We provide IT Staff Augmentation Services!

Network Administrator Resume Profile

4.00/5 (Submit Your Rating)

Summary

Energetic IT professional securing 11 years of outstanding experience in Windows NT/2000/XP/2003/2008, Linux, Check point Firewall, Cisco network security devices, CTI systems support and System Administration. Versatile, self-starter with proven communication and the ability to take on a leadership role when necessary. Hard-working, results-oriented, technical professional able to work well in demanding environments or alone on special projects Technical Skills Software Experience Cisco Routers 1700, 2800, 3745, 7200 series . Cisco Switches Manageable like 4506,6504, 6513 etc and Unmanageable Checkpoint Firewall R65, R70, R75, R77.10 , Cisco ASA 5510 TCP/IP. DNS. DHCP. WINS. Remote Desktop. VPN. LDAP. GPO Configuration, Implementation. Terminal Services. DFS. Windows Clustering environment. Norton Ghost. RAID Symantec Endpoint Management and Trend Micro-Office Scan Antivirus Web Sense and McAfee Web Gateway Configuration. MS ISA 2004 / 2006. TMG. DLP Windows XP, Windows 7, 2000/2003 2008/R2 Server and all Server Core versions MS Outlook/Web Access, MS Office 97/2000/XP/2007/2010. SharePoint Exchange 5.5/2003/2007/2010. Active Directory Active Directory Configuration, Implementation, Management and Migration. ADFS. SCCM. SCOM Linux OS Red Hat 9 and Cent OS 6.4. Citrix and Vmware Call center solution Inter Active Intelligence, Astrick and Ensercle RSA Authentication system setup and configuration Wireless router and Access point setup. Maintenance Network Monitoring tool like Netscaler, Cisco Prime Infrastructure, Orion and Solarwinds NAS server administration. VERITAS backup utility Change / Incident Management. ITIL

Work History

Confidential

Sr. Network Security Consultant

  • Analyzing Checkpoint Firewall Rules and Policies R75 and R77
  • Implementation of Secure Checkpoint Firewall Rule and policies
  • Clean up of unused rule, Services and Protocols
  • Narrowing down Security Risk by rewriting Checkpoint Firewall Rules with Specific Source and Destinations, ports and services
  • IPS-IDS
  • Designing Network Security. Implementation of SSL VPN and IP Sec Tunnel
  • Enforcing 2 Factor Authentication for all VPN connections RSA
  • F5 Big IP changes to enforce 2FA
  • Smart view Monitor and Tracker for Logs monitoring and troubleshooting
  • Tufin Secure Track for Firewall Rule, protocol, ports Analysis. Rule usage, network objects monitoring
  • Infoblox
  • Syslog monitoring using SPLUNK. Rule tracing, port or protocols analysis and troubleshooting using SPLUNK
  • ServiceNow for change and incident management. Following ITIL standards and tracking all changes of enterprise

Confidential

Security Consultant / Proxy Admin

  • Administered and maintained Checkpoint Firewalls
  • Configured IPSEC VPN
  • Handling Firewall Access Requests through ITIL Based Change management system. Scheduling changes and executing these changes during maintenance window off-hour
  • Executing change requests to the firewall rule base. Firewall Policy Optimization and Clean up
  • Check point firewall R75 management and VPN Client configuration. Policy Designing and implementation
  • Analyzing Checkpoint firewall rules. Identify rules those can be removed and work with Network team for the final Implementation. Creation of new rule based on Company requirement and policy
  • Implementation of Checkpoint Firewall test lab R77.10 . Rule Creation, policy push.
  • Tufin Secure Track for Firewall Rule, protocol, ports Analysis. Rule usage, network objects monitoring
  • Working with End client / Trading Partners to add/remove or edit IP list on Checkpoint Firewall for reverse proxy rule set
  • Analyzing Checkpoint rules for Reverse and forward proxy. Check point log monitoring and maintenance
  • SIEM Logs monitoring and troubleshooting. Q-Radar. Real time troubleshooting using SIEM logs
  • Setting up Cluster environment for all McAfee Gateway. Gateway Re-Imaging
  • Proxy Servers Designing, Implementation. Configuration. Management
  • Configuration of Reverse Proxy Servers. Allowing External Client to connect company network through reverse proxy rule set. Implementation of Secured Rule to allow traders to connect internal network
  • Upgrading from 7.3.2 to 7.4.1. Migration to higher version. PAC file Configuration
  • Policy Designing. Implementation of Rules. Securing Internet environment for Company
  • LDAP and Kerberos Integration with AD. IIS Setup for PAC file
  • Configuration of Web Reporter, Logs. Monitoring Logs. Real time troubleshooting. SIEM Logs
  • Configuration of Juno client and Juniper firewall for VPN connectivity
  • MS ISA 2004 proxy server setup. Configuration. Enterprise Rules, Array and Reverse proxy configuration
  • Installing Certification for Listener on ISA server. Migration from MS ISA 2004 to MS ISA 2006. TMG
  • Allowing RSA Authentication Server by adding rules on ISA server to enable VPN connection
  • Microsoft CLP client configuration for internal applications connecting to outside network
  • BMC Remedy for change and incident management. Following ITIL standards and tracking all changes of enterprise. Incident Management. Change Management

