We provide IT Staff Augmentation Services!

Network Security Engineer Resume

4.00/5 (Submit Your Rating)

Milford, CT


  • Extensive background in Cisco Switches and Routers, Cisco VPN Concentrators, Cisco Firepower Threat Defense Firewalls, Cisco Firepower Management Center, Cisco Firepower Stealthwatch, Cisco ASA Firewalls, Cisco ISE, Checkpoint Firewalls, Multiple firewall load balancing devices and software, IPS (Intrusion Protection Systems), ATM switches, MPLS, VOIP, Microsoft Windows, Linux, Unix and Python.
  • Worked on installing, configuring, of Cisco 7200, 3800, 3900,2800, 2900 series routers and Cisco Catalyst 2950, 3650,3750, 4500 series switches.
  • Experience in configuring protocols HSRP, GLBP, VRRP, ICMP, OSPF, BGP, EIGRP, MPLS, RIPV2, PPP, HDLC, PAP
  • Worked on Cisco Firewalls ACLs, ASA 5500 series, knowledge of Juniper Firewalls
  • Experience to adding Palo Alto Firewall to current network infrastructure. intergrade Cisco ISE wif Cisco Firepower to enable automated remediation
  • Upgrade Cisco 6500, 3750, 2960s, Nexus 5000, Nexus 2000, Nexus 7000 switch IOS software
  • Innovated wif support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud - based) process that does not impact stream processing.
  • Experience wif LAN/WAN networking equipment and protocols such as, but not limited to 802.1Q, TCP/UDP, IPv4, IPv6, NTP, DNS, DHCP, Ethernet, SNMP, SSH, TACACS, LDAP, and Syslog
  • Developed Ansible playbook to deploy services on cloud mainly on windows and Linux servers.
  • Managing existing infrastructure and created new infrastructure using Ansible as Configuration Management Tool
  • Experience in adding Policies in Palo Alto firewall PA-500, PA-3020 using GUI 6.1.
  • Configuring HA pair for two Palo VM-300 series AWS instance firewalls and testing the failover activity as well as ENI migration.
  • Exhibit strong communication, critical thinking, multitasking, and customer service skills
  • Involved in the redistribution into OSPF on the core Palo alto firewall.
  • Day to Day task when on Jobs TEMPhas included Network monitoring wif Solarwinds, using Solarwinds/Infoblox IPAM, utilizing Solarwinds, NCM for configuration and Solarwinds NetFlow to view TCP traffic
  • Revitalized project management processes using ITIL and PMP standards through automation and/or .
  • Hardware/Software platforms in production: Cisco, F5, Palo Alto, Infoblox, NetOptics and Solarwinds
  • Well experienced in configuring protocols HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, CHAP, and SNMP.
  • Worked on layer 2 security like port security, Port Fast, DTP, DHCP Snooping, Dynamic ARP Inspection.
  • Working knowledge of solar wind Orion traffic monitoring tool and Splunk.
  • Working knowledge of F5 load balancer LTM and GTM.


Firewall Technologies: Checkpoint (R75, R71 and R70), GAiA, Secure Platform (SPLAT), Smart Center Server, Palo Alto Firewalls (5200 and 7200), Panorama, App IDs, Global Protect

LAN Technologies: VLAN, VTP, Inter-Vlan routing, STP, RSTP, PVST, 802.1x

Network Securities: NAT/PAT, VPN, Filtering, IPsec, and ACL

Routing Protocols: RIP, IGRP, EIGRP, OSPF and VRRP, TCP/IP Infrastructure ServicesDHCP, DNS, SMTP, POP3, FTP, TFTP, Network Mgmt.

