Sr.network Engineer Resume
SUMMARY:
- 8 Plus years of experience in Networking, Security, System Engineering and Wireless Communications. Hands - on experience in providing network support, installation and analysis for a broad range of LAN/WAN/ MAN communication systems.
- Professional experience in Network engineering, performing Network analysis, design, implementing, capacity planning with focus on performance tuning and support of large Networks. Strong Knowledge in WAN technologies including T1, T3, ISDN, HDLC, Point to Point, ATM and Frame Relay. Working experience with deployment of Pa-5000 series Palo Alto firewalls.
- Implemented zone based firewalling and security rules on the Palo Alto Firewall. Have knowledge on various advanced technologies like VOIP, SIP, QOS, IPv6, Multicasting, and MPLS. Hands on Experience configuring and testing F5 iRules using Browser(IE), HTTP watch. Working experience with Load Balancers F5 LTM like 3900, 6900, 4200V over various environments.
- Hands-on experience on different load balancing methods, persistence and profiles on F5 LTM. Support customer with the configuration and maintenance of PIX and ASA 5585-X firewall systems and Checkpoint firewalls. Experience configuring Virtual Device Context in Nexus 7010. Troubleshooting on network problems with Wireshark, identify problem and fix.
- Identify, design and implement flexible, responsive, and secure technology services. Strong hands on experience on Cisco Routing, Switching and Security with Cisco hardware/software Cisco C Confidential lyst 6500, 4500, 2900, 3500, 3750 XL series switches, Cisco 1800, 2500, 2600, 2800, 3600, 3800, 7200 series routers. Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIXsecurity appliance, Failover DMZ zoning andconfiguring VLANs/routing/NATing with the firewalls as per the design.
- Hands on experience with Cisco ACS 4.x servers. Experience with converting PIX and Checkpoint firewalls over to the Cisco ASA solution. Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches. Experience setting up IPSEC VPN between ASA Firewall and Router 3800.
- Strong work experience with the following technologies MPLS, QoS, L2VPN, Multicast, and IPv6. Experience in implementation, support and trouble shooting of VLAN's including operational knowledge of spanning tree protocol (STP), VLAN trunking, inter VLAN routing and ISL/802.1q.
- Experience working with Nexus 7010, 5020, 2148, 2248 devices. Experience configuring SDH and SONET in the WAN environment. Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers.
- Extensive knowledge and troubleshooting in d Confidential communication protocols and standards including IEEE802.3, Token Ring, TCP/IP, Cable Modem, ADSL, PPPOE, Multilayer Switching, DoD Standards, Voice & D Confidential Integration techniques & standards such as SIP andIP Routing Protocols RIP, OSPF, EIGRP and BGP.
- Extensive and in-depth knowledge in Security, including VPN, IPSEC and GRE. Strong interpersonal, organizational communication, customer service & presentation skills. Experience working with troubleshooting WAN circuits like, T1, DS3, OC3, OC-12, OC 192 Circuits. Experience in monitoring and analyzing the load balancing of network traffic using KIWI Solar Winds.
TECHNICAL SKILLS:
LAN Technologies Ethernet: Fast Ethernet, Gigabit Ethernet, LWAPs.
WAN Technologies HDLC: PPP, Frame Relay, Channelized links (E1/T1/E2/T2).
Routing Protocols OSPF: EIGRP, BGP, RIP v1/v2, PBR, Route redistribution, Route filtering, Summarization, Static route.
Routers dealt with Cisco 7606: 7609, 3845, 3660, 2921, 2691, 1812, Juniper MX series and T series routers. Switching Technologies
VLANs: Inter VLAN routing and Port Channels, VTP, Spanning Tree Protocols like PVST+, RSTP+, Multi- Layer Switching, Port security, VSS, CEF and DCEF.
Network Security Technologies: ASA … Firewalls, Juniper SRX Firewall, ASA Firewall … Palo Alto (PA-2k, 3k, 5k), Checkpoint R75/77, IPsec, IDS, and IPS.
Load Balancers: F5 Network (Big-IP) LTM 8900 and 6400. Redundancy Protocols HSRP, GLBP, VRRP.
NEXUS Features: VDC, VPC, VRF, FEX, Fabric Path, F & M Series line cards. VPN Technologies GRE Tunneling, Remote Access VPN, Site-to-Site VPN.
Operating Systems Windows: (98, ME, 2000, XP, Vista, Windows 7, 8.1), Linux. Microsoft tools Microsoft Visio, Microsoft office.
WORK EXPERIENCE:
Confidential
Sr.Network Engineer
Responsibilities:
- Experience in Configuring, upgrading and verifying the NX-OS operation system. Experience with converting 6500 to Cisco Nexus in the d Confidential center environment. Converting CatOS to Cisco IOS Config Conversion on Access, distribution & Core layer switches. Experience working with Nexus 7010, 5020, 2148, 2248 devices.
- Configure Cisco wireless networks to include Mobility Services Engine, Cisco Prime, Wireless Aps and Wireless Lan Controllers (5508, 2504). Experience configuring Virtual Device Context in Nexus 7010.
- Deployed Cisco ACS for equipment authentication, authorization and accounting. User authentication and resource allocation using Cisco ACS server using Radius and TACAS+ protocols for administrative control.
- Configuration of Cisco 6500 (Sup 720), 4500 (SUP 6) & 3750 C Confidential lyst Switches for network access. Worked extensively on Cisco Firewalls, Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution. Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
- Worked on firewall technologies including general configuration, optimization, security policy, rules creation and modification of Palo Alto. Configuring, Installing and troubleshooting on Check Point Devices. Policy Building using IDP.
