We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

3.00/5 (Submit Your Rating)

Cupertino, CA

SUMMARY:

  • Network & Security Professional with 8+ years of experience in Designing and troubleshooting LAN, WAN, MPLS in Branch, Campus and Data Center environments and experience in Network Planning, Implementing, Configuring and Testing of networking system on both Confidential and Juniper Networks.
  • Strong hands on experience in installing, configuring, and troubleshooting of Confidential ASR 1k, ASR 9k, 7600, 7200, 3800, 3900, 3600, 2800, 2600, 2500 series Routers and Nexus 9K,7k, 5k & 2k, Confidential Catalyst 6500, 4500, 3750, 2950 and Juniper QFX 3500, EX 4200/4500 series switches.
  • Experience in installing and troubleshooting of WAN technologies like T1/T3, DS3, STM1, OC3, Gigabit and STM4 circuit types.
  • Enterprise Routing experience using protocols RIP v1 & 2, EIGRP, OSPF, BGP and MPLS VPNS.
  • Worked extensively on Configuring, Monitoring and Troubleshooting of Juniper SRX 550 and SRX 650 firewalls, Confidential 's ASA 5500/PIX security appliances, Checkpoint's 2200 and 4000 appliances, Confidential Firewalls, DMZ zoning & configuring VLANs/Routing/NATing with the firewalls as per the design.
  • Worked on various network topologies and configurations, TCP/IP, UDP, Frame Relay, Token ring, ATM, bridges, routers, and Switches.
  • Configuration and management of LAN switches with VLANs, Trunks, Spanning Tree Protocol, and Port Spanning etc.
  • Experience in implementing site - to-site and remote access VPN Technologies using GRE, IPSEC & MPLS.
  • Configured Security policies including NAT, PAT, VPN, Route-maps, Prefix Lists and Access Control Lists.
  • Well experienced in configuring gateway redundancy protocols like HSRP, VRRP and GLBP
  • Implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, and Route Maps.
  • Working with Confidential / ASA/Fortinet Firewall Administration, Rule Analysis, Rule Modification. URl filtering, SSL decrytption, SSL forward proxy etc on PA firewalls.
  • Good knowledge in configuration of Voice VLAN's (VOIP), prioritizing the voice traffic over the data traffic.
  • Provided technical leadership for problem escalation and resolution.
  • Experience on Confidential unified call manger.
  • Highly motivated with the ability to work independently or as an integral part of a team.
  • Experience with change management process and project documentation tools like Excel Configuration scripts and VISIO.
  • Experience in physical cabling, IP addressing and sub-netting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Access control server configuration for RADIUS & TACAS+.
  • Experience with 802.11x wireless technology.
  • Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows Linux platforms in Development, Lab & Production Environments.
  • Good knowledge of Confidential NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including Confidential NEXUS Fabric Extender (223, 2248).
  • Sound knowledge of virtual firewalls like ASA/PIX, checkpoint VSX, IDS, IPS as well as encryption techniques.

TECHNICAL SKILLS:

Networking: OSI, TCP/IP, Confidential IOS, IOS-XR, LAN/WAN interconnection, Frame-Relay, ISDN, RIP, OSPF, EIGRP, IS-IS, BGP, MPLS, STP, RSTP, MST, VTP, NAT, ACLs, VPN, IP-Sec

Hardware Routers: Confidential (1800/2600/3600/3800/7200/7600 series), Confidential ASR 9Ks)

Switches: Confidential (2900/3500/3700/5500/6500 Series, Nexus 7k)

Firewalls: Confidential ASA (5510,5540), Checkpoint R65, R70, R75, R77 Gaia, Juniper SSG, SRX, Confidential

Other Tools: Tufin Secure Track, Forescout Counter ACT, F5 Big IP (LTM/GTM/ASM), DNS, Bluecoat Proxy, Solar Wind,Wireshark, BMC Remedy, Citrix Netscalar, Confidential Prime, VM Ware

Operating Systems: Win 95/98, NT, XP,VISTA, LINUX, UNIX

PROFESSIONAL EXPERIENCE:

Confidential, Cupertino, CA

Sr. Network Security Engineer

Responsibilities:

  • Supported network and data center operations that designing the network architecture & maintaining it.
  • Handling the escalations during the outage and works with various technology team to overcome the outage.
  • As a Network Engineer, I use to design network architecture during the new Data Center implementation and coordinating with lab technicians to build the stable and efficient network.
  • Perform risk analysis of our servers that are updated & installed with latest patch and engaging the team to implement the same.
  • Experience with design and implementation of Virtual Switching System VSS for both User segment and server segment using 6509-V-E catalyst switches.
  • Deployment of lab setup, configuration of switches Avaya Cajun & ERS Switch, Extreme Switch, Confidential 3750 Switch, Confidential Router, HP Switch.
  • Configuration, Monitoring and Troubleshooting Confidential 's PIX firewall, ASA 5500.
  • VPN IPSEC and GRE migrations and new designs for the clients.
  • Configuration and Troubleshooting of the Network Routing protocols BGP and EIGRP during the Migrations and new client connections.
  • Involved in the configuration troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, BGP v4.
  • Supported on Confidential Nexus 5000 and Nexus 7000 Series Switch fabric links.
  • Experience with Checkpoint Firewall policy provisioning.
  • Check Point and Confidential ASA firewall administration.
  • Maintained high availability of resources with F5 BIG-IP load balancer based on different load balancing.
  • Physically assembled Firewalls, IDS/IPS, and Nexus 7ks and assisted in Rack -n-stack within the Data Center.
  • Configured network access servers for AAA Security Using Juniper IC Infranet Controllers MAG-SM360, MAG-4610.
  • Data Center Design Experience, installation and Configuration Network Devices in a Data Center Environment including patching the cables in the Patch Panel.
  • Experience with devices Confidential Network firewalls such as security NAT, Threat prevention URL filtering.
  • Experience in routers and switches in various network configurations supported VLANs, Qos, VoIP, and advanced access-lists.
  • Configured Confidential iOS ACL and Firewall rules to restrict and allow access to data resources.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Involved in configuring VDC, VPC and FCOE, upgrading NX-OS for Nexus Family Switches.
  • Worked on Port Groups on M series Module and F Series Module for Nexus 7000.
  • Involving into routing and switching related troubleshooting in case of any failure.
  • In switching, use to implement VLAN, VxLAN, VRR, STP, VTP, HSRP, Port Channel and ACLs in order to prevent our office network more secure.
  • Assisted in LAN Design & support, Office & Data Center configuration for WAN and LAN interface network, Extreme Switches
  • Taking weekly and monthly backup of various Network Devices that will help us to make the network up in case of any device failure which will help our organization to provide service to our Clients with minimal interruption.
  • Hardened Extreme and 24e's switches by complying with the DISA STIGS recommendations, configured VLANs and port authentication on the Extreme switches using 802.1x

Confidential, Cary NC

Sr. Network Security Engineer

Responsibilities:

