We provide IT Staff Augmentation Services!

Enterprise Network Architect Resume

2.00/5 (Submit Your Rating)

OBJECTIVE:

  • I am seeking a position as an Enterprise Network/Datacenter/Cloud Design/Implementation/ Optimization/Automation Architect.

PROFESSIONAL EXPERIENCE

Enterprise Network Architect

Confidential

Responsibilities:

  • Created Business Requirements and Business Case documents for Cisco ACI and Nexus Inter - Pod Network.
  • Created Technical Requirements documents for Cisco ACI and Nexus Inter-Pod Network.
  • Created and implemented Proof of Concept (POC) and Proof of Value (POV) use cases for Cisco ACI and Nexus Inter-Pod Network.
  • Created High-level Designs for Cisco ACI and Nexus Inter-Pod Network.
  • Created Project Plans for Cisco ACI and Nexus Inter-Pod Network.
  • Performed Gap Analysis on project resource requirements for Cisco ACI and Nexus Inter-Pod Network.
  • Create a parts List and Bill of Materials for Purchasing for Cisco ACI and Nexus Inter-Pod Network.
  • Created Low-level designs for Cisco ACI and Nexus Inter-Pod Network.
  • Created detailed implementation plans for Cisco ACI and Nexus Inter-Pod Network.
  • Created As-Built documentation for Cisco ACI and Nexus Inter-Pod Network.
  • Created Runbooks for Cisco ACI and Nexus Inter-Pod Network.
  • Create optimization and automation process workflows for Cisco ACI and Nexus Inter-Pod Network.
  • Designed and implemented a Cisco ACI Multi-Site infrastructure using Cisco Nexus 9364C Spines, Cisco Nexus 93180YC-FX Leafs, Cisco Nexus 2348TQ FEX and Cisco 2348UPQ FEX.
  • Designed and implemented the ACI infrastructure in a hybrid Application-Centric and Network-Centric mode depending on the workload. VMWare components leveraged an Application-centric deployment where VM attributes could be used for micro-segmentation. Other Components such as the Nutanix hypervisors were deployed in Network-Centric mode.
  • Designed and Implemented Segmentation to support NERC CIP Compliance using ACI VRFs, ACI Contracts and L3OUTs to Fortigate Firewall for malicious traffic detection.
  • Created detailed NERC CIP 5 documentation for the Electronic Security Perimeter (ESP) Design.
  • Designed and implemented an inter-pod Datacenter Interconnect (DCI) Network using Cisco Nexus 7706 routers with 40G M3 and F3 linecards
  • Enabled MACSEC within the Nexus 7706 inter-pod network
  • Configure OSPF routing between the ACI Border Leafs and the inter-pod network
  • Configured OSPF over SVIs between ACI VRFs and Fortinet Fortigate Firewalls in unmanaged mode
  • Implemented Intra-VRF contracts within Cisco ACI
  • Utilized ACI VISORE to clean out ghost policy objects in ACI.
  • Automated Cisco ACI configuration using Cisco UCS Director and JSON formatted REST API Calls.
  • Fixed Multiple Faults on Cisco ACI Fabric
  • Create/Modify Cisco UCS Director workflows
  • Create and Modify Fortigate Firewall Rules for SCADA EMS and ADMS.
  • Create and Modify FortiManager Firewall Rules for SCADA EMS and ADMS.
  • Utilize FortiAnalyzer for log analysis
  • Configured inband Management in ACI
  • Created Configuration to Enable MACSEC in ACI
  • Utilized JSON-Formatted REST API Calls on the ACI APICs to deploy over 600 ACI contract.
  • Created NERC Technical documentation which included daily operational procedures, upgrade procedures, recovery procedures and troubleshooting procedures.
  • Configured and performed troubleshooting on the following ACI Objects: Tenant, VRF, Endpoint Group (EPG), Contract, VLAN Pool, Domain, Attachable Access Entity Profile (AAEP), Interface Policy Groups and Interface Profiles.
  • Created Powershell Scripts to automate retrieval of ACI As-built data for the Runbook.
  • Design and implemented a Fortinet Firewall infrastructure that connected to Cisco ACI.
  • Implemented OSPF between the Fortinet Fortigate Firewall and Cisco ACI
  • Supported the implementation of Nutanix Hyper Converged compute infrastructure connected to Cisco ACI.
  • Implemented Cisco UCS Director to automate Cisco ACI, Cisco ACI Multi-Site, Cisco Nexus 7706, Cisco Nexus 3172TQ and Fortigate Firewall.
  • Utilized custom UCS Workflows to create more complex logic to support use-cases.
  • Utilized REST-API to add new Workflow tasks for functions without a built-in task.
  • Implemented Netbrain to automate diagramming of Cisco ACI and the inter-POD network.
  • Implemented Overlay Transport Virtualization (OTV) to support Vmware workload mobility.
  • Maintained Cisco ASA and AS-SM firewalls.
  • Deployed Cisco Hyperflex and tested its functionality with Nutanix during a Proof of Concept (POC) in selecting a hyper-converged platform.
  • Implemented VMWare ESX hypervisor and vCenter connected to Cisco ACI
  • Created High-level design for a Cisco SD-Access Infrastructure.
  • Created High-level design for extending Cisco ACI to the Cloud using Cisco ACI Anywhere
  • Configured Cisco ACI Remote Leaf.
  • The design involved repurposing the existing Cisco 3850 that were capable of being SD-Access Edge Nodes and adding new Cisco 9300 as Aggregation Nodes.
  • A new Access Core comprised of Cisco Catalyst 9400 would perform the function of the Broder Nodes.
  • Maintain an existing Palo Alto Firewall deployment comprised on PA-5050s, PA-3060s and Panorama.
  • Implemented A10 Load balancers for Server Load Balancing (SLB) and Global Server Load Balancing (GSLB).
  • Supported the implementation of NetApp Storage Arrays.
  • Supported the design and architecture of VMWare NSX-T being deployed to support the Software Defined Network (SDN) Overlay and Cisco ACI in Network-Centric mode was deployed for the SDN underlay.
  • Created Cisco ACI Multi-Pod Design for Migration of Legacy workloads connected to Cisco Catalyst 6509 to Cisco ACI in Application-Centric Mode.

