Sd Wan Engineer Resume
NJ
PROFESSIONAL SUMMARY:
- Having 12+ Years of experience in the field of Networking (Security, Routing, Switching and SD WAN).
- Excellent working knowledge of TCP/IP protocol suite and OSI layers
- Experience in addressing Cisco infrastructure issues, monitoring, debugging like routing, WAN outages, Network Hardware/Software failure, configuration and performance issues.
- Expertise in configuring switching protocols such as ARP, VTP, PPP, VLAN, STP, RSTP, PVST+, HSRP, GLBP, VRRP and Routing Protocols such as RIP, OSPF, BGP, EIGRP, IS - IS, MPLS and SD WAN.
- In-depth knowledge of deploying and troubleshooting LAN, WAN, Frame-Relay, Ether-channel.
- Configuration and administration of DNS and DHCP servers.
- Strong hands on experience in Monitoring and Troubleshooting of Cisco's ASA 5500Firewalls. Implemented Security Policies using ACL, IPSEC, VPN, TACACS+ and RADIUS.
- Experience in installing, configuring and troubleshooting of Checkpoint Firewall, Fortigate and Juniper SRX series
- Experience in adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications and Analysis, Account and Audit by Secure Tufin.
- Worked with F5Load balancing, IDS/IPS, Bluecoat proxy servers and Administrating, authentication controls (Radius, TACACS+)
- Experience in working with Juniper routers such as MX-480, MX-960 and switches EX-3300, EX-4200, EX-4300, EX-8200 and Juniper firewalls such as Juniper SRX-610, SRX-3600
- Experience in Implementing Check Point Firewalls NG, NGX, NG R55, NGX 60, NGX R65, R70, R75, R77.
- Extensive knowledge in implementing and configuring F5 Big-IP LTM-3900, and 6900 Load balancers
- Experience with Load Balancers for administrating and monitoring global & local traffic using F5 BIG IPLTM & GTM
- Configured Client-to-Site and site to site VPN using SSL Client on Cisco ASA 5520 ver 8.2.
- Strong hands on experience in layer-3 Routing and layer-2 Switching. Dealt with Cisco router models like 7200, 3800, 3600, 2800, 2600, and 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, and 2900 series switches.
- Experience in IPSEC VPN design connection and protocols, IPSEC tunnel configuration, encryption and integrity protocols.
- Experience in working with Nexus 7k, 5k, 2k series devises
- Working knowledge and monitoring of tools like Solar Winds and network packet capture tools like Wire-shark and TCPDUMP for analyzing the real-time statistics during the packet flow
- Knowledge in Linux and Unix Operating Systems, web security devices or proxy - Cisco and Bluecoat, understanding of global security policies
- Design expertise for theSD-WAN(Versa),SD-LAN andWANoptimization technologies for efficient delivery of the application data across LAN andWAN.
TECHNICAL SKILLS:
Routers: Cisco 7600, 7200, 3800, 3600, 2900, 2800, 2600
Routing: EIGRP, OSPF, IGRP, IS-IS, HSRP, RIP and BGP
Switches: Nexus 2K/5K/7K, Cisco Catalyst 6500, 4500, 3850,3560, 3750, 2960, GSR 12000, 7600, ASR9K/ASR1KSwitching
VTP, ARP, LAN, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer switch, Ethernet channels, Transparent Bridging.: Network Security
Checkpoint Firewall NG, NGX, NG R55, NGX60, NGX R65, R70, R75. Cisco PIX (506/515/525/535) and ASA (5505/5510) Series. Palo Alto Firewalls (PA- 5000/3000)Juniper Platforms: SRX, MX, EX Series Routers and Switches
Load Balancer: F5 Networks (Big-IP) LTM 8900 and 6400.
SD WAN: Versa 16 -1R2, R2-S2.2 - 20.1.0
LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet
WAN: PPP, HDLC, Channelized links (T1/T3), Fiber Optic Circuits, Frame Relay.
Comm. Protocols: ARP, Wi-Fi, WiMAX, CDMA, 3G
Gateway Redundancy: HSRP and GLBP
WAN Optimizer: Riverbed Steelhead Appliance
DHCP and DNS: Infoblox
Various Features: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP, FTP
AAA Architecture: TACACS+, RADIUS, Cisco ACS.