  • Involved in configuring and implementing of Composite Network models consists of Confidential 7600, 7200, 3800 series routers and Confidential 2950, 3500, 5000, 6500 Series switches.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Actively involved in software upgrades for Juniper routers, Confidential routers, Net Screen firewalls and extreme switches and expert in working with Computer Aided Dispatch (CAD).
  • Design expertise for the SD-WAN (Versa & Viptela), SD-LAN and WAN optimization technologies for efficient delivery of the application data across LAN and WAN.
  • Replace branch hardware with new 3900 routers and 2960 switches.
  • Configuring firewall switch module on Confidential 6506 distribution layer switches, configuring VTPs, trunking, inter-vlan routing, port fast, uplink fast, backbone fast on access layer switches.
  • Enable STP attack mitigation (BPDU Guard, Root Guard), Using MD% authentication for VTP
  • Planned and installed Frame Relay WAN links to the branch offices.
  • Maintained and setup wireless access points at various locations in the company.
  • Installed new Fortinet firewalls to increase security and network control setup IPS, and Application control, as well as logging for compliance
  • Great understanding of WLAN including 802.11 standards, Lightweight and Autonomous systems, WPA, PEAP.
  • Assisted in MPLS migrations, implemented a backup for the existing WAN connection using site-to-site IP sec VPN tunnels.
  • Knowledgeable in configuration of Voice VLAN’s (VOIP), prioritizing the voice traffic over the data traffic, Telecom, using Dark fiber created fast speed line between two campus, Wireless networks.
  • Worked on Amazon AWS with 3 other people as a team. Security frameworks were developed to protect and provide compliance for virtual systems, cloud computing and mobile applications solutions.
  • Worked on Network Traffic sizing of cloud to network through security firewalls.
  • Configured and deployed the NGFW Firewall Features in Fortinet, like App control, Web Filter, FSSO, Proxy, and DNS, IPS/IDS.
  • Configuring Viptela devices and creating device and feature templates on vManage required for SD-WAN implementation.
  • Implement the firewall rules using Netscreen manager (NSM).
  • Monitoring the network traffic with the help of Qradar and Confidential IPS event viewer.
  • Remediation of firewall rules from checkpoint firewalls to Confidential ASA firewalls and their implementation.
  • Helped in troubleshooting in DDoS.
  • Configuring and troubleshooting OSPF routing protocol on the corporate network.
  • Tested and implemented various BGP attributes such as Local P, MED, AS-PATH, Community, Extended community using route-maps.
  • Configured L2 path connections to ISP core with Extreme, Alpine and Extreme switches.
  • Configured Site-Site VPN on Confidential Firewall on one side and Fortinet on the other side.
  • Configuring, maintaining and troubleshooting with Fortinet firewall and security.
  • Perform Installation of Fortinet Firewall's on Customer Premise
  • Develop and maintain core competency on Fortinet's product line and technologies
  • Worked on migration of Frame Relay based branches to MPLS based VPN for customer’s WAN infrastructure.
  • Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0, also configured on BIG IP (F5) Load balancers and monitored the Packet Flow in the load balancers.
  • Have good experience working with the Trouble Tickets on F5 Load Balancers.
  • Switch experience includes Confidential Catalyst switches: Confidential 3750, 4500, 6500 series switches.
  • Managing enterprise BGP setup by configuring and troubleshooting BGP related issues.
  • Scaling of BGP and IGRP in the core, dealt with implementation of deployment related to Confidential devices and applying security policies on it.
  • Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
  • Administered Extreme switches, Mitel VoIP and VMWare between 27 sites in a managed MPLS.
  • Maintain effective communications with vendors, peers and clients in resolution of trouble-tickets, equipment RMAs, and support requests.
  • Managed data back-ups, scheduled data back-up, and preparation for disaster recovery files.
  • Planning for upgrade of IOS on devices and performing the upgrade.
  • Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IP Networking.

Confidential, Dayton, OH

Sr. Network Security Engineer

Responsibilities:

