We provide IT Staff Augmentation Services!

Network Engineer Resume

2.00/5 (Submit Your Rating)

New, YorK

SUMMARY

  • 8 years of Experience in Designing, Deployment and Operations of complex enterprise and service provider networks.
  • Provided technical leadership for problem escalation and resolution.
  • Highly motivated with the ability to work independently or as an integral part of a team and committed to highest levels of professionalism.
  • Knowledge on designing, implementing and troubleshooting complex layer 2 technologies such as VLAN, Trunks, VTP, and STP along with troubleshooting of inter - VLAN routing and VLAN trunking using 802.1Q.
  • Open stack/Linux administrator with over 5 years of experience in Open stack, cloud computing, Virtualization, Linux System Administration and Configuration Management.
  • Build stable, productive and profitable operations within highly technical environment.
  • Well experienced in configuring various routing protocols like RIP, EIGRP, OSPF, BGP, MPLS
  • Well Experienced in configuring protocols like HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, CHAP and SNMP.
  • Knowledge and deployed of Prisma Access.
  • Integration and Testing og Multiplatform devices with RSA Envision.
  • Designing and Implementing Azure Infrastructure environment according to the customer requirements.
  • Monitor Metro Ethernet Network latency and ensure it is within specific ranges using tools such as Netscout and other latency tools.
  • Experience in configuring Site-to-site and remote access VPN solutions.
  • Good knowledge in configuration of Voice VLAN’s (VOIP), prioritizing the voice traffic over the data traffic.
  • Experience to migrate the infrastructure on Amazon Cloud Service - AWS
  • Enterprise Switching with VLANs, Trunks, Spanning Tree, Port Spanning etc.
  • Troubleshooting and installing of CRS, ISR, GSR, ASR9000 and Nexus devices.
  • Worked on Load Balancer F5 LTM, GTM series like 6400, 6800, and 8800
  • Strong experience with Splunk 5.x and 6.x product, distributed Splunk architecture and components including search heads, indexes and forwarders.
  • Strong hands-on experience in installing, configuring, and troubleshooting ofCisco 7600, 7200, 3800, 3600, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
  • Experienced in various Juniper products: EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240
  • Experienced working with Nexus 7010, 5020, 2148 and 2248 devices.
  • Responsible for designing and deploying various network security & High Availability products like Cisco ASA, FortiGate, Palo Alto and Checkpoint Firewall products.
  • Implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, and Route Maps.
  • Experience in installing and configuring DNS, DHCP server.

TECHNICAL SKILLS

Experience: Cisco 00 Series Routers, Alcatel Lucent 7750, BRAS - Redback Edge Routers, T1s, DS3s, OC3/12/48s, IMA, GigE, Calix E5, E7, C7, ADTRAN (1148,1100,1248,1200,3K,5K) and UMC 1000

Applications: Remedy Ticketing System, IPAM, Citrix XenApp, Calix CMS and IMS, SAM 5620, Secure CRT and Cirus.

Networking Protocols: RIPv1, RIPv2, BGP, OSPF, EIGRP, NAT, ACL, Frame-Relay, MPLS.

Networking Terminologies: OSI Model, ARP, ICMP, TCP/IP, VLAN’s, Inter-VLAN routing Spanning Tree, DNS, DHCP, SNMP, SSH, Telnet, HTTP, IPv4, IPv6, GRE Tunnelling, Ethernet, ATM.

Networking: Network Design & Engineering, Operations Research, Cisco Routers (800, 2600, 2800, 3800, 4500), Switches (2950, 3560, 6500), Snort network intrusion detection systems (IDS). Network penetration testing tools like NMAP, Net filter, Iptables, Ethereal, SONNET, MPLS, DSU/CSU, ASR9K and Octane Line Cards.

Routers & Switches: GSR 12000, 7200, 7600, ASR 1002. 6500, 4506, 4510, Nexus 7000

Wireless: 802.11 (a, b, g, n), 802.16/WiMAX, 3GPP, LTE, GSM, UMTS, CDMA, 3G, RF

Software: Microsoft Office Suite, Visio, Lucid Charts, Wireshark

PROFESSIONAL EXPERIENCE

Confidential, New York

Network Engineer

Responsibility:

  • Maintain network connectivity in terms of Data, Voice, Video, and all the network services.
  • Implementing Routing Protocol Such as MPLS, F5 LOAD BALANCING, PALO ALTO, OSPF, EIGRP, RIPV2, IS-IS BGP, HSRP, VRRP, GLBP, VPN, IPSEC, AP, ENCRYPTION, WIRELESS STANDARD 802.11a, 802.11b, 802.11g, 802.11n, 802.11ab, troubleshoot, configure, and maintain Layer2/3 network devices such as Cisco Router 2600, 3800, 3900, 7600 series, Catalyst Switches C6500, C4000, C3650, C3860, C3750 and set up IP PHONES with QoS.
  • Creating Instances like different locations for the use of Open stack and AWS Clouds
  • We were creating the Brokers for the use of Kubernetes, Kafka, zookeeper.
  • Install, configure and administer Splunk Enterprise Server 6.x.x and Splunk Forwarder6.x.x on Redhat Linux.
  • Configured, Managed and supported MDM Intune and Cisco Meraki.
  • Experience in Bandwidth testing for Cisco, for network protocols using Wireshark tool.
  • Experience in deployment of Prisma Access and Prisma Cloud.
  • Design and configure moniter alerts in SolarWinds.
  • Experience with setup, install, maintain and troubleshoot Cisco ASA, PaloAlto, Fortinet, IDS/IPS, Juniper Net screen and Checkpoint Firewalls.
  • NetScout nGenious performance for NPM across the network.
  • Worked and maintained various network, application monitoring tools like Solar Winds, Cisco Prime, ForeScout, Wireshark, and TCP Dump.
  • Design expertise for the SD-WAN (Versa & Viptela), SD-LAN and WAN optimization technologies for efficient delivery of the application data across LAN and WAN.
  • Migrating Virtual Firewalls to Physical Firewall and Cisco ASA to Palo Alto Firewalls
  • Configuring and Troubleshooting of Various Firewall ACL, NAT rules, policy and protocols like OSPF and Switching protocols like STP, VLAN, VTP Using CLI, SecureCRT, Skybox and Cisco ASDM.
  • MPLS knowledge including operating system with specific emphasis on cicso,Linux as well as experience deploying, configuring and operating SolarWinds EOC.
  • Checking and pinging for the public and private clouds for the VCMTSVIRTUALIZATION Project
  • In Virtualization we were creating multiple VM’s for single Moonshoot
  • Experience administering IPAM solutions such as Infoblox for IP address management, DNS, and/or DHCP.
  • Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark tool.
  • Worked on Cisco Layer 2 switches (spanning tree, VLAN)
  • Creating and Testing Cisco Firewall and Switch operations using security protocol, IPS, ASA Firewalls, and MPLS switching for stable VPNs using WAN backbone
  • This role is responsible for performing a wide variety of daily Control M management tasks as well as providing recommendations for effective and efficient management of system
  • Designing and Implementing Azure Infrastructure environment according to the customer requirements.
  • Experience in Deployment of Prisma Access (Palo Alto Cloud Solution).
  • Configured Cisco ISE tunnels with Fortinet to enable secure transport and cloud based/site-site VPN to AWS.
  • New Fortinet firewall implementation, Traffic Migration and Upgrade Software of existing Firewalls per LLD, Testing, upgrade BIOS OS of Fortinet Firewall system.
  • NetScout APM, NetBrain Auto Diagraming Tool
  • Dev-Lab support implementation Advance SD-WAN Configurations for Traffic Engineering testing.
  • Configuring F5 Big-IP LTM and GTM. Responsible for troubleshooting of F5 load balancers
  • Worked with Network and Systems Administrators for troubleshooting incidents.
  • Configured Azure VPN gateway and established Site-to-Site connectivity, Express Route with On Premise Networks and Azure.
  • Developed Intune System with Compliance and conditional access policies with EMS security system.
  • Experience in maintaining asset management in SolarWinds.
  • Debugging the issues which are related to RSA Envision performance, reporting, collection of logs from various devices.
  • Configure Infoblox DNS IPAM for Microsoft DNS/DHCP setup and management.
  • Experience of Infoblox Grid Manager to manage DNS Forward and Reverse Lookup Zones.
  • Firewall in Palo Alto (PA3020, PA 5020, PA 5050, PA 7050) Firewalls; cisco environment (ASA5510, ASA5515, ASA5520, ASA5585) Firewalls; FortiGate (501E, 301E, 201E) Firewall.
  • Monitor Metro Ethernet Network latency and ensure it is within specific ranges using tools such as Netscout and other latency tools.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card(module) for the Nexus 5000. Creating or Modifying Firewall rules on Cisco 5555, 5520, Fortinet and Palo Alto VM-300 devices.
  • Designing and implementing Splunk-based best practice solutions.
  • Implemented site to site VPN on Cisco Meraki MX64, MX65, MC84, and MX400.

