Sr. Network / Security Engineer Resume
San Jose, CA
PROFESSIONAL SUMMARY:
- Cisco Certified Network Engineer wif 8 + years of experience in the areas of Routing, Switching, Security and Load Balancing
- Expert Level Knowledge about TCP/IP and OSI models
- Expert level noledge of troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, BGP and ability to interpret and resolve complex route problems.
- Maintained/Created Information Security programs for monitoring and updating corporate - owned web domains and web servers
- Hands on experience wif Cisco DNAC, Cloud Networking, SDN, SD-WAN, vManage
- Hands on experience wif Cisco NSO, Network Automation
- Solid understanding of Cloud Platforms, AWS, Microsoft Azure, GCP
- Extensive hands of experience wif complex routed LAN networks, Cisco Routers and Switches
- Experience in the setup of Access-lists, EIGRP and tunnel installations
- Proficient in configuring VLANs and VTP database on various Cisco catalyst and Nexus 9k/7k/5k/2k switches
- Hands on experience wif Network Automation wif Cisco NSO and python scripting
- Recommended, implemented and monitored policies and procedures for appropriate network security Incident Response
- Implementation of traffic filters on Cisco routes using Standard and extended Access list
- In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP services
- In-depth noledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts
- Configuration and troubleshoot HSRP, VRRP, GLBP, RSTP, MST. 10G related issues coming in network environment
- Knowledge of implementing and troubleshooting complex layer 2 technologies such as MSTP, VLAN Trunks, HDLC, STP, and RSTP
- Hands on experience on Cisco Nexus 9k, 7k, 5k and 2k switches
- Implementation of HSRP, VRRP and GLBP for Default Gateway Redundancy
- Hands on experience wif F5 Load balancer and DNS
- Excellent communication skills to interact wif team members and support personnel and also can act as a mentor to less experienced personnel
- Hands on experience wif all next generation firewalls Cisco FMC, FTD, Panorama, Palo Alto Firewalls,
- Expertise in implementation of traffic filters using Standard and Extended access-lists, Distribute-Lists, Prefix-List and Route Maps
- Experience in Network Management/Monitoring Tools and sniffers like SNMP, Wire shark and SolarWinds, Splunk, Cisco Prime, CUCM to support 24 x 7 Network Operation Center.
TECHNICAL SKILLS:
Cisco Platforms: Nexus 9k, 7K,5K,2K & 1K, Cisco routers (9500,9200,7600,7200,3900,3600, 2800,2600,2500,1800 series & Cisco Catalyst switches (6500,4900,3750,3850, 3500, 4500,2900 series) ASR1001,2900,3900,7200,7600 & ASR9000 series, Cisco ISR Routers
Juniper Platforms: MX, EX series Routers and Switches
SMTP, VLAN, Inter: VLAN Routing, VTP, STP, RSTP, Light weight access point, WLC.
WAN Technologies: MPLS, VPLS, Frame Relay, PPP, HDLC, (E1/T1/E3T3), DS3, OC192
Network Security: Cisco ASA, Juniper SRX, Palo Alto, Cisco Fire power, Checkpoint
OS products/Services: DNS, DHCP, Windows (2000/2003/2008, XP), UNIX, LINUX
RIPv2, OSPF, EIGRP, IS: IS, BGP, PBR, Route Filtering, Redistribution, Summarization, and Static Routing, Policy-based Routing
Gateway Load Balancing: HSRP, VRRP, GLBP, VSS
Various Features / Services: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP.
Network Management Tools: Wireshark, NetFlow Analyzer NetScout, SNMP, Cisco Prime Infrastructure, Etheiral, HP open view
Load Balancers: F5 Networks (Big-IP) LTM 6400, Citrix Load Balancer
Operating Systems: Windows (98, ME, 2000, XP, Server 2003/2008/2012, Vista, 7, 10), Linux, Mac, Unix
Languages: C++, Shell, Python
Tools: ArcSight, Splunk, Nmap, FileZilla FTP Server, Solar winds, Thousand Eyes
PROFESSIONAL EXPERIENCE:
Confidential, San Jose, CA
Sr. Network / Security Engineer
Responsibilities:
- Deploy, Configure, Manage Cisco DNA Center for Branch and Campus sites
- Hands on experience wif Cisco DNAC onboarding devices, integrate wif ISE
- Global wide IOS upgrades for different platforms using Cisco DNAC SWIM
- Configured global network premise devices to autanticate to new ISE 2.6 servers
- Hands on experience wif configuration templates, network profiles, Day-0, Day-N configuration using Cisco DNA Center for Cisco CAT9500,9300 switches
- Review and approve all fleet upgrade change for remote sites
- Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security
- Proactively involved in upgrade, maintenance, monitoring and support all Enterprise Network devices including ASR, ISR’s and catalyst9k switches.
