We provide IT Staff Augmentation Services!

Network Security Engineer Resume

2.00/5 (Submit Your Rating)

Charlotte, NC

PROFESSIONAL SUMMARY:

  • CCNA, CCNP & JNCIAx5A CERTIFIED professional with over around 9 years of experience in routing, switching, firewall technologies, systems design, administration and troubleshooting.
  • Exposure to LAN/WAN setup, installation, configuration and troubleshooting.
  • Experience of routing protocols like EIGRP, OSPF, RIP, BGP and IP addressing.
  • Experience in testing Cisco & Juniper routers cum switches in laboratory scenarios and deploy on site for production.
  • Configured syslog - ng for Splunk implementation, Familiar with monitoring tools such as Nagios and splunk.
  • Worked on contrail and openstack cloud environment to deploy virtual machines like vSRXs, vMX routers into cloud and provided design to the network cloud.
  • Strong experience in Network security using ASA Firewall, Checkpoint, Palo Alto, IDS/IPS and IPSEC/SSL VPN and implementing security rules.
  • Knowledge and experience on F5 load balancers and Cisco load balancers ( CSS and ACE ).
  • Excellent hands on Cisco ASA and checkpoint firewall to use multiple security levels and interfaces.
  • Worked on writing some test cases for different line ups by using Python, Robot Framework and integrating with ANT(Automation Network Tool).
  • In Depth knowledge of all DNS RFC specifications
  • Experience in working with Cisco Catalyst series 2900, 3560, 3750, 4500, 4900, 6500 Switches.
  • Experienced in Troubleshooting for connectivity and hardware problems on Cisco devices.
  • Hands on experience in configuring Cisco Nexus 2232, 2248, 5548, 6001 and 7018(Sup 2E) and worked on nexus protocols VPC, VRF, VDC and FEX Links.
  • IOS/JunOS upgrade for Cisco & Juniper routers and switches.
  • Hands on experience in cisco call manager and VoIP.
  • Install Avaya VoIP phones, Polycom and Cisco Codecs.
  • VMware ESX/ESXi, VMware vCenter, VMware vCSA and Windows 2008 R2 Hyper-V.
  • Implementing, maintaining and troubleshooting switching tasks such as VLANs, VTP, VLAN Trunking using 802.1Q, STP, RSTP, PVST+, Ether channel using LACP and PAGP, Inter-Vlan routing, and CEF.
  • Experience in L2/L3 protocols like VLAN, STP, VTP, MPLS, 802.1Q protocols.
  • Good knowledge in SD WAN Technologies like ACL, NAT/ PAT, Ether Channels, IPSec VPNs.
  • Enhanced level of knowledge with, PPP, ATM, T1 /T3 Frame-Relay, MPLS.
  • Expertise in implementation and troubleshooting of FHRP protocols such HSRP, VRRP, GLBP, ACL.
  • Prepared, arranged and tested Splunk core search strings and operational strings.
  • Worked with Cisco, Palo Alto, Juniper, Splunk, Force point, Nessus, Stealth watch, Checkpoint, Zscaler and other vendors to provide a stable, high-speed secure network.
  • Experience in working with Cisco 2800, 3600, 3800, 3900 series Routers
  • Expertise in Ansible playbooks and AWX deployments.
  • Extensive knowledge in different networking protocols DHCP, DNS, FTP, VOIP (SIP, H.323)
  • Extensive experience with Cisco IOS, IOS-XR, NX-OS Windows client/server operating systems, Linux, Networking technologies, Firewalls.
  • Troubleshooting & implementation of VLAN, STP, MSTP, RSTP, PVST, 802.1Q,, HSRP, VRRP, GLBP, LACP, PAGP, AAA, TACACS, RADIUS, MD5authentication, VTP & SVI.
  • Knowledge on complex Checkpoint, Cisco ASA & Palo Alto Firewalls Environment.
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • IOS/JUNOS upgrade for Cisco & Juniper routers cum switches.
  • Experience working with Nexus 7K, 5K and 2K.
  • Install core components of the7.6 XenApp environment.
  • Experience with virtualized ISE deployment.
  • Hands on Knowledge/experience on F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs.
  • Experience in design, implementation, and support of F5’s Big-IP Access Policy Manager (APM ) software component in a complex enterprise environment
  • Knowledge on F5’s BIG-IP Application security management and Edge Gateway Solution
  • Worked extensively on Palo Alto, Juniper Net screen, Fortinet and SRX Firewalls.
  • Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, MPLS, QoS and ITIL.
  • Hand-on experience in developing scripts using Perl scripting language.
  • Demonstrated success record in managing multiple tasks with proven ability to meet deadlines and proactively identifying the problem to solve complex technical issues.
  • In-depth knowledge of network communication technologies and techniques.
  • Experience on SONET and deployment of DWDM

