We provide IT Staff Augmentation Services!

Data Network Engineer Resume

4.00/5 (Submit Your Rating)

Pennington, NJ

SUMMARY

  • CCNP and CCNA certified with 9+ years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and Testing of networking system on both Cisco and Juniper Networks
  • Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system remedy
  • Experience of routing protocols like EIGRP, OSPF, RIP, and BGP
  • Worked on Cisco 7200,6500,3800, 3600, 2800, 2600, 1800,810 series Router andCisco 2900, 3500,4500, 5500, 6500 series switch
  • Extensive hands - on experience with complex routed LAN and WAN networks,routers and switches
  • Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers
  • Experience in the setup of Access-Lists, and OSPF, EIGRP, and tunnel installations
  • Proficiency in configuration of VLAN setup on variousCiscoRouters and Switches
  • Implemented and support Vblock in various Environment and Production
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks
  • Experience in configuring and Installation of Cisco ASA 5500 series Firewalls.
  • Good knowledge of Palo Alto Firewalls and the Panorama Network Security Management Box.
  • Experience in working with F5 lTM, GTM Load Balancers.
  • Knowledge of Windows XP, 2003, 2008 Linux Red hat server and Python, Perl, Shell scripting.
  • Experience with Bluecoat Proxy servers, LAN & WAN management.
  • Black listing and White listing of web URL on Bluecoat Proxy Servers.
  • Enhanced level of experience with OSPF, BGP, and TCP/IP
  • Excellent leadership with good written and oral communication
  • Great team player and able to work under pressure 24x7 duty rotation
  • Strong knowledge in HSRP, VRRP redundancy Protocols.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
  • Experience in physical cabling, IP addressing and sub-netting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Access control server configuration for RADIUS & TACAS+.
  • Experience with 802.11x wireless technology.
  • Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.
  • Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248)
  • Sound knowledge of virtual firewalls like ASA/PIX, checkpoint VSX, IDS, IPS as well as encryption techniques.
  • Hands-on experience in developing scripts using Perl scripting language.
  • Hands on experience in tools like Solarwinds, Infoblox, DNS, DHCP monitoring and management.
  • Good knowledge in configuring wireless Controllers Cisco 4400, 5500 and access points Cisco 1242, 2400 & 3500.
  • Good knowledge about SDN (Software Defined Networks)- Openday light. Experimented with Netscaler for SDN
  • Demonstrated success record in: Managing multiple tasks with proven ability to meet deadlines and proactively identifying the problem to solve complex technical issues.
  • In-depth knowledge of network communication technologies and techniques.
  • Finely tuned analytical/critical thinking and debugging skills with excellent verbal and written communication skills.
  • Highly enthusiastic, creative team player, project implementation, analytical, interpersonal and communication skills

TECHNICAL SKILLS

Client Operating Systems: Windows NT, 2000, XP, Vistas, Windows 7, Linux, Macintosh

Server Operating Systems: Windows Server 2003/ 2008, Microsoft Exchange Server, VMwareCitrix, Linux RHEL 6.1 Red Hat Entreprises.

LAN Technologies: VLAN, VTP, Inter-Vlan routing, STP, RSTP, PVST, 802.1x

WAN Technologies: Frame Relay, ISDN, PPP, ATM, MPLS, Channel & Leased lines

Network Securities: NAT/PAT, VPN, Filtering, Load Balancing, IDS/IPS, IPsec, ACL, CISCO ASA

Routing Protocols: RIP, IGRP, EIGRP, OSPF, BGP, IS-IS, HSRPScriptingPython, Perl, Shell, C++

Routed Protocols: TCP/IP, IPX/SPX, IPv6

Network Managements: SNMP, SSH, Telnet, ICMP

Packages: Visual Studio 2008, Unity, Kinect SDK, MATLAB, CAD, Flash.

Infrastructure Services: DHCP, DNS, SMTP, POP3, FTP, TFTPCCNA, TCP/IP, Networking, LDAP, IMAP Configuring and testing Hardware and Software. Cisco Routers (1800, 2500, 2600,2800, 3600, 3800, 7200). Cisco Switches (2900, 3500, 4000, 4500, 5500, 6500).