- Hands on experience wif configuring VSS in CAT9500, CAT6500
- Configure and maintain IPSEC VPN tunnels Cisco ASR routers to customer site’s
- Configuration and troubleshoot on HSRP, VRRP, GLBP, RSTP, MST. 10G related issues coming in network environment
- Supported EIGRP and BGP based network by resolving level 2 &3 problems of internal teams & external customers of all locations
- Configuration and extension of VLAN, subnet as per customer
- Racked, Stacked, cabled and configured Cisco AnyConnect VPN on Firepower4110’s to support new VPN members during Covid-19.
- Handled all ACL requests configuring on Cisco ASR, Firepower firewalls.
- Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, IP-pools, 802.1X, Trunking, STP, Inter-Vlan routing, LAN security
- Converting legacy sites to SD WAN sites using Vmanage, Viptela
- Hands on experience wif Automation using Cisco NSO, python for compliance checks on global Premise devices
- Hands one experience wif enterprise incidents wif P1 issues and experience wif ESP, Change Management
- Part of on-call supporting for global sites and resolve P1 SOC-EOC Incidents
Environment: Cisco DNA, SD-WAN, Viptela, Vmanage, Cat9500, Cat9300, Cisco ewlc, Cisco Aironet 1800’s Active Sensor, Cisco FirePower, Cisco ASR, ISR, Catalyst 9K, VPN, DNS, DHCP, Nexus, EIGRP, BGP, HSRP, VRRRP, L2/L3, Cisco Prime, Cisco ISE, Splunk
Confidential, Reading, PA
Sr. Network Engineer/ Security Engineer
Responsibilities:
- Hands on experience wif Network design, implementation and troubleshooting
- Hands on hands on experience of configuring and maintaining Cisco routers, switches, wireless access points, wireless controllers
- Hands on experience ACI, Nexus and maintain, operate Data Centers
- Hands on experience wif all L2, L3 technologies wif through noledge on TCP/IP model
- Working for FW-PCI project bringing all FWs to PCI compliance which involved Network segmentation, decommission rules, tighten rules etc.
- Expert wif pre-filter rules, access-control polices, IPS, IDS policies in Firewalls
- Configured Syslog to send logs to external Syslog server ArcSight for higher visibility
- Re-configured, consolidated, tightened FWs for all security measures.
- Maintain and closely monitor all data center Network devices
- Hands on hands on experience of configuring and maintaining Cisco routers, switches, wireless access points, wireless controllers
- Hands on experience on Nexus 9k,7k,2k/ACI network in Datacenter
- Hands on experience wif Cisco ASA’s, Cisco Firepower FWs, Palo alto FW’s
- Hands on experience wif Cisco FMC managing FTD’s having next generation features
- Configured IP-SEC tunnels using 3DES, AES/AES-256 Fortinet FWs to different vendors as per the business requirements
- Key contribution includes troubleshoot of complex LAN/WAN infrastructure dat include routing protocols EIGRP, OSPF & BGP
- Hands on experience wif N-map, Wire-shark, TCP dump for Network Security troubleshooting issues
- Technical assistance for LAN/WAN management and complex routing issues
- Hands on experience wif configuration of IP-SEC VPN’s, Remote Access VPN’S and troubleshoot the same
- Hands on experience wif SD-WAN, Cisco Meraki Dashboard
- Hands on experience wif Cisco Meraki MX, MS, MR in setting up wif remote site locations
- Configured Meraki Security appliances to handle all the retail site traffic wif IPS, IDS policies
- Hands on experience wif setting up Meraki wireless access points in remote locations and monitor and troubleshoot the health
- Hands on experience wif MS-Azure setting up virtual Fortinet Firewalls and implementing IPS, IDS, URL-filtering on the same
- Hands on experience wif Security Fabric, Fabric connector, policies in FortiGate Firewalls
- Hands on experience wif various migration/upgrade projects across F5 and hands on wif F5 BIGIP
Environment: FortiGate, Cisco ASA, Cisco FTD, Checkpoint, Cisco Meraki, F5-BIG IP, IP-SEC, VPN, MS Azure, SolarWinds, SNMP, Arc-Sight, Syslog, DNS, DHCP, Microsoft-Visio, Pulse Secure, Cisco AnyConnect, Nexus, EIGRP, OSPF, BGP, MPLS
Confidential
Milwaukee, Wisconsin / Remote-New Jersey
Sr. Network Engineer
Responsibilities:
- Migrated the Internet Edge Firewall Juniper SRX FW to Cisco Firepower2130 in the Datacenter
- Installed, Configured Cisco Firepower boxes in HA mode. Also installed FMC, upgraded FMC and FTD2130 devices as well
- Expertise in Cisco Firepower FTD managing wif FMC.