Senior Network/Cloud Solutions Architect

Confidential

Responsibilities:

  • Designed and implemented a Cisco ACI Stretched Fabric between 2 datacenters.
  • Implemented multiple Tenants, multiple VRFs and multiple EPGs.
  • Implemented Layer 2 and Layer 3 Outbound connections between ACI and other network devices.
  • Design and implemented a migration plan from Cisco 6500, Cisco Nexus 7Ks and 5Ks to Cisco ACI
  • Designed and implemented Cisco UCS on ACI and implemented disjointed Layer 2 to facilitate migration between the legacy Nexus 7009s and Cisco ACI.
  • Implemented Palo Alto 5060 firewall in managed mode within ACI
  • Implemented F5 VIPRION load balancers in managed mode within ACI.
  • Implemented Edge Services on ACI border leafs to connect remote sites.
  • Implemented ACI contracts between End Point Groups (EPGs).
  • Deployed and Configured ACI programmatically using REST API in JSON and XML formats.
  • Utilized Postman to validate the results from REST API calls.
  • Designed and implemented Palo Alto 5060 firewalls in Active/Active configuration
  • Designed and implemented F5 LTM and GTM in Active/Active Configuration between 2 datacenters.
  • Designed and implemented Cisco UCS 6332-16UP converged infrastructure.
  • Designed and implemented VMWare NSX infrastructure.
  • Designed and implemented Cisco UCS Director to automate the provisioning of ACI, Cisco UCS, VMware vShpere, NetApp vFiler, Palo Alto Firewall and F5 Load balancer.
  • Designed and Implemented Cisco Cloud Center (Cliqr) to manage and automate dynamic provisioning of resources between the Private Cloud infrastructures (VMWare vCloud and Openstack) and Public Cloud infrastructures (AWS and Azure)
  • Implemented Cisco Prime Service Catalog for requisition of infrastructure resources
  • Created a responsive Open Daylight Application in Python to interface with Cisco Nexus 9000, Cisco UCS Director, Cisco ACI, Cisco UCS, VMware vShpere, Openstack, NetApp vFiler, Palo Alto Firewall and F5 Load balancer.
  • Interfaced with Cisco UCS Director REST API to initiate new requests, track the workflow progress of existing requests, create custom workflows and create customer reports.
  • Interfaced with ACI REST API and ACI Cobra Python SDK. Utilized the APIC REST Python Adapter (ARYA). Also interfaced with ACI using the ACI PowerTool.
  • Interfaced with Cisco UCS REST API and UCS Python SDK and UCS PowerTool
  • Interfaced with VMware REST API, and VMWare Python SDK and PowerCLI
  • Interfaced with NetApp vFiler XML API using Python and Powershell toolkit
  • Interfaced with Palo Alto 5060 XML API using Python and Powershell.
  • Interfaced with F5 load balancer XML API using Python and Powershell Module.
  • Interfaced with Cisco Nexus 9000 using NETCONF, NX-API, Openstack Neutron
  • Implemented EEM and TCL scripts to automate event capturing on Cisco IOS devices.
  • Implemented Application Policy Infrastructure Controller Enterprise Module (APIC-EM) software Controller to automate the provisioning of Cisco IWAN connections and deployment and management of new campus infrastructure.
  • Utilized Github and JIRA for software version control and collaboration.
  • Utilized Puppet, Chef and Ansible to automate Network and Server configurations.

