Sr Network Engineer Resume
Tampa, FL
SUMMARY:
- 8+ years of professional experience in Network Planning, Implementing, Configuring and Troubleshooting of networking system on both Cisco and Juniper Networks.
- Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system remedy.
- Hands - on Experience in troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, BGP ability to interpret and resolve complex route table problems.
- Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches.
- Experience in Riverbed
- Steelhead WAN Accelerator Model: - 5520,1050,2050
- Center management console, Model 8000
- Implemented traffic filters on Cisco routes using Standard, extended Access list.
- In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP services.
- Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.
- Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks
- Hands on experience of data center environment and implementation of VPC, VDC and Fabric path on Nexus 9K, 7K, 6K, & 2K Switches
- Hands-on experience in using network monitoring tool Solar winds Orion.
- Excellent leadership with good written and oral communication.
- Experience in implementation and troubleshooting of Datacenter devices like Nexus 7000, Nexus 5000 and Nexus 2000 Series devices with VDC's /VRF’s configurations.
- Worked on Palo Alto Firewall
- Configured Security policies (Juniper) and Access Control Lists.
- Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
- Worked on HSRP, VRRP redundancy Protocols.
- Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
- Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
- Access control server configuration for RADIUS & TACAS+.
- Hands-on experience using Cisco Virtual Switching System (VSS).
- Experience with CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248)
- Hands-on Experience with CISCO Nexus 7000, Nexus 5000, and Nexus 2000 platforms.
- Hands-on Experience in Migration of network devices (Palo Alto, F5, Juniper, Aruba, Riverbed, Routers& switches) from one zone to other. Changing the management IP address.
- Good knowledge in Application Layer Socket programming.
- Tested and worked with software designers to establish a user-friendly environment.
- Familiar with Low Latency Networking and Design.
- Familiar with the architecture of complex global DNS infrastructure.
- Experience with monitoring and configuration of homogeneous and heterogeneous network.
- Great team player and able to work under pressure 24x7 duty rotation.
TECHNICAL SKILLS:
Cisco Platforms: Nexus 9K,7K, 5K, 2K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800, 810 series) Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series)CISCO 5500 WLC, CISCO ISE
Juniper Platforms: SRX, MX, EX Series Routers and Switches
Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi
Firewall: ASA Firewall (5520/5540/5585 ), Palo Alto, Checkpoint, PIX and FWSM
Network Tools: Solar Winds, SNMP, Cisco Works, Wireshark, QRadar, RSA Envision, Zenoss, NCM, Algosec, Voyence, Net scout, InfoBlox, Wireshark, ASDM, XenApp
Load Balancers: F5 BIG IP LTM 5000, GTM C-112, VIPRION VPR 2400
WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET
LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q
Security Protocols: IKE, IPSEC, SSL-VPN
Networking Protocols: OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA
Scripting: Python
Operating System: Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix
PROFESSIONAL EXPERIENCE:
Confidential, Tampa, FL
Sr Network Engineer
Responsibilities:
- Worked on implementation and troubleshooting of Datacenter devices like Nexus 9000, 7000, Nexus 5000 and Nexus 2000 Series devices with VDC's /VRF’s configurations.
- Worked with Cisco Nexus Switches and Virtual Port Channel configuration.
- Worked on Datacenter Migration project to migrate the existing 6509, 4509 devices to a Nexus 7010, 5010 and Nexus 2248 FEX based solution.
- Configured VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
- Configured FCOE using Cisco nexus 5548.
- Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
- Worked with the server team to get the DHCP scope created for Voice, Data and wireless networks for the new Site setup.
- Performed ISSU upgrade on Nexus 7010 devices by operating the supervisors in active/standby mode on the devices by determining ISSU compatibility.
- Worked on 1800,2600,2800,3600,7200,7600 Routers and 3850,4500,4900 Switches.
- Dealt with implementation of Cisco ASA 5585 devices and Juniper SRX 550 devices to apply security policies on it.