- Experience wif security zones, security policies, NAT in Firepower and Juniper Firewalls.
- Worked on Cisco Nexus 9000 family of switches whose hardware is based on Cisco ACI
- Created pre-filter rules, access-control polices, Intrusion policies, Malware polices on Firepower (IPS, IDS, Malware Detection)
- Built IP-Sec VPN tunnels from Cisco Firepower to SRX-220’s in remote sites using IKE pre-shared keys, AES-128, SHA and DH5.
- For ERP Project, Built IP-Sec VPN tunnel’s from FTD2130 to Cisco ASA5520 which is in other Enterprise using AES-256,SHA and DH5.
- Configured, Deployed ISR 1941 Router’s for a Specific project in the Network
- Built IP-Sec over GRE tunnel from ISR 1941 to Verizon Network Router.
- Served a platform for other services dat are required wifin the data center or cloud environment using Cisco ACI.
- Configured, Maintained different IPS, IDS policies on FTD2130.
- Configured Remote Access VPN (Any Connect) on FTD2130. Also configured User based VPN, creating access-control policies directing from the AD server.
- Designed the Network for Segmentation project
- Handled Network -segmentation project which included delete vlans, rename, create vlan document, create IP document, im plemented Qos
- Hands on experience on Juniper SRX, Pulse secure VPN.
- Created Visio diagrams per site including data center, also different documents like vlan document, IP document, Cab document etc
- Hands on experience on various Network monitoring tools Nagios, Wire-Shark etc
- Hands on experience on various tickets involving LAN/WAN Network issues.
- Provided on call support during the Weekends
- Configured, Maintained, Upgraded Cisco Catalysts switches 2660X,3650X,3950 etc
- Configured and deployed Aero-Hive access points in remote sites.
Environment: Cisco Firepower2130, ISR1941, Cisco Catalyst 3650X, 2960X, 3950, Juniper SRX 240, Aero-hive access points, Nagios, Wire-shark, DHCP, DNS, Cisco Any Connect, Pulse Secure VPN, IPSEC VPN, GRE, Radius, SNMP,NTP
Confidential, Mount Laurel, NJ
Sr. Network Engineer
Responsibilities:
- Worked for OK/SD Network Remediation Project
- Hands on experience in designing the Remote sites for Network Remediation Network.
- Configured Cisco2900, 3900, 4300 series routers upgraded IOS Images and installed respective licenses in all the routers.
- Managing Cisco Unified Communications Manager (CUCM) cluster wif 500+ phones utilizing dual-homed SIP trunks
- Provide extension mobility to users using CUCM
- Configured Cisco Catalyst Switches 3560-CX, 2960-CX in LAN Campus.
- Configured Cisco Catalyst 4500-X for Core and Distribution purposes.
- Created and updated Visio diagrams for the same and stored in the Share file.
- Configured Cisco AP’s using WLAN controller.
- Hands on experience on configuring Cisco AiroNet 2700, 3700 series Access points in WLAN Controllers 5508, 8540.
- Provided voicemail, extension mobility and device profiles using CUCM for cisco IP phones (7960, 7821)
- Hands on configuring Cisco ASA 5525 FW in the Network Remediation Project.
- Implemented QOS to conform the ACA standard.
- Strong hands on Network Circuit WAN upgrades, MPLS Circuit upgrades.
- Worked wif ISP providers for Circuit upgrades for LAN Campuses.
- Hands on Cisco Cube Experience and VOIP Infrastructure.
