We provide IT Staff Augmentation Services!

Network Administrator Resume

TECHNICAL SKILLS

Cisco Networking: Nexus/Catalyst Switches, ISR/ASR routers, Wireless, Meraki

Network Admission Control: 802.1x, RADIUS, TACACS,AAA

Networking: DNS, FTP, LAN, TCP/IP, WAN, MPLS

Windows Technologies: Active Directory, DNS, DHCP, NPS, Certificate Services

Network Security: Cisco ASA, Juniper, Checkpoint Firewalls, Fortigate, Sonicwall

VPN: Remote Access (SSL/IPsec), RSA, Site - to-Site VPN

Virtualization: KVM, Hyper-V, Xen, VMware

Server Hardware and Storage: Dell, HP, Cisco UCS, Fujitsu, Brocade, Netapp

Server Operating Systems: Server 2008 R2, Server 2012 R2 Server 2016, Server 2019, Ubuntu, Redhat, CentOS

Load Balancing: Citrix Netscaler, F5, Riverbed

Cloud Computing: AWS, Azure

Databases: SQL, MySQL

Network Management: Solarwinds, Nagios, PRTG, Netflow

PROFESSIONAL EXPERIENCE

Confidential

Network Administrator

Responsibilities:

  • Serve as primary point of contact for all Network & Infrastructure issues. Proactively monitor systems for issues and escalate with management to determine best course of action.
  • Serve as backup support to helpdesk personnel help supporting users in the field.
  • Design, develop and implement Helsinn infrastructure according to business needs and user requirements
  • Monitors service delivery compliance to budget, quality standards and customer and business stakeholder requirements
  • Resolve issues and prepare status reviews and reports
  • Test all changes to networks, hardware, software, and hosted applications
  • Cater to doing infrastructure coordination related to design and setup activities Confidential different stages of a project
  • Serve as Subject Matter Expert on matters relating to Network and Server infrastructure.
  • Design, build, test and implement Helsinn security measures including Anti-Virus, Firewall, Content Filters
  • Research new products and advise senior management on how the products can benefit IT and the business as a whole.
  • Staying on top on latest in technology and security trends,

Confidential

Infrastructure/Systems Engineer

Responsibilities:

  • Maintain and monitor all network, security and computer systems to meet the organization's current and future requirements
  • Responsible for management, maintenance and architecture of storage, virtualized environment, servers, network devices, and productivity tools
  • Monitor systems and identify performance issues proactively
  • Work within strict time frames and elevate incidents within defined timeframes
  • Test all changes to networks, hardware, software, and hosted applications
  • Monitors service delivery compliance to budget, quality standards and customer and business stakeholder requirements
  • Cater to doing infrastructure coordination related to design and setup activities Confidential different stages of a project
  • Work with various vendors and service providers to ensure productive environment
  • Resolve issues and prepare status reviews and reports
  • Professionally represent the infrastructure team as a technical consultant on projects.
  • Maintain the necessary project plans and documentation of all system builds and modifications
  • Interact and coordinate with vendors, suppliers, distributors and contract consultants
  • Maintain a good working knowledge of current infrastructure and future trends
  • Maintain good working relationships with all service providers and vendor to ensure that services received meet expected requirements of contract

Confidential

Systems Engineer

Responsibilities:

  • Traveling to client sites and analyzing their networks according to need and budget, designing and implementing the new solution. Client sites typically ranged from small to medium business.
  • Network analysis of each site included site survey, layout, current network implementation, gathering network information using monitoring tools such as Solarwinds & PRTG. In addition, bottlenecks, latency, network bandwidth usage & end user issues are taken into consideration.
  • Some familiarity with Fortinet Firewall platform
  • Client sites were mostly small, using Dell SonicWall routers or primarily Cisco ASA 5510 & 5520 firewalls. Servers are connected via Cisco 3560 L3 switch or standard 2960 SI switches L2. End users are connected via HP Procurve 2610 48 port PoE switches, or 2960 48 port PoE switches.
  • Monitoring & implement network devices & servers within the two datacenters. Network devices consisted of two Cisco ASA5520 Firewalls connected via 100/100Meg service between the two datacenters using site-to-site VPN tunnels using IPSEC. Three ESXi 5.5 hosts each, backed up to Amazon Cloud using Veeam Backup & Replication. Dual-Homed ESXi hosts & iSCSI devices connected to Cisco 48 Port 4948 Switches using LC-to-LC Multimode Fiber with 10Gb Uplinks. Both datacenters backup other ESXi hosts & Windows Hyper-V environments from client sites, each site having a IPSEC VPN Tunnel.
  • Ensuring consistent environments across all clients, responding to network issues via ticketing system.

Confidential

Security Analyst

Responsibilities:

  • Assisting in training & transitioning firewall, remote access, and security authentication to Network & Voice teams.
  • Overseeing the N&V teams in firewall and remote access issues until their familiarity with the various platforms (Checkpoint, Juniper and Cisco Secure) is complete.
  • Developing improved security policies for Confidential research and development labs across the globe.
  • Risk & Vulnerability assessments for R&D environments and creating solutions around customer’s needs that align with company security baseline policy.
  • Perform regular network scans to identify vulnerabilities & update necessary network devices to align with findings. In addition, keeping abreast of new and developing security threats & trends.
  • Running third party security tools on Mac OS X to test current infrastructure for vulnerabilities.

Confidential

Network Engineer

Responsibilities:

  • Assist in solving small to medium network issues within the corporate network infrastructure
  • VoIP: Experience with Avaya platforms, as well as the Cisco Call Manager platform.
  • Setting up dial plans, SIP trunks and Call routing as well as configuring end user IP telephony devices including phones and conferencing devices.
  • Implementing QoS across the campus to ensure highest call quality.
  • Experience in Cisco Catalyst Switches (6500, 4500 series platforms) Nexus 7k, 5k and 2k implementations, Cisco Routing, Cisco Wireless, as well as experience in MPLS, VPN, BGP, EIGRP, OSPF protocols.
  • Network Security: Familiarity with Cisco PIX/ASA and checkpoint firewalls.
  • Network Management: Experience with network monitoring in SolarWinds, Orion, Nagios, and Zabbix. Also, including device backups, fault identification and isolation, VoIP monitoring, and capacity planning
  • Planning, upgrading, and designing a corporate infrastructure according to needs and demands of the customer supported by a sound business case.
  • Have minimal experience with Juniper hardware
  • Working on-call hours/off hours with MPLS providers Confidential and Confidential to resolve any outages.

Hire Now