Sr. Solutions Architect

Confidential

Responsibilities:

  • Provided Architectural guidance for new converged infrastructure deployments.
  • Designed and Implemented new converged infrastructure deployments.
  • Provided Network and Security architectural guidance for applications deployed within the vBlock.
  • Provided Network and Security architectural guidance for new vBlock and Converged systems deployment.
  • Deployed and implemented Cisco Application-Centric Infrastructure (ACI) on Nexus 9000s to support multiple vBlocks deployed within the Confidential Datacenters.
  • Designed and implemented a Multi-Node UCS Director 5.4 infrastructure on VMWare vSphere to automate the provisioning of Linux, Windows and Citrix Virtual Machines, Network Devices, Storage arrays, Cisco PNSC, Cisco VSG, Citrix NetScaler, applications, and SharePoint Applications.
  • Designed and implemented UCS Director custom tasks and Workflows.
  • Designed and implemented NSX Manager, NSX Edge Services Gateway and NSX Distributed Firewall on vSphere 5.5 and Openstack Havana.
  • Troubleshot network and Security issues within the vBlock/Converged infrastructure
  • Implemented Network and Security Configuration changes on the vBlock
  • Designed and implemented VCE vBlock converged infrastructures. Deployed VB100, VB240, VB320/340, VB540 and VB720/740
  • Deployed Cisco Prime Network Services Controller (PNSC) and Cisco Virtual Security Gateway (VSG) to segregate Virtual Machine (VM) traffic between multiple Security Zones.
  • Deployed and implemented Cisco Nexus 5000, Nexus 2000, Cisco UCS, Cisco MDS 9513, and Cisco Datacenter Network Manager (DCNM).
  • Designed and implemented the following features on the Cisco Nexus 7000 and 5500 switches: vPC, HSRP, FCoE, and FC.
  • Deployed Nexus 1010 and 1110 Cloud Services Platform Appliances and deployed Nexus 1000v Virtual Supervisor Module (VSM), and Virtual Security Gateway (VSG) Virtual Service Blade (VSB)

Senior Flexpod/Network/Cloud Consultant

Confidential

Responsibilities:

  • Designed and implemented multiple Secure Multitenant Flexpod Datacenter infrastructures.
  • Installed and Configured Cisco Nexus 7000, Cisco Nexus 5500 and Cisco Nexus 2200.
  • Configured and installed Cisco UCS Director to automate network device configurations and Netapp Controller configuration.
  • Configured and maintained Cisco Intelligent Automation for the Cloud (CIAC) to manage diverse Cloud infrastructures.
  • Developed and implemented a migration plan for Physical-to-Physical (P2P) and Physical to Virtual (P2V) migrations from HP G6 and G7 blades to Cisco UCS B-Series blades.
  • Developed automation scripts to speed up the migration efforts and eliminate operator error during the P2P and P2V migrations.
  • Deployed VMWare VCenter to manage multiple ESX hosts spanning multiple datacenters.

