We provide IT Staff Augmentation Services!

Network Engineer Resume

0/5 (Submit Your Rating)

Edison, NJ

PROFESSIONAL SUMMARY:

  • Over 8 + years of experience in design, development, implementation, troubleshooting and maintenance of complex network systems
  • Sound knowledge of Routing and Switching concepts and MPLS design.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP - BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS
  • Configured and deployed QOS and defined class of service (COS) WRED and WFQ for bandwidth management.
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems
  • Extensive experience taking copy of Cisco IOS on TFTP server and loading back on routers
  • Extensive troubleshooting experience in ISDN and telephony circuit CSU/DSU connections
  • Monitored network congestion in frame relay connection using FECN and BECN and kept track of VC (Virtual circuit) status through LMI (Local management interface)
  • Extensive experience in Layer 3 routing and Layer 2 switching. Experienced dealing with router configurations like 7200, 3800, & 2800 and switches 6500, 4500, 3750, 2900 and 3500XL series
  • Proficient in configuration of routing protocols like RIP, IGRP, EIGRP and OSPF multiple areas BGP
  • Involved in designing L2VPN services and encryption system and other VPN with IPSEC based services.
  • Configure new routes for new endpoints into Palo Alto Firewalls.
  • Experience on designing and troubleshooting of complex BGP and IS-IS routing problems on mock lab scenarios.
  • Worked on F5 LTM, GTM series like 6400, 4200, 2000 for the corporate applications and their availability.
  • Worked on firewall Pix525, ASA and other tools like SNMP, AAA, RADIUS and designed VPN with IPSEC security layer.
  • Expanded LAN to accommodate 200 plus users. Coordinated installation and repair work. Diagnosed and corrected clients network related issues.
  • Experience with F5 load balancers andCiscoload balancers (CSM, ACE and GSS).
  • Experience on load balancing strategies/techniques, expertise in application switching/traffic management, knowledge of persistence and SSL s.
  • Basic and advance F5 load balancer configurations, including migrating configurations fromCiscoACEto F5 and general troubleshooting of the F5 load balancers
  • Experience with Blue Coat URL filtering with whitelisting and blacklisting URL, creating rules for content filtering.
  • Administered multiple Fortinet firewalls throughout WAN to ensure LAN integrity from external threat.
  • Provided Level-3 Network support for Cisco Switches and Cisco ASA 5500 Series Security.
  • Responsible for Cisco ASA firewall administration across our global networks
  • Designing, Implementing and Troubleshooting Cisco Routers using Static, RIPv2, OSPF, EIGRP & experience with Checkpoint, Cisco ASA devices
  • Possess Hands-on experience with TCP/IP, LANs, WANs, and WLANs (WiFi)
  • Advanced knowledge of OSI model, TCP/IP, Internet technologies, system security, firewall infrastructure, network architecture and Cisco network routing / switching (Layer 2 and 3) experience, design and implementation which includes Layer 1 to Layer 7 experience.
  • WAN experience with ATM, Frame Relay, SMDS, DSL, ISDN, DDS, T1 and T3, VPN, Cisco routers, PIX firewalls, RIP, IGRP, EIGRP, OSPF, BGP, HSRP, TACACS+ and Cisco Works.
  • Strong knowledge on networking concepts like TCP/IP, Routing and Switching.
  • Experience in Designing and implementing F5 BIG-IP load balancer.
  • Configuring and troubleshooting F5 BIGIP LTM load balancing and implementing, Creating I rules, Virtual servers, Pools, Nodes with health, Profiles, SNAT, SSL, NAT, Traffic Policies and QoS.
  • Extensive Packet level debugging and troubleshooting on Palo Alto Firewalls to resolve numerous network issues.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices and also configure 2k, 3k,7k series Routers
  • Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network
  • Experience configuring Virtual Device Context in Nexus 7k series switch.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.
  • Implementation of Juniper Firewall, SSG Series, NetScreen Series ISG 1000, SRX Series.
  • Worked on Juniper NetScreen Firewalls like, NS50, SSG 550M, SSG520M, ISG 1000, and ISG 200.
  • Hands on experiences on McAfee EPO with deploying and removing agent on client’s machine, removing virus and manually updating DAT files.
  • Design and Install UCP Select for VM Ware with Cisco UCS and Cisco Unified Fabric Switching
  • Experienced in installing VMware VSphere 5.1 5.5 and created virtual machines on ESX 5.1 5.5 Servers. Created standard images and deployed servers.
  • Hands-on experience on Checkpoint Firewall R70, Palo Alto and Cisco ASA 5500 firewalls.
  • Experience on Check Point Firewalls NG, NGX R65, R70 and VDs (VMware Network).
  • Experience in creating multiple policies and pushing them in to Checkpoint Firewall (Gateways) and hands on experience in managing the Checkpoint Management Server.
  • Expertise in configuring and troubleshooting of Cisco Routers (2600, 3600, 3700, 2800, 7500) series and Cisco Catalyst Switches (1900, 2900, 3500, 6500, 4500, 3750, 2960) series.
  • In-depth knowledge and experience in WAN technologies including OC3, E3/T3, E1/T1, Point to Point, MPLS and Frame Relay.

