Systems/network Security Architect Resume
SUMMARY:
- I do not no everything, though dat has never stopped me from providing excellent solutions. If I don’t no it then I will research, learn, lab, master, and deploy it successfully. I has done this frequently throughout my career, often with very short timeframes.
- I am never satisfied with my level of noledge and am a perpetual student of technology. I has completed the CCNP Security, and am now pursuing the CCIE Security. Once dat is complete, then I will move on to mastering another networking discipline.
- I has superb documentation and network diagram skills. It is rare to find a network diagram with more attention to detail TEMPthan those dat I create.
- Network robustness, stability, and security are my goals for every client dat I service. The networks dat I build are stable, redundant, and secure to the highest degree, commensurate with the available resources. If I am not absolutely confident in a network design then I will lab it before deployment and stress test it for days. Companies expect their networks to be always available and secure, and dat’s how I design and build them. My troubleshooting skills are superb. I honestly don’t recall a network problem dat I couldn’t resolve, regardless of the complexity level.
- I am truly a team player and enjoy working with IT professionals of all disciplines. I like to share my noledge and empower those I work with. My main goal is to keep the network running and secure, and I no dat my best chance of doing dat is with a skilled team.
- Reliability is another asset I bring to the table. I can be counted on to complete my tasks, show up on time, and be where I should be. I always answer my phone, respond to texts and emails, and proactively troubleshoot when I see potential issues. I has traveled for projects for many years and handle travel very well.
- I don’t expect anyone to simply take my word for anything. I will be more TEMPthan happy to provide you with s. In short, I personally guarantee you will be pleased with my work in all facets of the job. I will build and maintain a rock solid and secure network, and you’ll never even no it is there.
PROFESSIONAL EXPERIENCE:
Confidential
Systems/Network Security Architect
Responsibilities:
- Provide network security consulting to the world’s largest companies.
- Design and deploy Cisco ASA solutions including code migration, High Availability, clustering, L2L & RA VPN, etc.
- Design and deploy Cisco ISE solutions including all facets of wired and wireless 802.1x, posture, profiling, digital s, Active Directory integration, BYOD, guest access, etc.
- Design and deploy Cisco ACS Server solutions including TACACS+, High Availability, Active Directory integration, etc.
- Assist with routing and switching troubleshooting as needed for network security solutions deployments.
Confidential
Principal Engineer, Senior Network/Security Consultant
Responsibilities:
- Provide leadership to lead design engineers over data center, routing and switching, security, ISE, and wireless.
- Provide technical guidance to the design team and participate in network design and documentation.
- Work with Nexus 7000, 5000, 2000 FEX, and 1000v platforms related to design and configuration.
- Provide designs or design assistance to clients in preparation for Cisco ISE distributed deployments.
- Deploy Cisco ISE nodes including SNS appliances & VMWare virtual machines.
- Provide designs or design assistance to clients in preparation for Cisco ASA & IPS deployments.
- Deploy Cisco ASA & IPS including upgrades from 8.2 to 8.3+, configuration, remote access and LAN to LAN VPN, policies, rules, etc.
- Cisco device families: Nexus 7000, 5000, and 2000, 1000v, Catalyst 6500.
- Cisco ASR 9000 and 1000 series routers.
- Design and implement solution to bring new Nexus gear into the data center and transition IOS data center services to the Nexus environment.
- Provide consulting to integrate the Nexus gear into the existing environment while minimizing down time.
- Install and configure VMWare ESXi and VCenter Server in preparation for VM deployments such as Nexus 1000v, vASA, ISE, CSR 1000v, etc.
Confidential
Network Technical Lead
Responsibilities:
- Primary responsibilities over the temporary and permanent facilities
- Cisco device families: 2800, 3750, 6500, PIX 500, ASA 5500, FWSM, VPN 3000
- Routing protocols: EIGRP
- Circuit types: Metro Ethernet, MPLS WAN, Microwave, 802.11
- Design and deploy U.S. and European transatlantic MPLS (L3VPN) WAN
- Design and deploy end to end network for the temporary facility including access, core, security, remote VPN, and data center.
- Design and deploy 10G campus ring for permanent facility including 30 6500’s (6504, 6506, 6509) for core and access, as well as multiple FWSM’s.
- Install and deploy SolarWinds Orion for network management.
- Install and deploy Cisco ACS server for AAA.
- Install and deploy CiscoWorks LMS for network management.
- Provide technical and organizational leadership for network team members.
- Interview and select prospective contractors.
Confidential
Senior WAN Engineer
Responsibilities:
- Primary responsibilities over the nationwide MPLS network
- Cisco device families: 1800, 2600, 2800, 3800, 7200, 3750, 6500, ASA 5500
- Other devices: Allot NetEnforcer, Foundry Server Iron
- Routing protocols: BGP, EIGRP
- Other protocols: GRE, NAT, PBR, QoS, HSRP, etc.