Datacenter/Cloud Network Engineering Consultant

Confidential

Responsibilities:

  • Designed and implemented a multitenant datacenter infrastructure which included creating different Service delivery nodes and protected subnets for each tenant.
  • Designed and implemented the following features on the Cisco Nexus 9000, 7000 and 5500 switches: vPC, HSRP, FabricPath, OTV, EIGRP, BGP, VRF, FCoE, FC, PIM, GLBP and TrustSec.
  • Implemented OPNET AppResponse Expert to monitor and troubleshoot complex network/application issues.
  • Designed and implemented a firewall cluster using ASA 5585-X firewalls in routed mode and created different security contexts for each tenant in the multitenant environment.
  • Designed and implemented F5 Viprion Chassis for Application Service Delivery, deployed vCMP to host GTM and LTM guest Operating Systems and created multiple Route Domains to separate the traffic between different tenants.
  • Created F5 iRules to automate complex configuration and troubleshooting tasks.
  • Designed and implemented a Cisco UCS environment to host the Hertz’ Private Cloud infrastructure.
  • Configured and implemented UCS 6296, UCS 5108 chassis, 2204XP IO modules, B200 blades, B400 blades, VIC 1240 cards, VIC 1280 cards.
  • Implemented UCS disjoint infrastructure
  • Designed and implemented security to isolate each tenant traffic within the private cloud and perform stateful inspection using Cisco ASA 1000v and Virtual Security Gateway (VSG)
  • Deployed virtualized Network Switch functionality using Cisco Nexus 1000v and open vSwitch
  • Deployed virtualized Network Router functionality using Cisco CSR1000v, Brocade Vyatta 5600 vRouter and Vmware NSX.
  • Deployed virtualized Network Load-balancing functionality using Netscaler 1000v, F5 virtual LTM and GTM, Citrix Netscaler VPX, and Brocade virtual ADX.
  • Deployed virtualized Network Security functionality using Cisco’s ASA 1000v, Palo Alto’s Virtual firewall and Checkpoint’s virtual Security Gateway.
  • Deployed virtualized WAN acceleration using Cisco’s vWAAS.
  • Designed and implemented a global UCS environment and deployed UCS Central for Centralized Management of the different UCS Domains.
  • Automated Cisco UCS deployments using Powershell scripts.
  • Interfaced with the UCS API to retrieve system management information.
  • Deployed UCS Director to automate Cisco UCS, HP and Dell Server Provisioning
  • Deployed UCS Director to automate Cisco Nexus and Brocade MLX network configuration
  • Deployed UCS Director to automate Cisco MDS storage configuration
  • Deployed UCS director to automate NetApp and EMC storage provisioning
  • Deployed UCS Director to automate VMware, Hyper-V and KVM virtual infrastructures.
  • Designed, Implemented and managed a Hybrid cloud infrastructure that integrated VMware/UCS private cloud with Amazon and Google public cloud infrastructures. Utilized Cisco Intelligent Automation for the Cloud (CIAC) for Cloud management and orchestration.
  • Designed and implemented CIAC to orchestrate server compute functions. Implemented dynamic auto-provisioning using the public cloud if the resources are not available on the private cloud.
  • Interfaced CIAC with Vmware cloud director to automate virtual machine deployments.
  • Interfaced CIAC with Microsoft Systems Management Server to automate server Operating systems deployment.
  • Designed and implemented an OpenStack SDN infrastructure to enable massive dynamic scaling of compute and storage resources.
  • Designed and implemented OpenStack Nova to provision virtual machines on various hypervisors such as Vmware, KVM and Hyper-V for compute.
  • Designed and implemented OpenStack Swift to create a distributed storage infrastructure across multiple SDN nodes.
  • Designed and implemented OpenStack Glance to automate the discovery, registration and retrieval of virtual machine images.
  • Designed and implemented OpenStack Horizon to create a self-service portal for resource orchestration.
  • Designed and implemented OpenStack Keystone to provide unified authentication between OpenStack Nova, Swift and Glance APIs.
  • Designed and implemented the Openstack Neutron API with the SDN controller application to create a virtual network overlay on the Cisco Nexus 5000, 7000 and 9000 switches.
  • Designed and implemented OpenStack Cinder to provide block storage.
  • Designed and Implemented a Software Defined Networking (SDN) infrastructure created in Java to perform dynamic latency/cost based routing at a global scale leveraging the multiple circuits through which traffic could traverse and choosing the most optimal path.
  • Interfaced with the Cisco Open Network Environment Platform Kit (onePK) Controller to provide programmatic access to the Nexus 9000 platform from the SDN application.
  • Deployed VXLAN on the Nexus 9000 to map the physical VLANs to the Virtual Overlay VLANs.
  • Deployed the Nexus 9000 Application Virtual switch to support network telemetry applications.
  • Interfaced the SDN controller applications with the Nexus 9000 using the following interfaces: NX-API, NETCONF, Representational State Transfer (REST) and Javascript Object Notation (JSON).
  • Implemented Puppet and Chef Automation tools to automate Cloud provisioning and configuration.
  • Developed and implemented automation scripts and applications using Bash, Python, TCL and Perl.

