Senior Cloud Network Engineer Resume
Wilmington, DE
SUMMARY
- 9+ years of professional experience in Network engineering with Confidential Certified Network Engineer and Palo Alto certified network Security Engineer performing Network analysis, design, Implementing, capacity planning with a focus on performance tuning and support of large Enterprise Networks.
- Strong knowledge in Confidential Routing, Switching and Security with Confidential hardware/software (heavy Confidentialshop) experience.
- Experience working on Confidential Catalyst Series 3750, 4500, 6800, 6500, 9300, 9400, 9500; Confidential 2000, 5000, 6000 and 7000 series switches.
- Extensive work experience with Confidential Routers, Confidential Switches, Load Balancers and Firewalls.
- Experience in layer - 3 Routing and layer-2 Switching. Dealt with Confidential models like 7K, 5K, 2K series, Confidential router models like 7200, 3800, 2800, 2600, 2500, 1800, 4300, 4400, 4500, ASR 1000 series.
- Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP, GLBP for Default Gateway Redundancy
- Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
- Responsible for Palo Alto and Confidential ASA firewall administration across global networks.
- Experience in working with Confidential Switches and Virtual Port Channel configuration.
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the Confidential applications and their availability.
- Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)
- In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
- Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
- Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.
TECHNICAL SKILLS
- Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP
- Networking Hardware: Confidential Switches, Confidential Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls, Wireless Confidential and Aruba.
- Routing Protocols: OSPF, ISIS, EIGRP, RIP, MPLS, IS - IS, BGP, Multicasting
- Security Protocols: ACLs, IPsec Tunnels, VPNs, Port-security, SSH, SSL, IKE, AAA, Zone-Based Firewalls, NAT/PAT, DMZ, Content Filtering, IDS/IPS, URL Filtering, SNMP trap
- Network Monitoring: Solarwinds, Wireshark, HRping, Whatsupgold, Infoblox
- Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Confidential IOS, IOS XR, IOS-XE, NX-OS
- Routers: Confidential 4300, 4400, 4500,2600, 2800,3800,7200, Juniper M & T Series, ASR 1000
- Load Balancers: F5 Networks (BIG-IP), Netscaler (Citrix)
- DNS/DHCP: Infoblox
- Switches: Confidential 2960,3750,3850, CAT 9300, CAT9400, CAT 9500,4500,6500,6800 Confidential 7k,5k,2k
- Web Filtering: Bluecoat (Bluecoat SG 500) and Websense (V10000 g2)
- Simulation Tools: GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence
- Firewalls: FortiGate firewall, Checkpoint Nokia Firewall
- Checkpoint 48001070,12600, G-50, G-72, P-30-00,9070,570 | OS: R77.10, R76 and R70: Fortinet: FortiGate: 1500D and Forti-Manager: 1000D
- Wireless controller: Aruba Controller A6000 and Airwave management version is 8.0.7
- Monitoring and ADCs: Wireshark, Infoblox, SolarWinds TrueView, F-5 BIG-IP LTM, Sevone
PROFESSIONAL EXPERIENCE
Confidential, US, Wilmington, DE
Senior Cloud Network Engineer
Responsibilities:
- F5 LTM appliance with abilities to create VIP, configuration changes, troubleshoot and perform packet captures.
- Maintain and managing a LAN/WAN network, ensure connectivity between all datacenters including Monitor, troubleshoot and document any network issues.
- Blue Coat and IronPort proxy Content management, Citrix NetScaler Load Balancing
- Working with Citrix NetScaler suite of products; load balancing and WAF.
- Confidential Catalyst switches 6500, 3750 & 3550, routing protocol OSPF, EIGRP, BGP with Access Control lists and maintain Brocade VDX 6740 and ICX 7250 switches.
- Working with Network Monitoring and Troubleshooting tools including SolarWinds, SCOM, SNMP, SevOne, ThousandEyes, and Wireshark.
- Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.
- Resolve any network issues by implementing change control and providing support where and when required.
- Extensive troubleshooting on a case-by-case basis with deep understanding of networking/firewall concepts.
- Converting ASA version 8.x to 9.x. address security hardware refresh and migration activities using Python and Ansible scripts.
- Working test tools like Spirent, IXIA traffic load generators for network performance testing and analysis.
- Working with container platform comprising Docker, Kubernetes, or RedHat OpenShift platform.
- Monitored network for optimum traffic distribution and load balancing using Solar winds.
Environment: Switches, Routers, Checkpoint, Load Balancing(F-5), Nexus, Firepower, support of Cloud, MAN, WAN, MPLS, Fortinet, Juniper, TCP/IP, BGP, OSPF, EIGRP, Python Script, Blue-Coat Proxy, Infoblox.
Confidential, Jersey City, NJ
Senior Automation Network Engineer
Responsibilities:
- Implemented with Confidential Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
- Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
- Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment. working with Viptela and/or Velocloud SD-WAN elements vManage, vBond, vSmart, vEdge, and/or vCO.
- Performed virtualization and deployed various VMs using VMware ESXI 6.5
- Used Confidential ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
- Monitoring the network traffic with the help of Qradar and Confidential IPS event viewer.
- Remediation of firewall rules from checkpoint firewalls to Confidential ASA firewalls and their implementation.
- Monitoring the traffic through Confidential Catalyst Switches for Detection of Intrusion using IDSM2 and its Prevention IPS.
- Worked on deploying SD-WAN solution using VIPTELA Router.