- Configured, Managed Cisco Prime Infrastructure, Cisco ISE.
- Brought up sites replacing old routers, switches wif new routers.
- Also replaced EOL and EOS routers and switches in the firm.
- Created and implemented DUO VPN for dual autantication for Cisco any connect. For the same created VPN tunnels.
- Hands on experience on various tickets involving Network issues.
- Strong hands Network Monitoring tool Solar winds to monitor control and mitigate the Network.
- Active On-call Resource Engineer for Network issues in the firm.
- Configure Monitor and Troubleshoot Cisco WAAS devices 0E294, OE594, OE694.
- Installed Security licenses for Cisco Firepower FP4110 NGFW appliances
Environment: Cisco ISR 4451, ISR4331, ISR 2951, FTD, Checkpoint, Cisco Catalyst switches, Cisco AP’s 2700, 3700, WLAN Controller, ASA 5585, Solar winds, Cabling, Fiber optics, Cisco Prime Infrastructure, VPN, AAA-Radius, Tacacs, ACS, SNMP, Infoblox, DNS, DHCP, OE294, OE594, OE694
Confidential, Rhode Island
Sr. Network Engineer
Responsibilities:
- Key contributions include troubleshoot of complex LAN/WAN infrastructure dat include routing protocols EIGRP, OSPF & BGP
- Hands on experience on architectural design of LAN/WAN infrastructure.
- Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports
- Setup of fiber optics test and assembly production stations.
- Hands on experience on Network Access Control(NAC)
- Hands on experience on NAT (Network Address Translation)
- Hands on Experience testing iRules using Browser(IE), HTTP watch
- Convert Campus WAN links from point to point to MPLS and to convert encryption from IPsec /GRE to g et VPN
- Implemented and configured GLBP (on core switching and also for VPN redundancy), HSRP on different location of office on the switched network and managing the entire multilayer switched network
- Hands on experience configuring Fortinet NGFW 3000 series.
- Troubleshoot and installing of CRS, ISR, GSR, ASR9000
- Configured and implemented VDC and VPC on Nexus 9K,7K,5K switches in the Datacenter
- Created documents for various platforms including Nexus 9k, ASR1k enabling successful deployment of new devices on the network
- Experience wif configuring Nexus 5548 wif nexus 2248 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7010.
- Perform ISSU upgrades on nexus devices wif nexus OS 6.2 on nexus 7010 devices wif SUP2E line card.
- Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls
- Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls
- Perform tier 2 support for VoIP infrastructure and involved wif configuring Call Manager (CUCM) and Cisco Unity Connection (CUC)
- Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 wif PIX Firewalls
- Best practice implemented on Cisco & Juniper routers and switches.
- Implemented new devices Juniper MX-80 and MX-104 series as per policy reviewed by network architect.
- Worked on F5 LTM series like 7050, 5050, 2200 for several applications and their availability.
- Responsible for the configuration of Virtual Servers, Nodes, and load balancing Pools and configuring load balancing algorithms.
- Configured Session based persistence and I has leant configuring writing i-Rules for specific redirection purpose and i-rules for persistence
- Configuring various advanced features (Profiles, monitors, I Rules, Redundancy, SSL Termination,
- Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital
- Certificates executed various migration/upgrade projects across F5 and hands on wif F5 BIGIP
- Experience wif leadership of staff wifin the Information Security Management function
- Configured IPSEC VPN tunnels between Checkpoint and other non-Checkpoint endpoint devices using IKE pre-shared keys, 3DES and MD5
- Handled RFC4510 is an Internet protocol for accessing distributed directory services dat act in accordance wif X.500 (LDAP) Lightweight Directory Access Protocol.
- Responsible for multivendor firewall administration across our corporate networks
- Hands-on familiarity wif Microsoft Certificate Services and rela ted components
- Worked on Active Directory and its integration wif Microsoft PKI
- Support development, maintenance, and management of PKI policies in accordance wif the department Directives and local Instructions
- S pecifications, techniques, and standards such as but not limited to public key cryptographic key standards, certificate management protocols, and certificate validation
- Follow all Change Management Policies and Procedure Experience wif certificate-enabled applications, such as SSL/TLS, S/MIME, autantication, EFS, 802.1X, Code Signing, etc.