TECHNICAL SKILLS:

Network Protocols: MPLS, VRF, VRRP, Policy Based Routing, Route RedistributionStatic Routing, WCCP, VDC, MPLS, LDP, ISDN, PPP, VoIP, SIP, VTP, STP, RSTP, VLANs, 802.1q/ISL, CDP, LACP, OSPF, BGPv4, EIGRP, HSRP, RIPv2, VPC, VDC.

Cisco Router platforms: 1841, 2611, 2621, 2800, 3600, 3845, 3900, 7206VXR

Cisco Switch Platforms: 2900XL, 2950, 2960, 3500, 3550, 3560, 3760, 4500, 6500Nexus 9k 7k, 5k, 4k, 2k, 1k

Firewalls: Juniper SRX (5400, 3600, 1500, 650,240h, 210he, 100) (Netscreen ISG1000, SSG-550, 2000,5200,5400), Cisco ASA (5510,5520,5540,5550,5580,5585)

FWSM, Checkpoint NGX R55,R: 60,R-65, Palo alto- 7500, 7050

LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, Port Channel, TCP/IP, Ether channel, VLSM, Cisco/Catalyst L2/L3 Switches, Wireless (802.11 a/b/g/n), Checkpoint, Juniper/Net screen/Cisco Firewalls

Cisco/Juniper Routers, Silver Peak NX: 7xxx WAN Accelerators

OC192, OC: 48, FRAME RELAY, PPP, T1/E1, HDLC, MPLS, DS3, Leased Lines, DSL Modems, ISDN(PRI/BRI)

Network Management Tools: Cisco Works, Silver peak GMS, RSA Security and operations Console, VMware vSphere Client, TFTP, FTP, SSH.

Security Access Control/Policy: Cisco Secure ACS for Windows, RSA, AAA, TACACS+, Radius, MD5, IPsec, GRE, NAT/PAT, ACLs, Juniper SA SSLVPN w/DUO, SSLVPN

Operating Systems: Windows 2003, Windows 2008, Linux, Unix, Windows server 2012

Cisco IOS, NX: OS, CAToS, Aruba, JUNOS.

Documentation Tools: Microsoft Office, Visio, Project, SharePoint.

Load Balancing: F5 LTM, Citrix, Cisco ACE 4700 Series

IP Telephony: H.323, MGCP, SCC Cisco SRST

VoIP Devices: Cisco IP phones, Avaya

Cloud: Contrail, AWS, Openstack

Virtual devices: vSRX, vMX, Vf5

EXPERIENCE:

Confidential, Charlotte, NC

Network Security Engineer

Responsibilities:

  • Experience in designing new architecture and maintain a sandbox environment for testing.
  • Worked on implementation of major project like Juniper SRX firewall migrations in core mobility networks for multiple sites and zones(CORE-DMZ, EXN, ECB,CAZ, ISPAN, DST)
  • Worked on Automation tool called ANT an internal tool used for code upgrades and configuring of new devices Confidential different data centers.
  • Provide design solutions to the users based on the requirement and also work on the changes that lead to work on the implementation.
  • Worked on cloud infrastructure like Open stack, contrail.
  • Experience in tools like monitoring tools like JUNO Space, STRM, IP control and testing tools like MuDynamics, Spirent, Cyber flood, IXIA.
  • Testing of the new Core SRX zone hardware in Sandbox Lab - including regression feature test, performance and failover.
  • Worked with the Lab Ops team to install new SRX Core Zone hardware in Willows Lab and execute migration.
  • Worked on configuring new Juniper SRX Gen3 hardware firewalls 5800, 5600, 4600 devices and also worked on vSRX devices in network cloud
  • Worked on contrail and openstack cloud environment to deploy virtual machines like vSRXs, vMX routers into cloud and provided design to the network cloud.
  • Update Core Zone EDP documentation, Review the EDP, TOL and IG with the production teams (ATS) and Support FFA activities as needed.
  • Worked with Lab Ops and application folks to schedule, test and troubleshoot the migration strategy in lab and provide direction to lab operations as needed.
  • Good experience in deploying complex Routing Policy across different routing protocols.
  • Worked on writing some test cases for different line ups by using Python, Robot Framework and integrating with ANT(Automation Network Tool).
  • Worked on automating the JUNOSPACE and some other basic deployments by using ANSIBLE, PYCHARM, JINJA2 templates which is called End to End Automation.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on vSRX, Contrail cloud.
  • Experience in implementation and troubleshooting of Datacenter devices like Nexus 7000, Nexus 5000 and Nexus 2000 Series devices with VDC's /VRF's configurations.
  • Experience in implementation and troubleshooting of own physical and virtual lab setup by using devices like Nexus 7k, SRX 5800,5600,4600’s MX960, 480and also vSRX devices.
  • Addition/ Deletion of Firewall Rules, Reviewing and Processing the ticket, Firewall Clean up, Virtual Servers, Creation/Renewals, Troubleshooting
  • Troubleshoot traffic passing managed firewalls via logs and packet captures
  • Expert in using ANT scripts, Make and Maven for Build process. Experience in Implementation of Continuous Integration through Jenkins. Deployment using various CI Tools like Chef/Ansible
  • Automated the cloud deployments in contrail, openstack using Ansible and AWS Cloud Formation Templates.
  • Automated software installation using Ansible Playbooks.
  • Worked on F5 GTM, AFM, ASM and other F5 components to protect against advanced DDoS attacks.
  • Designed, built, and deployed F5 Big IP load balancers (8900’s, Viprions, Blades), F5 Big IP TCL, F5 Big IP TMOS, F5 Big IP LTM Local Traffic Manager, F5 DNS Domain Name Services
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Provided TierII Load Balancer expertise on F5 BigIP Local Traffic Managers (LTM). Designing F5solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BigIP Load Balancers.

Environment: Juniper (SRX 4600, 3400, 5600, 5800) cisco ASA 5585, 5580 Cisco Routers ( 3900, ASR 7200, 9000), Juniper MX960, MX480, switches (3750/3550), Nexus 9k,7K,5K, BGP, OSPF, SSL VPN, Site-to-Site VPN, MPLS, Ether Channels, Cisco Catalyst Switches, JUNO Space, NSM (Network and Security Manager) and Pulse secure, Panorama, JUNO Space, Ansible, JSA and Network Monitoring tools

Confidential, Redmond, WA

Sr. Network Engineer

Responsibilities:

  • Experience with Firewall administration, Rule analysis, Rule modification
  • My daily tasks are used to be providing the security between the data centers on the basis of tiers and also give access two the serves which are in two different zones and also monitor the traffic.
  • Provide design solutions to the users based on the requirement and also work on the changes that lead to work on the implementation.
  • Worked on implementation of major project in charter called Spectrum Mobile to go live.
  • Worked on the outages and change implementations for issues like timeouts, latency and asymmetrical routes.
  • Fortinet firewall deployment for multiple locations
  • Experience in JUNO Space, NSM (Network and Security Manager) and Pulse secure, Panorama, Algosec (Firewall analyzer), Splunk tools.
  • Contributed to the major charter projects like Spectrum mobile, Techmobile and Unified buy flow, telemetry and BHN to ICOMS migration.
  • Performed management and review of Sidewinder Firewall and BlueCoat Proxy policy, work flow and system settings following established change process.
  • Strong hands on and exposure to PaloAlto and juniper on regular basis tickets.
  • Handled Enterprise Network firewalls and involved in a part of migration from juniper to Palo Alto firewalls.
  • Successfully installed PaloAlto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Created firewall policies and NAT rules to provide access for websites internal and externally on Palo Alto and Juniper firewalls.
  • Also push Firewall rules staged during the day to respective cmas Confidential night. Push includes the juniper and Palo Alto firewalls.
  • Worked on Firewall tickets to deal with low, medium and high priority issues.
  • Addition/ Deletion of Firewall Rules, Reviewing and Processing the ticket, Firewall Clean up, Virtual Servers, Creation/Renewals, Troubleshooting.
  • Involved in L2 Technical approver for any changes made to the network which involved changes to the Switches, routers, firewall, Load balancers and DNS
  • Hands-on experience Installing & configuring firewalls - Checkpoint NG & NGX, Cisco ASA (5500), Cisco Pix, ISA, and IP tables.
  • Responsible for maintaining multi-vendor network environment including Cisco ASA, Juniper JUNOS, Fortinet firewalls, Palo Alto PA-200 and configuring different policies to provide connectivity.
  • Implementing security Solutions using PaloAlto Pa-5000/3000, Cisco ASA, Checkpoint firewalls R75, R77.20.
  • Configure and administer network devices consisting of F5 load balancers, Bluecoat proxies, Juniper SRX's, PaloAlto Network Firewalls.
  • Designed, implemented, and managed network security countermeasures including firewalls and intrusion detection/prevention systems such as: Palo Alto, Pfsense, and Cisco's SourceFire.
  • Configuration and troubleshooting of Firewalls ASA 5520, ASA 5510, Nokia Check Point VPN1 NGX R55/R65/R70.Performed upgradation from old platforms to new platforms R65 to R75.45 Created multiple policies and pushed them in to Checkpoint Firewall (Gateways) and the Checkpoint Management Server with SPLAT operating system.
  • Setup Cisco ACI Fabric (Spine/Leaf/APIC) Configure ACI APIC controller.
  • Configuration and troubleshooting of Site to Site as well as Remote Access VPN on Cisco ASA and Checkpoint firewalls.
  • Build and maintain network security infrastructure using Cisco ASA, IPS,
  • FirePower, ISE, ACS and RSA SecurID.
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Working with level-2 team in deploying and installing Palo Alto firewalls.
  • Participating in the firewall review calls to get the changes approved.
  • Experience with designing and configuring secure Virtual Private Cloud (VPC) through private and public networks in AWS.
  • Successfully set up an OPNET lab session to examine the effect of ATM adaptation layers and service classes on the performance of the network
  • Worked on configuring new Juniper SRX firewalls 5400, 3600, 1500, 650, 100 devices and also worked on Palo Alto Firewall.
  • Configured and maintained IPSEC and SSL VPN's, Troubleshoot IAP (Internet Access Points) on Palo Alto Firewalls.
  • Worked on juniper chassis cluster and solved the critical issues on user basis.
  • Participating in the firewall review calls to get the changes approved.
  • Responsible for Cisco ASA firewall administration, Rule Analysis, Rule Modification.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500, Juniper and Palo alto.
  • Primary responsibility is to design and deploy various network security & High Availability products like Checkpoint, Cisco ASA other security products
  • Installed various network hardware including concentrators, bridges, and hubs to establish communication connections with remote locations
  • Configure SSL VPN and Zone Based Firewall (site to site IPSEC)
  • Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • Hands on experience on the Juniper SRX 5400, 3600, 1500, 650,240h, 210he, 100 and also Juniper Net screens ISG1000, SSG-550, 2000 and also on cisco ASA 5585, 5580
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Juniper based networks.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures
  • Configured firewall logging, DMZs, related security policies and monitoring
  • Responsible for Configuring SITE-TO-SITE VPN on Juniper SRX between headquarters and vendor locations.
  • Hands-on experience with SD WAN (MPLS/Frame Relay), routers, switches, TCP/IP, routing Protocols (BGP/OSPF), and IP addressing.
  • Provide GG-SSL-VPN access to more than 700 vendors for charter across all over the world.
  • Assisting offshore teams located in Navisite India in troubleshooting layer 3 issues and routing protocol issues mostly BGP.
  • Strong experience in Network security using ASA Firewall, Juniper, Checkpoint, Palo Alto, IDS/IPS and IPSEC/SSL VPN and implementing security rules.
  • Experience in Network Tools like SNMP, Wireshark, Splunk , Solarwinds Orion , Network automation ITNA and algosec tool analyze the Network Operations.
  • Experience with the escalation problems for Routing, Switching and firewall connectivity issues using ticketing system Service Now and Jira.
  • Implementation traffic filters on Cisco routes using Standard, extended Access list.
  • Troubleshooting, optimizing and testing of static and dynamic routing protocols such as OSPF, BGP
  • Managed inventory of all network hardware, Management and Monitoring by use of SSH, SFTP, SYSLOG, SNMP, NTP, NAT and PAT
  • Built alert & monitoring scripts for applications & servers using Python & Shell Script
  • Good experience in deploying complex Routing Policy across different routing protocols.