TECHNICAL SKILLS:

Routers: Cisco 2600, 3600, 3700, 2800, 7500, 7600, 7200, 3800, 3600, 2900, 2800, 2600, 1800, 1700

Routing Protocols: OSPF, EIGRP, BGP, RIP v1/v2, MPLS, Static Routing Redistribution, Summarization.

Switches: Nexus 2K/5K/7K, Cisco Catalyst 2900, 3500, 3700, 6500, 4500, 3850, 3560, 3750, 2960

Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi- Layer Switch, Ether channels, Transparent Bridging

Network Security: Cisco ASA 5540, ACL, IPSEC, F5 Load Balancer, Checkpoint, Juniper SSG Series, Net screen Series ISG 1000, SRX Series, Cisco ISE, Palo Alto

Load Balancer: Kemp, F5 Networks (Big-IP) LTM 8900 and 6400

LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet

WAN: PPP, HDLC, Channelized links (T1/T3), Fiber Optic Circuits, Frame Relay, VOIP

Gateway Redundancy: HSRP, VRRP and GLBP WAN Optimizer Riverbed Steelhead Appliance, WAE DHCP and DNS Infoblox

Various Features & Services: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP, FTP

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Network Monitoring: Logic Monitoring (LM), LMS, Cisco Secure ACS, Wireshark, Cisco Prime Infrastructure, SNMP, HRPing

PROFESSIONAL EXPERIENCE:

Confidential, Edison, NJ

Network Engineer

Responsibilities:

  • Maintained a network lab with more than 30 routers (3600 series), 50+ switches (2900 series), firewall and other network devices like DHCP, DNS servers and VPN concentrators.
  • Experience working with ASR 9000 series switches with IOS-XR.
  • Switching related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet and Gigabit Ethernet channel between switches.
  • Experience in vSphere Infrastructure.
  • Helped the network team to install new switches and routers and configure the IOS according to the requirement which included VLAN, OSPF, Sub netting, EIGRP, BGP, VTP, PaGP, spanning - tree, IP Sub netting, wireless access points, T1 circuits and PIM-SM using auto RP.
  • Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
  • Assisted in backing up, restoring and upgrading the Router and Switch IOS.
  • Assisted campus for VOIP network management and troubleshoot.
  • Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewalls.
  • Experience with migrating from Cisco ASA 8.2 version to Cisco ASA 8.4 Version.
  • Experience with convert PIX rules over to the Cisco ASA solution.
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls for stable VPNs.
  • Experience configuring Virtual Device Context in Nexus 7k series switch.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices and also configure 2k, 3k,7k series Routers.
  • Implementation and maintained intrusion detection/ prevention (IDS/IPS) system to protect enterprise network and sensitive corporate data. For Fine-tuning of TCP and UDP enabled IDS/IPS signatures in Firewall.
  • Expanded LAN to accommodate 200 plus users. Coordinated installation and repair work. Diagnosed and corrected clients network related issues.
  • Configuration the access-list rules, network object-service group based on well-known port the port i.e. FTP/SFTP, SSH, HTTPS/HTTPS (SSL) and etc.
  • To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
  • Responsible for Cisco ASA firewall administration across our global networks.
  • Worked with LAN protocols like STP, RSTP, MST, VTP, VLAN and Port Channel Protocols like LACP.
  • Design and Install UCP Select for VM Ware with Cisco UCS and Cisco Unified Fabric Switching
  • Design and configuring Overlay Transport Virtualization (OTV) on Cisco NX-OS devices like Nexus 7000.
  • Worked on F5 LTM, GTM series like 6400, 4200, 2000 for the corporate applications and their availability.
  • Provided Level-3 Network support for Cisco Switches and Cisco ASA 5500 Series Security.
  • Responsible for Cisco ASA firewall administration across our global networks
  • Hands-on experience on Checkpoint Firewall R70, Palo Alto and Cisco ASA 5500 firewalls.
  • Experience in creating multiple policies and pushing them in to Checkpoint Firewall (Gateways) and hands on experience in managing the Checkpoint Management Server.
  • Possess Hands-on experience with TCP/IP, LANs, WANs, and WLANs (WiFi)
  • Designing, Implementing and Troubleshooting Cisco Routers using Static, RIPv2, OSPF, EIGRP & experience with Checkpoint, Cisco ASA devices
  • Built new relationships and strategic plans with Palo Alto Networks Channel Account Managers and Sales Teams covering the East territory.
  • Advanced knowledge of OSI model, TCP/IP, Internet technologies, system security, firewall infrastructure, network architecture and Cisco network routing / switching (Layer 2 and 3) experience, including LAN and WAN, design and implementation which includes Layer 1 to Layer 7 experience.
  • Experience working with migration from 6500 series devices to 4500 Series switches in Campus deployments at Core, Distribution and Access Layers.
  • Experience of VMware ESXi and VMware Infrastructure.
  • Hands-on experience with McAfee EPO deploying agent either with EPO.
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Implementing, configuring and troubleshooting routing protocols such as RIPv2 HSRP, GLBP
  • Installation & configuration of Microsoft Proxy Server 2.0 & Blue Coat Proxy.
  • Configured, installed, & managed DHCP, DNS, & WINS servers.
  • Provided front-end on-call network support 24x7x365 for all network infrastructures in the co-operation.