Tools: SNMP, SSH, Telnet, ICMP, Tufin, Firemon, HPSM, Cisco Works

SIEM tools: SPLUNK, McAfee Nitro

Operating Systems: Windows Vista/XP/NT/2003/360, Linux

Programming skills: Python, shell script


Network Security Engineer

Confidential, Milford, CT


  • Responsible for firewall rule set migration from Cisco ASA to newly implemented Palo Alto.
  • Integrated the data from SAP to ServiceNow by using API, Web services and captured that data in Service Now by creating a table using SNOW (ServiceNow) Incident and Service Request management workflow
  • Responsible for implementing firewall technologies including general configuration, optimization, security policy, rules creation and modification of Palo Alto Firewalls. Extensive Packet level debugging and troubleshooting on Palo Alto Fire wall.
  • Working wif Palo Alto firewalls PA3020, PA5020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.
  • Configuring rules and maintaining Palo Alto firewalls & analysis of firewall logs using various tools.
  • Conceptualized and implement DLP Program and policies and configuring (AWS) and Single Sign-On for User Authentication in the organization.
  • Design and implementation of security infrastructure for clients focusing on Cisco Firepower and ASA suite of products
  • Design and implement complex routing and switch environment
  • Redesign ASA environment using Route Based VPN solution (VTI) replacing Policy Based VPN solution for Cisco AnyConnect.
  • Redesign Cisco AnyConnect VPN network across multiple Metro - Confidential connected locations
  • Write Python programs for Cisco Firewall Management Console (FMC) to utilize the API in the FMC to migrate ASA rules and objects and Checkpoint rules and objects to FMC.
  • Write Python programs to collect, parse and analyze data, show runs and show techs from Cisco devices and Brocade devices.
  • Configure and Install Cisco NGFW FMC and FTD firewalls at multiple customers
  • Strictly follow and make recommendations for other teams to follow NIST cyber security framework.
  • Ongoing activity is to analyze firewall rules to categorize / prioritize the rules and recommend remediation action plans based on client's application types and security zones.
  • Troubleshoot firewall issues and pushing firewall policy updates during scheduled maintenance windows. Work during maintenance windows to conduct firewall firmware updates and/or access-rules changes.
  • Navigate and run queries on Splunk to view firewall and application specific logs, work on other SIEM tools to troubleshooting firewall-related issues to address application and/or connectivity issues.
  • Also, finalize implementation of automating Tufin and SecureChange for Firewall Rules implementation.
  • Actively mentor junior engineers. Develop and deliver cross-training activities. Participate in, and encourages a knowledge-sharing environment both wifin, and outside the department.
  • Manage policy on Cisco Firepower 9300 wif SM-44s running in ASA mode and Legacy ASA 5k Firewalls.
  • Upgrade End of Life Cisco ASA 5540 firewalls to firepower firewalls.
  • Managed several security environments for Tipping point IPS, Bluecoat proxy, Palo Alto Firewalls.
  • Working wif team to migrate DMZ environment to AWS cloud. On boarded and designed DMZ VPCs to accommodate Client’s energy applications to cloud. This included high availability setup for their in-house application.
  • Deployed and managed Cisco ASA virtual instance firewalls in AWS for extra layer of security.
  • Gained a high-level understanding and operated a multitude of different software, such as (but not limited to): Solarwinds NPM, Solarwinds TFTP Server, Cisco Prime Infrastructure, VSphere client, VMWare Client, Wire Shark, Secure CRT, and FileZilla FTP Client.
  • Review firewall logs and interpret packet captures (Wireshark).