PROFESSIONAL EXPERIENCE

Confidential, Pennington, NJ

Data Network Engineer

Responsibilities:

  • Installation and configuration of Cisco 810 series routers as part of the 4G back-up wireless network at all the different branches of banks which involves HSRP between the Primary Cisco 2921 and the backup 819 routers
  • Configuring new Nexus based devices and replacing the old 6500 core devices in the environment as part of the End-of-life Project
  • Provide technical support for ACI (Application Centric Infrastructure), APIC technologies.
  • Integrate Data Center technologies such as ASR, Catalyst, Nexus, UCS and Storage as well as Layer 4-7 devices including but not limited to Firewalls and Load balancers with ACI.
  • Currently working on migration to Cisco ACI and Nexus 9K, 7K, 6K, 5K switching in a fully fault-tolerant design model.
  • Experience with migrating from OSPF to BGP WAN Routing protocol
  • Configured BPDU Guard, port-fast, uplink fast and other spanning tree features
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer
  • Designed and Implemented Cisco UCS pods in Nexus 7000 and Cisco 6500 Platform
  • Experience with ASA 5500 series Firewalls
  • Deployment and Management of Bluecoat proxies in forward proxy scenario as well as for security in reverse proxy scenario.
  • Implement URL filtering requests in Bluecoat Proxy SG for website block list and whitelist purpose.
  • Worked in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover, DMZzoning & configuring VLANs/routing/NATing with the firewalls as per the design
  • Configured Security policies including NAT, PAT, VPN, Route-maps and Access Control Lists
  • Removed huge amounts of redundant Access Control Lists from various ASA 5500 series Firewalls as part of the Firewall Rule Optimization Project using tools like AlgoSec as part of it.
  • Physical Cabling of all components including VNX, VNXe, CX4, Celerra, DAEs, MDS, Nexus, 3560, AMP, Fabric Interconnects, etc. accordingly and powering up V-Block in customer data center
  • Worked on Palo Alto Firewalls and the Panorama Network Security Management Box in order to route over the data logs to the Logging device.
  • Support Bluecoat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Perform root cause analysis and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Tested authentication in OSPF and BGP
  • Troubleshooting all the undiscovered devices by the change management tool by checking the SNMP strings, routing, Access Control Lists on the switches/routers and also Firewalls.
  • Configuring the firewalls to send the logs over to the new logging device and then removing access on firewalls to send data over to the older logging server as part of the QRadar project.
  • Network Redesign for Small Office/Branch Locations. This includes changes to both the voice and data environment.
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy. It also includes the configuration of port channel between core switches and server distribution switches
  • Experience in communicating with different customers, IT teams in gathering the details for the project
  • Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
  • Redesigning Internet connectivity infrastructure for meeting bandwidth requirements
  • Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • Optimized performance of the WANnetworkconsisting of Cisco 3550/4500/6500 switches by configuring VLANs
  • Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers
  • Troubleshooting on resetting the tunnel to initiate the traffic by putting the root towards neighbor side. (if the traffic is not reaching the Destination).
  • Configured GRE tunnels inside VPN tunnel
  • Configured/tested the following network services QoS, multicast, HSRP, IPsec and GRE tunneling.
  • Troubleshooting and implementing tunnels (GRE over IPSEC)
  • Manage Netscaler MPX load balancing and content switching policies.
  • Establish application firewall policies on the Netscaler MPX
  • Handled SSL certificates on the Netscalers
  • Proactively monitor and manage all productions network systems to maximize system availability in Netscaler.
  • Upgraded the Netscalers from 9.x version to 10.5 safe build.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800. Added/removed various network pools for load-balancing as part of different projects and day-to-day troubleshooting activities concerning the respective projects.
  • Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network infrastructure and configured the entire network Infrastructure devices including Network Printers and Register
  • Experience in co-ordinating with Network Engineers and gathering the necessary information and communicating that with the IT-SEC regarding unauthorized changes as classified by the IT-SEC team.

Environment: 6500/3750/3550/3500/2960/2950 switches, Nexus 2000,5000 switches, Cisco 7200/3845/3600//29212800/819 routers, ASA 500 series, PA-5020, PA-5050, TACACS, BGP, GRE, OSPF, EIGRP, VPN, MPLS.

Confidential, Chicago, IL

Sr. Network Engineer

Responsibilities:

  • Worked onCiscoLayer 2 switches (spanning tree, VLAN)
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls
  • Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data environment
  • Plan, build, deploy, and maintain ACI data center lab utilized by internal parties.
  • Create and deliver ACI training to HTTS engineers globally
  • Involved in complete LAN, WAN, Extranet redesign (including IP address planning, designing, installation, pre configuration of network equipment, testing, and maintenance) in both Campus and Branch networks.
  • Worked on configuring, upgrading and verifying the NX-OS operation system.
  • Experience working with Nexus 7010, 5020, 2148, 2248 devices.
  • Worked as a part of data center deployment where we converted from Cisco 6500 to Nexus.
  • Troubleshooting connectivity issues through Bluecoat as well writing and editing web policies.
  • Worked Knowledge on Bluecoat Proxy like blocking URLs Etc.
  • Experienced with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Proficient in design, implementation, management and troubleshooting of Check Point Provider-1 / VSX, Palo Alto IDS, Foundry / F5 Load Balancers, and Blue Coat Packet Shaper systems.
  • Experience configuring high availability for XenServers, Presentation Servers using NetScaler.
  • Experienced configuring VPC, VDC and ISSU Software upgrades on Cisco Nexus 7010.
  • Experience working with BGP attributes such as Weight, Local-Preference, MED and AS-PATH to influence inbound and out bound traffic.
  • Upgrade of Checkpoint Gateways in Cluster with Minimal downtime.
  • Implementing security Solutions using PaloAlto Pa-5000/3000, Cisco ASA, Checkpoint firewalls R75, R77.20 Gaia and Provider-1/MDM.
  • Involved in Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, InterVlan routing and LAN security.
  • Manage Netscaler MPX load balancing and content switching policies.
  • Site-to-Site IPSec Tunnel, Site-to-Site IPSec GRE tunnel, DMVPN.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance.
  • Use and maintain routing protocols EIGRP, OSPF and BGP on the Routers in the network & also worked on BGP Route Reflectors, Confederations.
  • Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.
  • Installed and configured the Cisco routers in two different customer locations. It includes coordinating with Verizon and AT&T in order to bring the serial interface up for T1 link. Also, configuration includes frame relay, BGP and VPN tunnel on GRE
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • Configuring IPSEC VPN on SRX series firewalls.
  • Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210.
  • Implemented HSRP on the Cisco 2948G Layer 3 switches and EIGRP, OSPF on 2 Cisco 2610 routers, the Layer 3 switch, 3 Cisco 350XL Switches, Cisco 3524XL switches for load balancing and fail over.
  • Configuring ASA Firewall and accept/reject rules for network traffic.
  • Extensive knowledge and troubleshooting in data communication protocols and standards including TCP/IP, UDP, IEEE 802.3, Token Ring, Cable Modem, PPPOE, ADSL, Multilayer Switching, DoD standards.
  • Provided Load Balancing towards access layer from core layer using F5 Network Load Balancers.
  • Upgraded load balancers from Radware to F5 BigIP v9 which improved functionality and scalability in the enterprise.
  • Other responsibilities included documentation and supporting other teams.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000/7200/3845/3600/2800 routers, Checkpoint, OSPF, BGP, VLAN, HSRP, LAN, WAN, GRE, IPV4, ASA, Firewall, Checkpoint, Nexus 7K/5K/2K.

Confidential, Santa Clara, CA

Sr. Network Engineer

Responsibilities:

  • Configured Router/ Microsoft VPN Server in order to access certain limited network resources from customer locations
  • Installed and configured four PIX 525 and two ASA 5520 in customer locations. In addition to that, two PIX firewall configured for the Guest access
  • Deployment of Cisco 6500 switches in standalone and VSS modes with SSO and NSF
  • Supporting EIGRP, OSPF and BGP based network by resolving level 1 &2 problems of internal Sites
  • Providing daily network support for Global wide area network consisting of MPLS, VPN and point-to point site
  • Worked on Check Point Security Gateways and Cisco ASA Firewall.
  • Worked on Bluecoat Proxy SG to safeguard web applications in extremely untrusted environments such as guest Wi-Fi zones.
  • Experience working with Network management software NSM
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls
  • Upgraded load balancers from Radware to F5 BigIP v9 which improved functionality and scalability in the enterprise. Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs
  • Experience in operational support, troubleshooting on an enterprise network and possess data capture skills in Cisco CSS, Citrix NetScaler devices.
  • Expertise in configuration, setup and management of NetScaler 9.x for advanced load balancing of applications and Servers.
  • Installed, configured, and managed LAN/WAN Enterprise connectivity, VPN IPSEC-GRE remote office, tunnel, and data center connections, MPLS, and Cisco routers at clients' sites. Performed project design and implementation for numerous client LAN/WAN projects. Resolved all LAN/WAN connectivity issues. Secured access to client DMZ and provided selective VPN access for contractors. Performed network monitoring, network device inventory management, and client billing.
  • Experience in migration of Frame-relay based branches to MPLS based technology using multi-layer stackable devices like 6500 series switches and 2800 series routers
  • Created engineering configuration, Security Standards, documenting processes and Network documentation using Microsoft Visio
  • WAN Infrastructure running OSPF & BGP as core routing protocol.
  • Packet capture on firewalls and analyzing the traffic using Wire shark utilities.
  • Troubleshot Clustering issues on Check Point and Sync issues monitoring and fix.
  • Worked in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Design and implementation of Networks using TCP/IP
  • Configuring RIP, OSPF and Static routing on JuniperM and MX series Routers
  • Experience configuring Virtual Device Context in Nexus 7010
  • Worked on commissioning and decommissioning of the MPLS circuits for various field offices.
  • Worked on HP open view map for Network Management System and Ticketing.
  • Worked on a broad range of topics such as routing and switching, dedicated voice access, planning and implementation, large-scale high-visibility outages, change management coordination, proactive monitoring and maintenance, disaster recovery exercises, and core network repairs.
  • Support various Routers like 2600/3600/7200 series routers
  • Tested authentication in OSPF and BGP
  • Configured and troubleshoot OSPF and EIGRP
  • Work on different connection medium like Fiber and Copper Connectivity
  • WAN Infrastructure running OSPF as a core routing protocol
  • Follow process & procedures for change & configuration management
  • Supported nationwide LAN infrastructure consisting ofCisco4510 and catalyst 6513
  • Deployed the switches in high availability configuration with HSRP
  • NetworkMonitoring using tools likeCiscoWorks 2000
  • Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long term planning, implementation, project management and operations support as required
  • Configuration and troubleshooting link state protocols like OSPF in single area and multiple areas