Network Management: Wireshark, SNMP, Solarwinds, Splunk, ELK & Sumo logic
Script: VB (Visio Basic), Python
Monitoring Tools: Wire shark, Splunk, ELK, TCP Dump
PROFESSIONAL EXPERIENCE
Confidential, NJ
SD WAN Engineer
Responsibilities:
- Administration and maintenance of Versa FlexVNF appliances configured with CGNAT, Nextgen Firewall (NGFW), IPSEC, QOS, SLA monitoring, and URL filtering and Non-Versa Components, such as TACACS, JUMP, SYSLOG, NTP and PROXY
- Administration and maintenance of cluster nodes of Analytics and integration to IXIA to monitor logs in SPLUNK and LOGSTASH
- Physical Bootstrapping scripted and global script based bootstrap on uCPE’s.
- Troubleshoot IPSEC overlay connectivity fromSD-WANappliance to VersaSD-WAN controllers via Internet, MPLS and WBS transports.
- Continuous industry knowledge upgrade per theSD-WANproducts, Cloud resources and firewall for enterprise and service provider to ensureSD-WANclients/ISP expectations are met.
- Troubleshooting and configuration of Versa FlexVNFSD-WANappliances including Versa 100, 500 and 800 series Advantech devices via CLI, appliance context and Versa director contexts.
- Captured packets in customer data center or enterprise environment to ensure fault/down time are promptly resolved Sniffer and WireShark
- Working with the customer to troubleshoot complex hardware and software issues and replicate customer environments and network problems as needed to provide resolution. Document issues and work with engineering if needed to provide fixes.
- Served as the customer advocate for timely resolution of issues and for problem reproduction and escalation Participated in new product development, customer training, and other support related activities Helped defined and developed support processes and tools as appropriate
- Upgrade Versa FlexVNFSD-WANappliance software.
- Led the transformation of on premise product to SDN/NFV based product. This resulted in first ever Open stack KVM, VMWare, Microsoft Azure, AWS and Oracle VM, OCI based solution.
- Certification, testing and verification of SDWAN solutions and services.
- Development of automation and tools using and scripting
- Functional test planning, test executions, scripting and track issues with vendors.
- Evaluating new release of SDWAN solution on cloud platform for various products.
- VMD Deployment, installation, configuration and trouble shoot
- Upgrade Versa components by automation and post configurations
- Log analysis by using Splunk and ELK
- Configure MPBGP, ZTP URL Activation, VPN Profile and all its related issues
- Investigate and identify underlay and overlay BGP routing issues.
- SDWANtechnical assistance consultant with hands own on enterprise and ISP environment
- Deep technical troubleshooting on customerSDWANEdge connect device, Firewall Fortigate and Palo Alto.
- Collaborated with various engineering teams for successful migration of configuration management using REST API and Service Template. Working on bind variable to fix Robot script for Automation.
- Working on ONOPE, ONICE and INFRA MONITORING TOOLS.
- Drove the collaboration across product and account management, engineering and executive teams. Worked with multi-site teams for strategy creation, requirements management and work scoping leading to a successful launch of new product
- Drove the automation for VM
- Tech Stack: Various cloud providers, REST, JMeter, Python, Chef and Postman
Confidential, Chicago
Network Support Engineer
Responsibilities:
- Perform troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configure Cisco and Juniper Routers for OSPF, RIP, IGRP RIPv2, EIGRP, BGP, MPLS Static and default route.
- Responsible for Palo Alto and Cisco ASA firewall administration across global networks.
- Responsible role for implementing, engineering, & level 2 support of existing network technologies / services & integration of new network technologies / services.
- Designing, configuring, implementing and troubleshooting (LAN) VLAN’s, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel of Cisco & Juniper Switches.
- Configuring HSRP for network redundancy and High availability.
- Implementing and managing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
- Planned, tested and evaluated various equipment’s, systems, IOSs and procedures for use within the Network/ security infrastructure.
- Upgrading IOS, troubleshootingnetworkoutages
- Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network
- Working on EX-3300, 4300, QFX5100, Cisco 7K, 5K, 2K Switches and virtual chasis fabric, MC LAG, Voice configurations.
