We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

5.00/5 (Submit Your Rating)

Oakbrook, IL

PROFESSIONAL SUMMARY:

  • Over 10+ years of experience in the design, implementation, support, and maintain 24x7 network services serving as one of the highest levels of escalation for network and security issues. Make ongoing recommendations of network policies and standards., troubleshooting and documentation of LAN/WAN networking systems in Branch, telecommunication and Data Center environments
  • Proficient with network hardware and technologies including routers, switches, firewalls, Ethernet, Fast Ethernet, Gigabit Ethernet.
  • In depth expertise in routing protocols (BGP, OSPF, EIGRP, RIPv1&2), Switching architecture and protocols (VLAN’s, Trunking and Spanning Tree)
  • Hands - on experience in configuring Cisco routers/ Switches to perform functions at the Access, Distribution, and Core layers.
  • Installation, configuration and maintenance of Palo Alto Firewalls.
  • Working experience in wireless environment like cisco ASR and CSR system.
  • Solving issues in intra wireless n/w like dealing with access controllers and access points.
  • Excellent working knowledge of TCP/IP protocol suite and OSI layers.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Implemented traffic filters using Standard, Extended and Named access-lists.
  • Experience in configuring and troubleshooting IPSEC site to site VPN solutions.
  • Working experience with Datacenter Switches such as Nexus 2K, 5K and 7K.
  • Worked on Aruba S3500 mobility switch, Aruba105, 175, 225 Campus AP, Aruba 7210 & 7220 AP Controller.
  • Solid understanding of GSM, UMTS & LTE Network architecture, Call flow and Traffic Engineering
  • Working knowledge of transport connectivity such as T1, CAT5&6 Ethernet, DS1, DS3, Fiber, OC3and OC12, OC48
  • Hands on experience on Checkpoint UTM and NGX series Firewall and Application URL filtering,and strong understanding knowledge on PALO ALTO Product firewall.
  • Having proposals of change the environment form NX-OS to Application Centric Infrastructure (ACI) in Data center, implemented in the lab environment.
  • Responsible for Checkpoint and Cisco ASA firewall administration across our global networks.
  • Experience in Tier- 2 support, BMC Remedy tool, NMS ticketing system, network troubleshooting, handling escalation, and Root cause analysis (RCA) and SLA's.
  • Hands on experience with ACI (Application Centric Infrastructure) with spine and leaf architecture.
  • Understanding of latest security trends, vulnerability assessment techniques and attacks like DOS and Man in the middle attack.
  • Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
  • Install and configure Bluecoat ProxySG in the network for web traffic management and Policyconfiguration
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN,Trunks, VTP, Ether channel, STP, RSTP and MST
  • Proficiency in configuration of VLAN setup on various Cisco Routers and SwitchesImplementation of HSRP, VRRP and GLBP for Default Gateway Redundancy
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, AAA (TACACS and LDAP)
  • Proven ability in problem-solving, decision analysis, prioritizing work flow, multitasking and teamcollaboration and Demonstrated leaderships skills and have ability to lead team if necessary
  • Team player with excellent verbal and communication skills with ability to lead varied team sizesand capable of working with minimum supervision.
  • Strong hands on experience on PIX, Firewalls, and ASA Firewalls. Implemented Security Policiesusing ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ &RADIUS).
  • Working Knowledge with monitoring tools like Solar Winds and Network packet capture tools likeWire-shark.
  • Strong understand of Security Devices (Firewalls, Load Balancers, Proxy Servers, and IDS Sensors)
  • Designation and Implementation of Aruba Wireless solution including Aruba S3500 mobility switch, Aruba105, 175, 225 Campus AP, Aruba 7210 & 7220 AP Controller.
  • Worked on security devices ASA, juniper, Palo Alto firewalls, routers, switches.
  • Performed Aruba server upgrades to accommodate the newer versions of AOS code
  • Configuring and installing 6500, 4500 in Campus networks.
  • Experience in implementation, support and troubleshooting of VLAN's including operationalknowledge of spanning tree protocol (STP), VLAN trunking, inter VLAN routing and ISL/802.1q.
  • Provided availability and on-call support as required by the projects.
  • Experience of communicating with customers, solving complex problems in a timely productivemanner.

