We provide IT Staff Augmentation Services!

Network / F5 Engineer Resume

Franklin Lakes, NJ


  • Seeking for an opportunity where I can utilize my experience and skills towards organization objectives which helps me to upscale my professional career.
  • CCNA, CCNP Certified Professional with almost 8 years of experience in Designing, Configuring, Maintaining and troubleshooting complex network systems.
  • Hands on experience working with Router models (Cisco 7600, 3900, 2900 and 2600 series) and Switch models (Cisco 6500, 4500, 3850, 3750, and 2900 series) for configuration & troubleshooting of routing & switching protocols: BGP, OSPF, EIGRP, IS - IS, RIP, MPLS, VRF Routing, VLAN, STP, VTP, HSRP, VRRP, VSS, Ether-Channels, ACL’s.
  • Experience with designing, deploying and troubleshooting LAN, WAN, VPN technologies.
  • Experience in configuring Cisco Meraki Firewalls (MX 64W), Switches (MS 250) & Access Points (MR 74, MR 33).
  • Experience in working with Cisco Wireless Controllers (4400, 5500) and Cisco Aironet Access Points (1500, 1200, 1100 Series)
  • In-depth knowledge of Cisco ASA (5505, 5520, 5550), Fortinet (3800D, 1500D, 800C, 600C, 140D, 90D) and Palo Alto (PA-3020, PA-5550) Next Generation Firewalls.
  • Experience in configuring and implementing Network Security Policies.
  • Experience in configuring Site-to-site IPSec VPN tunnels, client VPN’s.
  • Experience in configuring and implementing security profiles like IDS/IPS, Anti-Virus, Data Leak Prevention(DLP), Web-Filter and SSL/SSH inspection profiles.
  • Ability to detect and prevent network intrusion attacks.
  • Experience in working with Advanced Endpoint Security Software like Carbon Black.
  • Strong experience with TCP/IP concepts, DHCP, DNS & Quality of Services(QoS).
  • Comprehensive knowledge of SNMP, Net Flow and Syslog.
  • Strong ability to review and understand, as well as create and maintain network diagrams within Microsoft Visio.
  • Strong experience in working with network monitoring tools like SolarWinds, WhatsUpGold.
  • Experience with 802.11x wireless technology.
  • Considerable experience in configuring user’s rules and policies for authentication using Bradford Network Access Control(NAC) tools.
  • Experience in analyzing network protocols (Ethernet, TCP/IP) using Wireshark tool.
  • Experience in working with security scanning tools like Nmap.
  • Hands-on experience of Python scripting.
  • Have knowledge of F5 LTM load balancers.
  • Excellent analytical, leadership, communication and organizational skills.
  • Strong attention to detail with ability to work in a team environment.



Switching: VLANs, VTP, STP, Inter VLAN Routing, Ether Channels, CEF, Port Security, VSS, LACP, PAGP

Security: Cisco ASA, Fortinet, Palo Alto, IPSec/SSL VPN, DLP, IDS/IPS, Bradford NAC, LDAP, F5 BIG IP LTM/GTM/ASM

Network Management: Wireshark, SNMP, SolarWinds, WhatsUpGold, Net flow, Syslog, Nmap

Communication Protocols: IP, TCP, UDP, DHCP, DNS, ICMP, SNMP, ARP, PPP, FTP, TFTP

Network Peripherals: Cisco Switches (2900 Series, 3560, 3750, 3850, 4500, 6500), Cisco Routers (2600, 2800, 3640, 3700, 7200 series), Meraki Firewalls (MX 64W), Meraki Switches(MS-25), AP’s (MR 74, MR 33), Cisco Aironet AP’s (1500, 1200, 1100 Series)