Environment: Cisco 6500/4500/2960 switches, Cisco 7200/3600/2800/2600 routers, Nexus 7k, Juniper M,MX routers, Juniper SRX firewalls,TACACS, EIGRP, RIP, OSPF,BGP, VPN, GRE,MPLS, F5 Load Balancers, PIX, ASA Firewalls

Confidential

Systems Engineer

Responsibilities:

  • Installing, configuring, administering, and performance tuning Microsoft SQL Server 2000 familiar with Database Creation, Database Security, Database Replication/ Migration, Database Performance Monitoring, User Management, Database Backup/Restoration.
  • Worked on VB Scripting for automation of processes for Windows Servers. Familiar with other script languages like ASP, Power Shell, PHP, Shell, Python.
  • Installing, configuring, administering, troubleshooting VMware server on ESX platform and VMware client, workstation.
  • Installation and Configuration of networks, router/switches configuration and wireless access point/router with security, TCP/IP, VPN, Content Filtering, Access Control Lists on router/switches, VLANs (port mapping, naming etc.), and routing IP address in both LAN/WAN and wireless networks.
  • LAN Cabling, RJ-45crimping, Labelling, Patch Panel, PC Junction boxes, Phone Switches and Rack set-up.
  • Assist staff with the installation, configuration, and ongoing usability of desktop computers, peripheral equipment and software within established standards and guidelines.
  • Analyze existing infrastructure using VMware Capacity Planner.
  • Plan and participate in VMWare Infrastructure consolidation plan reviews, meetings and conference calls.
  • Work with team members in taking snapshots prior to system maintenance activities.
  • Participate in physical to virtual conversion of current running systems for the optimization of the resources and application infrastructure.
  • Create and Manage virtual machines hosted on ESX 3, installation, configuration and administration of windows guest OS in virtual machines.
  • Work on day to day administration tasks and resolve tickets using Remedy.
  • Installation and configuration of network Printers.
  • Managed the member server, a server which hosts services like IIS, DNS, and DHCP.
  • Protected the organization's network from unwanted traffic coming from the internet using ISA Server which is a proxy server and a web caching server.
  • Provided the backup and recovery of the files and data, worked on Windows Firewall, Terminal server, troubleshooting the computer related problems.
  • Attending regular calls of the users related to computers & network problems.

Confidential

Technical Support

Responsibilities:

  • Level 1 technical support for IT Enabled Services of Hewlett Packard (HP) desktop and accessories
  • Responsible for providing first contact resolution meeting floor targets
  • Responsible for revenue generation, excellent sales experience
  • Ensured team always gets Csat on surveys
  • Worked over time and on weekends to meet floor targets for the team
  • Installation and setup of Windows XP and Windows 7 for remote customers (North America Customers)
  • Installation, configuration of Microsoft Outlook 2007 and 2010
  • Installation and configuration of Norton antivirus software
  • Installation and configuration of McAfee antivirus software
  • Responsible for resolving technical issues related to registry files, running services, and startup tools
  • Installation, configuration and technical support of HP printers
  • Installation, configuration and technical support of HP webcams, HP keyboards, wired and wireless HP mouse, HP monitors
  • HP Hardware technical support to find the root cause for black screen, blue screen, RAM failure, Processor failure, and any other hardware failure
  • Responsible for handling high call volume and provide on call resolution in a limited timeframe known as Average handling Time (AHT) of 30 mins. Per call
  • Responsible for escalation to L2 team or higher depending on the issues and remote login to help customer install a software that customer is unable to understand
  • Promoted as Subject Matter Expertise (SME)

Environment: Wins XP/ 7, TCP/IP, WINS, DNS, DHCP, FTP, LDAP, IMAP, SMTP, POP3, Mail Servers

We'd love your feedback!