We provide IT Staff Augmentation Services!

Technical Consulting Engineer Resume

4.00/5 (Submit Your Rating)

Richardson, TX

OBJECTIVE:

Seeking a challenging position as a Senior Network Engineer and System Engineer in a progressive organization where I can imply my technical skills, academic knowledge and experiences in the best possible way.

SUMMARY:

  • Accomplished Network Engineer and System Engineer and Technical Consulting Engineer with over 8+ years of experience in design, installation, configuration, administration, and troubleshooting of LAN/WAN infrastructure using Confidential routers/Switches and also worked like a System engineer in managing Servers like Windows & Linux and Virtualization with VMware ESXi.
  • Extensive work experiences on Confidential Catalyst Switches, Routers, and Data center Nexus devices.
  • Experience on dealing with Confidential Application Centric Infrastructure (ACI) by integration hardware and software products as per network layout
  • Implementation of HSRP, VRRP and GLBP for Default Gateway Redundancy.
  • Hands on experience on UCS manager and UCS products UCSM, UCS - B, C-series, M-series.
  • Experience in a wide variety of major network migrations like MPLS implementation, DMVPN implementation
  • Worked on bare metal operating systems hypervisors like RedHat, SUSE, MSFT, ESXi, Hyper-V.
  • Migrated, configured & installed 100 Confidential Meraki MR42 in a corporate & warehouse environment.
  • Has experience in working on cloud AWS/Azure cloud EC2, S3, RDS, Load Balancer, Auto Scaling with AWS/Azure command line interface and AWS python SDK.
  • Working in Confidential VSM IOT application deals with the security of an infrastructure.
  • Worked on Automation of server activities using Ansible and Shell scripts.
  • Experience in skillful deployment of Layer-2 technologies like VLANS, VTP, STP, RSTP, Inter-VLAN routing, VLAN Trunking, Ether Channels, VLAN access-maps and port security, CEF technologies.
  • Systems integration projects included Routers, Switches, Load balancers, DNS Servers, Firewalls, Virtualized servers, Multimedia, Remote Access, Wireless, Proxy servers, File Servers, Main Frames, multicast networks and much more.
  • Extensive experience working on Palo Alto and Confidential ASA Firewalls.
  • Experience with cloud services such as AWS -potential problems, and how to set up and manage service in the cloud.
  • Experience in deployment and Management of Bluecoat proxies in forward proxy scenario as well as for security in reverse proxy scenario.
  • Experience in troubleshooting network issues including boundary protection devices and Bluecoat Proxy Servers.
  • Have experience on services like VPC, EC2, S3, CloudWatch, CloudFormation and Route53.
  • Experience on FC, FCoE, NFS, iSCSI protocols and Zoning configuration in MDS switches.
  • Experience with working on latest Confidential Data Center switches like Nexus 2000, 5000, 6000 and 7000 series switches while implementing advanced features like VDC, VPC, Fabric path and OTV.
  • Configured and supported MPLS VPNs, MPLS networks and VRF.
  • Profound knowledge in deploying routing protocols like OSPF, BGP, EIGRP, RIP, policy-based routing on Confidential routers like 2600, 2900, 3600, 3945, 7200 and 7600 series, ASR 1000s and ISR configuring and troubleshooting route redistribution among routing processes.
  • Hands on Knowledge/experience on F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs.
  • Worked extensively on Confidential switches in Access, Distribution, and Core layers including but not limited to Confidential Catalyst 2900, 3560, 3750, 3850, 4500s, 6500s in Enterprise environment.
  • Worked on Windows 10 and Windows Server 2012 and 2016.
  • Working expertise in troubleshooting, optimizing and documenting LAN/WAN technologies and T1/T3, Ethernet WAN technologies.
  • Expertise in configuration of SSH, TFTP, FTP, DNS, DHCP, Syslog, NFS, CIFS, SMTP, LDAP
  • Experience in creating containerized applications using Docker and orchestrating using Docker swarm and Kubernetes.
  • Implemented VMware ESX 6.5 server to provide multiple virtual hardware platforms while keeping hardware costs and energy consumption down.
  • Hands-on experience in deploying GRE tunnels, Remote Access VPN and Site-to-Site VPN.
  • Managed inventory of all network hardware, Management and monitoring by use of SSH, Syslog, SNMP, NTP.
  • Worked with monitoring tools such as SolarWinds, NNM, Confidential Prime, troubleshooting tools like Wireshark, ticketing tools like Remedy, Service now and CSOne
  • Documented all the networks worked on, using Visio, Excel, Word and PPTs.