Environment: In Corporate office architecture with highly reliable & secured network including Cisco routers (7200, 3800, 2800) and Cisco switches (6500, 3700, 4900, 2900), Nexus (7K, 5K & 2K) Routing Protocols (EIGRP, OSPF, BGP), Switching protocols (VTP, STP, GLBP, HSRP), Cisco PIX (525, 535), ASA (5505, 5510), Fort iGATE Firewall 80C, 100d, 1240b on Forti OS5.2

Confidential, Tampa, Florida

Network Security Engineer

Responsibilities:

  • Responsible for fitting the infrastructure surroundings with majority of Cisco & Palo Alto appliances except for varied different instrumentality.
  • Efficiently exploitation ServiceNow tool for generation of tickets, distribution severity to incidents, following up with incident standing and troubleshooting incidents.
  • Excellently used Splunk to research and monitor incident management and incident resolution issues.
  • Analyzed and monitored incident management and incident resolution issues exploitation Splunk.
  • Researched, designed, and replaced aging stop firewall design with new next generation Palo Alto appliances serving as firewalls and URL and application review.
  • Upgraded and updated Cisco IOS from twelve.3T to 12.4. accustomed DHCP to mechanically assign reusable information science addresses to DHCP shoppers.
  • Configuring and troubleshooting perimeter security devices like stop NGX R77 Gaea, Provider-1/MDM, Secure Platform, Palo Alto and ASA Firewalls.
  • Palo Alto style and installation (Application and URL filtering, Threat bar, information Filtering)
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs exploitation varied tools.
  • Experienced in installing VMware VSphere 5.1 5.5 and created virtual machines on ESX 5.1 5.5 Servers. Created standard images and deployed servers.
  • WAN experience with ATM, Frame Relay, SMDS, DSL, ISDN, DDS, T1 and T3, VPN, Cisco routers, PIX firewalls, RIP, IGRP, EIGRP, OSPF, BGP, HSRP, TACACS+ and Cisco Works.
  • Successfully put in Palo Alto PA 3060 firewalls to protects information Center and provided L3 support for routers/switches/firewalls
  • Implemented Zone primarily based Firewalling and Security Rules on the Palo Alto Firewall
  • Exposure to wild hearth feature of Palo Alto.
  • Maintained and managed networks running EIGRP and BGP routing protocols.
  • Regularly performed firewall audits around stop Firewall-1 solutions for purchasers.
  • Provided tier three support for stop Firewall-1 software system to support customers.
  • Work on stop Platform together with supplier sensible Domain Manager. Worked on configuring, managing and supporting stop Gateways.
  • Configuration of routing protocols EIGRP and BGP for little to medium sized branches supported company branch standards, together with distribution and route maps.
  • Access purpose refresh and implementation at varied sized branches and locations.
  • Used network observation tools like Spectrum to confirm network property and protocol analysis tools to assess and pinpoint networking problems inflicting service disruption.
  • Worked with management and varied departments to develop procedures and troubleshoot issues as they arose.
  • Build IT security infrastructure together with stop, Juniper and Palo Alto firewalls
  • Configuring F5 Load Balancers: Adding virtual IPs, nodes, pools and health observation.
  • Configuring Juniper Net Screen Firewall Policies between secure zones exploitation NSM (Network Security Manager)
  • Backup and restore of stop and Cisco ASA Firewall policies
  • Handling Break/Fix things, monitor, configure, policy creation on Checkpoint's sensible Center Server running on Secure Platform
  • Monitoring Traffic and Connections in stop and ASA Firewall
  • Manage project task to migrate from Cisco ASA firewalls to examine purpose firewalls
  • Worked extensively in Configuring, observation and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover demilitarized zone socialization & configuring VLANs/routing/NAT

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960/6500 switches and Cisco 3640/ 12000/ 7200/ 3845/ 3600/ 2800 routers, Cisco Nexus 7K/5K, Cisco ASA five hundred, F5 BIGIP remembering, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP.

