Jr. Network Engineer Resume
IL
PROFESSIONAL SUMMARY:
- Resourceful Cisco - certified Network Engineer committed to performing assigned tasks while working in a fast-paced environment. Adept at identifying system performance and operational issues. Specialize in designing implementing and maintaining networking infrastructures.
- 3+ years of experience in Cisco/Juniper Networking, Security which includes designing, Deployment and providing network support, installation and analysis for a broad range of LAN / WAN protocols.
- 2+ years of experience wif the Firewalls especially on the CISCO and Palo Alto Networks.
- Extensively worked on Checkpoint and Fortinet. Also have an immense experience wif the proxies besides mentioned skills.
- Worked on LAN/WAN Networks form the very first project. Have hands-on experience wif LAN and WAN Networks and technologies.
- Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, IS-IS, EIGRP, RIP, BGP v4, MPLS.
- Experienced wif scripting languages like Python, PERL.
- Worked extensively in Configuring, monitoring and Troubleshooting Cisco's ASA 5510/5510 security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing wif the firewalls as per the design.
- Maintenance and support of Cisco, Check Point and Juniper firewalls.
- Involved in troubleshooting of DNS, DHCP and TFTP other IP conflict problems.
- Good knowledge of using Microsoft VISIO/Office as technical documentation and presentation tools.
- Worked closely on maintaining, configuring and troubleshooting the issues on CISCO network equipment.
- Working knowledge wif monitoring tools like Solar Winds and network packet capture tools like Wire-shark.
- Hands-on experience wif configuring the Ethernet ports, Etherchannel and VLANs.
- Worked in team that is working on VoIP and Hybrid Voice System Services.
- Good knowledge in configuration of Voice VLAN’s (VOIP) and had experience in Prioritizing the voice traffic over the data traffic.
- Assist customers in their network design queries related toIOS-XRdevices
- Implemented traffic filters using Standard and extended access-lists, Distribute-Lists, prefix lists and Route Maps.
- Worked together wif the team on SSID Configuration and assignment.
- Hands-on experience on Checkpoint Firewall R77, Palo Alto and Cisco ASA 5520 firewalls.
- Worked on Nexus switches such as 2000, 5000 and 7000 series.
- Configured Security policies, Including NAT, PAT, Route-maps and Access Control Lists.
- Experience wif convert Checkpoint VPN rules over to the Cisco ASA solution. Migration wif Cisco ASA VPN experience.
- Worked on Nexus 7K Core and Server Farm Switches wif VSS & VPC support.
- Designing and configuring of OSPF, BGP on Juniper Routers (MX series) and SRX Firewalls.
TECHNICAL SKILLS
Cisco Switches: Cisco Switches Catalyst 6500, 4900, 3750,3500 series and its stacking, Nexus 9K/7K/ 5K/ 2K family switches.
Cisco Routers: ISRs/ ASRs/ VXRs/ GSRs family (1800, 2500, 2600, 3600, 3700, 4000, 7200 & 7600).
Operating Systems: Cisco Nexus 7K/5K/2K FEX to 9K Spine & Leaf (NX-OS-ACI Enhanced mode), VXLAN, ACI/APICV2 Software Defined Network, VMware NSX-VXLAN underlay/overlay private cloud/software defined network, ESXi, Virtualization, Cisco IOS software family, Cisco SAN OS family, F5 TMOS.
Protocols: OSPF, BGP, RIP, EIGRP, IGRP, IS-IS, IPv4/ IPv6, VTP, STP, PVST+, RSTP, MSTP, HSRP, GLBP, VRRP, FHRP, NHRP/ NHS, TCP/ IP, MGCP, SCCP, SIP, H.323, PPP, HDLC, FTP, Telnet, SNMP, DHCP, DNS, HTTP/ HTTPS, SMTP, NTP, 802.1q, ISL, Spanning tree(802.1D&802.1W), BPDU guard, PVST, RPVST+.
Networks: Frame Relay/ MFR and PPP Multilink, ATM, DS0, E1/ T1, E3/ T3, POS/ SONET, ISDN BRI/ PRI, Conventional leased lines/ IPLC, Optical Fiber, Dark Fiber, TDM, WAN/ MAN/ LAN, MEN, VPLS, IPVPN, IVPN, MPLS VPN, DIA, aVPN, DMVPN/ EZVPN, IPSec, GRE over IPSec, SRST, DSL/ Network Monitoring PRTG, HP Network Node Manager, Solar Winds, Nagios
Management Tools: NSM (Net Screen Manager for Juniper SSG Devices), Cisco Works, ASDM, IDM, Net QoS, CA, Solar Winds, Cisco Prime.
Cisco Administration: IOS Upgradation using TFTP/ Xmodem/ SCP, AAA/ TACACS/ RADIUS, Hardware Installation, Process Memory & CPU Utilization.