- Large enterprise IT consulting, administration, or support experience
- Assist and troubleshoot Cisco Meraki solutions remotely including 802.11a/b/g/n/ac Wireless networks
- Involved in the redistribution into OSPF on the core ASA firewall
- Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
- Involved in the modification and removal of BGP from the MPLS routers
- Also prepared documentation for various Vlans and Voice sub-networks and worked on Visio for the same.
- Performed basic security audit of perimeter routers, identifying missing ACL’s, writing and applying ACL’s
Environment: Cisco Catalyst 7509, 6500, 4500, 4000, 3750, 3850, 3560, F5 BIGIP LTMs-6900, Cisco ASA 5525 firewalls, Power Connect Switch 5548,Infoblox,MPLS,Multicast,Nexus-7k, Palo Alto 5060,PCI,SOX,OTV,VPC,Nexus-FEX,IOS,IOS-XR,NX-OS,IPSEC, OSPF, EIGRP, BGP, IS-IS, ASR 1k,9k,cryptography,L2&L3 VPN, Metro Ethernet,802.1Q,Riverbed Steelhead, Prime Infrastructure, UCS, Multicasting
Confidential, Detroit MI
Network Engineer
Responsibilities:
- Hands on experience of working wif OTV & FCoE on N exus between the datacenters and Nexus 9 000 series
- Negotiate VPN tunnels 10G using IPSec encryption standards and also configured, implemented site-to-site VPN, Remote VPN
- Proactively involved in upgrade, maintenance, monitoring and support for the PA500 Palo Alto devices.
- Configured IPSEC VPN on Palo Alto firewalls
- Configuration and troubleshoot on HSRP, VRRP, GLBP, RSTP, MST. 10G related issues coming in network environment
- Handled Various Cables and allotted networks(NAC)
- Configuration and extension of VLAN from one network segment to their segment between different vendor switches (Cisco, Juniper)
- Configured STP for switching loop prevention and VLANs for data and voice along wif Configuring port security for users connecting to the switches
- Worked on Network design and support, implementation related internal projects for establishing connectivity between the various field offices and data centers.
- Designed and configured of OSPF, BGP on Juniper Routers and SRX Firewalls Juniper MX series Internet service providers
- Experience configuring Virtual Device Context in Nexus 9k, 7k,5k series switch
- Managed teams of front line security analysts, investigators, and change/incident engineers
- Developed a deep understanding of the prospective customer purchase process and assist wif pre-sales activities
- Troubleshoot and installed CRS, ISR, GSR, ASR9000 and Nexus devices
- Ensure Network, system and data availability and integrity through preventive maintenance and upgrade
- Supported EIGRP and BGP based network by resolving level 2 &3 problems of internal teams & external customers of all locations
- Handled all the Firewall Migrations from Cisco ASA to Fortinet on a Global Scale.
- Worked on the migration to new Checkpoint R75 firewalls from Juniper firewalls
- Firewall Policy implementation on Checkpoint NGX R52 and R54.
- Provided daily network support for national wide area network consisting of MPLS, VPN and point-to point site
- Worked on different Cisco & Juniper devices of access, distribution and core
- Experienced wif Juniper: EX-2200, EX-4300, EX-4500, MX-480 and SRX550 trouble shooting
- Having hands on experience wif f 5 Local and Global Traffic Managers (LTM >M )
- Configured objects such as Load Balancer pools for local traffic management on F5 Load Balancers
- Worked on commissioning and decommissioning of the MPLS circuits for various field offices
- Worked on F5 BIG-IP LTM 6900, configured profiles, and provided and ensured high availability
- Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc)
- Experience on modules like APM, ASM and AFM.
