Sr. Firewall/network Engineer Resume
TECHNICAL SKILLS:
Operating Systems: Windows - MS 95, 98, ME, 00, XP, Vista, 7,8,10,11Linux - Ubuntu, Gentoo, Redhat, Suse, Mandriva (Mandrake), Debian, CentOSApple - Mac OSX Snow Leopard, 9, 10.x
Servers: MS Server - NT, 2000, 2003,2008,2012 Exchange, IIS-6,2008,WSUS, 2010Linux - Apache, FTPHP-San w/Citrix Presentation 4-5, TACACS servers.
Routing: TCP/IP, DNS, OSPF,BGP, MPLS, MLPPP, IBGP, EBGP, VlAN, QOS, DMVPN, EIGRP, EVPN
Security/Firewall: Firebox, PGP, Watchdog, BlackIce, Norton AV/Spyware, Spybot, RSA, VPN, MXLogic, Cisco ASA devices, Scansafe, Checkpoint, Palo Alto, Watchguard, Juniper, Kemp load balancers(virtual)
Software/management Applications: ALL MS Office software, Lotus, Open Office, Ghost, Partition Magic, VMware, Adomo, Carpe Diem, Compulaw, Denemeyer/Diams, Elite Web View, Equitrac, Extranet, SQL 7/2000, Global Cross Conference, Hot Docs, ICreate, Lexis, OneNote, SpiceWorks, Citrix-Zen apps,HP Openview, Sharepoint, Cisco management/network tools, Wireshark, Network Associates Distributed Sniffer, Mevo, Netops, Smokeping, OpenNMS, Inflobox-NetMRI, Opnet and other various networking tools. Cisco Prime HP IMC, Junos Space, SolarWinds, OpsGenie, LogicMonitor, Splunk, Azure portal
Hardware/Desktop/Laptop/Router/Switch/Tape Backup/PDA/Phone: Dell, Compaq, Toshiba, IBM, Apple, BlackBerry,Treo, WYSE-thin client, Cisco enterprise routers, switches, controllers, wireless aps, TADs, dial-up modem, Cisco WAAS, ASA, Routers ex;3945, 3851, 2951,881,819 Switches ex;3750, 3750x, 4506, 6509,Juniper SRX, MX series
Other devices: Netbox, Gigamon G&H series, Cisco 3600 wireless AP HP/Aruba-Switches, Cisco Meraki devices, Kaseya
PROFESSIONAL EXPERIENCE:
Sr. Firewall/Network Engineer
Confidential
Responsibilities:
- Managed services support of numerous clients nationwide via managed RDP and local network equipment as well as hosted services.
- Support to include vpn setup for Meraki systems, Meraki to Azure tunnels, VPN builds on ASA, Juniper and Palo Alto firewalls depending on client setup and needs.
- Customers were load balanced through virtual Kemps depending on required services. Kaseya desktop management was used for server and end user support.
- Changes in routing, security profiles for servers, etc, were sent through ConnectWise ticketing systems. Changes to Juniper firewall, switches, ASA firewalls as well as Palo Alto were all part of daily duties.
- Azure requests were done through AWS hosting with Azure express routes back to the core. Client request for Azure were done through the Customer support Portal to reach all resources to include, Vng’s, Vnets, etc.
- Data center conversion of Juniper firewalls to Palo Alto pairs with Panorama management. This was done for 3 data centers.
Sr. Network/Firewall Engineer
Confidential
Responsibilities:
- Took part in redesign and setup of complete network uplift to include firewall and switch HA pairing, rule reconfiguration, MPLS changes to ensure future SDWAN preparation.
- Assist in design and maintenance new network vpn connections through Palo Alto Firewalls
- Assist in design and maintenance Hp switches and Cisco routers with current codes, BGP route changes, and any and vlans running through said systems.
- Assist in design and maintenance of overall network redundancy by adding additional Palo Alto firewalls and reworking of switch ports and vlan configurations with additional ip address spaces and segmentation of internal versus external traffic
- Took part in Bank and financial compliance audits by providing updated documentation and drawings of all network and security policies and setup
- Maintained and setup new devices for SolarWinds( 2016) network monitoring and configuration saves.
- Maintained and configured wireless ap’s through Aruba WAB-7010 controllers.
Sr. Network/Firewall engineer
Confidential
Responsibilities:
- Completed multiple data center projects for Nexus 5k,7k, Avocent devices, ASA, Checkpoint, and Palo Alto firewalls.
- Updated designs based on project changes to route, vlan, interface descriptions, etc.
- Made required code upgrades to devices per tested code
- In depth trouble shooting of data center traffic through the various access layers to create reports for upper management.
- Created change requests and in-depth, step-by-step implementation plans that included backout procedures.
Sr. Network/Firewall engineer
Confidential
Responsibilities:
- Support and maintenance of all enterprise wide Palo Alto and Cisco ASA firewalls
- Completed projects related to Skypeforbusiness, Apple, Aruba wireless, and other infrastructure initiatives related to the business merger including security, upgrades to code and physical machine and security audit of security rules.
- Ticket requests handled through Remedy ticketing where my work brought change to the overall request/resolution process and documentation.
Net- security/infrastructure engineer
Confidential
Responsibilities:
- SME-L2 for enterprise wide Palo Alto firewall requests, maintenance and support to include project work.
- Performed requested firewall validations for project and change requests.
- Participated in 7 day on-call rotations.
- Worked with architecture and security teams on testing, business impact, and security of new products and services to include Gigamon, and Cisco FireEye.
- Assisted in of offshore teams on Palo Alto and ticket BAU processes.
- Participated in testing, implementation and troubleshooting of uplift projects involving ex:Cisco ASA-5545 with IPS-SSP modules, FireEye CM-series 7.5, Nexus-5500-series, and Gigamon H-series with-GigaVUE-OS 4.4, and Palo Alto.