Languages: C, C++, Java, Python, UNIX, Bash/Shell Scripting.
PROFESSIONAL EXPERIENCE:
Confidential, IL
Jr. Network Engineer
Roles &Responsibilities:
- Secure the corporate WAN/LAN and server architecture. Maintain firewalls& IPsec gateways and related equipment.
- Provide security guidance and drive infrastructure decisions in collaboration wif other technical team, ensuring security principles are being upheld and no violations of security policy is taking place.
- Configured the BGP as a WAN protocol, and OSPF/EIGRP as interior routing protocol.
- Configuring and Troubleshooting Cisco Firewall/ASA, Checkpoint FW, Bluecoat Proxy SG and Cisco IronPort
- Configuration of Access List ACL (STD, Ext, Named) to allow users all over the company to access different applications and blocking others.
- Acquired expertise in writing Python, Unix and PERL scripts for separate functionality
- Configured Cisco ASR, ISR 2800 & 3800 series routers wif OSPF as an enterprise IGP
- Support Tier-1 Internet Service Providers and large enterprises in troubleshooting CiscoIOS-XR platforms - ASR9000,CRS, and XR12000
- Implemented traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF)
- Worked wif Cisco IOS/NX-OS, IOS-XR network software.
- Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550).
- JUNOS and NAT migrations on Juniper SRX firewalls
- Review monitoring and security risks for our network infrastructure, update security policies using Juniper NSM and Palo Alto firewalls
- Installation of Cisco ASA 5500 series firewalls, Cisco 3500, 4500, 6500 series switches
- Configuration and Maintenance of ASA 5550, ASA 5510 Firewalls and Cisco IPS 4240 using Cisco Security Manager (CSM).
- Installing, configuring Juniper (M, Mx and EX Series) and SRX devices.
- Updating and troubleshooting IPS/IDS (Cisco, Fortinet).
- Provided Configuration and VPN support for Cisco and Fortinet.
- Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tuning AS-path.
- Convert campus WAN links from point to point to MPLS and to convert encryption from IP Sec /GRE to Get VPN
- Daily technical hands on experience in the configuration, troubleshooting of Juniper SRX firewalls as well as experience working directly wif customer in a service/support environment.
- Extensive implementation of firewall rules on Juniper SRX daily, using SPACE as well as CLI when needed.
- Responsible for overall firewall configuration implementations and policy installations across all platforms during maintenance windows including Juniper, Check Point, and Fortinet for major enterprise network.
- Install and configureBluecoatProxy SG in the network for web traffic management and policy configuration
- Configuration and troubleshooting of EIGRP, OSPF, BGP.
- Configuration of Standard and Extended ACLs for Security.
- Troubleshooting the issues related to routing protocols.
- Managing, troubleshooting and monitoring the network using Network Monitoring tool. Network Security implementation wif Cisco IOS Feature Set, NAT, and Simple Network Management Protocol.
- Involved in migration from Frame-Relay/ATM network to MPLS-based VPN for customer’s WAN infrastructure
- Provided support for troubleshooting and resolving Customer reported issues.
- Performed IOS upgrades on Catalyst 6500, 4500, 3500 series switches, and 7200, 3800 and 3700 series routers.
- Creating new templates for Nexus, Juniper, ASR, andAristadevices by accessing networking devices in production and analyzing the available configurations.
Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/6500 switches and Cisco 3640/7200/3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA5510, Checkpoint, Aruba Controllers 6000, 3600, 3400,650: windows server 2003/2008: F5 BIGIP LTM.
Confidential
Jr. Network Engineer
Roles &Responsibilities:
- Implement Security Policies
- Controlnetworkaccess based on device type.
- Apply port forwarding, source NAT and destination NAT.
- Authenticate users through the firewall policies.
- Offer an SSL VPN for secure access to your privatenetwork.
- Establish an IPsec VPN tunnel between two Fortigate appliances.
- Deploy the right operation mode.
- Deploy an explicit proxy wif firewall policies, authentication and caching.
- Evolve beyond port numbers wif application control.
- Neutralize threats and misuse: viruses, torrents, and inappropriate websites.
- Deploy FortiGate devices as an HA cluster for fault-tolerance and high performance.
- Inspect traffic transparently, forwarding as a layer 2 device.
- Connect virtual domains (VDOMs) wifout packets leaving the FortiGate.
- Fight hacking and denial of service (DOS)
- Offer Fortinet Single Sign On (FSSO) access tonetworkservices, integrated wif Microsoft A D.
- Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies.
- Understand encryption functions and certificates.
- Defend against data leaks by identifying files wif sensitive data, and block them from leaving your privatenetwork.
- Optimize performance by leveraging the ASIC acceleration chips, such as CP or NPs, instead of only the CPU resources.