Environment: Juniper (SRX 5400, 3600, 1500, 650,240h, 210he, 100) Juniper Net screens ISG1000, SSG-550, 2000 cisco ASA 5585, 5580 Cisco Routers ( 1900, 2900, 3900, ASR 7200, 9000), Juniper M20, switches (6500/3750/ /2950 ), Nexus 7K,5K &2K, BGP, OSPF, SSL VPN, Site-to-Site VPN, MPLS, Ether Channels, Cisco Catalyst Switches, JUNO Space, NSM (Network and Security Manager) and Pulse secure, Panorama, Algosec (Firewall analyzer), JUNO Space, Ansible, NSM (Network and Security Manager) and, Splunk tools

Confidential, Jackson, MI

Sr. Network Engineer

Responsibilities:

  • Worked as a part of network team where my daily tasks included configuring, monitoring and troubleshooting of TCP/ IP networks .
  • Worked on installation, configuration of LAN/WAN Networks, Hardware, Software, and Telecommunication services: Cisco Routers and Switches
  • Managed Cisco call manager, Cisco Voice Mail Unity servers. Worked with in Cisco Routing and switching background w/QOS.
  • Experience configuring BGP, OSPF in Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 on advanced technologies like, MPLS VPNs, TE and other service provider technologies.
  • Managed AD Domain Controller, DNS and DHCP Servers and configurations
  • Responsible for the IPAM (IP Address management) system for a very large WAN/LAN network.
  • Expertise in configuring and troubleshooting of Palo Alto, SRX Firewalls and their implementation Experience in site-to-site and remote access VPN solutions.
  • Experience in Cisco Unified Communication Manager (CUCM), Call Manager Express (CME), Cisco Unity Connection (CUC), Unified Contact Center Express (UCCX), Unified Contact Center Enterprise (UCCE), IM and Presence, SRST and Voice Gateways.
  • Worked thru Aruba and Cisco WLAN and Controller config files to help Admin with WLAN troubleshooting
  • Delivering global engineering support to customers, partners, and field engineers for Stealthwatch product line.
  • Designed, proposed and implemented NSX micro-segmentation.
  • Design and sessions, installing ICM / UCCE, developing call flows, compose technical documentation & mentoring other team members.
  • Worked with Cisco UCCE, IPIVR, Cisco Unified Communication System
  • Designing, configuring, and troubleshooting QoS, SIP, H.323, RTP, SCCP, Session Border Controllers, Voice Gateways, Voice circuits IP /TDM, Cisco Telepresence Infrastructure, QoS, NAT, PAT, and multicast.
  • Understanding of the different IP based applications and their use with StealthWatch.
  • Manage Meraki equipment for office network supporting 60 staff members.
  • Executed zero impact cutover of all HTTP/HTTPS internal traffic for 6500 users to new Websense/Forcepoint proxy platform from Blue Coat.
  • Configured and implemented voice gateways (H323/MGCP/SIP), SRST for remote sites
  • Developed MTS software plug-in for Multimedia over Coax Alliance (MoCA) configuration capability on DOCSIS cable modem and gateway products.
  • Upgrade the physical and virtual environments, including VMware vCenter, NSX, ESXi, Cisco Nexus 9K, Palo Alto, & BigIP F5
  • Fortinet Access List Management in Fortigate 200B hardware model with IOS 4.1
  • Configured WIDE IP and WIDE IP pool on F5 GTM’s to support load balancing between data centers.
  • Experience in configuring, upgrading and troubleshooting on Riverbed Traffic Optimizers and Cisco WAAS (Wide Area Application Services) and managing all the devices in the network using Central Manager
  • Worked on configuring the Nexus 5k Aggregation Switch and Nexus 2k Fabric Extenders.
  • Installed and Configured new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2K
  • Supported Operations team when complex changes are done by developing MOPs for network devices (routers, switches and A10 Load balancers) code upgrades, VLAN/IP migrations from old to new network topology without any service disruption.
  • Deployment and management of the following firewalls: Fortinet 100D, Fortinet 60C, Fortinet 60E, Fortinet 60D, Fortinet 200E (HA), this includes the whole UTM (app control, Web Filter, IPS, DoS, DDoS, etc.
  • Configured network using routing protocols such as RIPv2, OSPF and troubleshooting L2/ L3 issues.
  • Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Riverbed Steelhead appliances
  • Added and modified the servers and infrastructure to the existing DMZ environments based on the requirements of various application platforms.
  • Programming and maintaining Cisco, Meraki and Hp networking equipment on campus. Set up and maintenance of Windows 2008 and 2012 servers. Managing a PBX phone system with Mitel and Aastra phones. Pulling and installing cabling and wireless access points. Extensive work with Meraki and cisco ISO on all types of Meraki Access points (indoor and outdoor) and Cisco 2960s and 2960x models.
  • Supporting the operational needs of customers using Stealthwatch for network security and forensics
  • Assist in creating network design standards for hardware and software. Developing and maintain Network Documentation (Visio diagrams, Excel spreadsheets, Word documents, etc.) Configure and troubleshoot network elements in a test/dev environment.
  • Deployment and management of the following security software: Trend Micro FDE with Bit Locker extension, Mimecast e-mail security (the whole suite and more than 30 modules), Trend Micro Security Suite DLP, Application Control, AV, Deep Inspection, Trend Micro HIDS, Trend Micro Predictive Learning, Trend Micro Web Filter, Device Control, URL Filtering/URL rating and Predictive Machine Learning. Packet Analyzing/Scanning with WireShark and NMAP, IDS Monitoring with Security Onion, Alien Vault SIEM for servers and PC's and FortiAnalyzer SIEM for the firewalls, Vulnerability Assessment with Qualys and Nessus Professional.
  • Worked on Inflobox to update the DNS host, Configuring NAT onto the Juniper SRX firewalls and a record to assist the part of the load balancer migration from F5 to A10.
  • Hardware/Software Installation and Maintenance of Avaya Aura Communication Manager 5.x, Avaya Aura Communication Manager 6.x templates.
  • Worked with Avaya Aura g700, g350, g250, g430, g450, g650 VOIP Gateways
  • Integrating Cisco Stealthwatch with other Cisco Security services such as Firepower and Cisco Identity Services Engine (ISE).
  • Worked on large scale implementation and maintenance for SSH (Secure Shell), PKI/SSH, VPN, IPSEC Satan, ISS, TCP/IP Monitoring.