Senior Network Security Engineer

Confidential, Portland, Oregon


  • Educate/share enterprise network security strategy, solutions, ongoing technology enhancements
  • Provide risk analysis and strategic recommendations to improve Information Security.
  • Analyze firewall rules to categorize / prioritize the rules and recommend remediation action plans based on Client’s Application types and Domain Boundary environment.
  • Performed Firewall rule cleanup. Delete unused firewall rules using Tufin secure track .
  • Centrally managed all Palo Alto Firewalls using Palo Alto Panorama M-100 management server.
  • Implementing brand new Cisco ASA Firewalls wif updated Security Policies.
  • Work on Checkpoint and Palo Alto firewalls, including advanced rule base design, rule base optimization, global/shared objects, and DDoS protection measures (IPS)
  • Examine the SIEM events using WildFire threat analysis, data filter logging, etc. and create custom reports based on the needs and schedule to share them wif other stakeholders in the organization.
  • Analyzed potential usage of cloud vendor services (AWS) to support mission operations.
  • Created a Change Request Template to mirror Changes created in ServiceNow and Helped prepare for a migration of Helpdesk Ticketing solution to SNOW (ServiceNow) Incident and Service Request management workflow
  • Multiple wireless deployments of Cisco 5508, 7500 and 8540 wireless network controllers deployment 3000 stores and 10 different corporate campuses supporting: anchor controller, flexconnect.
  • Cisco ISE implementation for Guest access wif Cisco Wireless Controllers using EOIP guest wireless services
  • Cisco ISE implementation for 802.1x authentication
  • Cisco ASA deployment and configuration for nationwide Cisco AnyConnect VPN connectivity to business partners
  • Cisco ACS implementation for 802.1x authentication
  • Nexus Switch 5K,9K deployment and migration from existing Cisco Core Catalyst switches
  • Configuration, deployment and distribution of various models of Catalyst Core and Distribution switches
  • Migration from MPLS/DWDM only to MPLS/DWDM and Metro Ethernet using Cisco OTP.
  • Implemented protection measures against Distributed Denial of Service (DDoS) on security devices.
  • Utilize the in-depth knowledge of Interior Gateway Routing protocols (e.g., OSPF, EIGRP), Border Gateway Protocol (BGP) configuration, BGP peering, BGP route advertisements, prefix-lists and route-maps
  • Extensive knowledge and work experience wif web application security controls using MFAs and SSOs
  • Work on projects multiple projects simultaneously, collaborating different engineers supporting multi-tiered application traffic flow, server load balancing, global load balancing, and routing.
  • Resolved many connection issues wif internet-based banking applications and systems
  • On boarded Palo Alto Firewall VMs in client’s AWS cloud account for extra level of security apart from NACLs and security groups. Managing security policies through Panorama VM in AWS cloud.
  • Managing connectivity between AWS prod and Dev VPCs. That includes dedicated low latency direct connect gateways and private VPNs for hybrid DCs.
  • Closely working wif client’s applications team to on board new applications to AWS. Responsible to deploy and configure load balancer instance for new application HA.
  • Participate in all technical aspects of LAN, WAN, VPN(Cisco AnyConnect) and security Internet Service projects including, short- and long-term planning, implementation, project management and operations support as required.
  • Participate in 24*7 on-call support and implementing changes quite often during odd hours.
  • Strong knowledge and experience of incident, problem management, change management best-practices.

Network Security Analyst

Confidential, Charlotte, NC


  • System Performance related issues wif 1X, EvDO and LTE coverage. Create FireSAT or escalate ticket to NOC on mass outages using SNOW (ServiceNow) Incident and Service Request management workflow.
  • Analyze complex call processing routing issues, service impairments in roaming, transport services, network hardware& software faults, translations, and voice/data network elements.
  • Installation and troubleshooting of firewalls Cisco ASA, Imperva Web App Firewalls, Checkpoint firewalls and Juniper firewalls
  • Knowledge and experience wif Cisco Firepower 9300 and 4120 Fire Sight.
  • Expert knowledge wif configuring Cisco ISE 2.2.
  • Responsible for every aspect of networking and security of client’s AWS VPCs.
  • Managed a migration effort to ensure all Palo Alto firewalls were included in the organizations Tufin database to begin automating remediation efforts.
  • Supported the technologies like IWAN Solutions, APIC-EM, Prime Infrastructure and Cisco ASA.
  • Worked on setting up the Ether-Channel interfaces between Cisco Switch's 6500, 3750 in line wif Net Optics TAP devices for capturing the Network Traffic and is set to be monitored wif the ForeScout Counter Act NAC Appliance.
  • Design, installation and support of Cisco Nexus 7K, Nexus 6K, Nexus 5K and Nexus 2K for clients throughout Pennsylvania for multisite enterprise networks
  • Design, installation and support of Cisco Catalyst 4500x, Catalyst 4500 and Catalyst 6500 switches for clients throughout Pennsylvania for multisite enterprise networks
  • Design, installation and support of Cisco VSS on Catalyst 6500 switches used as Core switch for DWDM backbone connectivity for Campus deployment for Enterprise customer.
  • Designed, installed and supported Cisco 5760 Wireless LAN controllers and Cisco 5508 Wireless LAN controllers in Enterprise networks exceeding 500 Wireless Access Points
  • Designed, installed and supported of Cisco ASA, Adaptive Security Appliances for use as both firewall and Cisco AnyConnect VPN termination devices.
  • Designed, installed and supported of Cisco ISE, Identity Services Engine for use in Wireless environment and wif LAN connected devices for 802.1x NAC authentication. Implementations include: device provisioning, Web Authentication, 802.1x MAB, 802.1x EAP-TLS, 802.1x AD authentication, Guest authentication among others.
  • Troubleshoot network and security issues on Enterprise networks, including determining location of network loops and security issues resulting from hacking from the internet.
  • Provide feedback to technical support on finding device issues and to help minimize ticket escalation to the NRB via SNOW (ServiceNow) Incident and Service Request management workflow.
  • Responsible for the investigation, resolution, and follow-up activities for: all customers on FTTN, FTTN-BP, FTTP, FTTC and IP-DSL networks. Provided technical help, troubleshoot and resolve complex application, and network, equipment issues in real time for both internal and external customers at implementing security Solutions using PaloAlto Pa-5000/3000, Cisco ASA, Check points firewall R75, R77.20 Gaia, VSX and Provider-1/MDM.

