Sr. Network Security Engineer Resume
SUMMARY:
- CCNA, CCNP and PCNSE professional with around 9 years of experience in network design, implementation, and support. Routing, switching, firewall technologies, system design, implementation and troubleshooting of complex network systems.
- Extensive knowledge with VLAN's, Trunking, RSTP, SNMP, Ether Channels, HSRP, Port Security, ACL's, QoS, Traffic Policing, Shaping, EIGRP, OSPF, NAT, PAT, Inspections, VPN's, DHCP, WireShark etc.
- Used Spirent as part of traffic generator testing - Protocols used FTP and http
- Expertise in configuring and troubleshooting of Palo Alto, Juniper NetScreen & SRX Firewalls and their implementation
- Working Knowledge of Cisco IOS, Junos & basic Nexus (9k, 7K, 5K&2K).
- Automated configuration management and deployments using Ansible playbooks for resource declaration. And creating roles and updating Playbooks to provision servers by using Ansible.
- Installing, Configured and management in Ansible Centralized Server and creating the playbooks to support various middleware application servers, and involved in configuring the Ansible tower as a configuration management tool to automate repetitive tasks
- Hands on experience on PIX (506, 515, 525, 535), ASA (5505/5510) Firewalls. Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
- Experience in working on cloud AWS cloud EC2, S3, RDS, Load Balancer, Auto Scaling with AWS command line interface and AWS python SDK.
- Working on incident Management Tools Service NOW
- Configured ServiceNow to integrate with AWS to Create Resource Profiles, configure governance, Populate the Cloud Service Catalog using Blueprints & Hands-on experience with trouble shooting several issues of ServiceNow integration with Cloud Management.
- Worked aggressively on complex Palo Alto firewalls Environment. Deep technical troubleshooting on customer SD-WAN Edge connect device, Firewall Cisco ASA, Palo Alto
- Worked on Cisco Nexus 9000 family of switche
PROFESSIONAL EXPERIENCE:
Confidential
Sr. Network Security Engineer
Responsibilities:
- Migrated Palo Alto Next - Generation Firewall series PA-500, PA-3060, PA-5060, PA-7050, PA-7080 from Cisco PIX and ASA and Source of knowledge for SD-WAN and routing trends* Created and maintained Cisco TAC cases until closure of VOIP network issues.* Monitored Global Support Service desk for tickets that were opened dealing with VOIP troubles or changes.* Maintained and created scripts in Python that assisted in pulling in the necessary data into Splunk to meet audit and reporting requirements.* Written the Ansible YAML scripts to configure the remote servers.* Integrated Jenkins, Rundeck and
Ansible. Designed and developed Jenkins Build deployment* Installing Ansible Tower and using it to manage systems* Responds to internal Service Now customer maintenance, repair and additions/expansion requests through the ticketing system.* Experienced in incident management tools like Service Now and BMC remedy* Worked in for the NextGen Datacenter Cloud Architecture, using Cisco ACI and Nexus 9K.* In-depth knowledge in designing, implementing, configuring with best practices on NextGen IDS/IPS Firewalls such as Palo Alto, Cisco Firepower (Sourcefire).* Serve as the customer's go-to resource for all matters related to the Palo Alto firewall* Technology support given for Cisco ACI, NSX, Open Source solutions, AWS/Azure VPC, Arista &VxLAN.* Experienced provisioning SD-WAN service as automated failover solution for MPLS VPN by Cisco Meraki MX 80 Firewall* VTC, Layer 2 and Layer 3 Technology, and VOIP* Additional tasks include assisting with the day to day operations and management of other network devices such as Cisco ISE, Infoblox, Palo Alto firewalls and Panorama.* Configured Site to Site IPSEC VPN tunnels on FortiGate.* Created an automated backup procedure for all F5 load balancer appliances like 7050, 5200V and 4200V.* Experience with SAN and NAS storage in Unix/Linux/Windows Server environment* Technically proficient at installing, configuring, and maintaining UNIX (both in a physical and virtual environment).* Experience performing analysis on NSX implementations*
Working knowledge of Cisco ACI, NXOS and IOS, QoS, data center network design, cloud infrastructure design and management, OSPF, BGP, VLAN Trunking* Establish AWS technical credibility with customers and external parties* Working on Scripting capabilities in one or more of the following - Python, TCL, Perl, or Shell* Used Ansible and Ansible Tower as Configuration management tool, to automate repetitive tasks, quickly deploys critical applications, and proactively manages change.* Wrote Python Code using Ansible Python API to Automate Cloud Deployment Process.* Developed Python Modules for Ansible Customizations. Provided Tier 3 support on SourceFire IPS/NGFW sensor placement and deployments.* Cloud migration networking for applications to AWS, MS Express route/Azure, O365* Experience in implementing policies using Cryptography, ACL, AS
Confidential
Palo Alto Firewalls Engineer
Responsibilities:
- Configuring rules and maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs.* Working on Site migration from Partner network to separate network to SD - WAN solution.* Management of security solutions including Symantec Endpoint Protection and Sourcefire.* Experience in designing, building and maintaining Windows NT and man UNIX / Linux Evnt.* Linux and Microsoft Active Directory Administration* Troubleshoot network, configuration, and connectivity issues related to VoIP services running on Cisco's IOS platform* Placed in charge of control and maintenance of the SD-WAN laboratory environments, performing version updating before user client official updating* Used Ansible Playbooks to setup Continuous Delivery Pipeline. Deployed micro services, including provisioning AWS environments using Ansible Playbooks.* Worked on CDN, CMS, Metadata API, OTT/IPTV,* Used
