We provide IT Staff Augmentation Services!

Network Administrator Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • OFFERING 9+ YEARS OF EXPERIENCE IN INDUSTRY, To associate with a growth oriented enterprise and strive to achieve the goals of the organization, with sustained individual growth through hard work and self - improvement in any demanding condition.
  • Knowledge of Juniper SRX (100, 210, 240, 650).
  • Knowledge of Cisco Switches (3560, 2960). Juniper Ex-220, 4200
  • Knowledge & Implemented F5 Big IP LTM (Configured and implemented)
  • Knowledge & Implemented Sonicwall NSA 2400 Firewall (Configured and implemented)
  • Knowledge and implemented Sophos XG 550, XG 650
  • Knowledge Checkpoint Firewall ( Distributed Architecture )
  • Knowledge and implemented Bluecoat Proxy SG and Operation Task
  • Knowledge and implemented Palo Alto ( 500,3k, 5k)
  • Knowledge of Cyberoam CR50iNG and Operation Task
  • Implementation of DHCP, DNS, FTP, TFTP,

PROFESSIONAL EXPERIENCE:

Confidential

Environment: Watch guard Firebox, Cisco (2600 Series, 1800 Series, 800 Series) Router, Catalyst (2960 Series, 2950 Series, 2960-S Series 10G), Cisco Linksys Wireless-G Broadband router (WRT54G), Linksys Wireless-N, Audio Codes MP- 118 VOIP GatewaysCloud Links AIRCEL (Data), AIRTEL (Backup- Data), TATA (VOIP Traffic)

Network Administrator

Responsibilities:

  • Maintaining the HTTP (or S) policies, policies related to Inbound and Outbound connections.
  • Failover management between links.
  • Configuration and managing the Three VPN tunnels for STS connection between Watchguard Firebox and Cisco ASA (US Side).
  • Configuring policy based routing for making HA for critical devices.
  • Cisco ASA 5510 configuring ACL for Inbound connections
  • Cisco ASA 5510 STS VPN tunnel between gateway peers, Configuration and implementation.
  • Configuring Policy NAT with ACL restriction for DMZ zone servers.
  • Watchguard IPSec Mobile VPN / SSL VPN/ STS ( Configuration & Implementation)
  • Implementation for Sonicwall made in Bridged mode (gateway for client will be PIX)
  • Implementation of Sonic firewall GVC VPN and STS and maintaining policies for Inbound and outbound for US side.
  • Configuring and managing the LAN environment of Confidential India office ( Basement, GF, FF, Plot-2)
  • Configuring and managing the Wireless for Office, Guest and VIP users (Basement, GF, FF, Plot-2)
  • Configuring and managing Kaspersky Administration Kit (Network Agent 8.0, KAV 6.0, Agent installation, Scanning, database update of Workstation, Blocking the USB ports through Kaspersky administration Server.
  • Managing the audio codes for VOIP traffic based upon per port configuration.
  • Vendor management for Network equipments and having comparison over best technology.

Confidential

Environment: Blue Coat, ForeScout, Palo-Alto networks, Extreme Switches.

Support Specialist (Network Security)

Responsibilities:

  • Implementation of Blue coat Proxy SG at Transparent and Explicit mode,
  • Implementation of policies in the VPM for URL filtering.
  • Setting the failover in the Blue Coat Proxy SG,
  • Integration of Blue Coat Proxy SG with Active directory (AD)
  • Countable monitoring of AD users with Reporter implementation through FTP server like File-zilla, 3csserver.
  • Interaction with the clients to meet their requirements for URL filtering,
  • Configuration of Bluecoat Packet Shaper, Limiting the bandwidth for special category
  • Implementing the POC of Bluecoat Packet Shaper
  • Configuring the Bluecoat Mach5 ADN Feature, Site to site tunneling and WAN Optimization
  • Implementing Byte Caching, Object caching, Protocol optimization.
  • Understanding the network architecture, giving them solution oriented advise
  • Going to clients organization, implement POC (Proof of concept)
  • Demonstrating the features of product.
  • Clients Wipro, WNS, LPU jalandhar, ….Etc
  • Configuration of Forscout CounterAct (NAC) Devices.
  • Information of endpoints, what they installed in OS, Mac address, ip address
  • Implementation of policies like AV Compliance, External devices compliance, IM Compliance,
  • P2P Compliance, Windows compliance.
  • Network Activity of endpoint
  • Vulnerability check of endpoints, declared that host Malicious host and block it.
  • Make reports of what is going at the endpoints

Confidential

Environment: LAN, Proxy server, Cisco ASA Firewall, PBX (Digital phone and Analog phone)Network, Maintenance of CCTV’s IBM system x3610.

Data Communication Engineer

Responsibilities:

  • Accountable for configuring Cisco ASA 5510 AIP-Module, configuring Cisco ASA 5510 CSC-Module and updating signatures of Cisco ASA 5510 AIP-Module every week.
  • Maintaining CCTV Network of DRDO Site and maintaining Internet computer Systems through Kerio-control Proxy Server. Involved in URL filtering through Kerio-Control, also content filtering. installing, supporting and maintaining new server hardware and software infrastructure; managing email, anti-spam and virus protection; setting up user accounts, permissions and passwords; monitoring network usage; ensuring the most cost-effective and efficient use of servers; suggesting and providing IT solutions to business and management problems; ensuring that all IT equipment complies with industry standards; analysing and resolving faults, ranging from a major system crash to a forgotten password;

Confidential

Environment: Routing, Switching, Firewall Security IPS/IDS, VLAN, Nagios Monitoring

Network Engineer Cum District Coordinator

Responsibilities:

  • Install, configure and manage Windows Servers, manage LAN, router/switches, VPN.
  • Monitoring Network Congestion and Problems and apply proper solutions to resolve.
  • Working on Nomus Broadband gateway.
  • Documents network problems and resolution for future reference.
  • Day to day administration and monitoring of IDS/IPS products. working closely with departments/organisations and collaborating with other IT staff
  • Communicate frequently with ISP to provide and receive feedback, issue and solutions status for proper functioning of the network.
  • Using Nagios and Unicenter for monitoring of network services, host resources.
  • Performs daily review of the data switch/router and WANequipment, including, reviewing log files and interface statistics
  • Apply OS patches and upgrades on a regular basis, and upgrade administrative tools and utilities.

We'd love your feedback!