We provide IT Staff Augmentation Services!

Wireless Network Engineer Resume

2.00/5 (Submit Your Rating)

OBJECTIVE:

  • Seeks full time staff Network / Wireless Engineering position with an aggressive company that invests in its employees and offers professional growth and development opportunities

SUMMARY

  • Over seventeen years of experience with computer networks on LAN/WAN, security, and wireless.
  • Experience in Cisco WAN, WLAN and LAN technologies, including various router (8xx, 17xx, 18xx, 25xx, 26xx, 28xx, 36xx, 45XX, 7) and switching (29xx, 35xx, 37xx, 65xx, Nexus 5000 & 7200 ).
  • Experience with Cisco Wireless technologies including Primes Infrastructure, Meraki Cloud 802.11AC System and Aerohives system.
  • Experience with network monitoring, management, and packet analysis tools to monitor and troubleshoot network/application performance and connectivity problems (SolarWinds, Cisco Prime, Cisco ACS, Wireshark, Air Magnet).
  • Knowledge and experience with deploying CISCO wireless Access Points (primarily 1262/3500/3600/3700 - series) and selection of antenna types.
  • Firewall auditing, gathering technical IOS to implement Cisco devices such as Cisco Pix & ASA 5510, 5520 and 5540 with IDS/IPS Systems, VPNs, ACS and RSA.
  • Experience in Network security appliances ISE1.4 and AnyConnect 4.1 with 802.1x policy and PKI Smart Card single access.
  • Hands on extensive experience with Symantec and monitoring system Websense, Infoblox.
  • Experience managing Windows 2000, 2003 and 2008R2, Active Directory services, DNS, DHCP.
  • Knowledge how to configure protocols: OSPF, EIGRP, RIPv2; STP; SVI; HSRP, VRRP; GLBP.

PROFESSIONAL EXPERIENCE

Confidential

Wireless Network Engineer

Responsibilities:

  • Working on various Wireless complex incidents at several hundred sites.
  • Install and configure the Meraki access points and device for the Cloud system.
  • Implement and configure Cisco Catalyst 3560 and 6500 series switches
  • Deploy cisco wireless Access Points (primarily 1262/3500/3600/3700- series) Use the AWS Management Console as remote access and manage the enterprise’s resources.
  • Use Primes Infrastructure (2.x or 3.x) tools to monitor and troubleshoot the controllers and the access points.
  • Using AWS as remote access for remote location through Ping ID access.
  • Use Cisco Identity Services Engine ISE ACL to the controllers for security policy to monitor the end Users access to the network.
  • Configure Cisco Identity Services Engine (ISE) and Cisco Secure Access Control System (ACS)
  • Respond to the incident routing and switching configuration problems, wireless coverage/performance issues.
  • Use Amazon Workspace and Ping ID to access every Confidential & Confidential site worldwide.
  • Utilize ITIL incident management tools such as HP ServiceNow and Remedy to track and resolve support requests.
  • Manage and contribute to wireless support knowledge database. Document lessons learned and known support issues.
  • Participate in root cause analysis studies. Work with third party vendors including network carrier and cabling vendors to remediate wireless outages. Take part in weekly meetings to review issues and project status.

Confidential

Network & Data Security

Responsibilities:

  • Cisco ISE (Identity Service Engine) solution enforces network access policies to endpoints. Here are the major features that ISE solution supports:
  • Microsoft AD Integrated Authentication Security for Wired, Wireless and VPN Access to the network.
  • Dynamic Endpoint Profiling and Access Privilege Assignment to IP Phones, Wireless Access Points, Multi-Media Equipment, and other Office appliances connected in the network.
  • The mechanism that ISE enforces network access in general is to assign access privileges, in form of DACL (downloadable ACL), VLAN assignments and/or other RADIUS attributes, to network connection attempts based on the results of identity verification, such as interactive user authentication, endpoint type and hardware addresses.
  • Setup a Backup server for ISE and setup a weekly system report with ArcSight team, supporting industry standard security interfaces and systems, PKI Smart Card ensures easy integration with your organization's current infrastructure and security strategy
  • Special training in Palo Alto Networks next-generation firewalls how to safely enable applications to secure the enterprise. Using the Panorama as centralized control of the firewalls and appliances.
  • Cisco Catalyst 3560 and 6500 Series Switches
  • Cisco WLC 5508 and 5520 Series Wireless LAN Controllers.
  • Posture Assessment for Windows and Mac OSX workstations using AnyConnect Secure Mobility Client.
  • Hardware Upgrade of existing ISE- 3315/3355/3395 to the latest SNS-3495 Series Appliances for higher performance to support the higher demands of Posture Assessment.
  • Software Upgrade of existing ISE version 1.2 to the latest ISE version 1.4 for Posture Assessment using AnyConnect and other feature enhancements.
  • Cisco ASA 5545-X Series VPN Appliances on four different locations (3 Penn, Wall, Trenton and Mt laurel).

Confidential

Cisco Security Wireless Analyst

Responsibilities:

  • Network Cisco Security Wireless Analyst on Cisco Wireless Control System (WCS) with 10 controllers and WiSM2, Cisco Clean Access, Infoblox to control the DHCP, DNS for the wireless SSID, WhatsUpGold and KIWI syslog server.
  • Experience with network monitoring, management and packet analysis tools to monitor and troubleshoot network/application performance and connectivity problems (SolarWinds, Cisco Prime, Cisco ACS, Wireshark, AirMagnet)
  • Evaluated the existing Wireless networks for upgrade and new installations of 1500 Cisco AP’s.
  • Designed and implemented of wireless system diagrams using Visio for new locations.

Confidential

Network Security Support

Responsibilities:

  • Member of the network engineering and telecommunication teams. Responsible for installing and configuring (ISS) circuits for multiple sites.
  • Supported and interfaced with IPS providers such as (Verizon, Comcast, and Cablevision & Centurylink).
  • Provided recommendations for 73 network sites, prepared proposals on the procurement of CISCO equipment for the Network design team.
  • Updated the Network documentation using SharePoint and designed the site Visio.
  • Installed and configured TLS, EVPL, EPL with EIGRP protocol on Cisco router 800, 880, 2950, 2960 series and switches 1920, 3750 series).
  • Connected the site through ACS to the GRE tunnel for remote access.
  • Collaborated with Verizon and Hudson fiber CIE cutover and improvement of the old sites.
  • Communicated directly with management on a regular basis and participated in weekly executive meetings to provide status updates.

We'd love your feedback!