Environment: Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800), switches (6500/3750/ /2950 ), Nexus 7K,5K &2K, F5 Load balancing (LTM, GTM, APM, AFM, ASM), EIGRP, RIP, OSPF, Voice Gateways , BGP, VPN, MPLS,WAAS, Wi-Fi controllers, Ether Channels, Cisco Catalyst Switches, Firewalls (Cisco ASA, Palo Alto), Cisco Voice (CCM, UCCE), Shell Scripting, Avaya Aura.

Confidential, NYC, NY

Sr. Network Engineer

Responsibilities:

  • Worked as part of delivery team where my daily tasks included code upgrades, prefix-list addition, and access-list addition using python script and on Linux platform based on tickets generated by customers.
  • Migration and implementation of Palo Alto Next-Generation Firewall seriesPA-500, PA-3060, PA-5060, PA-7050, PA-7080.
  • Worked on migration project - XenApp 4.5 to XenApp 6.5 - Server 2003 (Legacy) to 2008 R2 (Gen 2) environment.
  • Architected, proposed and implemented a 100gb, rack-mount server ESXi environment with NSX and VSAN
  • Configured Motorola WIFI Wireless controller routers
  • Basic understanding of Unified Contact Center Enterprise (UCCE) - Intelligent Contact Management (ICM), Customer Voice Portal (CVP) and Interactive Voice Response (IVR/VRU).
  • Worked on OSPF routing protocol, configuring BGP sessions and troubleshooting on Nexus 1K, 5K, 7K, Juniper MX-960 routers and cisco ASR routers.
  • Installed and maintained production servers for client services (web, dns, dhcp, mail).
  • Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 and Juniper J series J230, M 320 and MX960 routers
  • Mitigated security risk from within Azure Cloud. Ensured the secure transfer of data from on-premises to Azure.
  • Use of Azure services for HA and DR and developed security policies for Azure cloud.
  • Responsible for planning, documenting and implementation of complex Firewall and VPN solutions.
  • Designed perimeter security policy, Implemented Firewall ACL's, allowed access to specified services, Configured Client VPN technologies including Cisco's VPN client via IPSEC
  • Installed and configured LAN/WAN Networks, Hardware, Software, and Telecommunication services- Cisco Routers and Switches.
  • Configuring firewall rules in Juniper SRX firewall using cli.
  • Developed entire frontend and backend modules using Python on Flask Web Framework
  • Created MSI packages using Citrix Installation packager in Citrix.
  • Configuring Citrix Load balancing for XenApp 6.5 farm as per the environment demand.
  • Working on configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between different data centers.
  • Implementing IPv6 addressing scheme for routing protocols, VLANs, subnetting and mostly during up gradation of cisco ISR routers 2800/2900/3800/3900 and switches.
  • Configuration and deployment of cisco ASA 5540 firewall for internet Access requests for servers, Protocol Handling, Object Grouping.
  • Also role of Network Operator Center technician and monitoring the whole infrastructure, including: Solaris OS, VmWare ESXi ver 5.0, Hyper-V, Windows Server 2012 OS, IBM Blade Center H, Brocade Switches, BNT Switches, VPN connections, Cisco Switches, Fortinet Firewalls Ver 5.0, ASA Firewalls.
  • Worked on Cisco wireless LAN technologies and Switching. Configured Virtual server, service groups, Session persistence, Health monitors and Load balancing methods in new F5 andA10 LTMs. Configured WIDE IP and WIDE IP pool on F5 GTM’s to support load balancing between data centers.
  • Installation & configuration of Microsoft Proxy Server 2.0 and Inflobox DNS, DNCP and IP Address Management (IPAM)
  • Manage Bluecoat Web Proxy and content filter.
  • Lead member of the SSL decryption team for the implementation of decryption of SSL traffic using the Blue coat proxy SG.
  • Security configuration on Wireless LAN using protocols PEAP, EAP-FAST.
  • Assigning RADIUS and TACACS+ for new deployments in production environment. AAA for users to implement changes on production devices. Most of these devices are cisco propriety.
  • Generating audit reports by running automated scripts on various devices to check the layer 2 issues like errors on the links, port flapping’s.