TECHNICAL SKILLS:

Routers: Cisco 2600, 2800, 3600, 4400, 7200, 7609 Series,7600

Switches: Cisco 2900, 3500, 3700, 5000, 6500 Catalyst Series, Cisco 7000, 5000, 2000

Firewall: Checkpoint R65/R70/R75/R77/Provider-1 firewall, Palo Alto, Cisco PIX 500 series, Cisco ASA, IDS: CISCO IDS 4520 Juniper, Imperva SharePoint 2010, Imperva WAF, FortiGate

Load Balancer: F5-Big-Ip, LTM, Ax10

Communication Protocols: TCP/IP, UDP, DHCP, DNS, ICMP, SNMP, ARP, RARP

Routing Protocols: BGP, ISIS, OSPF, EIGRP, VRRP, HSRP, GLBP, RIP2, Infoblox

Switching Protocols: STP, RSTP, PVSTP, VTP, ARP, VLAN

IP Services: DHCP, NAT, VLAN, DNS, FTP, TFTP, LAN/WAN

WAN Technologies: ATM, ISDN, PPP, MPLS, ATT, 802.11, 802.11a, 802.11b, APLUS

Network Technologies: IPsec, GRE, NAT/PAT, ACL, IPv4, IPv6

Software: Sniffer Pro, Microsoft FIM, MS Lync, MS Exchange, Trunking and STP

Operating Systems: Windows XP/7/8, Linux

Service Provider: CCIE SP - Service Provider (Ideal but not required) DCI, Riverbed, ASP 9K

PROFESSIONAL EXPERIENCE:

Confidential, Oakbrook, IL

Sr. Network Engineer

Responsibilities:

  • Managed multiple large scale projects in a fast paced environment and provided leadership to other members of the team for the 58 branches of Confidential across United States and 1 branch in India. Quickly turned business problems into technical solutions. Managed configurations and the deployment of equipment in compliance with established technology policies. Recommended technical solutions that will enhance performance, increase redundancy, and add flexibility to the existing infrastructure. Troubleshoot network outages and report of network performance issues. Maintain system and network availability and monitoring of services. Participated in rotating 'on-call' schedule with engineering team.
  • Maintained the appropriate relationships with 3rd party vendors and evaluate vendor hardware, software, and communications products and to provide recommendations for purchases with our corporate objectives in mind.

    Performed capacity planning in various scenarios. (Single/Redundant Circuits, Load Balancing, Aggregation, etc.)