- Experience on changing device value on VIPTELA Vedge router 1000 and 2000 series.
- Worked on inside leg and DMZ leg for client traffic and outbound traffic, respectively.
- Setup routing polices and ACLs for SSL VPN traffic on perimeter firewalls.
- Managing and implementation of PORs (port open requests) based on the requirements of various departments and business lines.
Environment: Confidential 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, PPP, VPN, Checkpoint, Confidential ASA, AWS, TCL, Riverbed, Firepower, Clustered SQL server 2014/2012/2008 R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003
Confidential, Montvale, NJ
Network Operations Engineer
Responsibilities:
- Working in high availability Confidential Environment and provide Level 3 Network Support.
- Configuring, upgrading and verifying the NX-OS operation system.
- Converting PIX rules over to the Cisco ASA solution.
- Basic and advance F5 load balancer and Cisco ACE configurations, general troubleshooting of the F5 load balancers .
- Worked on SD-WAN solution. Configured policies, encryption methods for WAN traffic. Worked on L1/l2 issues with customer and Nokia professional services
- Experience with convert Checkpoint VPN rules over to the Confidential ASA solution. Migration with both Checkpoint and Confidential ASA VPN experience
- Worked on juniper pulse config on SRX firewall gateways.
- Worked on application acceleration service on pulse and deploying pusle secure agent on clients machines
- Providing Level 3 support to customers, resolving issues by attending to conference calls.
- Providing Level 3 Engineering and Support to other internal network engineers and contractors.
- Designing and installing new branch network systems. Resolving network issues, running test scripts and preparing network documentation.
Environment: Confidential switches - 2948/3560/4500/3560/3750/3550/3500/ and Confidential routers - 1200/ 3640/ 7200/ 00 /2800 , Confidential 7K/5K, Confidential ASA 500, Confidential ISE, F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, SRP, TCL, SQL Server 2005 Integration services packages.
Confidential, Boston, MA
Network Engineer
Responsibilities:
- Assisted in troubleshooting LAN connectivity and hardware issues in the network of 100 hosts.
- Studied and analyzed client requirements to provide solutions for network design, configuration, administration, and security.
- Worked on juniper pulse setup in DMZ and inside environment for remote SSL VPN setup.
- Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
- Maintained redundancy on Confidential 2600, 2800 and 3600 routers with HSRP.
- Created a backup and recovery policy for software application and verified peripherals are working properly.
- Monitor performance of network and servers to identify potential problems and bottleneck.
- Performed RIP & OSPF routing protocol administration.
- Interacted with support services to reduce the downtime on leased lines.
- Troubleshoot problems on a day to day basis & provide solutions that would fix the problems within their Network.
- Maintenance and Troubleshooting of connectivity problems using Ping, Trace route.
- Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issue Other responsibilities included documentation and support other teams
- Configured OSPF over frame relay networks for NBMA and point to multipoint strategies
- Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
Environment: Catalyst 6500/3750/3550/3500/2950 switches, Confidential 7K, 5K switches, Cisco 7200/3600/ 2800/2900 series routers, TACACS, EIGRP, RIP, OSPF, BGP, VPN, Confidential Prime, ISE, EtherChannel, vPC, Juniper QFabric, Juniper EX series switches, Confidential UCS, F5 load balancers, Palo Alto and Confidential ASA firewalls, Outlook/Office 365
Sr Network EngineerCA
Responsibilities:
- Configuring and troubleshooting multi-customer ISP network environment.
- Involved in network monitoring, alarm notification and acknowledgement.
- Implementing new/changing existing data networks for various projects as per the requirement.
- Troubleshooting complex networks layer 1, 2(frame relay, ATM, Point to Point, ISDN) to layer 3 (routing with MPLS, BGP, EIGRP, OSPF and RIP protocols) technical issues.
- Providing support to networks containing more than 2000 Confidential devices.
- Performing troubleshooting for IOS related bugs by analyzing past history and related notes.
- Carrying out documentation for tracking network issue symptoms and large-scale technical escalations.
- Commissioning and Decommissioning of the MPLS circuits for various field offices.
- Preparing feasibility report for various upgrades and installations.
- Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
- Worked on the security levels with RADIUS, TACACS+.
- Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc.)
- Identify, design and implement flexible, responsive, and secure technology services
- Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
Environment: Juniper firewalls 5GT, 208, SSG 5, SSG 140, 550, NSM, IDS/IPS, Vulnerability Assessment tools like Nessus, Red Hat Enterprise Linux, Solaris, Juniper SSL VPN’s, Juniper EX2200/2300 switches, Catalyst 4500, Confidential 5K core switches.
Confidential
Network Engineer
Responsibilities:
- Provided estimated bandwidth requirements for data replication, to best determine adequate timing for migration service levels
- Assisted in network engineering efforts consistent with the infrastructure of an Internet Service Provider and support of such network services. Helped in designing and implementation of VLAN for the new users.
- Installation and Configuration of various types of Personal Computers and Printers. Installation of different operating systems on Intel based PC's.
- Installed Hard disks, Floppy drives, CD Drives, Sound Blaster cards, CPU, Memory, Power supply unit, Network card, Video graphics card, Hard disk controller card on PC systems.
Environment: Catalyst Switches - 3750, 4500, 4508, 6500, Confidential Routers - 2600, 3600, 7613, Switches - 3750, 4500 and 6500 Routing Protocols (EIGRP, OSPF, RIP), Switching protocols (VTP, STP, GLBP, HSRP)