Senior Network Engineer

Confidential

Responsibilities:

  • Installed and configured SUP2/2E, M1/M2 Series Modules, and F1/F2/F2E Series modules.
  • Deployed FabricPath between the Nexus 7018 aggregation switches and the Nexus 5596 Access switches
  • Deployed Unicast OTV and Multicast OTV creating multiple overlays through an MPLS core.
  • Deployed and implemented F5 VIPRION chassis and configured the LTM and GTM using vCMP as guest OSes.
  • Designed, configured and implemented a Cisco UCS network with UCS 6296 and 16 UCS 5108 Chassis with B200 and B420 Blades.
  • Designed and implemented a cloud-based multitenant network Solution based on the flexpod architecture.
  • Designed and implemented Security Solutions on Cisco ASA 5520, ASA 5515X and ASA 5525X
  • Configured site-to-site VPN tunnels, Secure Desktop, multiple security contexts, Network Address Translation, Access Control List and application inspection.
  • Configured remote access VPN using the Cisco VPN client, Cisco Anyconnect VPN client and SSL VPN.
  • Configured Active/Standby High Availability with ASA 5515-X firewalls
  • Configured Cisco ACE Load balancers to load balance http web servers, https web servers, IBM Websphere MQ servers and multiple gateways.
  • Installed, Configured and maintained Cisco 3750X IP Services switch.
  • Installed, Configured and maintained Cisco Nexus 7004 datacenter core routers
  • Installed, Configured and maintained Cisco Nexus 5548 UP switches
  • Installed, Configured and maintained Cisco Nexus 2248 Fabric Extenders
  • Installed, Configured and maintained Cisco Fabric Interconnect 6248
  • Installed, Configured and maintained Cisco Unified Computing System (UCS)
  • Installed, Configured and maintained Cisco B200 M3 blade servers.
  • Installed, Configured and maintained Cisco C200 Rackmount servers.
  • Installed, Configured and maintained Nexus 1000v virtual switch
  • Configured virtual Port Channel (vPC), vPC+, Fabricpath, overlay transport virtualization (OTV), port profiles, Multiprotocol Label Switching (MPLS), Hot Standby Redundancy Protocol (HSRP) and Virtual Device Contexts (VDCs) on Cisco Nexus 7004
  • Installed and configured M2 and F2 cards on Cisco Nexus 7004.
  • Configured service profile, LAN connectivity, San connectivity, Quality of Service (QoS) and VM-FEX on Cisco UCS Manager.
  • Implemented FcoE Aggregation on the Cisco Nexus 6000.
  • Configured Virtual SANs (VSANs), basic and enhanced zoning, Node Port Virtualization (NPV), Node Port Identifier Virtualization (NPIV), Fiber Channel over Ethernet (FCoE), Fiber-channel (FC) and multihop FCoE on Cisco Nexus 5548 UP
  • Installed and configured Layer 3 daughter card on Cisco 5548UP.
  • Utilized Solarwinds’ Network Performance Monitor (NPM), Network Configuration Manager (NCM), Network Traffic Analyzer (NTA) and Engineer’s Toolset
  • Utilized Cisco Datacenter Network Manager (DCNM) to manage Nexus 7004 and Nexus 5548UP switches
  • Configured and maintained Cisco Nexus 2232 Fabric Extenders (FEX) connected to Nexus 7004
  • Configured and maintained Cisco Nexus 2232 Fabric Extenders (FEX) connected to Nexus 5548UP switches
  • Configured and maintained NetApp 3250 Arrays
  • Designed a storage Metro-cluster infrastructure to interconnect two regional datacenters over Dark fiber.
  • Designed and configured Fiber Channel over IP (FCIP) tunnels on Cisco MDS 9222i between 2 regional datacenters.
  • Configured Fiber Channel over DWDM Interswitch Links (ISLs) between two regional datacenters.
  • Installed and configured VMWare ESX 5.1 server on Windows 2008 server and ESX 5.1 Appliance.

