We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

3.00/5 (Submit Your Rating)

WI

SUMMARY:

  • Hard - working Network Engineer skilled at overseeing complex company networks with a focus on efficiency and performance optimization.
  • Detail-oriented and proactive with strong troubleshooting communication and analytical abilities.
  • Cisco Accredited Network Engineer with over 7 years of industry experience, including routing, switching and firewall skills.

WORK EXPERIENCE

Confidential, WI

Senior Network Engineer

Responsibilities:

  • Configuration & troubleshooting of VLAN’S, inter-switch connectivity, inter-VLAN routing
  • Resolving network related issues
  • Configuration of ether channels & trunks in Switching network
  • Maintain & support company’s LAN & WAN environment
  • Meeting client requirements and completing targets within deadlines
  • Maintaining spreadsheets of client d Confidential and communicating with customers regarding network issues
  • Using software like Axis, Maxim, Aastha, to create d Confidential and updating it timely.
  • Providing in-depth research for Checkpoint, Fortinet, and Firewalls for complex troubleshooting .
  • Planned configuration mapping and distribution of applications using F5 BIG IP LTM. Configured Virtual IPs and F5 servers & related pool and pool members.
  • Implemented network technologies including Cisco routers, switches, and access points in office buildouts.
  • Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark to determine any outages.
  • Configured Routing protocols RIP, OSPF, EIGRP, static routing and policy-based routing.
  • Implemented port security - MAC limiting, DHCP snooping to make the network invulnerable to attacks.
  • Configured IPsec tunnels with Cisco ASA to enable secure transport and implemented site-to-site VPN and remote VPN.
  • Involved in L2/L3 Switching Technology administration including creating and maintaining VLANs, STP, VLAN Routing.
  • Configured BGP with different attributes like Weight, Local P, Next hop to load balance between multiple links.
  • Engineered Route-redistribution between different routing protocols like OSPF, BGP, and EIGRP for increased efficiency.
  • Implementing F5 load-balancing and experience with LTM, IP Networking, Cabling, D Confidential Circuit Turn-up/Testing.
  • Suggest and Test BoM for solutions for network infrastructure .
  • Hands-on experience with Solar winds, wire shark. Can handle role of Network SME.
  • Configuration of VLAN’s, VTP domain, Trunk Encapsulation, Ether channels, Inter VLAN Routing, STP, HSRP, stacking.
  • Installed and configured Cisco WLC 5500 including high availability and adding access points to the controller.
  • Worked on change management as per ITIL standards.
  • Experience and high-level understanding in application delivery controllers, local and global load balancing techniques, redundancy solutions, high availability options for mission critical internal, vendor and public facing applications. Experience with F5 LTM, GTM, APM, NetScaler's, Cisco ACE and A10,Service endpoints, Network Security, Risk Assessments, Security Architect DDI,AAA/Cisco ISE, HLD & LLD,CMDB
  • Worked on Campus Wireless environments with 1000+ access points, Wireless LAN controllers, Anchor Controllers, Authentication policies, BYOD policies, Integration with RADIUS. Experience with Aruba and Cisco WLAN.
  • Knowledge of SMF / UPF / AMF / MME, SAEGW, SPGW, ePDG, SaMOG 3GPP standards 5G / CUPS / LTE / GSM / CDMA,VNet’s and VNet peering, VPCs and VPC Peering, Transit Gateways, Express Route, Azure Hub Spoke Configuration.
  • Familiar with Subscriber Policy (HSS / HLR) Offline / Online Charging architectures (such as PCRF Gx and OCS Gy, interfaces) OSS and BSS Protocols for billing and provisioning interfaces (Gz, SOAP, Rest)Deep Packet Inspection and enhanced charging principles (Rating groups, redirect etc.)

Confidential

Network Engineer / Englewood, CO

Responsibilities:

  • Configuring Static routes, IGRP, EIGRP, OSPF, BGP Routing protocols.
  • Implemented HSRP, STP, VTP and VLAN Trunking (802.1Q & ISL), Port Security on Cisco C Confidential lyst 6500 switches.
  • Experience in managing ASA Firewalls, C Confidential lyst switches, nexus switches and customer integration. Ability to setup devices, modify ACL’s and trouble shoot issues.
  • Configuring Cisco 4500, 3560, 2960 switches and 2800, 3800 routers.
  • Deployed new networks at company's remote sites as part of the branch upgrade projects.
  • Upgraded IOS code at Cisco routers and Switches as part of the life cycle maintenance of the network hardware across organization.
  • Troubleshoot complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF and BGP.
  • Troubleshoot the network issues onsite and remotely, depending on the severity of the issue.
  • Responsible for implementing, engineering, & level 2 support of existing network technologies / services.
  • Provide support for troubleshooting, resolving Customer reported issues and document them.
  • Implement network service gateway redundancy such as HSRP, VRRP, and GLBP.
  • Configured and managed Cisco access layer routers and switches.
  • Perform network maintenance and upgrades with communication and approvals from the business on a predefined schedule.
  • Experience with devices Palo Alto Network firewalls such as security NAT, Threat prevention & URL filtering.
  • Knowledge on Juniper switches and routers.
  • Hands-on experience with Meraki controllers/WAPs.
  • Hands-on experience with Solar winds, Wireshark, ISR
  • Preparation of High Level & Low Level designs according to the solution.
  • Cisco DNA, SD-Access, Cisco ACI, VMware NSX, SDWAN, Riverbed, ARUBA
  • Knowledge of troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, BGP ability to interpret and resolve complex route table problems.
  • Experience with architecture and Configuring of Cisco C Confidential lyst switches. (Core Switch: Cisco 6500, 4500 series, Access Switches Cisco 3560, 3750 series) and routers (2800, 3800, ASR-1002).
  • Configuring HSRP, STP, VTP and VLAN Trunking (802.1Q & ISL), Port Security on C Confidential lyst 6500, 4500 switches.
  • Performed network implementation that includes configuration of routing protocols, leased lines, ISDN lines, VLANs and IOS upgrades and installations.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 1000 redundant pair.
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, ASA firewalls, VPN Concentrators TCP/IP, NAT and Checkpoint R75, R77 versions.
  • Performed software upgrades on Cisco ASA and checkpoint firewalls.
  • Knowledge on IDS/IPS and DLP.
  • Experience in SIEM administration, configuration, and optimization.
  • Experience in Threat hunting
  • Experience participating in and acting as an escalation point for complex network threat investigations.
  • Experience in Linux command line.
  • Familiar with regular expressions and d Confidential normalization.
  • Experience with Storage (SAN, NAS, DAS) and backup systems
  • Hands on experience in operational monitoring and management tools (Solarwinds, System Center, NimBUS, Zabbix, Grafana/Graphite, Nagios
  • Experience managing Hypervisor Management Systems (VMware, AHV, KVM, HyperV, etc.).
  • Experience with message brokers, such as RabbitMQ/ Kafka/ Flume
  • Worked on web servers, such as IIS, Websphere, Apache or NGNIX
  • Familiarity with load balancers, such as F5, Array, Fortinet, etc.
  • Accomplish work detail with cloud service providers (AWS, GCP, Azure, etc.)
  • Experience with E-mail and collaboration technologies such as Exchange 2012, O365/M365, SharePoint
  • Knowledge of DC-DR Automation tools, such as Zerto, Perpe

Confidential

Network Engineer

Responsibilities:

  • Responsible for physical and logical design for various LAN, WAN projects need Implemented & supported network infrastructure at company’s corporate office
  • Worked on design & implementation for d Confidential networking, routing & switching, Subnetting and network segmenting within large scale enterprise network
  • Managed Cisco switches, routers, and firewalls Commissioned Checkpoint Firewalls: Virtual as well as SPLAT firewalls Upgraded various devices, such as ASA, Checkpoint, Routers, Switches
  • Involved in firewall policy cleanup standardization as per customer needs Configured BGP and configured Local P to choose best route
  • Integrated VoIP with PSTN and setup voice Gateway ensuring QOS for Cisco based Voice over IP and CDR for voice call Accounting
  • Worked with WAN team for migration of Frame-Relay/ATM network to MPLS-based VPN for customer’s WAN infrastructure
  • Designed and implemented site-to-site IPsec VPN back up tunnels
  • Troubleshooting of various application performance issues using Wireshark
  • Involved in installing and configuring a Cisco secure ACS server for AAA authentication (RADIUS/TACACS+)
  • Configured Bluecoat Proxy
  • Skilled in tracking details, communicating deadlines, and following up with key personnel resulting in many medium to large scale projects being completed on time or ahead of schedule
  • Created and maintained detailed network documentation, Physical and Logical network maps, Hardware and Software configurations, cabling layouts and floor plans to assist with troubleshooting
  • Experience interfacing with vendor or 3rd party Network Operations Centers, internal customers & external customers
  • Experience with network monitoring systems & helpdesk/trouble ticketing systems
  • Knowledge troubleshooting with network protocol analysis software such as Wireshark, PCAP-ng and/or Ekahau.
  • Knowledge of RF spectrum analyzers such as Wi-Spy and Fluke
  • Knowledge of Ipswitch What's Up-Gold and Manage Engine monitoring tools
  • Hands on expirience of Cisco Wireless Controllers, Cisco Prime & APs

Confidential

Network Engineer

Responsibilities:

  • Provided Level 3 Support for customer request on change of configuration.
  • Switching: Configuring and Troubleshooting of Vlans, Svi’s, Inter-vlan routing, VTP, HSRP.
  • Routing: Expertise Protocols: OSPF, EIGRP, BGP and STATIC Routes, GRE, Filtering, redistribution.
  • Involved in the configuration of § Cisco ASA, PIX,Checkpoint,Juniper and Routers ( IPSec VPN,SSL VPN (Clientless, Thin Client and Thick Client VPN, GRE VPN, GRE over IPSec VPN, IPSec Remote Software Client VPN ) § Redundancy: Active /Standby Failover, Active/Active Failover, State-Full Failover, Checkpoint Clustering § MPF (Modular policy Framework) for L3/L4/L7 traffic inspection § Implementing Virtual Firewall - Security Context. § Device level and user level network access restriction using ACS.
  • Configuration and Troubleshooting of Wireless controller, Access point (lightweight and Autonomous) and Integration with WCS.
  • Implemented Cisco firewalls, Checkpoint, Juniper in network for security policy enforcements using ACL and NAT (Port Redirection, Static NAT, Dynamic NAT, Policy Static/Dynamic NAT, Identity NAT Flavors’- Static/Dynamic/Policy).
  • Implemented interface level redundancy and object tracking using SLA.
  • Implementing Cisco IPS in Inline/Promiscuous mode for Attack detection Vulnerabilities and attack vectors.
  • Tuning and Custom Signature creation for Cisco IPS.
  • Implementing Network Access Restriction using Cisco ACS for Cisco Routers/Switches/Firewall.
  • Implementing Router Security Strategies to secure router processor from DOS/DDOS attacks and other vectors using Router Planes - Control Plane Management and Security, Management Plane Security, D Confidential Plane Security and Management.
  • Implementing Router Security Strategy using option drops, logging interval and common unused services running on router by default, Direct connect, S2S VPN, C2S VPN

Confidential

Network Engineer

Responsibilities:

  • Experience with Interior and Exterior routing protocols that includes RIP, OSPF, EIGRP, IS-IS and BGP. Worked on Cisco, Juniper and Arista routers.
  • Experience in Network Security that includes perimeter security for Internet, Extranet, DMZ, Internal Server farms, and Web traffic security with Proxies, Web Application firewalls. Worked and migrated multi-vendor equipment and Next generation firewall technologies. Worked on ASA, Firepower, Checkpoint and Palo Alto firewalls. Experience on MWG, Bluecoat and Zscaler proxies.
  • Experience with TACACS/RADIUS severs, migration from ACS and Aruba ClearPass to ISE. Experience with windows and Infoblox DNS and DHCP servers, IPAM, internal and external grids.
  • Experience with WAN connectivity, MPLS circuits, leased Lines, Metro Ethernet, Site to Site IPsec tunnels, ISP circuits, Customer Edge configurations. Experience with SD-WAN solutions that include Viptela and Versa.
  • Experience with setting up and troubleshooting SSL VPN solution using Cisco AnyConnect, Juniper Pulse Secure, Zero Trust Network Access.
  • Knowledge and operational experience with SDN, Cisco ACI, VXLAN, VTEPS, VNI, Bridge Domain, Arista Cloud Vision, EVPN, MP-BGP, Spine and Leaf Architecture.
  • Experience with Zscaler Cloud Proxy Architecture with ZIA, traffic forwarding using GRE tunnels to Zcloud, Azure AD Authentication, Access policies, ZAPP.
  • Experience with Network Monitoring tools, SNMP, Log collectors, Splunk, ticketing tools and thorough understanding of workflows in corporate environments that include Financial, Healthcare, and Retail clients.
  • Very enthusiastic to explore and implement innovative ideas in Network Automation in configuration, documentation, troubleshooting, workflow integration, API integration with multiple tools using Python and Ansible. Basic Exposure to Python and Ansible.

TECHNICAL SKILLS:

Load Balancers:  Kemp, Cisco CSM, F5 Networks (big-IP) LTM 8900 and 6400

Firewalls:  ASA, Cisco PIX, checkpoint.

Routing Protocols:  IGRP, RIP, EIGRP, OSPF, BGP, RIPV2, TCP/IP, STP, RSTP, VLANs, VTP, MPLS, HSRP, VRRP, Route Filtering, Redistribution, Summarization, Static 

LAN Technology:  VLAN, RSTP, VTP, Inter-VLAN routing, STP, Domain, HSRP, Trunks,, Ethernet, Fast Ethernet, Gigabit, Workgroup, Domain.

WAN Technologies:  PPP, HDLC, Fiber Optic Circuits, Frame Relay, VOIP, ATM, SONET, MPLS, VPN, IP sec-VPN, Leased Line, ISDN/Dial-Up.

Operations:  Layer 3 switching, ether channels, Uni-layer switching.

Antivirus & Endpoint protection:  Symantec Enterprise Edition, Cisco CSA, MacAfee Enterprise Edition.

Network Management Tools:  SNMP, Cisco works LMS, Cisco MWTM, Wire shark, Net flow Analyzer and Ethereal.

Network Security:  VPN, ACL, IPsec, IDS/IPS, Filtering, Port-security, AAA, Zone-Based Firewalls, juniper SRX, Cisco ASA, Palo Alto firewalls.

Network Technologies:  TDMA, SONET, MANET, FDMA, CDMA, DSL

We'd love your feedback!