- Configuring HSRP between the 3845 router pairs for Gateway redundancy at various sites
- Configuration and extension of VLAN from one network segment to their segment between Different vendor switches (Cisco, Juniper)
- Ability to self-direct and work independently when necessary and clearly articulate technical concepts / issues to both technical and non-technical peers and management
- Contribute to overall process improvements and network documentation
- Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling
- Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches
- Updated the HP open view map to reflect and changes made to any existing node/object
- Handled SRST and implemented and configured the Gateways, Voice Gateways
- Responsible for service request tickets generated by the halpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes wif all around technical support
- Having Hands on experience wif (LDAP) Lightweight Directory Access Protocol
- Designed and implemented Cisco VoIP infrastructure for a large enterprise and multi-unit office environment. Met aggressive schedule to ensure a Multi-office reconfiguration project which was successfully delivered
- Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security
- Experience wif the quality department Cisco QOS and maintenance teams
Environment: Checkpoint-R65,R70,NGX,VPN,Solar Winds, IP, IPSEC, AAA-Radius, Tac-acs, ACS, SNMP, Infoblox, DNS, DHCP, OSPF Troubleshooting, Bigip, F5-LTM-1600, 3600, GTM, Viprion, Active Directory, OSPF, EIGRP, Out-look servers,Nexus-9k,7k,5kCisco Routers-7600, 7200, 3800, Cisco Switches-2950, 3500, 5000, 6500,HSRP,GLBP,ACE-GSS-4400,VM-ware-ESXi-6,Vsphere,Vcenter,UCS
Confidential, Tampa FL
Network Engineer
Responsibilities:
- Monitor the operability and reliability of the network
- Configured STP for loop prevention and VTP for Inter - VLAN Routing
- Configured and troubleshooting of EIGRP, OSPF, BGP, LACP
- Configuration of Standard and Extended ACLs for Security
- Technical assistance for LAN/WAN management and complex customer issues
- Troubleshoot the issues related to routing protocols
- Has hands on experience on Nexus 9k,7k,5k/ACI network in Datacenter
- Managing, troubleshooting and monitoring the network using Network Monitoring tool
- Network Security implementation wif Cisco IOS Feature Set, NAT, and Simple Network Management Protocol
- Provided support for troubleshooting and resolving Customer reported issues
- Performed IOS upgrades on Catalyst 3550, 2950, 1900 switches, and 3600, 2600 and 2500 routers
- Provided support for global network including T1/T3, ATM connections using HDLC and Frame Relay on 2600, 4000 series Routers
- Installed wireless access points (WAP) at various locations in the company
- Maintained redundancy on Cisco 2600, 2800 and 3600 routers wif HSRP and VRRP
- Implemented and configured routing protocols like EIGRP, OSPF and BGP
- Responsible for SNMP Monitoring and Performance Tuning software
- Designed WAN structure to prevent single point of failure in case of link failure
- Maintenance and Troubleshooting of connectivity problems using PING, trace route
- Planned and Implemented Subnetting, VLSM to conserve IP addresses
- Experience wif the quality department Cisco Qos and maintenance teams
Environment: Cisco Catalyst 7509, 6500, 4500, 4000, 3750, 3850, 3560, F5 BIGIP LTMs-6900,Cisco ASA 5525 firewalls, Power Connect Switch 5548,Infoblox,MPLS,Multicast,Nexus-9k,7k,5k Palo Alto 5060,PCI,SOX,OTV,VPC,Nexus-FEX,IOS,IOS-XR,NX-OS,IPSEC,Frame Relay, OSPF, EIGRP, BGP, IS-IS, ASR 1k,9k,cryptography,L2&L3 VPN, Metro Ethernet,802.1Q.
Confidential
Jr. Network Engineer
Responsibilities:
- Provided estimated bandwidth requirements for data replication, to best determine adequate timing for Migration service levels
- Configured HSRP between VLANs, Configuring Ether-Channels, and Port Channel on 6500 catalyst
- Switches Replaced branch hardware wif new 2851 routers and 2960 switches
- Implemented WLAN Aruba Wireless Access Points and its Controllers at various corporate sites fort
- 802.11n Infrastructure and its legacy technologies
- Experience in working wif Cisco Nexus 5000 series switches for data center
- Configured OSPF on CISCO devices wif multiple routing processes and redistributed them. Tested and hands on experience in multi area OSPF topologies
- Configured, managed and troubleshoot networks using routing protocols like RIP, EIGRP and
- Assisted wif troubleshooting all network issues wif routers and switches when necessary and consulted wif on Call tech as needed for client
- Monitor, troubleshoot, test and resolve Frame Relay, ATM, MLPPP, PPP, and Dial-up
- Configured/Troubleshoot issues wif the following types of routers Cisco (7200, 6500, 4500, 1700,
- 2600 and 3500 Series to include bridging, switching, routing, Ethernet, NAT, and DHCP
- Assisted wif customer LAN MAN, router/firewalls
- Configured VLANs wif 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating
Environment: Cabling, OSPF, ASA, IP, DNS, IP addressing DHCP, VLAN, VTP, CSS, HTTP, HTTPS, Access Control Lists, Standard and Extended Access lists, Vmware