Advanced Services Network Consultant

Confidential

Responsibilities:

  • Designed and implemented an Openflow network telemetry application to interface with the Brocade MLX switches.
  • Created and Implemented Network Design Proposals for multiple customers connecting to the Service Provider through MPLS and Frame-Relay circuits.
  • Configured and maintained Brocade DCX and Cisco MDS fabric switches to support SAN connectivity.
  • Installed and Configured Network Attached Storage (NAS) devices to support the SAN deployment.
  • Configured and maintained Brocade DCX and Cisco Nexus 7000 series data center routers to support Verizon’s IMS services infrastructure
  • Configured and maintained multiple Linux servers running on VMware ESX server.
  • Maintained 83 Brocade MLX Data Center routers across various geographical regions.
  • Designed and implemented a 10G aggregation network for Verizon Wireless to support the new Long Term Evolution (LTE) infrastructure.
  • Created high-level network diagrams of the LTE infrastructure using Microsoft Visio.
  • Developed method of procedures on complex network engineering processes.
  • Developed and implemented complex parameters to analyze and filter data coming from various EVDO, CDMA and LTE applications, aggregated the data and repacked it for various monitoring applications.
  • Designed and implemented enterprise management software applications to manage the 10G aggregators.
  • Created and maintained device configurations to support data monitoring access to Verizon's FA/HA PDSN and Long term Evolution (LTE) network.
  • Provided support for Ericsson and Alcatel Lucent MME, PGW, SGW, eHRPD, HSGW and XGW.
  • Utilize scripting languages such as Perl and Expect to automate routine network management tasks on the Brocade devices.
  • Configured and maintained Brocade IronView Network Manager (INM)
  • Configured and maintained Brocade Network Advisor (BNA)
  • Configured and maintained Brocade Data Center Fabric Manager(DCFM)
  • Created and maintained configuration to support data feeds to IBM Blade Servers.
  • Created and maintained configuration to support data feeds to NetScout monitoring applications.
  • Created and maintained configuration to support data feeds to Tektronix network analyzer.
  • Created and maintained configuration to support data feeds to Alcatel Lucent (ALU) Guardian application.
  • Created and maintained configuration to support data feeds to Cisco Video Optimizer application.
  • Created and maintained configuration to support data feeds to Juniper SRX firewalls.
  • Utilized Brocade E-health to monitor the Brocade MLX network.

Senior Network Engineer/Systems Analyst

Confidential

Responsibilities:

  • Designed, implemented and maintained the 10 million dollar MPLS infrastructure on Fort Hood, Texas.
  • Developed complex processes to migrate over 1200 layer 2 devices, 50 layer 3 devices (Foundry NetIron XMR, and Cisco Nexus switches) and over 50,000 users from an IP-based network to an MPLS infrastructure using Virtual Private Networks (L3VPNs).
  • Configured and maintained the following Cisco Devices: CiscoWorks, 6500, 3750, 2950, Nexus 5000, and Nexus 7000.
  • Configured and maintained the following Foundry/Brocade Devices: ServerIron ADX 4000, NetIron XMR, NetIron IMR, BigIron 4000/8000, FES24/48/96, FGS24/48, and SX 800/1600.
  • Designed and maintained the Fort Hood Server Farm SAN architecture supporting over 100,000 military and civilian personnel.
  • Created multiple layer 2 and layer 3 network diagrams using Microsoft Visio.
  • Configured and maintained Brocade DCX Backbones.
  • Configured and maintained EMC SAN devices
  • Utilized Brocade Data Center Fabric Manager (DCFM) to monitor the Brocade SAN fabric.
  • Configured and maintained Brocade Fiber Channel over Ethernet (FCoE) switches.
  • Utilized the following network monitoring, management and analysis tools: HPOpenview, OPNet, CiscoWorks, Ironview, Solarwinds, WhatsUp Gold, Ethereal, and Wireshark.
  • Implemented Virtual Private LAN Services (VPLS) across network endpoints requiring layer 2 VLAN propagation.
  • Configured and Managed Cisco Wireless Access Points and Cisco Wireless LAN Controllers (WLC) through Cisco Wireless Control System (WCS).
  • Migrated CiscoWorks Wireless LAN Solution Engine (WLSE) to Cisco WCS.
  • Performed site surveys and utilized WCS heat maps and map editor to determine Access Point placement.
  • Configured Cisco Wireless LAN Controllers (WLC) through the web interface, CLI and through WCS.
  • Configured Cisco 2106, 3750G, 4400 WLCs and WiSM on the Cisco 6500 switch (With Supervisor Engine 720) through CLI and through WCS
  • Configured Cisco Aironet 1250AG and Aironet 1520 through WCS
  • Performed Code upgrades, on Cisco WLCs and Access Points through the WCS web interface.
  • Created technical documentations on advanced network and systems processes.
  • Engineered HPOpenview, OPNet, and Foundry Ironview network monitoring and management applications.
  • Designed, implemented and maintained Visual Basic and C++ software applications that automates the creation of DHCP scope options and RADIUS server options. These applications saved the Confidential (NEC) over $50,000 by reducing the man-hours required to perform those tasks.
  • Implemented MAC Authentication by interfacing over 1200 layer 2 devices with Microsoft Information and Authentication Server (IAS) and Active Directory.
  • Utilized advanced scripting languages such as PERL, EXPECT, PowerShell and VBScript to automate complex desktop, server and networking tasks.
  • Improved network efficiency, reliability, and security on Fort Hood’s network infrastructure by hardening network devices according to the most recent DoD Information Assurance Certification and Accreditation Process (DIACAP) requirements.
  • Maintained the Sybase database backend of the Ironview network monitoring application.
  • Created SQL queries to retrieve dynamic data from the Sybase database
  • Maintained Multiple DHCP Servers, Radius Servers and Windows 2008 Domain Controllers.
  • Implemented Performance Tuning of the Windows 2008 hardware components, Network Adapters and storage devices
  • Implemented Performance Tuning of Windows 2008 web servers, IIS, File Servers, Active Directory Domain Controllers, Terminal servers, and Virtualization servers.
  • Performed Windows Server 2008 clustering for DHCP Servers, IIS, and Radius Servers.
  • Utilized Remedy to track trouble tickets and provided level IV technical support.
  • Maintained Cisco ASA and 3000 VPN Concentrators. Configured users to authenticate using smart cards and digital certificates.
  • Maintained a Windows Deployment Server (WDS) to allow users to image computers using PXE boot.
  • Maintained a SharePoint 2007 Server with a SQL 2005 backend. Designed SharePoint web sites for collaboration and project tracking.
  • Utilized VMware and Virtual PC to simulate complex network and server configurations before deployment.

Network Systems Analyst/Information Assurance Instructor

Confidential

Responsibilities:

  • Developed and Maintained a Windows 2003 Active Directory Infrastructure.
  • Developed course materials and conducted training courses in information assurance and Network security based on the Comptia Security+ exam and the CISSP exam.
  • Developed course materials and taught a course in Computer Networking based on the Comptia Network+ exam.
  • Maintained a Windows Software Update Server (WSUS), DNS Server, and DHCP.
  • Utilized Symantec ghost server, to automate the configuration of user computer systems.

Network Support Engineer

Confidential

Responsibilities:

  • Performed LAN connectivity
  • Performed server hardware configuration.
  • Performed Network and Server security.
  • Contributed to the development of a web-based events-driven distributed database application created in C# .NET on a SQL 2005 database backend. The application tracks events on the battlefield and provided military leaders with situational awareness of the battlefield in real-time.
  • Provided field technical Support for the distributed database application.
  • Created customized SQL queries and displayed the results of the queries to a web-site front end.
  • Configured and maintained a Dell PowerEdge Server running windows 2003 to host the database application.
  • Implemented hardware RAID to provide 2 Terabytes of data redundancy.

We'd love your feedback!