  • Analyzing the Audit report and work along with Data center teams to check the optics and troubleshoot issues.
  • Developed/Modified/Enhanced existing and new Perl Packages, Perl frameworks and tools
  • Coordinating along with Global data center teams located Confidential different locations and work along with them for troubleshooting layer 2 issues.
  • Worked on Citrix NetScaler load balancer for load balancing and failover across data center and between web servers.
  • Implementing continuous delivery (CICD) pipeline with Docker, Maven, Ansible, Jenkins, GitHub and AWS AMI's in Linux environment.

Environment: Routers (Nexus 1K, 5K,7K, Juniper MX-960), switches (6500/3750/ /2950 ), F5 Load balancing (LTM, GTM, APM, AFM, ASM), EIGRP, RIPv2, OSPF, BGP, VPN, Unified Contact Center Enterprise (UCCE), MPLS, Cisco Catalyst Switches, Firewalls (Cisco ASA, Palo Alto), Cisco Voice (CCM, UCCE, UCCX), Citrix, Python, Shell and Perl Scripting.

Confidential, Seattle, WA

Network Security Engineer

Responsibilities:

  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration
  • Worked on configuring and troubleshooting of routing protocols such as OSPF and BGP for effective communication.
  • Maintain LAN communication between Servers/Workstations.
  • Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls, Installing and configuring new juniper SRX series firewalls to meet day to day work
  • Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
  • Installed and configured SSH ( Secure Shell) encryption to access securely on Ubuntu and Red hat Linux.
  • Deployed and created the rule set for the Blue coat cloud proxy (Unified Agent) used to secure laptops off of our corporate network.
  • Provide and support to First Data users to stage and request new firewall and Bluecoat proxy requests on Tufin.
  • Also push Firewall rules staged during the day to respective cmas Confidential night. Push includes the checkpoint firewalls and Blue coat Proxy through ssl interception for ICAP, DLP.
  • Provide rotation on call support for firewall and bluecoat proxy proxy issues
  • Configure and implement voice gateways (H323/MGCP/SIP), SRST for remote sites, CUCME and CUE distributed design.
  • Configures Fortinet firewalls (100D and 200C) including Policies, SSL Inspection, IPSEC VPN Tunnel configuration, SSL VPN configuration. Web Proxies, Web Filtering.
  • Performed troubleshooting, fixed and deployed many Python bug fixes of the two main applications that were a main source of data for both customers and internal customer service team
  • Worked on load balancers like F5 10050s, 10250v, GTM 2000s, 2200s to troubleshoot and monitor DNS issues and traffic related to DNS and avoid DDoS
  • Deployment of Palo Alto firewall into the network. Configured and wrote Access-list policies on protocol based services
  • Configured network access servers and routers for AAA security (RADIUS/ TACACS+)
  • Troubleshooting of protocol based policies on Palo Alto firewalls and changing the policies as per the requirement and as per traffic flow.
  • Worked on DNS server involving configuration and resolving DNS related issues
  • Writing rules for NAC servers as per the authentication and authorization of systems within the company.
  • Monitoring the network access points with the help of IBM Q Radar and Cisco prime infrastructure.
  • Implementing and troubleshooting (on-call) IPsec VPNs for various business lines and making sure everything is in place.
  • IPv6 is implemented Confidential a larger scale using cisco ASR 7200 and 9000 series routers delivering flexible service
  • Installing and configuring new cisco equipment including Cisco 1900, 2900, 3900 series routers, Cisco catalyst switches 6807, Nexus 7010, Nexus 5500 and Nexus 2k as per the requirement of the company.
  • Worked on regular troubleshooting of BGP, EIGRP routing protocols
  • Adding and modifying the servers and infrastructure to the existing DMZ environments based on the requirements of various application platforms
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers, switches and firewalls to the DMZs
  • Working closely with Data center management to analyze the data center sites for cabling requirements of various network equipment

