Resume
5.00/5 (Submit Your Rating)
SUMMARY:
- More than 5 years of experience in Designing, Implementing and Supporting of Cisco based Network Infrastructure, including Voice, Wireless and Video technologies,
- Hands on work experience in network infrastructure with LAN/WAN technologies, L2/L3 Protocols, IOS, wireless networking, VOIP, and NMS,
- Experience in VMware servers ESXi 5.x with VMware vSphere Client,
- Excellent knowledge and understanding in network infrastructure,
- Good understanding in VMware, storage, DHCP, DNS, SNMP, Log analysis, TFTP, LDAP and AD,
- Expert in routing and switching in Cisco platform: routers (1800, 2500, 2600, 2900); switches (2750 - 6500); protocols (VLAN, Dot1Q, STP, RSTP, MST, TCP/IP, UDP, RTP, RIP, EIGRP, OSPF, BGP, H.323, SIP, MGCP/SGCP, PIM/IGMP, IPsec), ip/ipv6 services),
- Experienced in network monitoring analysis using Wireshark, TCPDump, GNS3,
- Designed and implemented Enterprise network infrastructure (routers, switches, firewall, VMware),
- Strong skills both in oral and written communication, and Technical presentation,
- Excellent in problem solving, troubleshooting, conflict resolution and customer support
- Flexible, self-motivated, quick learner, ambitious, goal oriented, a team player and reputed leader
TECHNICAL SKILLS
- Operating Systems: Windows 7, XP, Windows 2003/2008 Server, Sun Solaris 10, Linux Sever Ubuntu EditionScripting Languages: Windows Power Shell (v 2.0), VB Script,
- Shell Scripting in Bash shell, PythonNetworking: TCP/IP, OSPF, RIP, EIGRP, BGP, OSPF, VLAN, LAN, WAN, VLAN (802.1q), IPsec, PPTP, SNMP, HTTP, TFTP, SMTP, POP3, PPP, PPPoA and PPPoE, VPN, DMZ, Firewalls, Custom NAT, DNS, DHCP, ATM, Frame Relay, RTP, ISDN DSL, ISL, 802.1x - RADIUS,Wireless,VoIP, Security,Virtualization,
- Private Clouds: 802.11 a/b/g/n, Wireless Bridges, Access Points,
- Wireless Distribution Systems, WPA, IDS, 802.x, PEAP, Access Lists, WDS, IAPP, etc, SIP, H.323, Q931, G711, T38, G729 codecPalo Alto Firewall (PAN OS 7), Cisco ASA 55XX - 5510X, Cisco FIREPOWERVMWare vSphere 5.5, ESXi 5.5.Contrail Juniper, VMWare NSX, OpenStack,
PROFESSIONAL EXPERIENCE
Network Engineer,Confidential,
Responsibilities:
- Designs, installs, configures, troubleshoots, and administers client networks.
- Works in collaborative networking team with IT Administrators.
- Supports day-to-day changes upon customer requests.
- Design, configure, install, and monitor client’s devices.
- Installed and configured multiple Firewall/VPN systems for Internet and Extranet connectivity, using Cisco ASA/IOS.
- Recommend upgrades to the network based on network assessments.
- Security/Vulnerability assessment for different clients using Kali and backtrack tools.
- Recommend upgrades or mitigation techniques based on the above assessment.
- Deployed Wi-Fi WPA-2 Enterprise Security utilizing Radius authentication to Active Directory via Microsoft Network Policy Server.
- Developed and installed PRTG and Kiwi monitoring systems to analyze and trend network traffic and to provide service level analysis for corporate LAN and WAN interfaces and critical Hughes NOC components.
- Designed network and systems architecture to support unicast and multicast delivery of digital media content to remote sites.
- Designed, implemented and managed VPN Access to systems for engineering, support and vendor teams.
Network Consultant
Confidential, Michigan,
Responsibilities:
- Designed and implemented Firewalls, and IDS/IPS to different network segments in the nuclear reactor plant in order to comply with the requirements of the Confidential approved Cyber Security Plan.
- Designed and implemented firewalls, such as, mainly PAN devices, Cisco FirePOWER virtual Appliance, and data diodes to secure the plant.
- Modified network into different segments in order to secure the environment and divide the whole plant network into 4 levels for fully isolating the critical reactor plant from the rest of the world.
- Used network taps to collect the traffic traversing between highest levels to the lowest.
- Installed ESXi, Windows VM with DC/AD on L2 DMZ server.
- Installed FireSight IDS on L2 DMZ server.
- Installed and configured Palo Alto 3020 firewall devices.
- Installed and configure Cisco FirePOWER
- Installed SolarWinds LEM and Orion.
- Develop and configure rules on SolarWinds LEM and Orion on L2 DMZ server.
- Configured NPM/LEM to forward L3 Syslog traps out through firewall to L2.
- Expanded Test Procedures to cover FIM, integration with SEP and all of L2 DMZ.
Service Alberta Edmonton,
Responsibilities:
- Refreshed routing and switching equipment at the Ministry of Infrastructure, Environment, Justice, Finance, and ARD in a hybrid Enterprise/Service Provider network, personally handling over $3 million Cisco equipment over the course of the project.
- Staged and deployed 92 Cisco Catalyst 6500 devices (with 10+ SUP720 10G, 80+ SUP32, 300+ 6148 line cards) and 12 Catalyst 3750s.
- A full visual Inspection of installed cabling infrastructure and terminations had conducted during site surveys.
- Documented and took pictures of sites.
- Design and installed horizontal and vertical wire managers to support the cabling above and below the equipment racks.
- Tested and implemented redundancy and high availability using GLBP, HSRP, VSS, VCP, and OSPF & EIGRP tuning.
- Provided technical training, supervision and support to new members of the project deployment team.
- Prepared migration plan for 12 devices from Cat-OS to IOS - including design, validation, and implementation.
- Assisted in deployment of ONS 15454, MDS 9500 and Catalyst 3640.
- Prepared Method of Procedure (MOP), migration strategy, requirements, and various reports.
- Assisted Project Manager (PM) with scheduling, organization, logistics of 800+ devices, and other administrative tasks.
- Worked in a multi-vendor environment including teams from Cisco, IBM, and others.
- Role Breakdown: Systems Staging 35%, Systems Deployment 40%, Network Design 15%, Administration/Organization 10%.
- Performs troubleshooting to determine and resolve the root cause of most hardware or software malfunctions at the network level
- Performed complex moves, adds, changes of network equipment
- A very good understanding of Network equipment Deployment Guidelines
- On Call on weekends and travel to other cities in Alberta for deployments