Confidential, San Diego, CA

Network Engineer/ Admin

Responsibility:

  • Designed, installed, and maintained various LAN/WAN technologies and applications connecting remote sites to cooperate headquarters.
  • Configure IPSEC and SSL VPN with Palo-alto, Cisco ASA, Fortinet, Checkpoint and Router.
  • Worked and maintained various network, application monitoring tools like Solar Winds, Cisco Prime, ForeScout, Wireshark, and TCP Dump.
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Develop high-level dashboards in Splunk and also creating various apps and data models which are used by different users.
  • Deployed Prisma Access and Prisma Cloud closely with team.
  • Deployed and configured virtual networks and storage accounts in Azure
  • Coordinate and provide significant input to project planning and application design
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Updated organization Secure ID from RSA 5.1 to 6.1 to support remote access Authentication.
  • Manage Palo alto, Checkpoint, Cisco ASA and Fortinet policy and network
  • Migrated from Cisco ASA to Palo Alto.
  • MPLS ISP provider. SD-WAN controllers were deployed using Cisco’s cloud-managed service and reachable via Internet transport.
  • Experience working on CISCO NEXUS data center infrastructure with 2000, 5000 and 7000 series switches by enabling networked devices to communicate effectively
  • Working on to set up OSPF dynamic routing on Cisco ASA Firewalls by using and following their current network structure.
  • Experience with setup, install, maintain and troubleshoot Cisco ASA, PaloAlto, Fortinet, IDS/IPS, Juniper Net screen and Checkpoint Firewalls.
  • Proficient in deploying and troubleshooting mission-critical environments using proactive suite of support services - Wireshark and SolarWinds.
  • Design expertise for the SD-WAN (Versa & Viptela), SD-LAN and WAN optimization technologies for efficient delivery of the application data across LAN and WAN.
  • Implemented VLANS between different departments and connected them using trunk by keeping one VLAN under server mode and rest falling under client modes
  • Good experience in systems administration, including analysing, designing, installing, maintaining, and repairing hardware, software, peripherals, and networks.
  • Expert level knowledge in troubleshooting Network Connectivity issues in Local Area Networks (LAN) using Packet Capturing Methods (Wire Shark).
  • Superior troubleshooting and technical support abilities with migrations and network connectivity
  • Worked on Cisco Prime to manage Access point Infrastructure.
  • Perform monitoring, analysis, diagnosis and resolution of problems involving Firewalls (CISCO ASA and Apply Cisco ISE configuration to switches.
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Monitor, operate and support network security devices such as cisco ASA
  • Experience in F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs.
  • Experience in configuring ACLs and VLANs.
  • Configured networks using routing protocols such as OSPF, BGP and manipulated routing updates using route- distribute list and administrative distance for on-demand Infrastructure
  • Working on troubleshooting, implementing and configuring new devices and helping them to build new data centre and moving devices from one data centre to another by moving all devices.
  • Deployment of Networking Prisma Access with team for the given project.
  • Worked with citrix team to Implement centralised solution for remote administrators to access RSA administration tool.
  • Experience in Configuring and Integrating the Servers with different environments to automatically provisioning and creating new machines using Configuration
  • Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Documenting workflow process, managing and implementing standard policy and procedures

Confidential, New York

Network support Engineer

Responsibility:

  • Installed and configured Cisco switches to merge voice and Data network infrastructure.
  • Responsible for the management of network at the client environment.
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco ASA Firewalls, NAT and Juniper SRX firewall.
  • Creating Network objects, dynamic address groups, FQDN and assigning it to rules based on the information in tickets.
  • Implemented Voice VLANS, UDP, SIP, and RTP and provide QOS by DSCP and IP Precedence.
  • Creating custom URL profile based on the expressions and assigning it to rule to perform URL filtering.
  • Configuring network interfaces, static routes, NAT rules in panorama and thereafter pushing to individual palo alto devices.
  • Experience Palo Alto, Network Security, Juniper Firewalls, SSL VPN, Checkpoint, RSA, Cisco Nexus, Cisco ACE, Cisco Wireless.
  • Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Like, 4500-X in VSS mode and 3850 switches for distribution and POE-user switches
  • Experience in configuring VLAN setup on various Cisco Routers and Switches.
  • Troubleshooting the Network failure issues and thereby making the changes to Network Infrastructure.
  • Worked on maintenance and upgraded Cisco wireless WLC, LWAPP APs
  • Troubleshoot issues with Wireless Access points (Cisco 3502) and configure SSID’s on 5520 Wireless LAN Controllers.
  • Configured RIP and EIGRP on 2600, 2900and3600 series Cisco routers
  • Troubleshooting when the servers are down, checking logs the identify the error and thereby taking necessary steps.
  • Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long-term planning, implementation, project management and operations support as required
  • Configured VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7k/5k devices
  • Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
  • Providing Technical Support and solutions for Network Problems and resolve tickets across sites and corporate offices.
  • Involved in periodic IOS upgrades, troubleshooting network outages and high severity incidents.

We'd love your feedback!