We provide IT Staff Augmentation Services!

Sr. Network Security Admin Resume

3.00/5 (Submit Your Rating)

Boston, MA

PROFESSIONAL SUMMARY:

  • Network Engineer with Over 8+ years of experience in testing, troubleshooting, implementing, optimizing and maintaining enterprise data network and service provider systems.
  • Implementation, Configuration and Support of Checkpoint (NGX R65, R70, R71, R75 and R77), Juniper Firewalls (SRX5400, SRX5600 and SRX5800), Cisco Firewalls (ASA 5505, 5506 - X, 5585), Palo AltoNetworks Firewall models (PA-2k, PA-3k and PA-5 k).
  • Provide scalable, supportable military grade TCP/IP security solutions along with expert TCP/IP network designs that enable business functionality.
  • Administration, Engineering, and Support for various technologies including proficiency in LAN/WAN, routing, switching, security, application load balancing and wireless.
  • Worked on Juniper Net Screen Firewalls NS50, SSG 550M, SSG520M, ISG 1000, ISG 200 and Cisco PIX 535, 520, 515, ASA -5500 and 5505.
  • Experience in Deployed Check Point Provider-1 NGX and configured CMAs
  • Install, configure, document, and maintain global enterprise LAN/WANsystems consisting of Brocade, Foundry, Cisco, Juniper, Palo Alto, Avaya, andRiverbedtechnologies.
  • Policy development and planning / programming on IT Security, Network Support and Administration.
  • Experience withJuniperSRX 240 Firewalls, QFX,MX, EX SERIES
  • Experience in configuring and Troubleshooting BIG-IP F5 load balancer LTM.
  • Creating Virtual Servers, Nodes, Pools and iRules on BIG-IP F5 in LTM module.
  • Experience with Firewall migrations from PIX firewall to Cisco ASA and Juniper SRX firewall appliances
  • Supported configurations forCiscoVoice CUCM, Unity and UCCE as well as supporting infrastructureACS, Radius and F5
  • Experience in analyzing security logs generated by Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, network flow systems, Anti-Virus, and/or other security logging sources.
  • Monitor SIEM and IDS/IPS feeds to identify possible enterprise threats. Actively investigate, respond to and remediate security incidents.
  • Proficiency in configuringCiscoASA 5540, 5580,AAAauthentication, Palo Alto Firewall
  • Strong background working with Cisco Unified Communications suite (Call Manager, Unity Connection, Presence, Emergency Responder, Jabber Client)
  • Experience with Bluecoat Proxy servers, LAN & WAN management.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Experience with Checkpoint VSX, including virtual systems, routers and switches.
  • Design Cisco voice technologies, including CiscoUnifiedCommunicationsproducts such ascommunicationsmanager (CUCM), Unity/Unity Connection, and CER
  • Administration of IBM QRadar SIEM systems,
  • Experience with DNS/DFS/DHCP/WINS Standardizations and Implementations.
  • Extensive understanding of networking concepts, (IE. Configuration of networks, router configuration and wireless security, TCP/IP, VPN, Content Filtering, VLANs, and routing in LAN/WAN, Ethernet Port, Patch Panel and wireless networks.)
  • Experience with security tools from various vendors to include: Cisco, McAfee, Symantec, Sourcefire, ArcSight, Juniper, BlueCoat, Encase, FireEye.
  • Experience with management platforms such as Panorama, Juniper NSM and Smart center.
  • Hands on experience with Juniper mx and ex series
  • Black listing and White listing of web URL on Blue Coat Proxy Servers.
  • Administration of production Windows Servers infrastructure that includes Domain Controllers, IIS Web Servers, SharePoint, File and Print and FTP/SFTP servers.
  • Experienced with routing protocols (RIPv1/2, IGRP, EIGRP, OSPF, BGP), switching (VLANS, VTP Domains, STP and trunking),
  • Extensive experience in Windows 2008 R2/2008/2003 Wintel Servers at single or multi domain platforms.
  • Proficient in installing and configuring Windows Server 2003, 2008, 2012 and Windows XP, 7 & 8 Professional Client Operating Systems
  • IDS and IPS event management using CSM including signature updates for SSM Modules, IDSM.
  • Provides management level reporting of firewall and Intrusion Protection System (IPS) activity on a periodic basis.
  • 24 x 7 on call support.

