We provide IT Staff Augmentation Services!

Jr. Network Engineer Resume

5.00/5 (Submit Your Rating)

IL

PROFESSIONAL SUMMARY:

  • Resourceful Cisco - certified Network Engineer committed to performing assigned tasks while working in a fast-paced environment. Adept at identifying system performance and operational issues. Specialize in designing implementing and maintaining networking infrastructures.
  • 3+ years of experience in Cisco/Juniper Networking, Security which includes designing, Deployment and providing network support, installation and analysis for a broad range of LAN / WAN protocols.
  • 2+ years of experience wif the Firewalls especially on the CISCO and Palo Alto Networks.
  • Extensively worked on Checkpoint and Fortinet. Also have an immense experience wif the proxies besides mentioned skills.
  • Worked on LAN/WAN Networks form the very first project. Have hands-on experience wif LAN and WAN Networks and technologies.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, IS-IS, EIGRP, RIP, BGP v4, MPLS.
  • Experienced wif scripting languages like Python, PERL.
  • Worked extensively in Configuring, monitoring and Troubleshooting Cisco's ASA 5510/5510 security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing wif the firewalls as per the design.
  • Maintenance and support of Cisco, Check Point and Juniper firewalls.
  • Involved in troubleshooting of DNS, DHCP and TFTP other IP conflict problems.
  • Good knowledge of using Microsoft VISIO/Office as technical documentation and presentation tools.
  • Worked closely on maintaining, configuring and troubleshooting the issues on CISCO network equipment.
  • Working knowledge wif monitoring tools like Solar Winds and network packet capture tools like Wire-shark.
  • Hands-on experience wif configuring the Ethernet ports, Etherchannel and VLANs.
  • Worked in team that is working on VoIP and Hybrid Voice System Services.
  • Good knowledge in configuration of Voice VLAN’s (VOIP) and had experience in Prioritizing the voice traffic over the data traffic.
  • Assist customers in their network design queries related toIOS-XRdevices
  • Implemented traffic filters using Standard and extended access-lists, Distribute-Lists, prefix lists and Route Maps.
  • Worked together wif the team on SSID Configuration and assignment.
  • Hands-on experience on Checkpoint Firewall R77, Palo Alto and Cisco ASA 5520 firewalls.
  • Worked on Nexus switches such as 2000, 5000 and 7000 series.
  • Configured Security policies, Including NAT, PAT, Route-maps and Access Control Lists.
  • Experience wif convert Checkpoint VPN rules over to the Cisco ASA solution. Migration wif Cisco ASA VPN experience.
  • Worked on Nexus 7K Core and Server Farm Switches wif VSS & VPC support.
  • Designing and configuring of OSPF, BGP on Juniper Routers (MX series) and SRX Firewalls.

TECHNICAL SKILLS

Cisco Switches: Cisco Switches Catalyst 6500, 4900, 3750,3500 series and its stacking, Nexus 9K/7K/ 5K/ 2K family switches.

Cisco Routers: ISRs/ ASRs/ VXRs/ GSRs family (1800, 2500, 2600, 3600, 3700, 4000, 7200 & 7600).

Operating Systems: Cisco Nexus 7K/5K/2K FEX to 9K Spine & Leaf (NX-OS-ACI Enhanced mode), VXLAN, ACI/APICV2 Software Defined Network, VMware NSX-VXLAN underlay/overlay private cloud/software defined network, ESXi, Virtualization, Cisco IOS software family, Cisco SAN OS family, F5 TMOS.

Protocols: OSPF, BGP, RIP, EIGRP, IGRP, IS-IS, IPv4/ IPv6, VTP, STP, PVST+, RSTP, MSTP, HSRP, GLBP, VRRP, FHRP, NHRP/ NHS, TCP/ IP, MGCP, SCCP, SIP, H.323, PPP, HDLC, FTP, Telnet, SNMP, DHCP, DNS, HTTP/ HTTPS, SMTP, NTP, 802.1q, ISL, Spanning tree(802.1D&802.1W), BPDU guard, PVST, RPVST+.

Networks: Frame Relay/ MFR and PPP Multilink, ATM, DS0, E1/ T1, E3/ T3, POS/ SONET, ISDN BRI/ PRI, Conventional leased lines/ IPLC, Optical Fiber, Dark Fiber, TDM, WAN/ MAN/ LAN, MEN, VPLS, IPVPN, IVPN, MPLS VPN, DIA, aVPN, DMVPN/ EZVPN, IPSec, GRE over IPSec, SRST, DSL/ Network Monitoring PRTG, HP Network Node Manager, Solar Winds, Nagios

Management Tools: NSM (Net Screen Manager for Juniper SSG Devices), Cisco Works, ASDM, IDM, Net QoS, CA, Solar Winds, Cisco Prime.

Cisco Administration: IOS Upgradation using TFTP/ Xmodem/ SCP, AAA/ TACACS/ RADIUS, Hardware Installation, Process Memory & CPU Utilization.