- Working on OMNI and ELK for monitoring and logging issues
- Working BMC Discovery
- Working on Auroba Controller, Access points, add devices, WLAN, H.323, SIP, VOIP Gateway, Codec, Native VLAN’s, Voice data and working on CUCM, so on.
- Working on SecureTuffin for Analysis, Audit and Generate Reports. Secure Change for change implementation by doing automation.
- Working on Palo Alto, FreeBSD, Checkpoint and Cisco ASA Firewalls for policy configuration, VPN’s, global objects and so on - Decommission process and deployment so on.
- Responsible to monitor and collect logs over Cisco ISE and configure policies for Network Admission and Access so on.
- Supporting customers to implement and manage ACI, Cisco UCS.
- Responsible for working closely with customers to troubleshoot ACI issues, and improving the ACI product through documentation and knowledge sharing.
Confidential - Reston, VA
Network Security Engineer
Responsibilities:
- Configuration, Management and Troubleshooting of Checkpoint, Palo Alto and Fortinet Firewalls.
- Utilized Forti Manager, FortiClient and Forti Analyzer to maintain and optimize FortiGate firewalls.
- Migrated legacy Cisco ASA firewalls to Fortinet firewalls using Forti Convertor migration tool in the enterprise environment.
- Working on Traffic Migration from Cisco ASA firewalls to Fortigate.
- Collaborated with system administrators’ team to implement ACL on System, Servers, Firewall, Active directory, AWS IAM and in DLP solutions for policy configurations and providing end point security, working on Proactive threat prevention, Anti-virus, Anti spyware, IPS and NACL etc. (Symantec and Netskope).
- Participated with security team on risk assessment, vulnerability assessment, SDLC, Incident response and gap analysis to create plan for each activity and achieve it in time.
- Monitored day to day logs of systems and network from Firewalls, IDS, Sysmon and Splunk server; and documented every high level, middle level alerts (like Botnet, New Intrusion etc.) as a part of evidence gathering to suggest new rules and policy’s suitable to working environment.
- Experience in working on Symantec HIDS/ HIPS CSP solution for FIM (File Integrity Monitoring) and prevention policies including detailed policy creation/ application and Alert configuration
- Performing System Administration Tasks for Symantec Data Center Security.
- Provide onsite SymantecDLPtechnical service and support to a Large Enterprise customer base.
- Upgraded the infrastructure from SymantecDLP12.5 to SymantecDLP14.0
- Implemented site to site VPN in Juniper SRX as per customer.
- Implemented various EX, SRX & J series Juniper devices.
- Made changes to network to easy isolation process, designed and implemented the backup recovery plan for system recovery’s, customized the logs of network and system components and directed them centrally to facilitate the incident/breach detection.
- Conducting a deep system and memory analysis using the forensic tools to find the malwares and to gather the proof of compromise for chain of custody
- Design the right remedy for the detected events and creating the IOC for network and system.
- Followed the right incident leads from networks and systems during the time of incident and also reverse engineered the dead systems and memory units to find exact cause of compromise.
- Part of Pen-Testing team on Black-Box testing of client and worked on Metasploit framework, Harvester, Maltego, Netcat and Nexpose.
- Worked on Blue Coat Proxy SG to safeguard web applications in extremely untrusted environments such as guest Wi-Fi zones.
- Deployment and Management of Blue coat proxies in forward proxy scenario as well as for security in reverse proxy scenario.
- Configured Zscaler cloud-based proxy solution for content filtering, DLP tools for working end client protection and reporting.
- Performing URL filtering and content filtering by adding URL's in Blue coat Proxy SG's.
- Provided administration and support on Blue coat Proxy for content filtering and internet access to primary, remote site offices and VPN client users
- Support Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
- Working on Service now to attend incidents and changes for operational changes.
- Configure Implement, Secure and support Virtual Network and best security practices for single and multi-regional data centers.
- Implemented data partitioning, replication, database mirroring.
Confidential - Ashburn, VA
Network Security Engineer
Responsibilities:
- Performed conversion of Palo Alto & Checkpoint VPN rules
- Performed upgrade Checkpoint R.78 to R80.10 and configuration changes, optimization, integration and deployment.