- Configured Load balancers and Riverbed WAN optimizers.
- Areas of responsibility include routing and switching, SSL VPN and Site-to-Site VPN using Cisco ASA 5505 and 5520, Riverbed WAN optimization.
- Responsible for Firewall Administration, Rule Analysis, Rule Modification on ASA 5585 and also migration of policies from Cisco ASA firewall to Palo Alto.
- Deployed Palo Alto firewalls for different NAT, video conferencing traffic.
- Managing Palo alto Models 5060,3060 using Panorama.
- Responsible for day to day management of Fortinet, Cisco Devices, Traffic management and monitoring.
- Configured Site-Site VPN on Palo Alto Firewall on one side and Fortinet on the other side.
- Creating Security policies and rules in Fortinet firewalls used as egress filtering firewall in the enterprise network environment.
- Auditing and review of the rules in security policies in multi-vendor firewall environment like Checkpoint, Fortinet and Palo Alto.
- Corporate firewall management and support including site-to-site IPsec VPN and remote SSL VPN architecture design and implementation on Fortinet systems.
- Worked on F5 Load balancers and ConfiguredBIG IP as reverse proxy and Managing Application traffic
- Responsible for configuration and troubleshooting issues related to F5 GTM/LTM devices such as 4200v, 5200v, Viprion 2200 and F5 APM.
- Responsible for configuration and troubleshooting issues related to F5 LTM 2000,3000,6900.
- Responsible for implementing and deploying group policies and Active Directory network services (DHCP, WINS and DNS) within a Windows 2008 networking environment.
- Performed network administration of Active Directory Server DHCP Server, ADFS, IDAM, DNS Servers.
- Monitor the health of the devices, alarms with network monitoring tools such as SolarWinds, Wireshark, Orion and VPM
- Utilize BMC remedy ticketing system to monitor, troubleshoot and resolve alarms on sites.
- Consulted with engineering team to resolve tickets and troubleshoot L3/L2 problems.
- 24x7 on-call escalation support as part of the security operations team.
Confidential, Eden Prairie, MN
Sr. Network Engineer
Responsibilities:
- Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network.
- Configuration and Administration of Cisco and Juniper Routers and Switches.
- Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
- Expert on creation and maintaining of standard configurations for all Checkpoint Firewalls.
- Designed and implemented a remote access solution using Checkpoint Firewalls Site to Site VPN blade.
- Setup and maintained CheckPoint-1 security policies including NAT, Secure Remote access.
- Worked on Checkpoint Platform including Provider Smart Domain Manager.
- Worked on configuring, managing and supporting Checkpoint Gateways.
- Provided support for Checkpoint R77. 40 with GAIA and SPLAT.
- Planned and designed to in corporate McAfee's IDS/IPS devices into Lowes network at optimized network locations.
- Troubleshoot and hands on experience on security related issues on Checkpoint IDS/IPS.
- Worked on F5 load Balancer, configured Virtual servers, pool, pool members, worked on load balancing methods for LTM.
- Involved in the configuration of AIR-CAP-3502 standalone access points for wireless setup and point to the appropriate WLAN controller.
- Configured virtual servers, nodes and load balancing pools on the F5 LTM 6400, 6800 devices for various medical/biomed applications and their availability.
- Proficient using the F5 based profiles, monitors, VIP's, pools, pool members, iRules for virtual IP's.
- Used load balancer Cisco CSM and F5 LTM between the servers inside the server farm and in the DMZ.
- Configured and troubleshoot Juniper EX series switches and routers.
- Migrated to Juniper EX series switches from Cisco 3500 series and 6500 series switches.
- Experience with moving data center from one location to another location, from 6500 based data centers to Nexus based data center.
- Network Redesign for Small Office Locations. This includes changes to both the voice and data environment.
- Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
- Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches.
- Switching tasks include VTP, ISL/ 802.1q, IPSec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP.
- Installed and configured DNS, DHCP servers.