  • Performed Office move for san jose branch .
  • Installed, configured new Waps for the entire office in aerohive manager.
  • Updated Qos and DHCP scripts on the switches of the various branches of Confidential as the Ucaas project went live in production.
  • Updated the NetworkDiagramsinVISIO.
  • Experience with Aruba/Ruckus Wireless Controllers, Access Points and IAP.
  • ImplementArubaWireless infrastructure usingArubacontrollers & Access Points.
  • ConfiguredArubaaccess points troubleshoot connectivity issues withArubaaccess points Surveyed, designed and implemented wireless network infrastructure solutions for both indoor and outdoor environments for multiple clients in several distinct markets.
  • Worked on various security tools likeArubaActivate,ArubaActivate, Bluecoat, Websense, Source.fire,EM7,CADAauthenticationetc.
  • Worked onArubaActivate andArubaAirwave for whitelisting and blacklisting theArubadevices for the users.
  • Hardware experience includes Ubiquiti, Meraki, Cisco, HPAruba, and Ruckus wireless systems.
  • Responsible for implementation/installation of LAN/WAN/SAN,ArubaSwitches,ArubaWireless AP's andArubaVirtual Controllers.
  • Performed wireless site surveys using industry standard tools such as Air Magnet and Cisco &ArubaSwitches Managed and completed over 100 projects installing/upgrading client's wireless infrastructure toAruba.
  • Worked on Multi-vendor platform with checkpoint, Fortinet and Cisco firewalls requesting net flow for security compliance, coding, and pushing firewall rules after approval and troubleshoot incidents as required.
  • Good Understanding of Multiple Contexts in ASA firewalls and implemented different failover mechanisms among ASA firewalls
  • Setup and maintained Check Point security policies including NAT, VPN and Secure Remote access.
  • Experience with hybrid CatOS to Native Cisco IOS code migration involving Catalyst 6503 to Catalyst 6504 switches
  • Lab Implementation of multiple security contexts in ASA firewalls and Checkpoints configures redundancy (Active-Active failover and active-standby failover) among them
  • Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, and HA) on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital s, Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of Firewall logs using various tools
  • Successfully installed Palo Alto PA 3060 Firewalls to protect Data Centre and provided L3 support for routers/switches/Firewalls.
  • Install and upgrade Bluecoat proxy SG (900, 810 and SG9000 series) and Proxy AV (510,810 and 1400 series) in all the Datacenters.
  • Worked with Palo Alto 4020,4060 devices from scratch by deploying them
  • Troubleshooting the firewall PA-5060, 4060 and monitoring the performance.
  • Adding the rules in Palo Alto firewall for allowing the traffic and blocking them from different nodes in the network
  • Configure policies on the Bluecoat VPM, local database and PAC files to filter the traffic flow by creating custom rules, URL categories and routing policies.
  • Configure and manage Bluecoat 510 directors in active and Standby mode.
  • Working with F5 Load Balancers for LTM and GTM type load balancing between multiple centers.
  • Configured ACLs in Cisco 5540 ASA firewall for Internet Access requests for servers, Protocol Handling, Object Grouping and NAT.
  • Troubleshoot and Worked with Security issues related to Cisco ASR 9K, Checkpoint, IDS/IPS and Juniper Net screen firewalls.
  • Juniper Contrail SDN Cloud Computing Open Networking Openflow/ODL.
  • Configure and maintain security policies on Fortinet firewall and manager/ Fort Analyzer
  • Migrating existed Bluecoat Proxy infrastructure with McAfee Web Gateway using Parent/Childarchitecture across multiple Data Centers using F5's LTM load balancer
  • Configure and maintain security policies on Fortinet firewall and manage Forti Manager/ Forti-Analyzer.
  • Installed redundant BigIP F5 LTM and GTM load balancers to provide uninterrupted service to customers.
  • Installing and configuring Checkpoint NG R55 and NGX R60.
  • Deployed VPLS for DCI for spanning the VLans across the datacenters to provide support for low latency and critical applications
  • Monitor the network traffic through Orion Solarwinds and Spectrum syslog server.
  • Knowledge with Alcatel 7750 routers, which we deployed as a MPLS Core in the Network providing services to all the remote sites.
  • Configured and Administered Cisco ASA 5585 firewalls which includes setting up the different zones.
  • Configured and deployed BIG-IP LTM 8900 for providing application redundancy and load balancing.
  • Performed network administration tasks such as creation and management of VLANS, Port security, Trunking, STP, Inter-VLAN routing, and LAN security.
  • Configuring and implementing Remote Access Solution: IPsec VPN, any connect VPN, SSL VPN.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Involved in the Team of Data Center Operations to perform duties like administration and monitoring of Cisco Routers and Switches according to the organization requirements.
  • Knowledge in implementing and configuring F5 Big-IP LTM-6400 load balancers.
  • Involved in Network Designing, Routing, and DNS, IP Subnetting, and TCP/IP protocol.
  • Configured ACLs in Cisco 5585 ASA firewall for Internet Access requests for servers, Protocol Handling, Object Grouping and NAT Control using Object NAT.
  • Implemented Cisco ACI infrastructure for supporting rapid application change by reducing complexity with a common policy framework that can automate provisioning and resource management.
  • From EIGRP domain to OSPF in order to maintain and support multi-vender capability.
  • Worked on BGP and peering the CE with the AT&T and Century Link MPLS providers using Local ps and AS Path attributes.
  • Implemented VPLS and worked on Route Reflectors, Route Targets, LDP, L3VPN's, VRF's exclusively.
  • Experience deploying F5 Load Balancers for load balancing and traffic management of business application. Design and Implement Remote access VPN server using Checkpoint NGX R60 and NG R 55 & Cisco ASA.
  • BMC Remedy Ticketing system, Change Management, Incident Management and solving the SR's assigned to me.
  • Assisted with the Cisco ACE Load balancer.