TECHNICAL SKILLS:

Cisco router platforms: 2500, 2600, 2800, 3600, 3700, 3800, 7200, 7609

Cisco Switch platforms: 2900XL, 2950, 2960, 3560, 3750, 4500, and 6500.

Firewalls & Load Balancers: Cisco ASA 5585, 5550, 5540, Juniper SRX5400, 5600, 5800, Juniper Netscreen 6500, 6000, 5400. Juniper SSG Firewalls, Palo Alto PA- 2000/3000/4000/5000, F-5 BIG-IP LTM (3900 and 8900), Blue Coat SG8100, AV 510, AV810.

Routers: Cisco routers (1900, 2600, 2800, 2900, 3600, 3800, 3900, 7200, 7600), Cisco L2 & L3,Cisco NCS 2k,4k,4216, Juniper routers (M7i, M10i, M320)

Switches: Cisco switches (3560, 3750, 4500, 4900 & 6500), Nexus (2248, 5548 &7010)), Cisco ASR 9000 series, Cisco ACE load Balancers

Routing: RIP, EIGRP, VRF, OSPF & BGP, Route Filtering, Redistribution, Summarization, Static routing

WAN Technologies: FRAME RELAY, ISDN T1/E1, PPP, ATM, MPLS, leased lines, DSL modems.

LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, NAT/PAT, FDDI. Cisco

Secure Access Control Server (ACS) for TACACS+/Radius.

Routing Protocols: RIP, OSPF, EIGRP, and BGP.

Switching Protocols: VTP, STP, RSTP, MSTP, VLANs, PAgP, and LACP.

Network management: SNMP, CiscoWorks LMS, HP OpenView, Cisco ISE, Solar winds, Ethereal.

Software: Microsoft Office Suite, MS SQL Server 2008, HTML.

Language: Unix, Turbo C / C++, basics in Perl and Shell scripting.

EXPERIENCE:

Confidential, Boston, MA

Sr. Network Security Admin

Responsibilities:

  • Implementing security Solutions using PaloAlto PA-3000/5000, Cisco 5580/5540/5520
  • Configuration and administration of firewalls, which includes Palo Alto and Cisco ASA firewalls.
  • Researched, designed, and replaced Cisco firewall architecture with new next generation Palo Alto PA3000 and PA5000 appliances serving as firewalls and URL and application inspection.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
  • Successfully installed Palo Alto PA-3000/PA-5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • As part of Security and network operations(NOC) team I was actively involved in the LAN/WAN level 3 support (diagnose and troubleshoot layer 1, 2, 3 problems)
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls and also implemented Zone Based Firewall and Security Rules on the Palo Alto Firewall.
  • Configuration and Maintenance of Cisco ASA, ASA 5540, ASA 5520, ASA 5510 series firewalls.
  • Deployment and Management of Blue coat proxies in forward proxy scenario as well as for security in reverse proxy scenario.
  • Set up and configure new 810 and 9000BlueCoatProxySG units to Bank of America standards, updating these standards when needed with A&E.
  • Extensive knowledge of Cisco ISE, FirePower, Cisco AMP for endpoints, and/or FireEye.
  • Worked onBlueCoatProxy SG to safeguard web applications in extremely untrusted environments such as guest Wi-Fi zones.
  • Provide and ongoing support to customers in best practices with configuring a next generation Palo Alto firewall including URL Filtering, Antivirus, Intrusion Prevention,Wildfire, and Application control.
  • Provided administration and support on Blue coat Proxy for content filtering and internet access to primary, remote site offices and VPN client users
  • Monitor Intrusion Detection Systems (IDS) console for active alerts and determine priority of response.
  • Successfully deployed VIPRION 2400 with 2 blades and licensed the chassis with vCMP.
  • Review daily log data gathered from various resources such as sensors, alert logs, firewall logs, content filtering logs.
  • Installed and configured F5 BIG-IP to provide Load Balancing for server across multiple datacenters.

Environment: Cisco ASA 5580/5540/5520, Palo Alto PA-5000/3000, Big IP F5 LTM/GTM, Nexus switches, TCP/IP, VPN, wireshark, Cisco Sourcefire, Splunk, Bluecoat Proxy servers, IDS/IPS. SIEM and Monitoring.

