We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

5.00/5 (Submit Your Rating)

Middletown, NJ

SUMMARY:

  • 8 years of experience in networking, installing, configuring and maintaining network devices.
  • Deploying, implementing and providing support for Cisco, 3850, 1800, 2500, 2600, 2800, 3600, 3750, 3800, 7200, ASR 1K, 9K routers, Cisco 2900, 3500, 3700, 4000, 4500, 4900, 5000, 5800, 6500, 7600, Cisco Nexus and Catalyst 3850, Arista Switches Juniper,, E series, J series and M series. Juniper, SRX & VPN, T - Series, MX-Series Routers. Checkpoint (NGX R65, R70 and R71), Juniper,, Firewalls (SRX5400, SRX5600, and SRX5800), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo alto, Blue Coat Networks Firewall models (5060, 7060), Fortinet firewalls
  • Installed, configured, and maintained with vendors Cisco, Juniper,, Alcatel-Lucent, Arista, Brocade, Riverbed, Enterasys, Fortinet networking and CISCO MERAKI WIFI 802.11 a/b/g/n/ac technologies and Protocol sniffers. WPA, WPS, IEEE802.11, 802.11n/ac.
  • Performed Ospf, BGP, EIGRP, HSRP, VRRP profile, IPV6, Bundle Ethernet implementation on ASR 4300, 1K, 2K, 3K, 7K 9k, Cisco 6500 Series and Juniper, Vyatta routers
  • Deploying and migration of of complex layer 2 technologies such as VLAN Trunks, VTP Ether channel(LACP), Port channels(PagP), STP(PVST+), RSTP and MST from Cisco to Arista switches
  • Deploying and decommission of VLANs on core ASR 4300, 1K, 2K, 3K, 7K 9K, Nexus 7K and 5K and its devices.
  • Configuring and troubleshooting Cisco CISCO MERAKI WIFI 802.11 a/b/g/n/ac Networks: LWAPP, WLC, WCS, Standalone APs, Roaming, CISCO MERAKI WIFI 802.11 a/b/g/n/ac Security Basics, IEEE 802.11 a/b/g, RF spectrum characteristics.
  • Providing support for voice communications technology and VoIP Protocol sniffers.
  • Deploying and Migration of of MPLS L2, L3 VPN in brocade firewalls
  • Configuring and troubleshooting Site to Site VPN, Remote access VPN, IPsec VPN, SSL VPN, DMVPN
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution, migration with both Checkpoint and Cisco ASA VPN experience.
  • Adding and removing checkpoint firewall policies based on the service requests from different user
  • Experience with Fortinet Firewall,McAfeeWeb/Email Gateway, Netscout, Blue Coat or Cisco ASA, IPS/IDS
  • Experience with BIG-IP F5 load balancers, version 9.x, 10.x, 11. X
  • Good knowledge on Meraki SU-MIMO, MU-MIMO.
  • Experience on F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs
  • Experienced in DNS, DHCP, SMTP, FTP, HTTPS, and web security architecture.
  • Worked with F5 based profiles, Virtual IP's, iRules for virtual IP's, monitors and pool members.
  • Dealt with F5 load balancing of web traffic and data center environment failover for HA servers, fabricpath
  • Implementation of DHCP, DNS, FTP, TFTP, Frame Relay, MPLS, ATM, software Defined Networking SDN, CISCO ACI, CISCO ACI
  • Experience in technical documentation of Change management process and Project documentation using Excel and VISIO.
  • Very good understanding of fiber-optic technology including cables, connectors, patch panels, and optical transport technologies such as DWDM and SONET.
  • Extended the support to all unified communications components including troubleshooting, configuration, optimization and design of a multi-cluster environment.
  • Knowledge of large-scale Cisco Communication Manager, Messaging, presence and conferencing solution Architecture, Design and installation.
  • Reviewing and validating existing telecom services and solutions.
  • Experiences with using Virtualization tools like Citrix, VMware, Hyper V
  • A highly-organized individual who adopts a systematic approach to problem solving, effectively analyzes results, and implements solutions
  • Ability to manage all phases of network installation and administration.
  • Excellent customer management/resolution, problem solving and debugging skills with good verbal/written communications and presentation skills.
  • Experience with Shell, linux,, Unix scripting
  • Experience on Deploying and decommission of VLANs on core ASR 9K, Nexus 7K and 5K and its devices.
  • A highly-organized individual who adopts a systematic approach to problem solving, effectively analyzes results, and implements solutions
  • Implementation of DHCP, DNS, FTP, TFTP, Frame Relay, MPLS, ATM, ISDN, CISCO ACI, CISCO ACI.
  • Extensive knowledge of Data Encryption Computer Networking and Cloud Computing, Cisco's Cloud Edge/WAN services network.
  • In-depth knowledge of cloud networking environments