Topologies: Ethernet, T1, Wireless, MPLS, Frame Relay, ATM

Operating Systems: Windows, Linux


Confidential, Franklin Lakes, NJ

Network / F5 Engineer


  • Configuring security & network systems such as switches (Cisco 6500, 4500, 3750, 3650, 2900), routers (Cisco 2921,2951), firewalls (Fortigate 3800D, 1500D, 800C, 600C, 140D, 90D, Cisco ASA 5505, 5520, 5550), VPN, antivirus and IDS/IPS software.
  • Designing a firewall and user policy system to protect the components of network and the internal resources from malicious people - hackers or employees.
  • Used F5 LTM load balancers to increase capacity and reliability of applications.
  • Troubleshoot and Performed health checks on F5 LTM/GTM load balancers and monitored the status of the application servers.
  • Migrated applications from cisco ACE/CSM to F5 LTM and GSS configurations to F5 GTM wide-ip's.
  • Worked on automation daily F5 backups using ansible.
  • Designed and deployed F5 LTM and GTM load balancer infrastructure per business needs from the ground up approach.
  • Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers.
  • Securing network by developing network access, monitoring, control and evaluation, maintaining documentation.
  • Finding security gaps by performing routine audits of hardware and software entities on the network and closing the gaps.
  • Generating quarterly security threat intelligence reports and analyzing them of all public facing firewalls using fortianalyzer.
  • Configuring IPSec Site-to-Site VPN tunnels on fortigate firewalls between the commuter stations and the headquarters located in downtown.
  • Creating Network Visio drawings and maintaining SLA reports.
  • Successfully designed, re-engineered, implemented and transitioned from WhatsUpGold to SolarWinds monitoring tool (NPM, NCM, NTA, SAM, UDT)
  • Successfully integrated SolarWinds and Service Now for automatic creation and assigning tickets to respective personnel in case of any network outage.
  • Providing mentorship and to the newly hired Tier-2 support associates.
  • Monitoring Carbon Black end point security dashboard and alerts thereby taking necessary actions in case of any security breach.
  • Working on Network stabilization for all commuter stations. Stabilization includes replacing all out of roadmap switches including core, Re-IP all networks as per standard, Standard configuration on all switches with standard firmware and stabilized the wireless networks.
  • Configuring Cisco Aironet Wireless AP’s (1500, 1200, 1100 series) in bridge mode to extend the network across commuter stations where cabling is difficult over the tracks.
  • Deploying secured wireless Meraki AP’s by configuring corporate and guest SSID’s across commuter sites.
  • Automated network tasks like upgrading switches using python scripting language.
  • Redesigned Internet connectivity infrastructure for meeting bandwidth requirements.
  • Configured VSS on Cisco Layer 3(6500, 4500) Catalyst Switches.
  • Planning, testing and evaluating various equipment’s, systems, IOSs and procedures for use within the Network / security infrastructure.
  • Responsible for simulating network operations with usage of monitoring tools like Wireshark, Solar Winds thereby resolving tickets as per the issue.

Environment: Cisco Switches, Cisco Routers, Cisco ASA Firewalls, F5 LTM, Meraki Switches, Meraki AP’s, Meraki Firewalls, Cisco Aironet Wireless AP’s, Fortigate NGFW, Fortimanager, Fortianalyzer, Carbon Black, SolarWinds, WhatsUpGold, IPSec VPN, OSPF, BGP, SNMP, Net flow, Syslog

Confidential, New York City, NY

Network Engineer


  • Configured Routing protocols such as BGP, EIGRP, OSPF, static routing, policy-based routing and high availability technologies such as VRRP, HSRP and GLBP.
  • Configured STP, VTP, Ether-Channels (PAGP & LACP), VLAN, port security, trunking(802.1q) on Cisco Catalyst switches.
  • Configured STP enhancement features like BPDU Guard, port-fast, uplink fast to speed up the network convergence.
  • Responsible for managing the F5 Load balancer and Checkpoint firewall infrastructure of the client environment with DNS Infoblox.
  • Experience in using REST API calls for basic F5 configuration (Pools, Monitors, Virtual, Profiles).
  • Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers.
  • Deployed BigIQ and DCD’s across multiple datacenter managing 140 enterprise F5 virtual instances.
  • Participated in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long-term planning, implementation, project management and operations support as required.
  • Implemented and provisioned new VPN customers in Cisco IP/MPLS-VPN Network using different routing protocols.
  • Monitored the condition of different components in the network (routers, switches, wireless AP’s etc.) to avoid possible network clash.
  • Configured iBGP and eBGP peering’s between layer 3 switches and core routers.
  • Responsible for Cisco ASA firewall administration, rule analysis and rule modification.
  • Involved in configuration of Access Lists(ACL) on ASA firewall
  • Configured network access servers and routers for AAA security (RADIUS/ TACACS+)
  • Delivered best practice guidance for managing Palo Alto Network firewalls.
  • Implemented zone-based firewalls and security rules on Palo Alto firewalls.
  • Identifying network problems and troubleshooting by analyzing network traffic using packet capturing tools like Wireshark.
  • Performed day-to-day administration of company’s network infrastructure.
  • Established VPN tunnels using IPSec encryption standards and also configured and implemented Site-to-Site VPN and remote VPN.
  • Involved in change documentation process.
  • Configured SNMP, Net Flow and Syslog.

Environment: Cisco Switches, Cisco Routers, Palo Alto (PA-3020, PA-5550), Cisco ASA Firewalls, F5 LTM, SNMP, Net Flow, Syslog, VTP, VLAN, VRRP, HSRP, STP, EIGRP, OSPF, BGP, MPLS, 802.1qJIRA


Network Engineer


  • Worked with Network building and network infrastructure management team.
  • Major contributions included IOS upgrade for switches and routers, troubleshooting of complex LAN/WAN infrastructure, configuring firewall, monitoring traffic using Wireshark.
  • Involved in switching technology administration including creating and managing VLAN’s, port-security, trunking, STP, inter-VLAN routing etc.
  • Active participation on operational support for routing/ switching protocols in complex environments including BGP, OSPF, EIGRP, STP, 802.1q etc.
  • Analyzed and understood the issues related to DNS, DHCP and other IP conflicts.
  • Hands on experience working with security issues like applying ACL’s, configuring NAT and VPN.
  • Planned and implemented IP addressing scheme using sub netting and VLSM.
  • Document preparation of design, security requirements, validation and implementation criteria based on MS Visio and MS Office.
  • Provided LAN/WAN/VLAN support and maintenance.

Environment: Cisco ASA, Cisco Switches 2900/3560/3750/4500/6500, Cisco Routers 3900/3800/2900/4400/7600, LAN, WAN, OSPF, EIGRP, BGP, IP Sub netting, MS Visio, DNS, DHCP, VLSM, VLAN

Hire Now