Confidential, Boston, MA

Sr. Network Admin

Responsibilities:

  • Implementing security Solutions using PaloAlto PA-5000/3000, Cisco 5580/5540/5520, Checkpoint firewalls R70, R75, R77.20Gaia and Provider-1/MDM.
  • Configuration and administration of firewalls, which includes Checkpoint, Juniper, and Cisco ASA firewalls.
  • Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for stateful replication of traffic between active and standby member.
  • Researched, designed, and replaced Checkpoint firewall architecture with new next generation Palo Alto PA3000 and PA5000 appliances serving as firewalls and URL and application inspection.
  • Configuring rules and Maintaining Palo Alto Firewalls& Analysis of firewall logs using Panorama.
  • Successfully installed Palo Alto PA-3000/PA-5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • As part of Security and network operations(NOC) team I was actively involved in the LAN/WAN level 3 support (diagnose and troubleshoot layer 1, 2, 3 problems)
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls and also implemented Zone Based Firewall and Security Rules on the Palo Alto Firewall.
  • Planned, configured, and actively managed thecommunicationshardware infrastructure that included Cisco 3745/3845 Voice Gateways, VG248 Analog Gateways, CiscoUnifiedBorder Elements, and
  • Installed and configured high availability Big IP F5 LTM and GTM load balancers like 6600, 6800 to provide uninterrupted service to customer applications and monitoring the availability.
  • Responsible forDatacenteroperations, monitoring and maintaining the network devices 24/7.
  • Planning, designing, configuring, testing, validating, implementing and deploying of Microsoft Local Administrator Password Solution (LAPS) across client's Active Directory with GPOs.
  • Assist in the creation and maintenance of network andDataCenterdiagrams and detailed site documentation..
  • Worked on F5 solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BigIP Load Balancers.
  • Build the rules for the application access across the IPSEC VPN tunnel
  • Experience with converting Cisco 6500 IOS to Cisco Nexus NX-OS in the data center environment.
  • Install updates on new signatures.
  • Working on day-to-day service tickets to solve troubleshooting issues.
  • 24x7 support.

Environment: Cisco ASA 5580/5540/5520, Checkpoint R70, R75, R77.20 Gaia, Palo Alto PA-5000/3000, Big IP F5 LTM/GTM, wireshark,CiscoSecureACS5.x, Nexus switches, CISCO ISE, TCP/IP, VPN, Cisco WSA, Bluecoat Proxy servers, Qradar, IDS/IPS. SIEM and Monitoring.

Confidential, Columbia, SC

Sr. Network Engineer

Responsibilities:

  • Daily technical hands on experience in the configuration, troubleshooting of Juniper SRX firewalls as well as experience working directly with customer in a service/support environment.
  • Troubleshooting Firewall Connectivity related issues using Smart view tracker on Checkpoint, NSM Log viewer for Juniper Firewalls.
  • Expert working knowledge including the ability to setup, configure, upgrade, manage, and troubleshoot switches; enterprise VPN solutions; Juniper SRX firewalls.
  • Design, Implement & troubleshooting of Juniper switches, routers, Wireless and Firewalls EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240, SRX 3600/650, WLM1200, WLA632, WLA 532, WLC2800 and JunosVwireless Lan controller.
  • ExperienceQFX5100, SRX 1500, 5400, MX 480, EX 4300 Series Routers and Switches, Aruba wireless 7200 series.
  • Successfully deployed VIPRION 2400 with 2 blades and licensed the chassis with vCMP
  • Configuring & Managing LAN, WAN, VPN and Firewall of Juniper MX Routers for End Users
  • Perform the technology planning, design, implementation and L3 support of IT Security solutions including PKI, Checkpoint Endpoint Security, Splunk, Bromium, and other security tools.
  • Ensure identity management systems align withCiscohardware and software and follows TACACS+ and/or RADIUS standards by utilizingCiscoAccess Control Server as an Authentication, Authorization, and AccountingAAAserver.
  • Used Python to interface with the UI and manage the storage and deletion of content.
  • Managing and administering Juniper SRX and Checkpoint Firewalls at various zones including DMZ, Extranet (Various Business Partners) and ASZ and internal.
  • Deep understanding intrusion detection/protection systems such as Sourcefire, Firesight, Snort and FireEye and tools like tcpdump, Wireshark, nmap.
  • Licensing the VIPRION 2400 vCMP guest and mirroring the vCMP guest.
  • Implementing Security Solutions in Juniper SRX and NetScreen SSG firewalls by using NSM.
  • Monitoring Cisco FirePower (Threat Detection System), ASA traffic logs, Manage SIEM, access control list, VPN connection reports, and routers/switches change events.
  • Part of the migration from "network centric" model to an application policy model infrastructure, create plans in includeACI, Hybrid Cloud and use of containers and orchestration tools
  • Configure B2B VPN with various business partners and 3rd parties and troubleshoot VPN Phase 1 and Phase 2 connectivity issues including crypto map, encryption domain, psk etc.
  • Provided administration and support on Blue coat Proxy for content filtering and internet access to primary, remote site offices and VPN client users
  • Follow information security policies, methods, standards, NIST standards, and practices to organize information systems, IT material, and interpret regulations.
  • Monitor Intrusion Detection Systems (IDS) console for active alerts and determine priority of response.