TECHNICAL SKILLS:

Cisco Routers: , 3600, 3800, 7200, 7600, ASR series routers

Cisco Switches: 2900, 3500, 3700, 4000, 4500, 4900, 5000, 5800, 6500, 7600, Catalyst 3850, Nexus 5K, 7K

EX2200, EX4200, EX: 4500, MX-480, M Series, SRX210, SRX240

LAN Technologies: Ethernet, Fast Ethernet, and Gigabit Ethernet, SMTP, VLAN, Inter-VLAN Routing, VTP, STP, RSTP, Light weight access point, WLC

WAN Technologies: Frame Relay, PPP, HDLC, (E1/T1/E3T3), DS3, OC192, OC3

NetworkSecurity: Cisco ASA5550/ 5540, NetScreen, Sonic Wall, Juniper, SRX, Palo alto, Blue Coat, Fortinet, AAA, Firemon, Filesystems, Cloud computing, Red Hat Storage,RADIUS, LDAP, IPsec VPN, SSL SAN, VPN, IDS, IPS, Source Fire, Fire Eye, Cisco NAC (4.9.3), Cisco ISE, RSA, RSA 2 Factor, SIEM, Qradar, Tripwire ACL, IPsec, VPN, Port-security, AAA, Zone-Based Firewalls, IOS based Build a Lab for the team using various Aruba, Brocade controllers, Switches, Microsoft, Shell, linux,, Shell, Unix, Airwave, CPPM Router security DFA, firewalls, IDS/IPS, Mcafee

OS products/Services: DNS, DHCP, Windows, UNIX, LINUX

Routing Protocols: OSPF, EIGRP, BGP,ISIS, VRF, PBR, Route Filtering, Redistribution, Summarization, and Static Routing.

Gateway Load Balancing: HSRP, VRRP, GLBP, EBGP

Various Features / Services: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP.

NetworkManagement Tools: Wireshark, Netflow Analyzer, Cisco Works, Ethereal, SNMP, HP open view

Security Server Protocols: TACACS+, RADIUS.

Load Balancers: Cisco CSM, F5 Networks (BIG-IP) LTM 8900, BIG-IP GTM 6800, Cisco ACE 4710.

Firewalls: PIX, ASA 5500, Palo Alto, Juniper SRX, Checkpoint, fortigate & Brocade.

PROFESSIONAL EXPERIENCE:

Sr. Network Engineer

Confidential, Middletown, NJ

Environment: Cisco 60 / 60 / 50 / 60 6500 switches and Cisco 00 / 45 / 00 routers, Cisco ASA 500, Checkpoint, Bluecoat, AWS, Cisco ISE, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

Responsibilities:

  • Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco 1600, 2600, 2800, 3600, 7300 series Routers. Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.
  • Configured VLAN's, Private VLAN's. Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls Subject Matter Expert for juniper Routing, Switching, Security, and VPN Systems. Responsible for entire company network infrastructure that includes Cisco Switches, Routers, Firewalls, Access Points, Servers and PBX.
  • Implementation of Site-to-Site VPNs over the internet using 3DES, AES/AES-256 with ASA Firewalls. Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as Cisco 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.
  • Designed and Implemented Firewalls, F5Viprion deployments to Front end and DMZ customers. Measure the application performances across the MPLS cloud through various routing and switching methods. Configured inside ACL, outside ACL, inside, outside interfaces.
  • Configuration and troubleshooting of EIGRP, OSPF, BGP, CSM, integration with ASA devices. Experience in migration of VLANS & Configured VLANs with 802.1q tagging, Ether channels, and Spanning tree for creating Access/distribution and core layer switching.
  • Strong experience in creating firewall policies as per the requirements on Checkpoint, Palo Alto, Cisco ASA, Juniper and Fortinet firewalls. Solid understanding of OSI and TCP/IP model.
  • Experience in Physical cabling, IP addressing and Sub netting with VLSM using QIP configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Cisco Nexus 7000, 5000 series installation and configuration, implementation with Port channel and troubleshooting in a TCP/IP OSPF environment.
  • Worked on Web Security, Security Services, configuring and accessing the Bluecoat ProxySG, troubleshoot the ProxySG. Involved in Network Designing, Routing, DNS and IP Subnetting, TCP/IP Protocol. Configured RIP, OSPF, EIGRP, BGP, MPLS, QOS, ATM and Frame Relay.
  • Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corporate Network.
  • Extensively worked on various cloud environments like AWS. Created highly available and scalable infrastructure in AWS cloud by using various AWS services like EC2, VPC, RDS, and Route53.
  • Configuring VLANs/ACLs/Etherchannel/RADIUS/QoS/Storm Control on the new switches.
  • Deployed Cisco ISE 1.2/1.3 for Enterprise RADIUS Authentication with Active Directory, RSA Secure ID, Proxy Radius Services to Cisco ACS.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x authentication for Wireless users.
  • Experienced with deploying Juniper SRX 240, SRS 220 Firewalls with zone based security, URL filtering and IDS/IPS. Implemented security policies using ASA 55XX Firewall as well as Fortinet firewall IPS/IDS, AAA Security (TACACS+, RADIUS) on different series of routers
  • Redesign current security network and implement Cisco IDS/IPS and Network Access Control (NAC) to insure the maximum security.
  • Experienced with designing Virtual Environment for L4 and L7 application Load balancing Local LB architecture, optimization profiles, SSL offload and extended security profiles for applications
  • Configure and implementing Fortinet Security systems Firewall. Assisted in managing global Fortinet Fortigate firewall infrastructure.
  • Responsible for maintaining multi-vendor network environment including Cisco ASA, Juniper JUNOS, Fortinet firewall. Aided in troubleshooting potential network issues in rolling out ISE
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Strong hands on and exposure to Checkpoint & Palo Alto on a regular basis.
  • Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
  • Installed and configured DNS, DHCP. Responsible for creating and configuring FORWARD LOOKUP ZONE AND REVERSE LOOKUP ZONE. Redistributed required routes from OSPF in to BGP. OSPF cloud is present in US and is connected to all our customers over Sprint's Frame Relay backbone.
  • Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.
  • Efficiently utilized Cisco Nexus 7K, 5K, and 2K in managing and deploying data center switch upgrade to a 10GB infrastructure, resulting to a new virtual port channel technology.
  • Migrated from Cisco ASA 5540 firewall to Palo Alto 5250 Firewall. Used Palo Alto 5250 Firewall for Enterprise Security, configured ACL's for Internet requests to Server Farm in LAN and DMZ.

Confidential, Austin, TX

Sr. Network Engineer

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/ switches and Cisco 3640/ 00/3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Checkpoint, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

Responsibilities:

  • Experience with design and implementation of Data center migration
  • Experience with manipulating various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters, Route-maps and route policy implementation.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Configured CIDR IP RIP, PPP, BGP, MPLS and OSPF routing.
  • Assisted in MPLS migrations, implemented a backup for the existing WAN connection using site-to-site IP sec VPN tunnels.
  • Involved in the activity of DATA-Center migration of regular Cisco catalyst switches with the new Nexus2148, 2224T, 5548, 6018, 7010using F3/M3 line-cards with 10GE & 40GE interfaces and Supervisor 2E.
  • Configuring and installing 6500, 4500 in Campus networks.
  • Switches Replace branch hardware with new 2851 routers and 2960 switches.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to Getup.
  • As part of Data Center fabric remediation/refresh project, deployed Cisco Nexus switches and implemented features like FEX Links, VPC and VDC.
  • Lead Engineer for Network refresh project for Multinational insurance company. Providing remote assistance for replacing exiting switches with new Cisco switches.
  • Configuring routing protocols OSPF, EIGRP, RIP, MPBGP, LDP and BGPV4
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst
  • Build Logical design and Implementation of Wireless Solution
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Deploying and decommissioning Cisco switches and their respective software upgrades.
  • Performing the ACL requests change for various clients by collecting source and destination information from them.
  • Maintained complex LAN/WAN networks with several VLANS and provided support for routing protocols and also providing secure sessions over internet using IPsec and SSL encryption.
  • Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.
  • Supporting EIGRP and BGP based on the network by resolving level 2 & 3 problems of internal teams & external customers of all locations
  • Performing troubleshooting on slow network connectivity issues, routing issues that involves OSPF, BGP and identifying the root cause of the issues.
  • Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0.
  • Design and Implement DMZ for FTP, Web and Mail Servers with CISCO PIX 506, PIX515
  • Building the VPN tunnel and VPN encryption.
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2B network connectivity.
  • To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Troubleshoot the Network Issues onsite and remotely depending on the severity of the issues.
  • Performed Break Fix support through driving to different buildings, identifying the root cause of the hardware issues with switches, routers.
  • Design, implementation and operational support of routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.
  • Worked with creating VIP (virtual servers), pools, nodes and applying iRules for the virtual servers like cookie persistency, redirection of the URL.
  • Created Visio Dean / Visio Documentation to give complete picture of network design for each building.
  • Experience in Configuring, upgrading and verifying the NX-OS operation system.