- Experience with working on Palo Alto centralized management GUI PANORAMA. Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LANs of network.
- Palo Alto Networks firewall connect securely over a public network, configured Site-to-Site VPN, Interfaces and Zones for the LSVPN, Enable SSL between GlobalProtect LSVPN Components, Global Protect Gateways for LSVPN.
- MPLS / VPN / QoS for Ethernet, IP and MPLS, Cisco router 12K, 7609
- Designed MPLS VPN and QoS for the architecture using Cisco multi-layer switches.
- Automated network implementations and tasks and monitoring tools using python scripting.
- Configured OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair. Design and installation of Cisco Meraki Wireless network components. Monitoring Traffic and Connections in Palo Alto and ASA Firewall. Backup and restore of Palo Alto and Cisco ASA Firewall policies. Configured CIDR IP RIP, PPP, BGP, MPLS and OSPF routing.
- Experience with convert Palo Alto VPN rules over to the Cisco ASA solution. Migration with both Palo Alto and Cisco ASA VPN experience. Experience with convert Palo Alto VPN rules over to the Cisco ASA solution. Migration with both Palo Alto and Cisco ASA VPN experience.
- Configured F5 LTM, GTM series like 6400, 6800, 8800 for the applications and their availability. Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.
- Drafted, installed, and provisioned ASA and Checkpoint firewall rules and policies. Worked with F5 APM sessions and manipulating session using I Rule and also configuring Access Policy Actions and branch rules. SSL offloading, Cert management and Troubleshooting experience on F5.
- Installed and configured F5 Load balancers and firewalls with LAN/WAN configuration. Configured Big-IP F5 LTMs (virtual servers, pools, SNATs, health monitors, iRules) for managing the traffic and tuning the load on the network servers. Worked on migrating the LTM 5100 version 9.2 to 5100 LTM version 9.4 and F5 GTM configurations. Worked on updating pools, members and nodes using the GUI interface for the local traffic managers.
- Involved in iRule management like loading rules, writing iRule syntax using TCL language and iRule extension to TCL. Worked on updating the SSL s to the application URL using the F5 LTM and F5 GTM. Working with Network Design and implementation teams on various projects across North America.
- Designed & implemented IP Intelligence facilities of dynamic black and white lists, IP reputation d Confidential base and dynamic IP shunning in AFM.
- Performed Event Logging DOS attack prevention, Migration of DOS on AFM.
- Configured network firewalls & DOS iRules, VIP pools, nodes in BIG-IP AFM.
- Performed various AFM components trouble shooting in BIG-IP AFM.
- Installed, Administrated and supported F5 load balancers, Big IP 3600 LTM with APM and 5200v with APM and VCMP.
- Developed Application policy manager (APM) d Confidential sheet for configuration of BIG-IP APM based on end user application performance.
- Modified and reconfigured Two factor authentication BIG-IP APM authentication.
- Configured one-time password for BIG-IP APM to add more security at the time of initialization of the application
Confidential
Network Engineer
Responsibilities:
- Responsible for Design, integration, configuration, maintenance, performance monitoring and security of network infrastructure including local area networks (LAN), wide area networks (WAN), firewalls, DHCP, DNS.
- Installing the Network devices in d Confidential center environment and clearly articulate complex network designs and drawings through documentation (Visio) as well as verbal sessions.
- Experience in Configuring Site-to-Site and Remote Site VPNs, NAT/PAT policies. Managing Cisco Secure ACS for TACACS+, RADIUS authentications. Monitoring customer d Confidential networks and providing fault isolation and remote troubleshooting.
- Experience on designing and troubleshooting of EIGRP routing issues. Responsible for the management of network at the client environment. Supporting and performing projects for the client WAN environment at a global level.
- Implementation of network system upgrades and modifications including planning, testing, scheduling and coordination. Ensures that change management and defined security procedures for all network systems are executed in accordance with customer policies and procedures.
- Interacting with Carriers for installation of new WAN circuits at Customer premises and make sure circuit installed with no issues and ready to use before users move in to the branch.
- Providing Teir-3 technical support for LAN/WAN issues and on-call for technical escalation on a rotational basis (Remedy Ticketing system). Well experienced in troubleshooting bug related issues with help of Cisco TAC service.
- Providing networking services coordinate tasks and ensure their execution and documentation in accordance with established standards.
Confidential
Network Engineer
Responsibilities:
- Managed the LAN Switching Environment including creating and maintaining VLANs, STP, Trunking, Port Security, VLan Security etc. Assisted in migrating existing server and network infrastructure from to a d Confidential center for optimal functionality and management.
- Involved with the Systems team to Install, configure, & maintain DNS, DHCP on Windows 2000/2003 Server, also configured a FTP server; Installed configured & maintained MS Exchange Server.
- Set up and troubleshoot secured wireless access points for broadband Internet. Involved in configuration of WAN connection using a 3600 series Router and Frame relay method. Implementation of NAT with a pool of 2 public IP addresses.
- Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security Settings of the networking devices (Cisco Router, switches) co-coordinating with the system/Network administrator during any major changes and implementation.
- Designed and implemented an IP addressing scheme with subnets for different departments. Support a video conferencing network of distributed video units across U.S. and optimize the network infrastructure over which they run.
- Install and maintain voice, video and d Confidential communications infrastructure systems and cabling. Used various Network sniffers like Ethereal, TCP dump etc. SNMP network management using MRTG and Cisco works. Participate in 24 x 7 incident & problem support.