TECHNICAL SKILLS:

Operating Systems: Windows (Server 2003/2008, Vista, Windows 7), Linux OS

Routers: Confidential GSR12016, ASR1001, 2900, 3900, 7200, 7600 & ASR9000

Switches: Confidential 3750, 4507, 4510 & 6500 series switches, Nexus 7010, 5548, Meraki

OSPF, EIGRP, BGP, PBR, IS: IS, Route Filtering, Redistribution, Summarization, Static Routing

Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.

Network security: Cisco (ASA, PIX) 5510, SANS SIFT ACL, IPSEC VPN, GRE VPN

Load Balancer: F5 Networks (Big-IP) LTM Module, Confidential ACE 30 load balancer

LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet.

Leased lines 128k: 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN, Load Balancing. Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management

AAA Architecture: TACACS+, RADIUS, Confidential ACS

Network Management: SNMP, Solar Winds, HP open view, and Wire shark

Reports and Network Diagrams: Microsoft (Visio pro.)

WORK EXPERIENCE:

Confidential, Richardson, TX

Technical Consulting Engineer

Responsibilities:

  • Provided technical support for the Confidential VSM application which is used to secure the infrastructure.
  • Extensive experience on UCS manager and UCS products UCSM, UCS-B, C-series, M-series.
  • Worked with UCS B200 (M2, M3, M4, M5), C 220/240/460/420 , B480M5, Nexus 1000v, 6100, 6200, 6300, 6400 generation fabric interconnects and 5108 chassis.
  • Experience in native FC, FCOE and iSCSI, NFS, CIFS configuration and troubleshooting.
  • Hands on experience with local storage and Hardware/Software RAID configuration on blades and rackmount servers.
  • Working on the PA-VM based firewalls like VM-300 and VM-500, where all the firewalls are deployed in the AWS C5xM size instance.
  • Created Python scripts to automate the process of logging into APIC-EM web application and fabric switches to retrieve information.
  • Developed the automation scripts using Python to validate credentials and configure interfaces and confirm the reachability of the devices.
  • Implement network, mainframe, distributed systems, collaboration, conference, voice and security changes Execute or implement automated and scripted changes or infrastructure requests.
  • Work directly with the Network Core Infrastructure Services (NCIS) Team to coordinate the completion of all automated scripts.
  • Worked on the implementation of Confidential ASA 5500 series firewalls.
  • Experience with migrating from Confidential ASA 8.2 version to Confidential ASA 8.4 Version.
  • Configure network devices F5 load balancing for GTM/LTM traffic monitoring. Add/modify/delete VIPS/WIPS
  • Perform device migrations and work with the migration team to ensure that all manageability checks have been properly performed during device acceptance.
  • Had to work with MPLS to provide end-to-end customer connectivity.
  • Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and Policy routing over Confidential Routers, Switches (Nexus 7Ks, Catalyst 6500).
  • Helped team to automate lab server activity using Ansible and shell scripts. Installed multiple applications using docker.
  • Experience in ESXi and vCenter operations like NIC teaming, DVS, vSwitch, DRS, storage & compute vMotion, VM templates, backup jobs, ESXi patching and upgrade.
  • Configure and troubleshoot Linux bonding and File systems (EXT, XFS, ZFS,LVM), kernel parameters.
  • Experienced in Infrastructure Development and Operations involving AWS Cloud platform like EC2, EBS, S3, VPC, RDS, SES, ELB, Auto scaling, Cloud Front, Cloud Formation, Elastic Cache, Cloud Watch, SNS, AWS Import / Export.
  • Setup and configure Cloud Watch agents to monitor necessary health parameters of an application and AWS services.
  • Used Confidential ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate it by using python scripts.
  • Creating a BGP multi-homed network using BGP attributes like AS-PATH, MED and local-p as per the environment.
  • Troubleshooting MPLS, DMVPN, PFR in enterprise level in Data Centers & Large remote sites
  • Troubleshooting on the issues of the AWS services like connectivity issues and making new implements.
  • Design, implement and maintain all AWS infrastructure and services within a managed service environment.
  • Configured Linux servers to PXE boot and SAN boot. Modified grub files.
  • Knowledge of SAN (ie. EMC VNX, Netapp, etc.) Technologies and strategies.
  • Extensive work experience in installing and troubleshooting server operating systems like RHEL, SUSE, ESXi, Windows.
  • Provided technical support to partners and/or customers for Confidential technologies, products, and/or solutions.
  • Resolving moderately to highly complex technical problems, depending on the customers' need.
  • Design, Deploy and maintain enterprise class security, network and systems management applications within an AWS environment.
  • Perform data migration from on premises environments into AWS.
  • Performed OSPF, BGP routing protocol administration.
  • Simulate technical problems in the lab environment.
  • Have worked with database MySQL to tweak the application.
  • Monitored instances running on EC2 using AWS CloudWatch involving creating alarms and notifying users via SNS.
  • Acted as a technical expert and provides support on a worldwide basis.
  • Set up Route 53 to ensure traffic distribution among different regions of AWS.
  • Worked with different protocols like DHCP, DNS, NTP, LDAP, HTTP, SFTP and others.