Confidential, Monmouth Junction, NJ

Network Engineer

Responsibilities:

  • Interacting with clients, understanding their needs & providing technical support to clients by remotely accessing their networks & troubleshooting the issues raised.
  • Developing technical design documentation of new data center connectivity based on common design standards.
  • Designing structured cabling and rack-layout’s for new datacenter
  • Configuring Power PDU’S and Digi console in data center environment.
  • Updating all sever and network design documentation for each project worked, ensuring accuracy.
  • Coordination of equipment replacement for service restoration
  • Vendor escalation, chase 3rd party vendors and suppliers for regular updates and escalate where necessary
  • Troubleshooting of all sever and network/firewall Incident reported by Service Desk. As well as working on Service requests.
  • Ensures connectivity and communication among networks, servers and clients inside and outside the department
  • Change management responsibilities, ensure all change procedures are followed properly Documentation and reporting
  • Upgrading Cisco IOS on routers
  • Configuring VLANs in Cisco Switches with Inter-VLANs routing with VTP (VLAN Trucking Protocol).
  • Experience configuring Virtual Device Context in Nexus 7k series switch.
  • Configuring cisco 6509 switches in core level.
  • Strong knowledge on networking concepts like TCP/IP, Routing and Switching.
  • Set up network infrastructure with fail over mechanism
  • Configuring ether-channel on cisco switches
  • Configuring IPsec vpn tunnels in cisco ASA firewalls
  • Planning, installation, configuration and ongoing maintenance of wired networking infrastructure including routers, switches, and configuring all necessary LAN / WAN protocols in support of wireless infrastructure.
  • Configuring, managing and troubleshooting networks using routing protocols like RIP, EIGRP and OSPF (Single Area and Multi Area).
  • Assisted with troubleshooting all network issues with routers and switches when necessary and consulted with on call tech as needed for client.
  • Perform routine network maintenance checks as well as configure and manage printers, copiers, and other miscellaneous network equipment.
  • Troubleshot the issues related to routing protocols.

Confidential

Network Administrator

Responsibilities:

  • Supported core network consisting of Cisco routers running multi area OSPF. Implemented stub/Totally stub areas as per requirements
  • Deployed Cisco ACS using TACACS+ for Authentication, Authorization and Accounting of access to network devices
  • Installation, configuration, and testing cisco equipment’s, IOS updates, and configuration changing, troubleshooting various LAN/WAN technologies issues for internal and external clients, monitoring network performance, defining network policies and procedures
  • Resolve customer WAN/LAN/wireless/load balancing networking issues
  • Installed and configured SolarWinds server.
  • Configuring IPsec VPN Site-site, GRE Tunneling and SDM along with troubleshooting.
  • Firewall and router configuration changes as per the business requirement.
  • Provide technical assistance and support for incoming queries and issues related to Networks, computers systems, software’s, and equipment’s hardware.
  • Evaluating network performance, including availability, utilization, throughput, and latency
  • Optimized OSPF and EIGRP network reducing network multicast traffic
  • Greatly enhanced network manageability using SNMP, NTP, SSH and Solar Winds
  • Performed configuration and management of network and circuits. Documented and updated network physical and logical layout.
  • Designing, Implementing and Troubleshooting Cisco Routers using Static, RIPv2, OSPF, EIGRP & experience with Checkpoint, Cisco ASA devices
  • Built new relationships and strategic plans with Palo Alto Networks Channel.
  • Extensive day to day work with Spanning Tree Protocol and multiple VLANs

Confidential

Network Engineer

Responsibilities:

  • Migration of RIP V2 to OSPF, BGP routing protocols.
  • Configured and installed Cisco routers 2500, 2600, 3601 and 4000 series.
  • Configured EIGRP for Lab Environment.
  • Implemented ISL and 802.1Q for communicating through VTP.
  • Working with Client teams to find out requirements for their Network Requirements.
  • Designing solutions for frozen requirements using Cisco Routers and Switches.
  • Deploying the network infrastructure to meet the requirements.
  • Created VLAN and Inter-Vlan routing with Multilayer Switching.
  • Documenting and Log analyzing the Cisco ASA 5500 series firewall.
  • Worked along with the team in ticketing issues.
  • Performed administrative support for RIP, OSPF routing protocol.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
  • Real time monitoring and network management using Cisco Works LMS.
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Monitoring network performance to improve the backup strategy using Net rep, Solar winds

We'd love your feedback!