Environment: F5, NGX R55 and R65, Checkpoint, Fortinet, Bluecoat, Nexus 9396, 7010, 5548, 5520, 2248, Cat 6880, VPC, VDC, VRF, VSS, Alcatel 7750, Cisco ASA, BGP, VPLS, OSPF, EIGRP, QOS, VPM, SDN Solarwinds, STP, VLANS, VTP, Port-Channel, and Switch Stacking.

Confidential, San Jose, CA

Sr. Network Engineer

Responsibilities:

  • Converting CatOS to Cisco IOS Config Conversion on distribution layer switches
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst switches
  • Configuring PAGP and LACP protocol along with BFD link detection protocol
  • Experience with design and implementation of Data center migration
  • Experience with hybrid CatOS to Native Cisco IOS code migration involving Catalyst 6503 toCatalyst 6504 switches .
  • ArubaOS AP's,ArubaInstant Controller-less AP's,ArubaMeshOS multi-radio mesh platform.
  • Configured, Managed and Supported new and existing Wi-Fi network withArubanetworks Wi-Fi Controllers (WLC), access points and airwave software.
  • Hands on experience as well as competitive sales on Aruba's full product line including; AP-100, 110,175,130.
  • Support and Administration onArubaWi-Fi. Hands on experience inArubaS2500 switches,Aruba7200, 3600 series wireless controllers,ArubaIAP 105, Airwave Products and clear pass Servers.
  • Configuring, Troubleshooting, Designation and Implementation ofArubaWireless solution includingArubaS3500 mobility switch,Aruba105,175,225 Campus AP,Aruba7210,7220 Controllers.
  • Operational support for all Sprint retail stores. Devices consist ofArubaequipment such asAruba7010,ArubaS p,ArubaAPs (105, 205 and 225s),ArubaRAP-5s.
  • Providing technical security proposals, detailed RFP responses, security presentation, installing and configuring ASA firewalls, VPN networks and redesigning customer security architectures.
  • Experience with managing the completed end to end site solutions
  • Involved in Datacenter build and support, Implementation, migrations network support, Interconnectivity between an old Datacenter and new Datacenter.
  • Converting access-lists to Firewall rule sets on FWSM module with 6509-E Catalyst switches
  • Involved in setting up Voice VLANs on distribution switches, and configuring access switches ports for AVAYA IP PHONES
  • Implementing 3750 Rack/Stack switches using Cisco Stack Wise technology
  • Experience with design and implementation of Virtual Switching System (VSS) for both User segment and server segment using 6509-V-E catalyst switches.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering)
  • Data center migration was involved in Access, Distribution and Core layers.
  • Installed new purchased Hardware to the new DC, migrate data over WAN connection, also greatly involved in virtualization of physical servers.
  • Integrated and evaluated Cisco ACI, VMware NSX, and Arista CVX SDN solutions.
  • Design and implement Catalyst/ASA Firewall Service Module for various LAN's.
  • Experience with migration Hybrid based Cisco CatOS and Native Cisco IOS on 6500 catalyst switches.
  • Involved in migration of WLAN segment on the LAN Core. Also, involved in configuring wireless VLANS
  • Working knowledge of Firewall service module FWSM UPGRADE, FWSM RULESET conversion
  • Coordinated precise scheduling for all migration events including all equipment and resources for the data center migration on an extremely accelerated schedule with for a high-profile client.
  • Upgrading IOS on 2960 and using 2960 switch as a PAGP between VSS
  • Working knowledge of PPP Protocol with Enhanced Flex WAN module on 6500 catalyst switchInvolved configuring PPP multilink group, dialer group, PPP authentication protocols like PAP, CHAP.
  • Working knowledge of Terminal server and the configurations
  • Installation of L3 Switching Engine Policy Feature Card & Distributed Forwarding Card DFC3C

