Systems Engineer Resume Profile
3.00/5 (Submit Your Rating)
CambridgE
Summary: I am a Network/Systems Engineer with 6 years of experience. My goal is to obtain a position in the field of Networking/Systems Engineering in order to further develop my skills and career. I desire a position offering interesting technical challenges, problem solving, and creativity. Areas of interest include network management, testing, analysis, integration, optimization, domain services, virtualization, security and network design.
Qualifications/Skills:
- Platforms: Cisco standard IOS, Cisco NX-OS, Windows Server 2003/2008, Windows XP/Vista/7, MAC 10.x, Windows Operation Console 2007, Brocade standard IOS, familiar with standard Linux and JUNOS Command Line Interfaces
- Applications: Wireshark, VMware ESXi VSphere 5.0, Putty, Windows Active Directory, Network Policy Server, Group Policy Objects, Microsoft Office, SNMPc, Cisco NetManager, WinSCP, IXIA Automate, Junos Pulse, Junos SPACE, Palo Alto Security Monitoring, Infoblox Grid Manager, Blue Coat Web Proxy.
- Networking Skills: TCP/IP, 802.1Q Vlans, SNMP, DHCP, DNS, TFTP, LACP, SCP, SSH, NTP, ACL's, 802.1x, RADIUS AAA, LDAP, MACsec, PKI, VPN, SSL.
- Able to troubleshoot networking issues as they arise, communicate ideas, learn new concepts quickly, manage tasks and deadlines independently.
Confidential
Systems Engineer
- Warfighter Information Network-Tactical Increment 2 WIN-T INC 2
- Worked as a systems engineer responsible for integration, testing, and configuration of this Mobile ADHOC network. This network included Cisco and Juniper routers and Ethernet switches, as well as Firewalls and IPS modules.
- Configured and built Windows Active Directory Domain Controllers which provided the Network with certain Network Services which included: DNS, LDAP Authentication, DHCP, RADIUS AAA, 802.1x port security, and secure CAC card logons.
- Designed the RADIUS Authentication, Authorization, and Accounting structure for the entire network. Configured and tested both the networking equipment as the RADIUS Client and the Domain Controllers as the RADIUS Authentication Server.
- Wrote and performed both component and system level test procedures often with a Government witness.
- Supported numerous milestone test events taking on both Networking and Domain Services duties. These test event location included: Fort Hood TX, Fort Bliss TX, Fort Huachuca AZ, Aberdeen Proving Grounds MD, Fort Campbell KY, Fort Drum NY, and Fort Polk LA.
- At different test events including WIN-T INC 2 Interoperability Test Evaluation IOT E worked closely with the customer interfacing the Army's classified Domain with the WIN-T Domain Controller Architecture.
- Built and integrated WIN-T Domain Controllers with the Army's classified Domain at different bases prior to the network being deployed in Afghanistan.
- Worked with other systems engineers to solve known networking issues and then integrate the configuration solutions into the deliverable baseline configurations.
- Developed requirements to present to vendors in order to select networking equipment to replace current End of Life equipment.
- Lead interview process of hiring entry level engineers.
- Confidential Network Analyst
- Responsible for the analysis, monitoring, and troubleshooting required to ensure the reliable operation and peak performance of Boston Children's Hospital wide area and local area networks.
- Performed live system upgrades during scheduled hospital maintenance windows. Upgrades included Cisco routers, Juniper SRX 3400 Firewall 10 Gig modules, and Junos MAG 4610 SSL/VPN Gateways.
- Ensured network redundancy during any new installation or upgrade.
- Resolve customer problem tickets as they arise
- Monitored perimeter network for potential threats specifically DoS attacks. Once threats were identified they were added to the firewall policy.
- Migrated existing VMware ESX hosts from VSphere standard virtual switch to a Cisco 1000V distributed switch platform in order to improve network management.
- Deployed new production VMware ESX hosts on Cisco Nexus platforms.
Vendor Product Familiarity:
- Cisco: Catalyst Switches 2900, 3500, 3750, 6500, Routers 2800, 3800, 5940 Ruggedized router for military applications , ASA Firewalls, Nexus 5K, 7K, 1010 Virtual Services Appliance, 1000V Virtual Services Module.
- Juniper: J-Series Routers, SRX Firewalls, MAG 4000 Series SSL/VPN Gateways, and LN 1000 Ruggedized router for military applications
- Other: GE CP923RC embedded switch, KVM over IP products, MRV terminal servers, General Dynamics TACLANE KG-175D, Dell PowerEdge servers, Secure Key Loader SKL