- Worked with Infoblox for securing and managing DNS, DHCP and IPAM. Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
- Replaced branch hardware with new 3900 routers and 2960 switches.
- Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
- Involved in configuring Juniper SSG-140 and Cisco ASA firewall
- Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
Confidential, Bellevue, WA
Network Engineer
Responsibilities:
- Experience with Supporting both Network and Security infrastructure in data center environment and Campus environment, which involved with devices such as routers, switches, firewalls and wireless access points.
- Strong hands on experience on ASA (5525/5545/5585 ) Firewalls. Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
- Configured ASA 5540 to ensure high-end security on the network with ACLs and Firewall.
- Providing solutions to ESA, WSA, CWS, Content security management appliance, ASA, ASAv and ASA with Firepower.
- Experienced in security and building Cisco ASA firewalls with Failover.
- Replaced ASA legacy firewalls with ASA next generation firewalls as per business requirements.
- Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.
- Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.
- Upgraded Roger Management Network security appliances with Cisco Firewall ASA 5580, IDS, network management tools Cisco works (VMS, LMS, CSM), IDS/IPS.
- Add Trunks, Spanning Tree protocol, Port-Security, VLAN-MAPs and DOT1X for Switches and Wireless
- Experience with implementing Cisco 6500 VSS on the User distribution switches.
- Upgraded IOS on the different ASA flavors like 5510, 5520 and 5585 firewalls.
- Involved in design and implementation of Data Center Migration, worked on implementationStrategies for the expansion of the MPLS VPNnetworks.
- Working Knowledge of Cisco IOS, Cisco IOS-XR, Cisco Cat OS, Cisco NX-OS, JUNOS
- Experience with configuring BGP in the data center and also using BGP as a WAN protocol and manipulating BGP attributes.
- Deploy and support network load balancers, such as F5 LTM/GTM, Cisco ACE
- Implemented various EX, SRX & J series Juniper devices.
- Troubleshot and configured theJuniper Net screen firewalls (SRX).
- Experience with deploying Fabric Path using Nexus 7000 Devices.
- Experience with configuring VPC, VDC and OTV between the data centers as a layer 2 extension.
- Experience with configuring FCOE using Cisco Nexus 5548.
- Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multilayer Switching.
- Configuring OSPF and Static routing on Juniper M and MX series Routers.
- Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
- Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wire shark.
- Maintaining the health of 250+ wireless Access points in multiple locations.
Confidential
Hardware Support Engineer
Responsibilities:
- In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
- Configured and troubleshoot OSPF and EIGRP.
- Planning and configuring the routing protocols such as OSPF and Static Routing on the routers.
- WAN Infrastructure running OSPF & BGP as core routing protocol.
- Tested authentication in OSPF and BGP.
- Performed and technically documented various test results on the lab tests conducted.
- Hands on Experience working with security issue like applying ACL’s, configuring NAT and VPN.
- Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security.
- Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series.
- Responsible for Configuring SITE TO SITE VPN on VPN Concentrators series between Head office and Branch office.
- Configured Firewall logging, DMZs& related security policies & monitoring
- Worked onCiscoLayer 2 switches (spanning tree, VLAN).
Confidential
System / Network Engineer
Responsibilities:
- Troubleshooting of CISCO routers like ping, trace route and basic issues.
- Ensure connectivity and communication among networks, servers and clients inside and outside department.
- IOS upgrade for Cisco routers & switches.
- Configured and troubleshoot OSPF and EIGRP.
- Ensure reliability, stability and recoverable of specific server environments.
- WAN Infrastructure running OSPF & BGP as core routing protocol.
- Planning and configuring the routing protocols such as OSPF, RIP, and Static Routing on the routers.
- Worked on ASA firewalls and F5 load balancers
- Managing Layer 2 switches of Cisco, VLAN configuration and assigning ports to specific VLAN as per requirement.
- Monitor and tune network to ensure acceptable levels of performance.
- Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security