Network Analyst

Confidential, Fort Worth TX


  • Configured, Managed and Monitored Palo Alto firewall models (Specifically the PA-5050 and the PA-5260).
  • Performed migrations from Check Point firewalls to Palo Alto using the PAN Migration Tool MT3.3.
  • Implemented advanced Palo Alto Firewall features like URL filtering, User-ID, App-ID, Content-ID on both inbound and outbound traffic.
  • Deployed Palo Alto firewalls using Confidential NSX through L2 and L3 interfaces on models such as VM-300, VM-500, and VM-1000-HV.
  • Enablefile forwarding to Wildfire cloud through Content-ID implementation to identify new threats.
  • Leveraged Palo Alto Networks’ Wildfire inspection engine to prevent Zero-Day attacks.
  • Manage multiple Palo Alto firewalls centrally through the Palo Alto Panorama M-500 centralized Management appliance.
  • Implemented the Global Protect VPN, IPSec VPNs and SSL VPNs through IKE and PKI on Palo Alto firewalls for site-to-site VPN Connectivity.
  • Deployed Active/Standby modes of High Availability (HA) wif Session and Configuration synchronization on multiple Palo Alto firewall pairs. Knowledge on the application of Active/Active HA mode.
  • Enforced policy checks on north-south and east-west data center traffic through Panorama M-500. Provided escalated technical support in troubleshooting firewall and network issues.
  • Hands-on experience wif Bluecoat Proxy Secure Web Gateways for content filtering, Data loss prevention and prevent Zero-Day exploits.
  • Implemented security measures to resolve data loss vulnerabilities, mitigate risk and recommend security changes or system components as needed.
  • Demonstrated competency using security controls to disrupt the attack kill chain.
  • Configured AAA Server (RADIUS and TACACS+) for authentication and authorization of all remote VPN users.
  • Configured and implemented Enhanced VPC, OTV, and Fabric path between Nexus 7k and 5k series switches for the datacenter operations.
  • Experienced working in Data Centers managing cabling infrastructure (copper and fiber) and power provision.
  • Experienced on Cisco Nexus 2248 FEX and Nexus 5500 series switches to provide flexible solution and access port connectivity across datacenter architecture.
  • Coordinated wif the Network administration team to implement and test Disaster Recovery plan for the Data Center.
  • Hands-on experience in the connection of LAN MDF to IDF using Nexus 5000 series switches and Catalyst 3850 series switches.
  • Configure F5 Big-IP load balancers through GUI and writing IRules to monitor and tune the load on network servers.
  • Extensively used SevOne (Collects network data) to collect data from F5, by polling through SNMP and log collection through Syslog, create reports and forward to Operations team.
  • Configured Firewall-security context modes, interfaces, objects and access list, NAT, AAA for network access and advanced network protection on Cisco Firewalls.
  • Migrated from Cisco ASA to Palo Alto firewalls.
  • Enabled the User-ID feature while creating policies based on users and groups rather TEMPthan individual IP addresses.
  • Configured windows USER-ID agent to collect host information using Palo Alto Global Protect.
  • Configured APP-ID feature in Palo Alto firewalls to reduce attack surface, regain visibility and control over traffic.
  • Created custom URL-filtering profiles and attached them to Security policy rules that allow web access.
  • Configured Global Protect gateway to provide VPN connections for Global Protect agents.
  • Configured Log Forwarding to forward logs from the firewall to Panorama and then configured Panorama to send logs to the servers.
  • Hands on experience in blocking unauthorized users and allowing authorized users to access specific resources by configuring Access Control Lists (ACL).
  • Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, executed various migration/upgrade projects across F5 and hands on wif F5 BIGIP LTMs/EM

We'd love your feedback!