  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP
  • Substantial lab testing & validation prior to implementation of Nexus 7K, 5K & 2K connecting to blade servers
  • Managed I-WAN SD-WAN and added rules for high priority traffic based on the QOS parameters.
  • Secured network access with Confidential Secure (RADIUS/ TACACS+)
  • Configured network access servers for AAA Security
  • Performed basic security audit of perimeter routers, identifying missing ACL's, writing and applying ACL's
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
  • Managed the security infrastructure of the service provider which includes Fortinet Firewalls, Confidential ASA’s, Juniper SRX, and PaloAlto.
  • Installed Fortinet appliances for security and compliance
  • Implement and configured GLBP (on core switching and also for VPN redundancy), HSRP on different location of office on the switched network and managing the entire multilayer switched network
  • Used Kiwi-Cat tools to manage configurations from desktop for network devices, including routers, switches and firewalls. Generate network device configuration reports, such as port, MAC, APR and version details
  • Enabled continuous Layer 2 monitoring with Solar Winds, so that each site can run independently until connectivity is restored.
  • Configured WAN connections with Meraki and FortiGate SD-WAN.
  • Responsible for managing activities, Upgrading IOS - Upgrading hardware and installing new devices, Tuning (Configuration), make standardization for the topology
  • Installation & configuration of Microsoft Proxy Server 2.0
  • Configured, installed, & managed DHCP, DNS, & WINS servers
  • Carried out performance monitoring & documentation of relevant network segments to ensure data integrity & environmental safety
  • Provide front end on-call network support 24x7x365 for all network infrastructures in the co-operation.
  • Experience in migrationof Frame-relay based branches to MPLS based technology using multi layer stackable switch like 6500 series and 2800 series router
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
  • Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.
  • Involved with security team on Confidential ASA, Fortinet firewall configurations.
  • Worked on and support with walk-thru on Confidential ASA to Fortinet firewall migration.
  • Experience with backup, support and policy administration support between various Fortinet firewall zones
  • Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Confidential IOS
  • Installation, Configuration and troubleshooting Confidential switches and Firewall on multi mode context based environments
  • Installation and Configuration of Confidential Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
  • Installed and configured the Confidential routers 2800 in two different customer locations. It includes coordinating with Verizon and AT & T in order to bring the serial interface up for T3 link. Also, configuration includes frame relay, BGP and VPN tunnel on GRE
  • VLAN Configurations, troubleshooting and Firewall ACLs and Object-Groups configuration and support
  • Configured IPSec site-to-site VPN connection between Confidential VPN 3000 Concentrator and Confidential 3800 Router/ Microsoft VPN Server in order to access certain limited network resources from customer locations
  • Installed and configured four PIX 525 and two ASA 5505 in customer locations. In addition to that, two PIX firewall configured for the Guest access
  • Managing a TACACS server for VPN user authentication and network devices authentication
  • Handled Corporate and Review Audits from the perspective of IT Security for Network Devices and Servers under our control
  • This includes Artifacts for regular Health Checks, IP and System Integrity, Change management, Problem management, Logical Access Controls, Network Connectivity.
  • Created engineering configuration, Security Standards, documenting processes and Network documentation using Microsoft Visio
  • Managing health check of Network devices this is involves upgrading IOS on every quarter after checking the vulnerability of IOS and reviewing the configuration
  • Installation, Configuration and Administration of ADS,DNS,DHCP and Web proxy(ISA)server
  • Upgrade Confidential Routers, Switches and Firewall (PIX) IOS using TFTP.
  • Circuit configurations/troubleshooting including SD-WAN, DMVPN, Site-to-Site VPN, point-to-point Serial, MPLS, DWDM, Microsoft Azure hands on experience with using SDN APIs to automate network
  • Manage Confidential Routers and troubleshoot layer1, layer2 and layer3 technologies for customer escalations
  • Taking Regular backups & testing the backups by restoring in test lab frequently
  • Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security Settings of the networking devices ( Confidential Router, switches) co-coordinating with the system/Network administrator during any major changes and implementation
  • Responsible for the installation, configuration, maintenance and troubleshooting of the company network. Duties included monitoring network performance using various network tools to ensure the availability, integrity and confidentiality of application and equipment
  • Installation & configuration of Confidential VPN concentrator 3060for VPN tunnel with Confidential VPN hardware & software client and PIX firewall
  • Configured Firewall logging, DMZs & related security policies & monitoring
  • Creating Private VLANs & preventing VLAN hopping attacks & mitigating spoofing with snooping & IP source guard
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems
  • Implementation of name resolution using WINS & DNS in TCP/IP environment
  • Configured FTP server for inside/outside users & vendors
  • Implemented the security architecture for highly complex transport and application architectures addressing well known vulnerabilities and using access control lists that would serve as their primary security on their core & failover firewalls
  • Used various scanning and sniffing tools like Wire-shark
  • Enabled STP Enhancements to speed up the network convergence that include Port-fast, Uplink-fast and Backbone-fast

Confidential, San Francisco,CA

Network Security Engineer

Responsibilities:

  • Participating in multiple projects such as data center build, DMVNP for 500+ branches, ASA to PaloAlto firewall migration
  • Designed and Deployed Confidential /Meraki Enterprise Cloud for Corporate HQ, Co-Locations and 500+ branches with distinct SSIDs.
  • Deploy SD-WAN controllers - with vManage, vSmart controllers, and the vBond.
  • Designed and implement Confidential /Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings
  • Confidential code upgrade for IOS/NXOS platform for all core data centers included Catalyst 3750,3850,4500,2960X and NEXUS 2K,3K,5K,9K and Routers ASR-1K, 2900 Series, 4300 Series
  • Running migration cutovers of MPLS-VPN and DMVPN for newly acquired offices, including travelling to country-wide offices
  • MPLS ISP provider. SD-WAN controllers were deployed using Confidential ’s cloud-managed service and reachable via Internet transport.
  • Migrate and provisioned existing MPLS circuits for newly accusation’s branches and corporate office to dedicated High-Speed WAN circuits from Verizon, Confidential and with all other local service providers
  • Design and Built the new Data Center in Flint, MI with multi-homing strategies and new accusation’s corporate offices prior to full cutover to John Deere’s corporate network
  • Securing the core infrastructure by migrating the access level from Local to RADIUS+NPS authentications
  • Securing all 500+ branches and corporate offices from Brute-Force attack by locking down the remote access
  • Migrating Confidential ASA firewall AnyConnect with secured VPN Users Group, including deployment of Two-Factor Authentication (LDAP+Soft Token) for VPN Clients
  • Provisioning PaloAlto based DMZ and L2L VPN between Corporate HQ and Co-Locations, partners and 3rd party cloud hosting services
  • Managing and troubleshooting LAN, WAN, Internet, VPN, Wireless; including switching, routing, applications, vendor and ISP coordination
  • Confidential ASA and PaloAlto migration and administration with access rules and security management
  • Zoning and provisioning for storage traffic on Confidential Nexus 5K, UCS based on EMC/PureStorage
  • Citrix NetScaler deployment with SDX and VPX instances for the Data Center to load balance the traffic between INSIDE and DMZ networks
  • Monitoring and administering network with PRTG Enterprise, Solarwind (Orion/NCM)
  • Managing and Troubleshooting Confidential Enterprise UC phone system, Jabber
  • Involved in complete LAN, WAN development, Datacenter including IP address planning, designing, installation, configuration, testing, maintenance etc.
  • Experience with Using OSPF/EIGRP as interior routing protocol and BGP as external protocol
  • Experience with working with different attributes like communities, local p, MED, Weight, AS-PATH in BGP for route influence and traffic seggregation
  • Experience with design and implementation of Virtual Switching System VSS for both User segment and server segment using 6509-V-E catalyst switches
  • Experience with migration Hybrid based Confidential CatOS and Native Confidential IOS on 6500 catalyst switches.
  • Configuring VPC, VDC Virtual Device Context in Nexus 7010, Nexus 5020
  • Configuring, upgrading and verifying the NX-OS operation system.
  • Experience with ISSU in-service-software-upgrade on Nexus OS with Nexus 5548 devices
  • Involved in Switching Technology Administration including creating and managing VLANS's, Port security, Trucking, STP, Inter Vlan routing, LAN security etc.
  • Migration of MPLS environment to Confidential Meraki based on SD-WAN IPSEC VPN solution
  • Experience with configuring Nexus 2000 Fabric Extender FEX which acts as a remote line card module for the Nexus 5020
  • Experience working with OTV FCOE on the nexus between the datacenters
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Involved in iRule management like loading rules, writing iRule syntax using TCL language
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Configuring IPSEC VPN on SRX series firewalls
  • Configuring Virtual Chassis for Juniper switches EX-4200,Firewalls SRX-210
  • Configuration and troubleshooting on HSRP, VRRP, GLBP, RSTP, MST related issues coming in network environment
  • Troubleshooting and installing of CRS, ISR, GSR, ASR9000 and Nexus devices.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Confidential 's ASA 5500/PIX security appliance, Failover DMZ zoning configuring VLANs/routing/NATing with the firewalls as per the design.
  • Worked on Extensively on Confidential Firewalls, Confidential PIX 506E/515E/525/ ASA /5540 Series.