Confidential

Infrastructure Support

  • Cisco ASA firewall 5500 Series management and VPN Client configuration. Policy Designing and implementation
  • Analyze current rule of Firewall and proxy server. Provide recommendations to add/remove/edit rules
  • Cisco ASA syslog monitoring and maintenance. Log Rotation. Cisco Any connect VPN Client
  • Administered and maintained Cisco ASA and Checkpoint Firewalls
  • Configured IPSEC VPN over Cisco ASA
  • Web Application Firewall WAF Gateway and MX server up gradation from version 7.5 to 9.5
  • SSL certification configuration, import certificate on WAF, Exception Handling, Reporting, Cookies and SQL Injection handling
  • RSA Token Authentication System Configuration, Management and Client installation for adding extra security layer to infrastructure
  • Cisco Router / Switches configuration, Management. MPLS Migration
  • Network and Server Management. Management of Networking Monitoring tools such as Solar winds
  • Active Directory Migration from MS Windows 2003 to 2008 R2 Server and Windows XP to 2007 on Client side
  • User Creation, Deletion, GPO, Security permission on DFS. Groups Creation, Distribution and Security groups. DNS. DHCP. IIS. DFS and Synchronization
  • Implementing Proxy server SQUID for enterprise network
  • Applied REGEX and FQDN, Black list for content filtering, ACL creation and other fine tuning on Squid
  • Squid Reporting
  • Cent OS and REDHAT Linux OS installation, configuration and management
  • MS ISA server logs monitoring and securing with patches required
  • Providing support to remote sites and facility for windows and Linux Systems, Cisco Switches and Router Configuration, Network monitoring and Security Audit
  • MPLS Migration. Cisco Router configuration. BGP, OSPF and other routing protocols and routes configuration
  • Integration of Symantec Enterprise Antivirus Software. Implementation of Endpoint protection for enterprise servers and configuring web console for efficient management. Patching and updates
  • Setting up Security Settings of Windows Enterprise Server according to compliance
  • Auditing Security on Windows Servers and Workstations
  • ITIL process flow integration. Change Management. Incident Management

Confidential

Network Administrator / ITS Lead

  • Integration of Check point firewall R70 . End to End point to point VPN tunnel between centers. Policy Designing and Implementation
  • Checkpoint firewall Management. Log Monitoring. Web sense integration with Checkpoint
  • Configuring Leased Lines, E1 circuit and Serial lines on Cisco 3745 and Cisco 7200 router
  • Introduced MPLS Circuit at Multiple locations for Company. BGP Cloud Configuration
  • Updating routing tables and IOS on Cisco router. Maintenance and Audit
  • Configured VLAN on Cisco 4506 and Cisco 6513 Switch
  • Configured Wireless Access in network with restricted access
  • Extensive experienced working on MS Outlook, Exchange 5.5/2000, IIS 5.x, SMS 2.x application Server, Lotus Notes Microsoft office productivity suites word processing, spreadsheet etc. SharePoint and terminal emulation,
  • Active Directory / DNS-DHCP Design and Implementation, Terminal Services VPN Support, Load Balancing, MS Clustering. Network Attached Storage Devices NAS , VERITAS Net Backup Exec, Symantec Backup, Ghost Image, Citrix
  • Active Directory Migration from MS Windows 2000 to 2003 and Windows 2003 to 2008 Server.
  • Handling HELPDESK Technical support campaign and provide technical support to all sites of company
  • Dialer monitoring supervisor. Providing Dialer support for each site and each campaign
  • Configuration of Lines, Station Campaigns, Workflow, Users on Dialer server. And client Application Configuration. Integration of Dialer server, Data base server and Web Server
  • Configuration of database server, web server, application server for contact center and company websites
  • Design and implement System/Network security
  • WSUS server installation, configuration and management for windows patches
  • Linksys and Acton wireless gateway setup
  • Configuring Compaq DL 360 NAS server Disk array and assign proper permission and access control to user groups
  • Contact center Administration, Administration of IP telephony systems and VOIP Gateway
  • Having knowledge of VoIP technology, MPLS networking, and Media Gateway interoperability
  • Primary responsible for support and maintenance, routing configuration, Voice Portal, Outbound Contact Solution, CTI and reporting platform and IVR management
  • Campaign Creation User Creation on communication server, Integration with application and Database systems with communication server
  • Building and Maintaining Telephony system and VOIP / DATA Network.
  • Network Designing, configuration, maintenance
  • Developing individual to perform at Etech-Helpdesk campaign as Team leader and provide global support to all sites of company
  • Implementation of LINUX based mail server. Postfix configuration. User and mail box creation.
  • Administration of LINUX based open source Astrick dialer server.
  • Securing in depth knowledge of installing and configuring access control systems.
  • Worked closely with customers/end users and studied requirements, designed, implemented and resolved issues related Hardware, Network Connectivity, Routing Switching.
  • Backup Management, Reporting, Recovery and Disaster Recovery planning and implementation
  • Worked on enterprise-wide security architecture design, development and Security Monitoring / Reporting, Policy Development, compliance, Vulnerability Assessment and Penetration Testing.
  • Participated as core Network Administrator team member in establishing 3 different facilities across the company, globally.
  • Configuration of Lines, Station Campaigns, Workflow, Users on Dialer server. And client Application Configuration. Integration of Dialer server, Data base server and Web Server
  • Setting up dial plans, call tactics and stations
  • Integration of Web sense server with MS-SQL server for reporting purpose.
  • System administration in multiple domain / user platforms with the skills of installation, migration, performance tuning, server security analysis, security configuration and system monitoring.

We'd love your feedback!