Confidential, Madison, WI

Network Security consultant

Environment: Cisco 3560/2950/2924/6509/6513/5500 switches, Cisco 3825/3640/7200 routers, Nexus 5020/5548/7010/7702/2000 series, VPN, BGP, OSPF, RIP, EIGRP, F5 BIG-IP, LTM, GTM, VLAN, VTP and Checkpoint.

Responsibilities:

  • Troubleshooting the TCP/IP networks for connectivity, outages and slow network issues and recommended appropriate and cost-effective solutions for the congestion.
  • Network consists of Heavy Cisco equipment such as: Cisco 2924 switches, Cisco 5500 series Layer 3 switches, Cisco 7200 series routers, Cisco Pix firewall 500 series and Wireless Access points Cisco 1230.
  • Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.
  • Worked on F5 and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance.
  • Responsible for deploying various network security & High Availability in Checkpoint Firewall
  • Configuring routing protocols OSPF, EIGRP, RIP, MPBGP, LDP and BGPV4
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst
  • Build Logical design and Implementation of Wireless Solution
  • Experience with configuring VMware and managing and maintenance of VMs (virtual server)
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Checkpoint and Cisco ASA VPN experience
  • Responsible for Cisco ASA firewall administration across our global networks
  • Experience with migration of Checkpoint R54 to SPLAT
  • Configured various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters, Route-maps and route policy implementation.
  • Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Configured Nexus 5020 and 7702 with multiple distribution VDC's running EIGRP for route propagation between them.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) hitch acts as a remote line card (module) for the Nexus 5000.
  • Continual network monitoring of data center support, troubleshoot and diagnose hardware problems.
  • Configured various Router interfaces like ATM interface, T3 & Channelized T1 interfaces
  • Configuring and troubleshooting CISCO catalyst 6509, 7609, 7613 with Supervisor cards, Cisco 3640, Cisco GSR 12416,21418(with PRP and RPR processors)
  • Configuring and implementing F5 BIG-IP LTM, GTM load balancers to maintain global and local traffic

Confidential

Network Engineer Consultant

Environment: Cisco 6509/ 3750/3550/3500/2950 and Cisco Nexus 1000v/2000 switches, Cisco 7200/3845/3600/2800 routers, Checkpoint firewalls(SPLAT), Net Flow, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, CSM, SUP720, Ether Channels, Fluke and Sniffer.

Responsibilities:

  • Configured IP RIP, PPP, BGP and OSPF routing.
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Implementation and support of Nexus 1000v/2000
  • Identify, design and implement flexible, responsive, and secure technology services
  • Experience with Firewall Administration, Rule Analysis, Rule Modification
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team. The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.
  • Worked with telecom vendors regarding network fault isolation.
  • Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
  • Installed different software on the systems. Install and managing network devices including Hubs, Switches.
  • Layer 2 switching technology architecture, implementation and operations including L2 and L3 switching and related functionality. This includes the use of VLANS, STP, VTP and their functions as they relate to networking infrastructure requirements including internal and external treatment, configuration and security.
  • Configuration and troubleshooting of Cisco catalyst 6509,7613 with supervisor cards
  • Design, implementation and operational support of routing/switching protocols in complex environments including BGP, OSPF, EIGRP.

Confidential

Network Administrator

Environment: OSPF, RIPv2, BGP, IGRP, LAN, WAN, RADIUS, TACACS, VLAN, Cisco Works, HSRP, CISCO 2600, 2800, 3600, NAT, Static route, Switching.

Responsibilities:

  • Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route. Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications.
  • Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access.
  • Configured the Cisco router as IP Firewall and for NATing. Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.
  • Installing new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations. Installing and maintaining local as well as network printers. Validating existing infrastructure and suggesting new network designs.
  • Working on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path, and Community, MED.
  • Providing technical support to LAN & WAN systems. Configuring all the required devices and equipment for remote vendors at various sites and plants. Installation and maintenance of new network connections for the customers.
  • Installing and maintaining Windows NT Workstations and Windows NT Server. Monitor performance of network and servers to identify potential problems and bottleneck.
  • Real time monitoring and network management using Cisco Works LMS. Monitoring Memory/CPU on various low-end routers in a network. Configuring routers and send it to Technical Consultants for new site activations and gives online support at the time of activation.

We'd love your feedback!