Languages: C, C++, Java, Python, UNIX, Bash/Shell Scripting.

PROFESSIONAL EXPERIENCE:

Confidential, IL

Jr. Network Engineer

Roles &Responsibilities:

  • Secure the corporate WAN/LAN and server architecture. Maintain firewalls& IPsec gateways and related equipment.
  • Provide security guidance and drive infrastructure decisions in collaboration wif other technical team, ensuring security principles are being upheld and no violations of security policy is taking place.
  • Configured the BGP as a WAN protocol, and OSPF/EIGRP as interior routing protocol.
  • Configuring and Troubleshooting Cisco Firewall/ASA, Checkpoint FW, Bluecoat Proxy SG and Cisco IronPort
  • Configuration of Access List ACL (STD, Ext, Named) to allow users all over the company to access different applications and blocking others.
  • Acquired expertise in writing Python, Unix and PERL scripts for separate functionality
  • Configured Cisco ASR, ISR 2800 & 3800 series routers wif OSPF as an enterprise IGP
  • Support Tier-1 Internet Service Providers and large enterprises in troubleshooting CiscoIOS-XR platforms - ASR9000,CRS, and XR12000
  • Implemented traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF)
  • Worked wif Cisco IOS/NX-OS, IOS-XR network software.
  • Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550).
  • JUNOS and NAT migrations on Juniper SRX firewalls
  • Review monitoring and security risks for our network infrastructure, update security policies using Juniper NSM and Palo Alto firewalls
  • Installation of Cisco ASA 5500 series firewalls, Cisco 3500, 4500, 6500 series switches
  • Configuration and Maintenance of ASA 5550, ASA 5510 Firewalls and Cisco IPS 4240 using Cisco Security Manager (CSM).
  • Installing, configuring Juniper (M, Mx and EX Series) and SRX devices.
  • Updating and troubleshooting IPS/IDS (Cisco, Fortinet).
  • Provided Configuration and VPN support for Cisco and Fortinet.
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tuning AS-path.
  • Convert campus WAN links from point to point to MPLS and to convert encryption from IP Sec /GRE to Get VPN
  • Daily technical hands on experience in the configuration, troubleshooting of Juniper SRX firewalls as well as experience working directly wif customer in a service/support environment.
  • Extensive implementation of firewall rules on Juniper SRX daily, using SPACE as well as CLI when needed.
  • Responsible for overall firewall configuration implementations and policy installations across all platforms during maintenance windows including Juniper, Check Point, and Fortinet for major enterprise network.
  • Install and configureBluecoatProxy SG in the network for web traffic management and policy configuration
  • Configuration and troubleshooting of EIGRP, OSPF, BGP.
  • Configuration of Standard and Extended ACLs for Security.
  • Troubleshooting the issues related to routing protocols.
  • Managing, troubleshooting and monitoring the network using Network Monitoring tool. Network Security implementation wif Cisco IOS Feature Set, NAT, and Simple Network Management Protocol.
  • Involved in migration from Frame-Relay/ATM network to MPLS-based VPN for customer’s WAN infrastructure
  • Provided support for troubleshooting and resolving Customer reported issues.
  • Performed IOS upgrades on Catalyst 6500, 4500, 3500 series switches, and 7200, 3800 and 3700 series routers.
  • Creating new templates for Nexus, Juniper, ASR, andAristadevices by accessing networking devices in production and analyzing the available configurations.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/6500 switches and Cisco 3640/7200/3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA5510, Checkpoint, Aruba Controllers 6000, 3600, 3400,650: windows server 2003/2008: F5 BIGIP LTM.

Confidential

Jr. Network Engineer

Roles &Responsibilities:

  • Implement Security Policies
  • Controlnetworkaccess based on device type.
  • Apply port forwarding, source NAT and destination NAT.
  • Authenticate users through the firewall policies.
  • Offer an SSL VPN for secure access to your privatenetwork.
  • Establish an IPsec VPN tunnel between two Fortigate appliances.
  • Deploy the right operation mode.
  • Deploy an explicit proxy wif firewall policies, authentication and caching.
  • Evolve beyond port numbers wif application control.
  • Neutralize threats and misuse: viruses, torrents, and inappropriate websites.
  • Deploy FortiGate devices as an HA cluster for fault-tolerance and high performance.
  • Inspect traffic transparently, forwarding as a layer 2 device.
  • Connect virtual domains (VDOMs) wifout packets leaving the FortiGate.
  • Fight hacking and denial of service (DOS)
  • Offer Fortinet Single Sign On (FSSO) access tonetworkservices, integrated wif Microsoft A D.
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies.
  • Understand encryption functions and certificates.
  • Defend against data leaks by identifying files wif sensitive data, and block them from leaving your privatenetwork.
  • Optimize performance by leveraging the ASIC acceleration chips, such as CP or NPs, instead of only the CPU resources.

We'd love your feedback!