Environment: Routers (Cisco 1900, 2900, 3900, ASR 7200, 9000), Switches (Cisco catalyst switches 6807, Nexus 7010, Nexus 5500 and Nexus 2k), Firewalls (Juniper EX, MX, SRX, Cisco ASA, Palo Alto, AAA), F5 Load balancer, Cisco Voice (H323/MGCP/SIP, CUCME, CUE), protocols BGP, EIGRP, OSPF and DNS server and C programming.

Confidential, Chicago, IL

Network Engineer

Responsibilities:

  • Experience with Firewall administration, Rule analysis, Rule modification.
  • Experience on F5 load balancer to maintain balance in the network system with application specific usage.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures
  • Installing and configuring juniper Mx series router along with juniper switches QFX series
  • Configured and resolved various OSPF issues in an OSPF multi area environment mostly on IPv4 and to some extent on IPv6
  • Worked with Cisco Contact Center (UCCE) technologies, including centralized ingress, CVP, VXML, ICM and UCCE/UC integration
  • Managed fast L3 switched/routed LAN/SD WAN infrastructure as a part of Network team.
  • Configured RIPv2, BGP and OSPF routing.
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, OTV, LDP, EIGRP, RIPv2, BGP v4. Configured IP access filter policies
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Deployed 7613 as PE and CE routers. Configured and troubleshoot the edge routers.
  • Excellent troubleshooting knowledge on T1, T3, OC-3 and OC-12
  • Configured egress and ingress queues for ISP facing routers using CBWFQ
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems
  • Experience with implementing and maintaining network monitoring systems (Cisco works and HP open view) and experience with developing complex network design documentation and presentations using VISIO
  • Worked on SONET and deployment of DWDM.
  • Estimated project costs and created documentation for project funding approvals.

Environment: Switches (Juniper M and QFX series), Routers (Cisco 1900, 2900), F5 load balancer, Protocols BGP, OSPF, FRAME-RELAY, MPLS, CIDR, RIPv2, EIGRP, OTV, LDP and Cisco voice (CVP, VXML, ICM UCCE/UC).

Confidential

Network Engineer

Responsibilities:

  • Worked on Cisco routers 7200, 3700, 3800 and Cisco Catalyst switches 4900, 3750’s and 6500.
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure.
  • Configured firewall logging, DMZs, related security policies and monitoring.
  • Creating private VLANs & preventing VLAN hopping attacks and mitigating spoofing with snooping & IP source guard
  • Installed and configured Cisco ASA series firewall and configured remote access IPSEC VPN.
  • Enabled STP enhancements to speed up the network convergence that include Port-fast, Uplink-fast and backbone-fast
  • Responsible for Configuring SITE-TO-SITE VPN on Cisco routers between headquarters and branch locations
  • Implemented the security architecture for highly complex transport and application architectures addressing well known vulnerabilities and using access control lists that would serve as their primary security on their core & failover firewalls
  • Installation & configuration of Cisco VPN concentrator 3060 for VPN tunnel with Cisco VPN hardware & software client.
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems
  • Used various scanning and sniffing tools like Wire-shark
  • Hands on experience working with security issue like applying ACL’s, configuring NAT and VPN
  • Documenting and Log analyzing the Cisco routers/switches/firewalls.

We'd love your feedback!