We provide IT Staff Augmentation Services!

Lead Network Engineer Resume

0/5 (Submit Your Rating)

Battle Creek, MI

SUMMARY

  • Over 8 years of Experience in Designing, Deployment and Operations of complex enterprise and service provider networks.
  • Adept in managing service functions & streamlining the working standards operating system for project rollout, design and development of Telecom solutions.
  • Good knowledge in configuration of Voice VLAN’s (VOIP), prioritizing the voice traffic over the data traffic.
  • Createtestingtools and scripts as needed to support system leveltestingactivities.
  • Experience developing and maintaining comprehensive system test plans
  • Experience writing Linux shell scripts
  • Experience innetworkperformancetesting and automation testing.
  • Effectively managed process according to ITIL framework standards implemented in the organization.
  • Attend and participate in system - level design meetings in order to addresstestingissues early in the software development process.
  • Enterprise Switching with VLANs, Trunks, Spanning Tree, Port Spanning etc.va
  • Provides technical leadership forproblem escalation and resolution.
  • Highly motivated with the ability to work independently or as an integral part of a team and Committed to highest levels of profession.
  • Extensive experience with Juniper: EX-2200,EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240
  • Worked on Load Balancer F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Part of a team that migrated one data center to another comprising of Brocade networking products.
  • Strong grasp of current and future technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, ACL, VPN, Wireless LAN and configuration of VLANS.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Built stable, productive and profitable operations within highly technical environment.
  • Highly motivated with the ability to work independently or as an integral part of a team.
  • Strong Analytical, Problem Solving, Technical Troubleshooting, Decision-Making, Customer Service Skills, Results-Driven.
  • Steered efforts for providing presentation and seminar to the customers for in-house projects to introduce about the projects Implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, and Route Maps.
  • Handling project activities like planning, site survey, optimization and acceptance testing of cell sites.
  • Managing the complete range of project activities right from conceptualization to installation, testing, maintenance and troubleshooting of networks.
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
  • Developing relationship with client in the point of long term of Business activities.
  • Coordinating with Field Engineers for obtaining site status reports for updates on project progress.
  • Monitoring the installation & commissioning processes at various sites.
  • Undertaking tests & inspections for ensuring operational effectiveness of equipment.
  • Preparing various project reports for identifying areas of obstruction / defects, conducting troubleshooting, service and repair to rectify the network.
  • Ensuring execution of preventive maintenance of networks, including schedules / shutdown maintenance to ensure trouble free and seamless operations.
  • Assisting in the execution of technical meetings with clients for requirement gathering and troubleshooting all kinds of problems.

PROFESSIONAL EXPERIENCE

Confidential, Battle Creek, MI

Lead Network Engineer

Responsibilities:

  • Responsible for maintaining Confidential ’s global network infrastructure in North America, Latin America, Europe and Asia-pacific.
  • Responsible for resolving most of the P1/P2 tickets in ServiceNow with in the SLA window specified by Client.
  • Involved in successfully configuring the 5 class Quality of Service and thus prioritizing the time-sensitive traffic.
  • Actively involved in resolving the Microsoft Lync call quality issue by changing the QoS parameters on the switches between the call manager and the Lync server.
  • Closely monitor the SCCM updates pushed by workplace solutions team so that they don’t cause congestion on the site’s MPLS link.
  • Manage Bluecoat proxy servers which we use to block/unblock certain websites for certain users. Also used Bluecoat proxy to allow some users to download .exe, .zip files.
  • Responsible for Backup circuit installation and maintenance at around 120 Confidential locations in North America. Also responsible for ordering new MPLS circuits for new Confidential locations.
  • Manage TREXTEL portal that is used to monitor the backup circuits and generate bandwidth utilization reports for all the backup ANIRA circuits.
  • Actively involved in performing the Failover testing from Primary circuit to Backup circuit before handing over a site to Operations team.
  • Monitored bandwidth utilization, logs, network speed and provided support for on and off site and user connectivity related issues.
  • Configured and managed OSPF redistribution and authentication with type 3 LSA filtering and to prevent LSA flooding and also configured OSPF over frame relay networks for NBMA and point to multipoint strategies.
  • Implementing and managing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Troubleshooting the TCP/IP networks for connectivity, outages and slow network issues and recommended appropriate and cost-effective solutions for the congestion.
  • Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, and MST; worked on other VLAN troubleshooting issues and configured switches from scratch and deployed them.
  • Performed Layer I, II and III troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for BGP, OSPF, EIGRP, Static and default route in a VPN environment using MPLS.
  • Configuring HSRP for network redundancy and High availability.
  • Experience with design and implementation of Virtual Switching System (VSS) for both User segment and server segment using 6509-V-E catalyst switches.
  • Hands on experience with Nexus Switches 2K,5K and 7K.
  • Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Primarily responsible for decommissioning site to site vendor vpn tunnels when there is a change in vendor for a project.
  • Configured Cisco ASAs to be used as a backup site to site VPN tunnel for our Latin America sites
  • Responsible for Managed network access points, secure site-to-site connections, VPN access process for 10,000+users across the globe.
  • Actively involved in resolving the route leakage issue with the service provider at one of our remote sites.
  • Experience working on Network design and support, implementation related internal projects for establishing connectivity in various field offices and Datacenters.
  • Deploying Cisco WAVE at remote sites both inline and WCCP mode for traffic optimization and monitoring them using the Cisco WAAS Control Manager. Also, deployed Cisco App Nav to further increase the optimization so that the return traffic chooses the same path through which it came in.
  • Signoff the sustainment handover document from network delivery team once a site’s network refresh activity is complete.
  • Experience in Cisco 2800 routers, ASR 1004 routers, Cisco 2900, 380, 3700 series switches: Physical cabling, IP addressing, Wide Area Network configurations
  • Cisco IOS experience on 3600/7200 class hardware in complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data center environment.
  • Attend weekly CAB(Change Advisory Board) meetings to discuss the network changes that will be performed the following week.
  • Configuring and deploying new cisco 1242 Wireless Access Points via Out of Band (MRV boxes) at remote locations in North America.
  • Calculating and submitting the AT&T SLA billing credits that the client should receive for the outages caused by the service provider (AT&T).