Environment: Juniper (SRX, JUNOS, ScreenOS, NetScreen SSG), Big IP F5 LTM/GTM, Nexus switches, TCP/IP, VPN, wireshark, Cisco Sourcefire, Splunk, Bluecoat Proxy servers, IDS/IPS. SIEM and Monitoring.

Confidential, Irvine, CA

Network Security Engineer

Responsibilities:

  • Day-to-Day work involves scheduling firewall policy provisioning and working with users to identify connectivity related issues and troubleshoot using both Smart Utilities and CLI.
  • Managing and administering Juniper SRX and Checkpoint Firewalls at various zones including DMZ, Extranet (Various Business Partners) and ASZ and internal.
  • Implementing Security Solutions in Juniper SRX and NetScreen SSG firewalls by using NSM.
  • Juniper Firewall Policy management using NSM and Screen OS CLI.
  • Hands on experience with Cisco Unified Applications like (CUCM, CUC, CER, UCCX, Presence, WebEx, Wireless, Video, etc.)
  • Operate and manage routers, firewalls, load balancers, and Public-key infrastructure (PKI).
  • Working experience of IPSec, SSL VPN and PKI technologies.
  • Network consisted ofJuniperMX104, SRX3600, QFX3600, EX4300, EX2200,JuniperMAG SSL Configure and administer Cisco ASA Firewalls (5585, 5550 and 5540) and use command line CLI, Cisco CSM, ASDM for day-to-day administration.
  • Active/Standby and Active/Active HA configuration on Cisco ASA Firewalls.
  • Solved problems on case-by-case basis with deep understanding of networking/firewall concepts, particularly withFortinetdevices.
  • Worked on configuration, maintenance and administration of Palo Alto PA3000 Firewalls and migrating customers from Cisco ASA to Palo Alto in HA network.
  • Configuring rules and Maintaining Palo Alto Firewalls& Analysis of firewall logs using various tools.
  • Involved in Upgrading bluecoat proxy servers from SG s to SG B.
  • Administration Big IP F5 LTM for all Local Load balancing and use GTM for load balancing across Data Centers.
  • Work directly with insurance companies to determine patient specific coverage and understand current HIPAA laws.
  • PerformedFortinetFirewall OS upgrades viaFortinetManager.
  • Support Data Center Migration Project involving physical re-locations.
  • 24 x7 on call support.

Environment: Juniper (SRX, JUNOS, ScreenOS, NetScreen SSG), Cisco (CheckPoint, ASA Firewalls), Palo Alto Firewalls, Big IP F5 LTM/GTM, TCP/IP, FortiGate.

Confidential, San Jose, CA

Network Engineer

Responsibilities:

  • Troubleshoot problems on a day to day basis &provide solutions that would fix the problems within their Network.
  • Part of Network Operation Center NOCoffshore support team from India supporting HP Data Center 24x7. L2 support for Cisco PIX and ASA Firewalls.
  • Schedule changes and work through maintenance requests over weekends.
  • Assisted in troubleshooting LAN connectivity and hardware issues in the network of 100 hosts.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 router with HSRP.
  • Hands on experience in Cisco Routers and Switches.
  • Configuration of CISCO Routers (2600, 2800 Series) and 3550, 4500 series switches.
  • Creating groups, users and policies in Active Directory.
  • Maintenance and Troubleshooting of connectivity problems using Ping, Trace route.
  • Managed the IP address space using subnets and variable length subnet masks (VLSM).
  • Point-to-Point, Frame Relay, T3, ATM, WAN troubleshooting.
  • LAN cabling in compliance with CAT5 standards.
  • Troubleshooting Active Directory, DNS, and DHCP related issues.

Environment: Cisco 2600/2800 routers, Cisco ASA, TCP/IP, VLSM, AD, DNS, Switching/Routing.

We'd love your feedback!