Network Infrastructure Security Engineer Resume
4.00/5 (Submit Your Rating)
PROFESSIONALSUMMARY
- A skilled senior security engineer with hands on technical experience in enterprise network and security domain handling design, implementation and support of various network and security products such as Palo Alto, Juniper SRX, Checkpoint, FortiGate NGFW, BIG IP (F5) load balancers and Infoblox DNS devices.
TECHNICAL SKILLS
Routing protocols: OSPF, RIPv2, Static & BGP Juniper SRX 1500, 1400, 240, 340
Network concepts: TCP/IP, UDP, ICMP, DNS/DHCP
Programming Language: Java, C#, C, C++
Software: Microsoft office suite Word, Excel, Power point
Encryption algorithm: DES, 3DES, AES, RSA
Cisco technologies: Nexus 5k, 7k, & 9k
PROFESSIONAL EXPERIENCE
Confidential
Network Infrastructure Security Engineer
Responsibilities:
- Configure and deploy various multiple Palo Alto platform: M - 100, M-200, 7050, 5060, 3060, 3020, 850, 820, 200 and Juniper SRX NGFW in a production and lab environment.
- Register and install purchased licensed subscriptions on Palo Alto support website.
- Installed and implemented User-id agent on windows AD and Palo Alto NGFW.
- Configured network monitoring on all network security devices via SNMPv3
- Implement High Availability to mitigate production downtime on Palo Alto and Juniper SRX NGFW.
- Centrally managed, configure, monitor and upgrade multiple Palo Alto and Juniper SRX firewalls policy, OS upgrade, application and threat updates via panorama and Junos space or as a standalone device.
- Configure and implement policy-based forwarding and load balancing features on Palo Alto NGFW.
- Configure and troubleshoots IPSec, SSL VPN and global protect security solution on Palo Alto NGFW.
- Deploy, name and configure virtual server, pools, nodes, profiles, persistence and health monitor on LTM
- Integrate F5 LTM to GTM to efficiently distribute network resources based on application requirement.
- Configure, deployed and managed F5 LTM in high-availability
- Extensive knowledge and experience with F5 LTM and health check troubleshooting.
- Stage and deploy Infoblox appliance in a production network.
- Allocate and design appropriate VIP for F5 ADC through IPAM in Infoblox
Confidential, Fayetteville. GA
Network Security Engineer
Responsibilities:
- Secure network infrastructure by implementing different security profiles in a security rule to ensure granular enforcement of enterprise policies.
- Implement URL filtering, threat prevention and wildfire on Palo Alto NGFW
- Configure, deploy and create policies on a Palo Alto and Check Point NGFW security ecosystem.
- Configure and deploy Check point security gateway on Gaia R76 and R77 respectively via standalone and distributed architecture.
- Monitor system health via Palo Alto Dashboard and Checkpoint smart view monitor.
- Firewall traffic tracking using tcpdump and monitor for packet capture and packet analysis
- Conduct regular download and installation of IPS signatures using Network Security Manager.
- Integrate Microsoft Active Directory on Palo Alto security devices to streamline security policy implementation via access control and group user’s creation.
- Monitor local and remote access behavior via USER-ID agents and global protect HIP profiles.
- Configure Source and Destination NAT on Palo Alto and Check point NGFW.
- Troubleshoots and analyze network traffic using traffic logs, Application Command Center, Syslog and Auth log to provide an update overview of network traffic.
- Integrate Microsoft Active Directory on Check Point NGX and Forti-OS.
- Configured and deployed f5 LTM devices in a production network.
- Knowledgeable in hosting SSL certificate of f5 devices.
- Good hands on creating custom profiles, health monitors and configuring SNAT pools.
- Experienced using smart dashboard and smart view tracker in creating rules, monitoring network traffic.
Confidential
Firewall Engineer
Responsibilities:
- Implemented policies, procedures and standards that preserve confidentiality, availability and integrity of data and network infrastructure.
- Integrated Microsoft AD on FortiGate 300D to authenticate and grant access to local and remote user.
- Successfully configured and deployed FortiGate 300D in a production network
- Created network object to further simply and enforce security policies.
- Created network analysis and report using network traffic log.
- Configure Site to Site VPN network security solution on FortiGate security appliances.
- Configure static and dynamic NAT on FortiGate NGFW.
Confidential
Network Engineer
Responsibilities:
- Segmented network via VLAN to improve network traffic and reduce bandwidth utilization.
- Created network traffic analysis report that gives visual and detailed insight for management planning.
- Determine network and software requirement such as NIC, platform, bandwidths.
- Ensure that the network is scalable to meet volume and capacity demands.
- Coordinate network maintenance, repairs and upgrade.
- Develop and implement solutions for network issues to meet customer’s needs.
- Troubleshoot network connectivity via Ping, tracert/traceroute.