Ansible to document all infrastructures into version control.* Perform VoIP Monitoring and management with Oracle Communications Operations Monitor.* Deployed CISCO ACI Greenfield and Migrated from Legacy network.* SD-WAN technical assistance consultant with hands own on enterprise and ISP environment* Working as a Network SME for the NextGen Datacenter Cloud Architecture, using Cisco ACI and Nexus 9K. Working with Cisco Account team onsite for creating and testing the POC* Experience with Cisco ACI (Application Centric Integration) technology implementation.* Strong hands on and exposure to Checkpoint, Cisco ASA & Palo Alto on a regular basis* Configure IPSEC and SSL VPN with Palo-alto, Cisco ASA, Fortinet, Checkpoint and Router.* Manage Palo alto, Checkpoint, Cisco ASA and Fortinet policy and network* Migrated from Cisco ASA to Palo Alto.* Experience in ASA, SourceFireFirepower Management Center for VMware & Sensors BIG-IP F5 LTM, ASM, and APM.* Experience with Cloud Networks and migration projects in AWS, and automation using Ansible.* Deploy and manage NSX SDN. Design and manage VXLAN network virtualization using ESGs, UDLRs and logical* Worked on Source Fire and Palo Alto IPS/IDS Systems, Splunk log monitoring tool, Qualys vulnerability assessment tool.* Experience with Splunk Security Infrastructure and Event Management. (SIEM). Correlate, review, rank, and coordinate work efforts for sites to follow up on high-priority events.* Created different application policies in the ACI including Tenants, Application Network Profile (ANP) and End Point Group (EPG).* Worked on DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.* Work on Change Management for migration from Cisco ASA to Palo Alto.* Implemented VLAN, VTP domain, Trunking and Ether Channel on Cisco 5500 switches.* Hands on experience in configuring Cisco 2800, 2900, 3800, 3900, 4300 and 7200 Series routers.* Created lot of site to site IPSEC VPN tunnel with Checkpoint, Juniper Netscreen* Configuring & managing around 50
Confidential
Network Security Specialist
Responsibilities:
- Responsible in Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.* Migration from Cisco to Palo Alto firewall & Cisco to Checkpoint firewall.* Troubleshoot of LAN, WAN networking issues using Wireshark, Netflow and other advanced tools* Troubleshoot IPSEC overlay connectivity from SD - WAN appliance to Versa SD-WAN controllers via Internet, MPLS and WBS transports.* Awareness on Cloud Computing, Software Defined Networking (SDN), Cisco ACI, VMware NSX* Develop/capture/document architectural best practices for building systems on AWS* Tested various networks which works on the protocols like of TCP/IP (IP, TCP, UDP, SNMP, DNS, DHCP, FTP, HTTP, HTTPS, ICMP, SMTP, ARP, IPSEC, and NAT)* Staged, planned and deployed Palo Alto NGF 5250s, 3020s, 3060s within Data Centres.* Troubleshoot and engage with NSX Engineering on customer reported issues, including identifying viable workarounds.
Maintained and created scripts in Python that assisted in pulling in the necessary data into Splunk to meet audit and reporting requirements.* Integrate multiple vendor IPSEC site to site VPNs, including Palo Alto Networks, Cisco ASA, and Juniper SRX firewalls.* Support Checkpoint firewall and Provider 1 versions of R55, R65, R70, SPLAT, and VSX.* Monitor and configure Alta Vista, Check Point, Cisco firewalls and IDS, and F5 Load Balancers.* Responsible for all Cisco, Juniper, Aruba, and telecommunications contracts and maintenance agreements.
Confidential
Senior Network Engineer
Responsibilities:
- Experienced in Integration, configuration and maintenance of Cisco Router, Catalyst Switches and Firewalls.* Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers.* Datacenter upgraded from C6500s to Nexus 7k/5k/2k, double - VPC* Experience with Cisco ACI (Application Centric Integration) technology implementation.* Primary experience with Palo Alto next generation firewall platform managed through Panorama and Juniper SRX firewall platform managed through JunOS Space* Experienced in Working with AWS technologies that support automation using cloud formation to create
EC2 instances* Worked with Palo Alto firewalls PA3020, PA5020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.* Have created lot of site to site IPSEC VPN tunnel with Checkpoint, Juniper Netscreen firewalls and Cisco ASA firewalls.* Has a good experience working with the Trouble Tickets on F5 Load balancers on LTM module.* Switch experience includes Cisco Catalyst switches: CISCO 3750, 4500, 6500 series switches.* Implementing, configuring and troubleshooting routing protocols such as OSPF (v3, v2), RIPv2, BGPv4, EIGRP, HSRP, GLBP and MPLS
Confidential
Network Engineer
Responsibilities:
- Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, BlueCoat Proxy and Riverbed Steelhead appliances* Configuring various BGP attributes such as Local P, MED, Extended Communities, Route
Reflector clusters, Route-maps and route policy implementation.* Converting CatOS to Cisco IOS Config Conversion on distribution layer switches* Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.