Network engineer
Confidential, Minneapolis, MN
Responsibilities:
- Design and maintenance of local and wide area networks (including connections in Shanghai)
- Internet and MPLS connectivity management for all offices
- Oversaw VPN and DR efficiency and communications to cloud vendors(HP)
- Third-level support to end users for communications, systems and enterprise applications
- Contribute to strategic design and implementation of technology initiatives.
- Design and maintenance of protocols, setup, and support of all Palo Alto firewalls
- Vendor and department accounting of assets to include replacement and end of life support efforts
Network Engineer
Confidential, Minneapolis, MN
Responsibilities:
- Support of over 400 POS sites with Cisco881/3g wireless routers, xp machines, multiple AP
- Use of BMC ticketeting system for updates and support.
- Administered sites through direct connect and Cisco Prime
- Completed reporting functions for sites SNMP reporting.
- Support of Wan infrastructure. Moves from 3750 to Nexus 5K
- Configure 3g failover for all sites. Maintained asset collection.
- Set support standards for help desk and external site support/cutover.
Network Engineer
Confidential, St.Paul, MN
Responsibilities:
- Mainly supported moves of 3800 Extreme switches to Cisco 6509, 3750, or 2960 switch.
- Ticket support for internal users- Sonicwall Vpn connections using Checkpoint end devices, general security and connectivity issues
- SonicWall vpn support for remote users.
- Gigamon 420 setup and installation for packet monitoring.
Network Engineer
Confidential
Responsibilities:
- Use Customer's engineering team's configuration standard to transition the existing 458 PIP locations to the Confidential UCCaas/DMVPN Cloud Cisco 881 architecture.
- Centrally stage, configure and manage the process of performing remote installation leveraging on-site Customer resource (Mevo) and Customer defined project plan.
- Manage and monitor the Cisco DMVPN Cisco 881 architecture during normal local business hours and as part of Customer's on-call rotation using Customer-provided toolsets for connectivity problems (i.e. tunnel loss) to/from any remote location, leveraging remote notifications via email, text or phone during off-hours.
- Trouble-shoot and repair tunnel/connection issues from dual head-ends down to local Cisco 881 hubs.
- Managing internal Customer's customer/user incident communications and expectations while following standard Customer incident processes.
Network Engineer
Confidential
Responsibilities:
- Configured OSPF as the internal protocol and BGP for MPLS route advertisements.
- Implemented T1, MLPPP, DS3, and OC3 MPLS circuits based on site bandwidth needs
- Assessed existing site infrastructure at remote sites and made recommendations for new equipment standards
- Configured Cisco ASA firewalls for various DMZ and 3rd Party Vendor connectivity needs
- Performed upgrades, static routes, and debugging for network troubleshooting and connectivity.
- Implemented a dual carrier MPLS core with Cisco 7200 series routers and 6500 series switches
- Implemented Cisco 3750 Stacks for Access Layer switches
- Configured VTP, Port-Channels and Trunking on 6500, 3700,4500 series switches
- Created Data and Voice CBWFQ QoS standards which were implemented throughout the enterprise
- Reviewed and performed QA on various network designs and configuration for accurateness and conformance to standards
- Implemented summarization at all remote sites to reduce the number of routes on the Core
- Evaluated current Core, Distribution and Access layer routing and switching architectures and made recommendations on how to improve performance and create more redundancy
- Completed rollout/tech refresh for remote sites by replacing Cisco 3500 series stacks with 3750 stacks
- Performed analysis of existing sites and gathered all requirements of bandwidth and switch utilization needs in order to allocate appropriate bandwidth and switch ports prior to migration
Network/System/Server Support
Confidential
Responsibilities:
- Provided hosted/managed server/support for Windows, Mac, Linux, Citrix, and Cisco systems
- Complete support of Cisco ip phones, routers, switches and other customer infrastructure needs
- HP\Wyse ThinClient and Cisco Unity Messaging configuration and management
- Utilized CRM for help desk ticketing
- Utilized Mxlogic for spam filtering
- Reviewed and performed QA on various network designs and configuration for accurateness and conformance to standards
- Performed analysis of existing sites and gathered all requirements of bandwidth and switch utilization needs in order to allocate appropriate bandwidth and switch ports prior to migration
- Implemented various access-lists, IOS upgrades, static routes, and debugging for network troubleshooting and connectivity
- Standardized all router and switch configurations at all sites according to standards
System Support
Confidential, Minneapolis, MN
Responsibilities:
- Support of Mac laptops and desktops-Integration with Windows AD/Exchange
- Windows 2003 server support and Administrator duties
- MS Office software setup/support
- Multimedia software/hardware setup and support
- IT budget management assistance
- Implemented various access-lists, IOS upgrades, static routes, and debugging for network troubleshooting and connectivity
- Standardized all router and switch configurations at all sites according to standards
Network Administrator
Confidential, Minneapolis, MN
Responsibilities:
- Network support of local office and franchise systems
- Gentoo, Redhat, Ubuntu, and Win 2003 server administration
- 3 Vmware server setups for FTP and creative services
- Administration of open source Free-PBX, Backup PC and Symantec Backupexec
- Server and Phone setup and support - BlackBerry and Treo devices
- SQL database server support
- MS 2003 Exchange and Open source Zimbra email setup, support, and FTP access
- Firebox firewall administration
- Implemented various access-lists, IOS upgrades, static routes, and debugging for network troubleshooting and connectivity
- Performed analysis of existing sites and gathered all requirements of bandwidth and switch utilization needs in order to allocate appropriate bandwidth and switch ports prior to migration
- Configured 6500 and 4500 series switches in Layer 3 configuration and Core switches