- Involved in the configuration and maintenance of IPSec Site-Site VPN and Decommission.
- Reviewed changes to network configuration for technical accuracy and provide solutions to Multi-Protocol Network problems.
- Created and designed network layout and documented network system design with detail information using Visio software. Vendor co-ordination for hardware issues and assessment management.
- Strong interpersonal, organizational communication, customer service & presentation skills.
- Performed Lockdown and Firewall rule removal for cleanup and optimization of Check Point Firewall
- Performed cleanup shadowing rules and partial shadowing firewall rules
- Performed blueprint to add service or network objects, groups and modifications, upgrade and trouble shoot
- Performed professional level documentation using Visio diagrams.
- Performed on Palo Alto Firewall on network security software and hardware, security monitoring systems, encryption software, threat and vulnerability management services and software, identity management solutions and network objects on global group, clean up unused rules, decommission etc.
- Worked with Checkpoint Firewall (SPLAT/GAIA) for management (Smart Dashboard, Smart Monitor), Logging (Smart Log, Smart View Tracker) and PAN OS
- Hands on experience with SIEM tools (QRADAR and Splunk), Intrusion Detection and Prevention Systems (IDS/IPS) and log management.
- Proficient with Splunk architecture and various components (indexer, forwarder, search head, deployment server), Heavy and Universal forwarder, License model.
- Implemented workflow actions to drive troubleshooting across multiple event types in Splunk.
- Policy Reviewing, Audit and cleanup of the un-used rule on the firewall using SecureTuffin and Splunk.
- Monitor and analyze Intrusion Prevention Systems (IPS), Anomaly Detection Systems (ADS), and Splunk/Arc Sight/QRadar (SIEM) to identify security issues for remediation.
- Responsible for supporting customers with Symantec products including Ghost Solution Suite, Deployment Solution, and Symantec Endpoint Protection.
- Responsible for using cutting edge solutions for Data Loss Prevention, threat prevention, anti-virus, system center and so on.
- Information protection solutions including DLP and Auditing.
Confidential, Vienna, VA
Network Security Engineer
Responsibilities:
- Configuration, Management and Troubleshooting of Checkpoint, Palo Alto and Fortinet Firewalls.
- Experienced on troubleshooting firewall issues using SmartView Tracker, FW Monitor and CLI Mode (tcpdump and Using Packet Capture Analyzers)
- Worked on building Site to Site VPN, Integration and Acquisition projects.
- Extensively worked on Rule Optimization and Decommission Changes.
- Review and optimize firewall rules using Rule Base Analyzers (Tufin) and generate Firewall audit reports.
- Involved in complete LAN, SD WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.).Involved in Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter VLAN routing, LAN security etc.Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
- Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Ether Channel implementation onASR9K redundant pair.
- Configured and Managed Forti-Manager and Fortinet Firewalls.
- Utilized Forti Manager, FortiClient and Forti Analyzer to maintain and optimize FortiGate firewalls.
- Resolved 8 to 10 tickets in a day from Tufin.
- Resolved Customers request to create firewall policies for Cisco ASA, Fortigate and NX-OS.
- Experience in configuring, supporting and troubleshooting Fortinet devices (60D, 200D, 500D, 600C, 800C, 900D, 1500D, 3700D, FAZ, FMG, 5144C, FCTRL, FML, FG) which includes the routing protocols (static, BGP), switching (Vlans, VCP, VPLS), NAT, firewall policies, SNMP, SYSLOG, LDAP and managing all the network gear related functions.
- Assisting various departments to meet their needs regarding Site-to-Site and Remote Access VPN.
- Troubleshoot connectivity issues through firewalls using command line utilities and GUI on Checkpoint Security Gateways, Cisco Firewalls especially ASA 5500(5540,5580) & amp; 5585X, Fortinet running on 3700D with 5.6 FortiOS.
- Conducted POC trials of Network Security technologies including web application firewalls (Fortigate) then implemented the solutions.
- Migrated legacy Cisco ASA firewalls to Fortinet firewalls using FortiConvertor migration tool in the enterprise environment.
- Configuring, maintaining and troubleshooting with Fortinet firewall and security.
- Implement and monitor firewalls (Fortinet, Checkpoint and Cisco) security policies.