Environment: 3750, 3550, 3560,3925, 2924, 6509-V-E, 6513, 6504, 6503, 6506, 6500 series switches, 7206, 2611, 6748, 6708, 2960, T1 Controllers, DS3 Lines (T3 Lines), Fiber and Ethernet cabling

Confidential - Temple Terrace, FL

Network Engineer

Responsibilities:

  • Configured and troubleshooting HSRP, BGP, OSPF, EIGRP, MPLS WAN, QoS and Route Maps.
  • Configured and maintaining Cisco 7200, 4400, 5000 and 6500 platforms.
  • Troubleshoot connectivity issues involving VLAN's, OSPF, QoS etc.
  • Support, monitor and manage the IP network.
  • Responsible of firewall management, with Checkpoint firewall.
  • Understanding the JUNOS platform and worked IOS upgrade of Juniper devices.
  • Strong hands on experience in layer-3 Routing and layer-2 Switching.
  • Worked on Nexus models like 7K, 5K, 2K series, Cisco router models like 7200, 3800, 3600,2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3925, 3500, 2900 series switches.
  • Performance monitoring of various applications and web servers to maintain quality of service and network stability.
  • Accountable for SAN migrations, LUN creations, and masking removal; Citrix XenApp,
  • XenServer, and XenDesktop design and implementation; and Citrix NetScaler
  • Configurations and maintenance.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/Switches/firewalls.
  • The project involved the decommissioning of older Cisco equipment and replacing them with the Nexus platform. These include the Nexus 2048's, 5596 and 56128 platforms
  • Maintained core switches, creating VLAN's and configuring VTP.
  • Designed IP Addressing schemes, VLAN tables and Switch port assignments, Trunking and Ether-channel implementation.
  • Gained hands on experience with VLSM, STP, VTP, VLAN Trunking.
  • Installed and set up Cisco routers and switches according to deployment plans.
  • Applied access lists and NAT configurations based on implementation guidelines.
  • Managed and developed network projects designed to strengthen network continuity and deploy security elements in an attempt to meet and exceed contract requirements, including system analysis and troubleshooting, change management, monitoring network performance with network tools.
  • IP Distribution for existing devices and new devices as they were added.
  • Preformed maintenance on equipment as necessary, performing device upgrades, modification of configurations, password changes and diagnostic testing.
  • Configuring FEX, VPC, Port-Channel on Cisco Nexus Switches.
  • Worked with vendors and Engineering team to test new hardware and procedures.
  • Prepared and maintained documentation using MS Visio.

Environment: NGX R55 and R65, Checkpoint, Fortinet, Bluecoat, Nexus 9396, 7010, 5548, 5520, 2248, Cat 6880, VPC, VDC, VRF, VSS, Alcatel 7750, Cisco ASA, BGP, VPLS, OSPF, EIGRP, QOS, VPM, Solarwinds, STP, VLANS, VTP, Port-Channel, Switch Stacking.