Confidential, NY

Network Security Analyst

Responsibilities:

  • Installing, Configuring and troubleshooting Confidential Routers (ASR1002X, 3945, 3845, 2800, 3600) and Switches to perform functions at the Access, Distribution, and Core layers.
  • Experience with manipulating various BGP attributes such as Local P, MED, Extended Communities, Route-Reflector clusters, Route-maps and route policy implementation.
  • Configured the Network Load balancer in the AWS for load balancing the traffic coming from third-party vendors.
  • Implemented Zone Based Firewalls and Security Rules on the Palo Alto Firewall. Exposure to wildfire feature of Palo Alto. Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network. Editing and Changing Palo Alto Polices and Monitoring threats on firewalls.
  • Working on the Palo Alto firewalls of the series VM-300 and VM-500.
  • Worked on Network automation using Python.
  • Confidential ASA/Palo Alto Firewall troubleshooting and policy change requests for new IP segments that either come online or that may have been altered during various planned network changes on the network.
  • Configuring the Network Load balancer in the AWS for the load balancing the traffic coming from the different third-party vendors or business partners around the globe.
  • Provided VPN services to site-to-site and Remote access VPNs using IPsec.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.
  • Performed network administration tasks such as creation and management of VLANS, Port security, Trunking, RPVST+, Inter-VLAN routing, and LAN security.
  • Worked with Palo Alto firewalls PA3020, PA5020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.
  • Worked extensively on Network Traffic SPANS and TAPS for monitoring network traffic, and virtual firewall ACL rules and policies in Counteract NAC Appliances for Network Access Controls.
  • Configuration of Citrix NetScaler and F5 LTM, GTM load-balancers based on project requirements.
  • Strong knowledge on migration of DDoS attacks, IPsec & SSL implementation on Confidential and Palo Alto firewalls.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
  • Configuring rules and maintaining Palo Alto firewalls & analysis of firewall logs using various tools.
  • Selecting appropriate AWS service to design and deploy an application based on given requirements.
  • Configured and managed F5 Big- IP LTM and GTM load balancers to provide reliable distribution of traffic across some servers by creating pools, nodes, and health checks.
  • Automated network implementations and tasks and designed monitoring tools using python scripting.
  • Configured Bluecoat as a forward proxy for all Web URL Filtering.
  • Worked on Bluecoat Proxy SG, SG400 and CAS appliance implementation for client’s internet traffic
  • End to end testing and implementation of Bluecoat proxy, implementing authentication using client s and SSL interception using client sub CA s
  • Migrated complex, multi-tier applications on AWS. Defined and deployed monitoring, metrics and logging systems on AWS. Migrated existing on-premises applications to AWS.