- Circuit types: T1, MLPPP, DS3, OC3, OC12, Carrier Ethernet
- Design, configure, and maintain 3 regional core networks which act as MPLS and Internet gateways for over 1,000 T1/Multilink/DS3 circuits.
- Design, configure, and maintain a network with over 1,000 circuits and routers connecting into a Verizon Business MPLS network via BGP.
- Project Lead: Deep Packet Inspection & QoS
- Determine the best solution for deep packet inspection and QoS traffic shaping for appropriate queuing at our 3 regional cores.
- Design network for and deploy Allot NetEnforcer.
- Design policy organization and implementation method.
- Project Lead: Edge Router Redundancy
- Design solution for edge router redundancy.
- Used “on net” MPLS circuits and “off net” solutions such as cable, DSL, and EVDO for vendor redundancy and increased bandwidth at lower cost.
- Designed load balancing and fault tolerant solutions using routing protocols and object tracking.
- Project Lead: Multicast
- Design, configure, and test multicasting across a nationwide MPLS network.
- Packaged a multicast solution for the Confidential sales force.
- Project Lead: Multi - Vendor MPLS Integration
- Determine the best technologies and companies to add fault tolerance and bandwidth on demand for our hotel customers.
- Design a solution to tie multiple MPLS networks together for seamless integration and disaster planning.
- Increase bandwidth while decreasing cost.
- Project Lead: Enterprise Conferencing Solutions
- Designed and deployed Internet solution for thousands of attendees at Cisco Networkers Conference in Anaheim, CA 2007.
Confidential
Lead Network Engineer
Responsibilities:
- Primary responsibilities over the core and peripheral network.
- Cisco router/switch families: 2600, 3600, 3700, 7200, 6500, PIX 500
- Primary routing protocol: EIGRP, OSPF, BGP
- Other protocols: MPLS, IBGP, LLQ, HSRP, PBR, NAT, etc.
- Circuit Types: T1’s, DS3’s, DSL, ATM
- Utopia & iProvo project lead
- Design, implement, and administer the network for our Ethernet ISP business.
- Project lead for network redundancy & disaster planning
- Designed new plan for network redundancy, created lab for proof of concept, then documented implementation steps.
- Added an additional 6500 to our core network with an Internet DS3 on each 6500, thus providing redundant Internet pathways.
- Added iBGP to 6500’s and created new peering configurations for EBGP.
- Migrated from EIGRP to OSPF for inter-vendor interoperability.
- Network Management Lead
- Use Solar Winds to monitor and manage SNMP network devices.
- Identify network problems and weaknesses and make recommendations for improvement.
- Cisco IP Telephony
- Install Cisco IP phone systems for businesses.
- Call management system: Asterisk (open source).
Confidential
Enterprise Network Engineer
Responsibilities:
- Install and maintain Cisco WAN routers in order to interconnect multiple IHC facilities.
- Cisco router families: 2600, 2800, 3800, 7200, 6500, 7500, PIX 500
- Primary routing protocol: EIGRP.
- Primary method of connecting sites: Frame Relay, T1’s, DS3’s, Ethernet, Microwave, 802.11.
- Project lead for state wide Physician’s Division.
- Order and install all T1’s and WAN gear. I worked closely with telco’s.
- Maintain WAN circuits and gear for over 40 sites throughout Utah.
- Extending demarcation points was a common task, including the use of NIU’s, 66 blocks, 110 blocks, patch panels, etc.
- Install 802.11 wireless WAN networks.
- Circuit Liaison
- Sole contact for all telco relations for WAN circuits. Worked with Qwest, ELI, Questar, Lightstream, XO, etc.
- Put together a database dat tracked all circuits in the network, thus saving IHC over $100,000 annually.
- Spearheaded a project to acquire federal funding for WAN circuits, thus saving IHC over $300,000 annually.
- Network Traffic Analysis
- Troubleshoot network problems with the use of NAI’s sniffer tools, as well as CompuWare’s Vantage products.
Confidential
Hardware/Software Test Engineer
Responsibilities:
- Test Confidential and Phobos brand hardware including firewalls, SSL load balancers, SSL off-load appliances, and Network Interface Cards.
Confidential
Network Administrator
Responsibilities:
- Monitor, manage, and troubleshoot WAN outages for Confidential 's Wide Area Network including multiple Cisco 7500 series routers.
- Monitor and maintain 10 NT Servers and over 100 NetWare 5 servers in Confidential 's corporate data center.
- Provide technical resource support for Confidential 's Help Desk personnel.
- Administer and troubleshoot NT and NetWare 5 servers, including GroupWise agents.
- Coordinate and actively participate in efforts to roll out new desktop and network products to Confidential 's network.