Confidential

Jr. Network engineer

Responsibilities:

  • Installed Nexus 7010 core switches and Nexus 5548 and 2148 server access switches. Configured 7010's with multiple distribution VDC's running EIGRP for route propagation between them.
  • Designed and configured IP addressing scheme and eBGP routing strategy for Century Link MPLS network connectivity. Wrote core and remote router configurations and implementation scripts.
  • Implemented EEM scripting on the WAN Routers for redundancy and for the Multihoming.
  • Working on L3 protocols such as BGP, OSPF and EIGRP also includes static routing and route redistribution.
  • Experienced in Configuring/Troubleshooting Routing Protocols EIGRP/OSPF/BGP/RIP.
  • Installed and Configured A10 (AX2500) load balancer as SLB for various application in backend.
  • Installed and deployed the Controller based Aruba Wireless Access Point.
  • Implemented STP, VTP, and Port-channel and advanced technologies like VSS on the Cat 6500's, OTV, and FCOE.
  • Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5520/5540) Series. Administered Cisco Catalyst 29xx, 19xx series switches.
  • Trained on Cisco Application Centric Infrastructure (ACI).
  • Troubleshoot layer1, layer2 and layer3 technologies for customer escalations.
  • IP Allocation & Maintenance for users and other needs throughout company.
  • Working on Quality of service QOS and class of service COS implementations for business-critical applications and prioritize traffic for voice and other critical applications utilizing classification techniques like DSCP, NBAR, Traffic shaping and Policing.
  • Configured Cisco Voice Security Gateways and implemented the zone based firewall services.

Environment: Nexus 7010, 5548, 2248, VPC, VDC, VSS, VSG, NGX R55 and R65, Cisco ASA, Wireshark, R76, R77, GAiA, Juniper SRX, EEM script, QOS, VPM, Solar winds, STP, VLANS, VTP, Port-Channel, Switch Stacking.

Confidential

LAN/WAN Engineer

Responsibilities:

  • Responsible for entire LAN and WAN maintenance and troubleshooting of the company network. Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements.
  • Performed network administration tasks such as creation and management of VLANS, Port security, Trunking, RPVST+, Inter-VLAN routing, and LAN security.
  • Worked with Cisco Catalyst 6500, 4500, 4900 switches and Cisco 2800, 3600, 3800, 7200 &7600 series Routers.
  • Worked with Routing Protocols of EIGRP and BGP.
  • Configured PVSTP+ for loop prevention and VTP for Inter-VLAN Routing.
  • Worked on commissioning and decommissioning of the MPLS circuits for various field offices& POPs.
  • Deployed Nexus 2000, 5000 and 7000 series switches.
  • GRE tunneling & Site-to Site VPN configuration between other two sites in USA.
  • Configured ASA 5520 to ensure high-end security on the network with ACLs and Firewall.
  • Implemented redundancy for Routers, Switches and Firewalls.
  • Manage Cisco Routers and troubleshoot layer1, layer2 and layer3 technologies for customer escalations.
  • Worked with Cisco Catalyst 6500, 4500, 3750,3925, 3560, 2960 switches and Cisco 2800, 3600, 3800, 7200, 7600 and ASR series Routers.
  • Played responsible role for implementing, engineering, & level 2 support of existing network technologies / services & integration of new network technologies / services.
  • Worked with Cisco Layer 3 switches 3560, 3750, 3925, 4500, 6500; Cisco Nexus 5000 and 7000 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, and ether channel.
  • Key contributions include troubleshooting of complex LAN /WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
  • Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location of office on the switched network.
  • Provided support for troubleshooting and resolving Customer and user reported issues.
  • Worked with Network Engineer's in the installation and configuration of firewalls.

Environment: BMC Remedy, Cisco ASA 5540, BIG-IP LTM 8900, QOS, Policy-maps, Class-maps, Nexus, VLans, STP, RSTP, PVSTP, VTP, HSRP, Etherchannel, BGP, OSPF, EIGRP, MPLS, ATM, PPP, HDLC. SNMP, TACACS+, DNS, DHCP, Basics of WLA.

We'd love your feedback!