- Working on Traffic Migration from Cisco ASA firewalls to FortiGate.
- Setup simplified and traditional VPN communities, and Cisco any connect.
- Researched, designed, and replaced Checkpoint firewall architecture with new next generation Palo Alto PA3000 and PA5000 appliances serving as firewalls and URL and application inspection.
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
- Successfully installed Palo Alto PA-3000/PA-5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
- Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls and implemented Zone Based Firewall and Security Rules on the Palo Alto Firewall. Exposure to wild fire feature of Palo Alto.
- Worked with Palo Alto firewalls PA250, PA4050, PA3020 usingPanoramaservers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.
- Configured systems log on the Palo Alto firewall and moved the logs toSplunk.
- Worked with Palo Alto firewalls PA5050 usingPanoramaservers, performing changes to monitor/block/allow the traffic on the firewall.
- Worked extensively in Configuring, Monitoring and Troubleshooting Palo Alto with ACL, NAT, Object Groups, Failover and Multi-Contexts.
- Responsible for Palo Alto and Cisco ASA firewall administration across our global networks Maintenance and configuration of Cisco ASR1000 series
- Configured, troubleshoot, and upgraded Checkpoint Firewalls for Manage clients, which included network and/or resource access, hardware or software problems.
- Implementing and troubleshooting (on-call) IPSec VPNs for various business lines and making sure everything is in place. Implementing IPSec and GRE tunnels in VPN technology. Designed, configured, implemented site-site VPN on Cisco ASA 5500 firewall.
- Worked with Data Center Network Manager offers intuitive, multi-fabric topology which supports VXLAN, Layer 2, Virtual Port Channel, Virtual Device Context, and Virtual SAN.
- Strong experience with monitoring and troubleshooting the data center network infrastructure.
- Configured Trunk ports and implements granular control of VLANs andVXLANsusing NX-OS to ensure virtual and flexible subnets that can extend further across thenetwork.
- Datacenter experience create new cable run list (L1), document runbook and Solution planning and upgrading, architectVXLAN, ACI and ASA cluster firewall with NAC, ISE
- Hands-on experience in usingnetworkmonitoring tool ELK, Solarwinds Net Flow Traffic Analyzer, Net Scout, Network Performance Monitor (NPM), Network Configuration Manager (NCM).
- Monitored and managed networks using Cisco Works tools and Wireshark.
Confidential
Network Support Engineer
Responsibilities:
- Assisted with troubleshooting all network issues with routers and switches when necessary and consulted with on call tech as needed for client.
- Configuration and Administration of Cisco and Juniper Routers and Switches.
- Validate existing infrastructure and recommend new network designs.
- Installed and maintained Cisco and F5 Load Balancer documentation.
- Responsible for network design, bandwidth allocation, IP address allocation, supervising installation, configuration and maintenance on major network technologies.
- Worked with various internal organizations during pre/post deployment phase of different type of circuits.
- Installed and configured Cisco 2600, 2800, 3600, 3800 routers and 2950, 3700, 6500 switches.
- Hands on experience with Nexus Switches 2K, 5K and 7K.
- Maintained and managed networks running OSPF and BGP routing protocols.
- Configured route redistribution between OSPF and EIGRP in a multi-area OSPF network.
- Daily monitoring of network traffic using sniffers (Wireshark) and access logs to troubleshoot and identify network issues.
- Performed switching technology administration including VLANs, inter-VLAN routing, Trunking, port aggregation
- Configure Cisco and Siemens IP and Cisco wireless phones
- Troubleshoot/connect, terminate new and existing voice & data lines
- Network port activation
- Experienced in Cisco Unified Communications Manager (CUCM)
- Cable clean-up and installation
- Route redistribution and route update manipulation using route-maps; distribute lists and AD manipulation and link negotiation.
- Providing Tier II support in the provisioning, end-to-end test and turn-ups and maintenance of the major accounts. Optimizing Network by continuously and extensively working with customer to upgrade and optimize network and Circuit Move Add Changes including detailed design documentation.
- Performed Layer I, II and III troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for BGP, OSPF, RIP, RIPv2, EIGRP, Static and default route in a VPN environment using MPLS.
- Implemented and troubles hooted the MPLS network.