Confidential, Johnston, RI

Network Engineer

Responsibilities:

  • Responsible for Confidential ASA firewall administration across our global networks
  • Support customer with the configuration and maintenance of PIX and ASA firewall systems
  • Implemented Confidential Secure ACS Server 4.0 for authenticating Users and devices in Network.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification
  • Used PIX Firewall and ACLs for authentication of EIGRP, BGP and to ensure high security on the network.
  • Configured Confidential 7200 routers which were also connected to Confidential PIX 535 security appliances providing perimeter based firewall security.
  • Configured Protocol Handling, Object Grouping and NAT on ASA Firewalls 5505 .
  • Used load balancers ACE and load balancing technique with multiple components for efficient performance and to increase reliability through redundancy.
  • Involved in migration from Frame-Relay/ATM network to MPLS-based VPN for customer's WAN infrastructure.
  • Troubleshoot latency and throughput issues on MPLS and Dedicated Internet Access circuits.
  • Works on application delivery network for blue coat SG works on network security like VPN, Firewall, IPSec, and Antivirus. Also works for Data loss prevention and Application control.
  • Moving all the Partner IPSEC VPN connections to the new data center and also We had to estimate the bandwidth for the data center and installing the gigabit MPLS circuits
  • Experience with building the New MPLS cloud inside the new data center environment.
  • Experience with design and implementation of Virtual Switching System VSS for both User segment and server segment using 6509-V-E catalyst switches
  • Enabled TACACS on Confidential devices for authentication, authorization and accounting AAA .
  • Implemented EAP Extensible Authentication Protocol for Wireless Networks.
  • Implemented with Confidential Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Configured, troubleshoot and maintained Confidential Switches 1900 through 8000 Series including Nexus switches.
  • Used Confidential routers, switches, Access Points, Concentrators for implementation and management purpose.
  • Experience working with Confidential Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture
  • Experience configuring Virtual Device Context in Nexus 7010
  • Implementing 3750 Rack/Stack switches using Confidential Stack Wise technology
  • Experience with design and implementation of Data center migration
  • Data center migration was involved in Access, Distribution and Core layers.
  • Worked on Confidential 5500 wireless controller.
  • Involved in configuring IP Quality of service QoS
  • Involved in designing and implementing QOS and policy map to 2800 series routers for all the branches
  • Experience Branch Relocation: Connect workstation, servers, etc. Rack and stack Pre-configured new hardware and connect the circuits. Work with Carrier to test and turn-up circuits.
  • Decommission serial T3 circuits and replace with MPLS circuits. MPLS clouds were provided by carriers ATT, Verizon or Level 3.
  • Experience on designing and troubleshooting of complex BGP and OSPF routing problems

Confidential

Network Engineer

Responsibilities:

  • Worked with cross-functional teams from requirements gathering to deployment. Identified technical requirements and developed work-flow charts and diagrams.
  • Configured, tested, troubleshoot and maintained network connectivity in a LAN/WAN environment and IT services running routing protocols on Confidential devices.
  • Managed and configured DHCP, DNS, Antivirus, and backups, Provided escalated IT support, hardware troubleshooting, backup and recovery, email communication and application support.
  • Configure and support of standard routing protocols also implemented ACLs and NAT on Confidential core switches.
  • Implement, configure and troubleshoot VPN's and Secure Remote related issues.
  • Implementation, support and trouble-shooting of VLANs including operational knowledge of Spanning Tree Protocol (STP), VLAN trucking, inter-VLAN routing and 802.1Q.
  • Deploying and decommissioning Confidential switches and their respective software upgrades.
  • Implementing & managing Symantec Data Loss Prevention, also responsible for data loss incident investigation and remediation.
  • Finding out the false positive offenses, modifying the rules to ignore the legitimate traffic and reducing the offence count.

We'd love your feedback!