  • Configuring, upgrading and deployment of Nexus 7010, 5596 and 2248.
  • Installation and deployment of new class 9X and class 10 Server farms in multiple silos.
  • Designing and installing new branch network systems. Resolving network issues, running test scripts and preparing network documentation.
  • Experience with Network Automation, Firewall Migration (FTD, FMC) and experience with configuring onsite to cloud connectivity using Azure.
  • Experience on coordinating and monitoring entire organizations Authentication, Authorization and Accounting (AAA) systems.
  • Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and Policy routing over Confidential Routers, Switches (Nexus 7Ks, Catalyst 6500).
  • Responsible for Juniper SRX firewall management and operations across our corporate networks.
  • Worked on network based F5 Load balancers with software module Access Policy Manager (APM) & Checkpoint Load Sharing on checkpoint clusters.
  • Automated network implementations and tasks and designed monitoring tools using python scripting.
  • Providing remote telephone support to Enterprise and Government entities that use HPE products such as Com ware, Pro curve and Aruba wireless switches.
  • Experience on Confidential wireless management systems which includes Confidential 8540 Wireless controller, Confidential 5520 Wireless LAN controller, and virtual wireless controllers.
  • Experience in working with Nexus 7010, 5548, 5020, 2148, 2248 devices.
  • Handling various firewalls like; Confidential ASA/Meraki, Juniper, SonicWALL, FortiGate and Checkpoint.
  • Design, and configuring of OSPF, BGP on Juniper EX2300 Routers and Palo alto Firewall.
  • Involved in migration of network from Confidential catalyst switches/ASA firewalls to Palo Alto.
  • Implementation of HSRP, VRRP and GLBP for Default Gateway Redundancy.
  • Working with Confidential Nexus 2248 Fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.
  • Implemented site to site VPN in Juniper SRX as per customer and various EX, SRX & J series Juniper devices
  • A hands-on role, which involves installation, management, and support of globally developed extremely complex, highly available Palo Alto and Confidential ASA firewall infrastructure.
  • Designed and implemented Cisco/ Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings.
  • Configure, update software, troubleshoot routing issues and maintain various enterprise network devices such as Confidential Nexus 9k's,7k', 6k's, 5k's and 2k's, Confidential Catalyst switches, Dell switches and Fortigate Firewalls.
  • Configured and debugged policy-based routing for special traffic, route filtering with route maps, route redistribution.
  • Ensuring problems are satisfactorily resolved in a timely manner with focus in providing a high level of support for all customers.
  • Tested Confidential routers, Confidential switches, Wi-Fi controllers, Confidential Prime, and port channel migrations, L2TPv3 X-connect.

Confidential, NY

Network Engineer and Systems Engineer

Responsibilities:

  • Migrated Data Center environment from Legacy Catalyst switches to new Nexus devices 7010 - SUP 2, 5548 and 2232 switches. And also implemented VPC, Fabric path and FEXs in that network.
  • Configured Citrix NetScaler Load Balancer to provide local and DR site Load Balancing.
  • Developed Automation Scripts to configure the network appliances and Managed Code Repository by maintain code repository in GIT; and administered practices of branching and code merging.
  • Responsible for all Load Balancing, i.e., F5 LTM/APM ASM/ and other Modules.
  • Deployed pulse secure load balancer on VM ware for Virtual servers and configured round robin distribution across the serves in the pool.
  • Install, upgrade and configure Next-Gen Palo Alto Firewall series PA-200, PA-500.
  • Migrated the policies from Confidential ASA to Palo Alto Firewalls.
  • Deployed Flex pod and vBlock deployments using Confidential Validated Designs.
  • Plan, implement, install, operate and maintain systems hardware, software applications and Information Technology infrastructure.
  • Worked on Source Fire and Palo Alto IPS/IDS Systems.
  • Manage project deployment lifecycle, define requirements, research solutions, design systems, support testing and oversee live implementation.
  • Installed new and upgraded Confidential routers 2811, 2921, 3460, 3925, 7200 and ASR1002.
  • Configure and troubleshoot VLANs, STP, VTP, Trucking, DNS, DHCP EtherChannel, EIGRP, OSPF, BGP, NAT and static routing.
  • Configure, maintain and design network security solutions including Firewalls (CheckPoint and Confidential ASA), IDS/IPS (CheckPoint and SourceFire), VPN, ACLs, Web Proxy, etc.
  • Configured HSRP, VRRP, GLBP for High Availability requirements in the network.
  • Configure, monitor and ensure connectivity of LAN, and WAN sites using SolarWinds and Wireshark.
  • Worked on devices Confidential IOS switches, Nexus(5K), Palo alto firewall (500,3020), Juniper SRX, MX,EX and NetScreen firewalls, ASA firewall, check point firewalls, VPN Pulse secure, F5 load balancer and Net Screen.
  • Worked on Palo Alto firewall migration tool.
  • Troubleshooting of LAN, WAN, WLAN networking issues using Wireshark, TCPdump, NetFlow, Syslog and other advanced tools and methodologies.
  • Daily phone and email troubleshooting of server-based connection issues.
  • Administered DHCP, DNS, HTTP, SSL/TLS, TCP/IP, SSH in Unix/Linux.
  • Implemented Positive Enforcement Model with the help of Palo Alto Networks.
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Worked with network based F5 Load balancers with software module GTM and experience with network based F5 Load balancers with software module Access Policy Manager (APM) & Confidential Load Sharing on Confidential clusters.
  • Installation, configuration and implementation of Apache/Samba, Nginx service on Linux.
  • LVM, Linux Memory Management, Analysis of Memory Usage, Cache & swap management, Analysis on extracted Syslog report check.
  • Experience with VMware ESXi 5.x/6.x; vSphere vCenter Server vCSA, vRealize Operations.
  • Experienced Configuration and implementation experience of VMware HA, FT, Resource pools, vApps, DRS, Affinity Rules, vMotion and Storage vMotion
  • Knowledge and experience in working with storage protocols like FC, FCOE.

Confidential

Network Engineer/Systems Engineer

Responsibilities:

  • Performing standard network operations via ITIL standard with Incident Management and Change Management.
  • Configuring and managing layer-2 technologies like VLANs, STP, VTP & port-security.
  • Providing gateway redundancy using HSRP & creating ACL for layer-3 security.
  • Configuring and troubleshooting layer-3 routing protocols like OSPF, EIGRP & BGP and also QoS.
  • Creating IP-prefix-list, route-map, offset-list and distribution list for performing route manipulations.
  • Configured IPSEC Site-to-Site VPNs to provide secure remote access to vendors and partners using SPA modules on Confidential 6500.
  • Deployed Confidential 6500 series switches with SUP32 & SUP720 and implemented VSS.
  • Performed Network Security Assessment and implemented security features such as network filtering, SSH, AAA, SNMP access lists, VTY access lists and HSRP authentication.
  • Experience in Active Directory, DNS, DHCP, IIS (Web Server), TCP/IP Protocol Stack, Terminal Server and Microsoft Clustering.
  • Experience in iSCSI, SAN, NAS/ NFS storage and RAID concepts.

We'd love your feedback!