Network Administrator Resume
2.00/5 (Submit Your Rating)
TECHNICAL SKILLS
- Confidential Networking: Nexus/Catalyst Switches, ISR/ASR routers, Wireless, Meraki
- Network Admission Control: 802.1x, RADIUS, TACACS,AAA
- Networking: DNS, FTP, LAN, TCP/IP, WAN, MPLS
- Windows Technologies: Active Directory, DNS, DHCP, NPS, Services
- Network Security: Confidential ASA, Juniper, Checkpoint Firewalls, Fortigate, Sonicwall
- VPN: Remote Access (SSL/IPsec), RSA, Site - to-Site VPN
- Virtualization: KVM, Hyper-V, Xen, VMware
- Server Hardware and Storage: Confidential, Confidential, Confidential UCS, Fujitsu, Brocade, Netapp
- Server Operating Systems: Server 2008 R2, Server 2012 R2 Server 2016, Server 2019, Ubuntu, Redhat, CentOS
- Load Balancing: Citrix Netscaler, F5, Riverbed
- Cloud Computing: AWS, Azure
- Databases: SQL, MySQL
- Network Management: Solarwinds, Nagios, PRTG, Netflow
- High Performance Computing
- Network Architecture, Design & Implementation
- Disaster Recovery
PROFESSIONAL EXPERIENCE
Confidential
Network Administrator
Responsibilities:
- Serve as primary point of contact for all Network & Infrastructure issues.
- Proactively monitor systems for issues and escalate with management to determine best course of action.
- Serve as backup support to helpdesk personnel help supporting users in the field.
- Design, develop and implement Helsinn infrastructure according to business needs and user requirements
- Monitors service delivery compliance to budget, quality standards and customer and business stakeholder requirements
- Resolve issues and prepare status reviews and reports
- Test all changes to networks, hardware, software, and hosted applications
- Cater to doing infrastructure coordination related to design and setup activities at different stages of a project
- Serve as Subject Matter Expert on matters relating to Network and Server infrastructure.
- Design, build, test and implement Helsinn security measures including Anti-Virus, Firewall, Content Filters
- Research new products and advise senior management on how the products can benefit IT and the business as a whole.
- Staying on top on latest in technology and security trends,
Confidential
Infrastructure/Systems Engineer IV
Responsibilities:
- Maintain and monitor all network, security and computer systems to meet the organization's current and future requirements
- Responsible for management, maintenance and architecture of storage, virtualized environment, servers, network devices, and productivity tools
- Monitor systems and identify performance issues proactively
- Work within strict time frames and elevate incidents within defined timeframes
- Test all changes to networks, hardware, software, and hosted applications
- Monitors service delivery compliance to budget, quality standards and customer and business stakeholder requirements
- Cater to doing infrastructure coordination related to design and setup activities at different stages of a project
- Work with various vendors and service providers to ensure productive environment
- Resolve issues and prepare status reviews and reports
- Professionally represent the infrastructure team as a technical consultant on projects.
- Maintain the necessary project plans and documentation of all system builds and modifications
- Interact and coordinate with vendors, suppliers, distributors and contract consultants
- Maintain a good working knowledge of current infrastructure and future trends
- Maintain good working relationships with all service providers and vendor to ensure that services received meet expected requirements of contract
Confidential
Systems Engineer
Responsibilities:
- Traveling to client sites and analyzing their networks according to need and budget, designing and implementing the new solution. Client sites typically ranged from small to medium business.
- Network analysis of each site included site survey, layout, current network implementation, gathering network information using monitoring tools such as Solarwinds & PRTG. In addition, bottlenecks, latency, network bandwidth usage & end user issues are taken into consideration.
- Some familiarity with Fortinet Firewall platform
- Client sites were mostly small, using Confidential SonicWall routers or primarily Confidential ASA 5510 & 5520 firewalls. Servers are connected via Confidential 3560 L3 switch or standard 2960 SI switches L2. End users are connected via Confidential Procurve port PoE switches, or port PoE switches.
- Monitoring & implement network devices & servers within the two datacenters. Network devices consisted of two Confidential ASA5520 Firewalls connected via 100/100Meg service between the two datacenters using site-to-site VPN tunnels using IPSEC. Three ESXi 5.5 hosts each, backed up to Amazon Cloud using Veeam Backup & Replication. Dual-Homed ESXi hosts & iSCSI devices connected to Confidential 48 Port 4948 Switches using LC-to-LC Multimode Fiber with 10Gb Uplinks. Both datacenters backup other ESXi hosts & Windows Hyper-V environments from client sites, each site having a IPSEC VPN Tunnel.
- Ensuring consistent environments across all clients, responding to network issues via ticketing system.
Confidential
Security Analyst
Responsibilities:
- Assisting in & transitioning firewall, remote access, and security authentication to Network & Voice teams.
- Overseeing the N&V teams in firewall and remote access issues until their familiarity with the various platforms (Checkpoint, Juniper and Confidential Secure) is complete.
- Developing improved security policies for Confidential research and development labs across the globe.
- Risk & Vulnerability assessments for R&D environments and creating solutions around customer’s needs that align with company security baseline policy.
- Perform regular network scans to identify vulnerabilities & update necessary network devices to align with findings. In addition, keeping abreast of new and developing security threats & trends.
- Running third party security tools on Mac OS X to test current infrastructure for vulnerabilities.
Confidential
Network Engineer
Responsibilities:
- Assist in solving small to medium network issues within the corporate network infrastructure
- VoIP: Experience with Avaya platforms, as well as the Confidential Call Manager platform.
- Setting up dial plans, SIP trunks and Call routing as well as configuring end user IP telephony devices including phones and conferencing devices.
- Implementing QoS across the campus to ensure highest call quality.
- Experience in Confidential Catalyst Switches (6500, 4500 series platforms) Nexus 7k, 5k and 2k implementations, Confidential Routing, Confidential Wireless, as well as experience in MPLS, VPN, BGP, EIGRP, OSPF protocols.
- Network Security: Familiarity with Confidential PIX/ASA and checkpoint firewalls.
- Network Management: Experience with network monitoring in SolarWinds, Orion, Nagios, and Zabbix. Also, including device backups, fault identification and isolation, VoIP monitoring, and capacity planning
- Planning, upgrading, and designing a corporate infrastructure according to needs and demands of the customer supported by a sound business case.
- Have minimal experience with Juniper hardware
- Working on-call hours/off hours with MPLS providers AT&T and CenturyLink to resolve any outages.