Network Security Consultant Resume
2.00/5 (Submit Your Rating)
SUMMARY
- As an experienced network architect, security engineer, project manager and line manager, I have been responsible for the design, installation, and operations and management of small, medium, and large LANs and WANs for over twenty years.
- I have extensive experience in systems integration projects supporting the integration of multi - vendor equipment from concept to cutover.
- During my career, I have accumulated over seven years of direct management experience.
PROFESSIONAL EXPERIENCE
Network Security Consultant
Confidential
Responsibilities:
- Connected seven sites for a construction company using Checkpoint appliances and creating VPN tunnels to HQ in Warren, Virginia
- Performed Root Cause Analysis for a manufacturing company after a serious outage. Configured QualysGuard and performed vulnerability assessment
- Replaced five closet switches with HP ProCurve switches and reconfigured VLANs and inter-VLAN routing for a car dealership in Northern Virginia
Network Security Consultant
Confidential
Responsibilities:
- Served as the Network Security Consulting Engineer responsible for implementing a new core architecture at Howard University. IBM was the prime on this 7-year managed-services contract
- Implemented Cisco Firepower and Nexus 9000 series equipment at the RCN data center in Lanham, Maryland in a fully redundant configuration with two 10 Gbps egress circuits dual-homed to two Howard University redundant POP locations
- Migrated from TrendMicro Tipping Point to the Cisco Firepower appliances for IPS
- Moved external partner VPN tunnels from the Cisco ASA 5585 to the Cisco Firepower appliances
- Migrated Remote Access VPN from Juniper to the Cisco Firepower appliances
- Responsible for BAU and support of the existing network
- Responsible for developing, documenting, and presenting the HU Security Architecture to IBM
Network Security Engineer
Confidential
Responsibilities:
- Implemented new 12400 Check Point NGTP cluster at production facility in Phoenix, including meshed VPN network
- Implemented Check Point 1120 and 640 appliances for out-of-band management and remote office connectivity
- Implemented Digi16 and Digi32 devices for remote serial connections
- Maintain and troubleshoot all network security devices
- Developed and performed Red Team exercises
- Upgraded old Brocade (Foundry) 4G-SSL load balancing appliances to Brocade Virtual Traffic Manager using the Web Application Firewall (WAF) at two facilities
- Responsible for all aspects of network engineering in addition to my security duties.
Brocade Security Engineer
Confidential
Responsibilities:
- Reconfigured vrrp-e instances on the ServerIron pair
- Resolved VLAN inconsistencies
- Gathered data with Wireshark to assess network connectivity
- Reconfigured ACLs throughout the network
- Assessed and reconfigured OSPF, and eBGP
- Assisted with the implementation of a new network utilizing A10 network equipment with Avaya switches
- Created both “as-is” and “to-be” network drawings
Network Engineer
Confidential
Responsibilities:
- Worked on the assessment/rationalization phase of GSA’s data center consolidation project
- Installed Riverbed and Gigamon equipment in the Fort Worth, Texas data center
- Performed on-site assessment of GSA’s Kansas City data center
- Utilized VMware Capacity Planner to assess virtualization capabilities
- Assessed Gigamon data with Riverbed Cascade
- Provided planning and documentation
Senior Systems Engineer
Confidential
Responsibilities:
- Member of Core Network Engineering team tasked with consolidating the entire data center of BLS.
- Implemented a re-designed switching and routing infrastructure to support consolidation activities (data center rack reduction from 135 to 65)
- Implemented IPS systems
- Retired one of two Catalyst 6513s at the core and implemented a Cisco Nexus 7010 in its place as the new core switch. Heavy emphasis on security.
- Implemented two Cisco UCS C250 servers for virtualization of mission-critical applications.
- Installed a new SAN network consisting of a Nexus 5010 and Nexus 2148 fabric extenders to migrate from the legacy Catalyst 6506 SAN network switch.
- Developed test plans and documentation to support implementation activities and the operational life cycle
- Virtualized over 40 servers using VMware ESX and VSphere
- Resolved complex network issues in a data center environment
- Implemented a fibre channel SAN for embargoed data using Brocade switches
- Eradicated internal static routing in favor of OSPF. Successfully configured OSPF authentication between the Cisco Nexus equipment and numerous HP ProCurve 3500 and 6200yl switches.
- Installed and configured F5 Big-IP load balancers for Web server farm (Layers 4 and 7)
- Relocated and configured building-wide television equipment
- Implemented controller-based Aruba wireless architecture
- Worked with business process and engineering teams to update existing Disaster Recovery and Continuity of Operations plans