- Implemented changes and upgrades to network equipment and perform quality assurance reviews of those upgrades. Reviewed all changes to network configuration for technical accuracy and impact.
- Provided Network Support in the designing and implementation of Point to Point over T1s Frame Relay, DSL over ATM and IP over Frame Relay and Gigabit Ethernet.
- Provided Tier1 and Tier 2 support in VOIP, escalate the issues like latency & QOS
- Documentation of network resources, systems, peripherals, procedures and policies for optimization of IT resources and security.
- Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.
- Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
- Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
- Co-ordinated with the Data Network and Security team and came up with possible solutions.
- Work on Physical Site Inventory verification; gather information of various Cisco Network devices and Security Devices to develop Run book and Spec Book.
- Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
- Monitoring with Solarwinds to observe hardware and software issues for debugging and log reporting.
- Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
- Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view) and experience with developing complex network design documentation and presentations using VISIO
Environment: Cisco 2600/2800/3600/3800 Routers, Cisco 2950/3700/6500/7613 switches, ASA, Firewall, RIPv2, OSPF, BGP, EIGRP, LAN, WAN, MPLS, F5 Load Balancer, VLAN, Trunking, ATM.
Confidential
Network Support Engineer
Responsibilities:
- Worked on 2600, 3500, 7613 Cisco Routers and 4500 and 6500 series Cisco Switches.
- Played responsible role for implementing, engineering, & level 2 support of existing network technologies / services & integration of new network technologies / services.
- Configured and managed Cisco access layer routers and switches
- Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
- Extensively worked on Nexus 5k and 7k, configured and troubles hooted.
- Provided support for troubleshooting and resolving customer reported issues
- Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.
- Worked on F5 and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance.
- Configured and managed OSPF redistribution and authentication with type 3 LSA filtering and to prevent LSA flooding and configured OSPF over frame relay networks.
- Designing, configuring, implementing and troubleshooting (LAN) VLAN’s, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
- Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience
- Implemented site to site VPN in Juniper SRX as per customer.
- Implemented various EX, SRX & J series Juniper devices.
- Implementing and managing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
- Configuring HSRP for network redundancy and High availability.
- Involved in designing of LAN (Ethernet) and WAN infrastructure for the new Data Centre Using MS Visio.
- Configuring VPN for site-site and remote access.
- Designing and configuring IP address schemes.
- Maintaining Cisco hardware and Cisco IOS upgrade.
- Configured Cisco 1231 Access points with 5959 and 4941 antennas (802.11/a/g).
- Provided Tier1 and Tier 2 support in VOIP, escalate the issues like latency & QOS
- Designing, configuring, implementing and troubleshooting (LAN) VLAN’s, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
- Implementing and managing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
- Configuring and implementing F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic
- Network port activation
- Cable clean-up and installation
- Planned, tested and evaluated various equipment’s, systems, IOSs and procedures for use within the Network/ security infrastructure.
- Upgrading IOS, troubleshootingnetworkoutages.
- Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short- and long-term planning, implementation, project management and operations support as required.
- Using Solarwinds and Spectrum to monitor the entire global enterprise. Knowing Solarwinds was key working in the NOC to catch or troubleshoot Sev1 outages.
- Provided leadership for enterprise technology support area by properly escalating complex incidents for the technical resolution of customer support issues.
- Consulted with other technical support teams to respond to recurring problems and facilitated in technical group meetings to assist in expediting the recovery of incidents.
- Provided incident management facilitation and interacted with Business Partners, and Support and Management teams to provide and receive incident information.
- Identified standards and procedures for process improvements and developed technical service policies for supported systems.
- Integration of Solarwinds and monitoring logs and reporting
- Configuring RIP, OSPF and Static routing on JuniperM and MX series Routers
- Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network
- Hands-on experience in the network management of circuits using TDM and Frame Relay network, performing configuration and provisioning management, fault management and performance monitor.
Environment: Cisco3640/1200/7200/3845/3600/2800/2600/3500/7613Routers,Cisco3750/3550/3500/2960/4500/6500 Switches, LAN, WAN, EIGRP, OSPF, RIP, BGP, F5 Load Balancer, VTP, VLAN, HSRP, HTP, IPV4, Nexus 5K,7K, LTM, GT