Environment: Cisco 6500 VSS architecture, F5 LTM, GTM, Checkpoint Firewall, 2504 and 5508 WLC, Bluecoat Proxy server, Cisco WAAS, Solarwinds, ScienceLogic, NetScout, Cisco Prime, Cisco ASA 5520, Cisco ASA 5585-x, Cisco ASDM, Cisco catalyst 3850X, 3650 switches, Nexus 7K,5K and 2K, ASR 1002 routers, Cisco 2821, 2600, 2800, 3640, 3700, 3825 Routers, LACP, MPLS cloud, Cisco AnyConnect, ASA Firewalls, EIGRP, OSPF, BGP, VLANs, LC-LC fiber, STP, RSTP, vPC, Port security, DNS, DHCP, NTP, SNMP, TACACS+, Cisco ACS, NCS, WAAS CM, Netgate modem, MRV Lx-1004 series, TREXTEL, Wireshark.

Confidential, Minnetonka, MN

Network Engineer

Responsibilities:

  • Participate in Datacard group’s Legacy Data Center Network Infrastructure Transition and Disaster Recovery Center transition to a co lo facility and its new headquarters at Shakopee.
  • Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long term planning, implementation, project management and operations support as required.
  • Actively involved in network engineering, design, planning (WAN & LAN), & implementation of the network design.
  • Co-ordinate with the Data Network and Security team and come up with possible solutions.
  • Racking and Stacking of Nexus 56128,5548, 2248 FEX, 2232 FEX, Catalyst 2960-X switches, Cisco ASA 5585-X, 5545-X, 5512-X, Palo-Alto 7050 and 3050 firewalls, Cisco ASR 1004 and 3945e routers. Then connect the circuits and work with carrier to test and turn-up circuits.
  • Installing and configuring new cisco equipment including Cisco 2960 catalyst switches, Nexus 56128 and Nexus 2k FEX’s, ASA 5585-X firewalls, ASR 1004 routers as per the requirement of the company.
  • Worked extensively on Configuring, Monitoring and Troubleshooting Cisco's ASA 5585-X security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Installed and configured around 65 new Cisco 2960-X switches for IDF closets in the new Headquarters.
  • Mapped around 2000 network jack numbers to the corresponding switchports in IDF closets, assigning them to specific vlans for data, voice and for printers. Also, actively involved in patching them.
  • Actively involved in deploying wireless access which comprises of separate wlan for guest, corporate and BYOD access
  • Configured IDF switchports in to corresponding Vlans using cisco smartport macros.
  • Configured DHCP scope on every IDF switch stack and also assigned static IP address to certain ports depending on the requirement.
  • Leveraged two Nexus 2232 Fabric Extenders and two 2248 Fabric Extenders, making them ‘Dual-homed’ to both N5Ks and implementing Enhanced Virtual Port-Channel (EvPC).
  • Establishing VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
  • Installed cisco 3548XL switches as ILO switches for management purpose and configured telnet and ssh access for all devices.
  • Replaced old 6500 VSS architecture and WAN routers from DR testing site with Nexus 5K and ASR 1004 routers.
  • Good knowledge of Cisco NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548,56128,7010) including Cisco NEXUS Fabric Extender (2232, 2248).
  • Configuration and troubleshooting link state protocols like OSPF in multiple areas.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, LACP ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Configured BPDU Guard, port-fast, uplink fast and port security for users connecting to the switches.
  • All the unused switchports are shutdown and moved into a separate vlan.
  • Efficient in cabling as per co-location contracts with loop-back testing, including CAT 6 and CAT 6a connections as per defined cabling procedures. This included patching the cables in the Patch Panel.
  • Network Cabling, dressing, labeling and troubleshooting various network outages onsite using tools like Cacti and Scrutinizer.
  • Installation and Configuration of networks, router/switches configuration and wireless access point/router with security, TCP/IP, VPN, Content Filtering, Access Control Lists on router/switches, VLANs (port mapping, naming etc.), and routing IP address in both LAN/WAN and wireless networks at the new headquarters.
  • Involved in setting up a new RADIUS server for authentication purpose to all IDF switches.
  • Configuring failover and working on ssl-vpn when in active/standby failover on ASA.
  • Configured Palo-Alto 7050 firewalls in vwire mode. Also configured Palo-Alto 3050 firewalls.
  • Testing all configurations before the Day Of Move and supervising the structured cabling on Day Of Move.
  • Experience with Project documentation tools & implementing and maintaining network monitoring systems and experience with developing network design documentation and presentations using Visio.

Environment: Cisco Nexus 56128,5548, 2248,2232 Fabric Extender (FEX), F5 LTM, GTM, Cisco catalyst 2960-X, 3548XL switches, Cisco ASR 1004 and 3945e routers, Palo-Alto 7050, M100 and 3050 firewalls, Cisco ASA 5585-X, 5545-X,5512-X firewalls, VPN 3000 concentrators, Gigamon Tap, Riverbed 3020, Cisco 2504,5508 WLC, Spanning Tree Protocol, LACP, vPC, vwire mode, site-to-site vpn, 6500 VSS, EIGRP, OSPF.

Confidential, Arlington, TX

Sr. Network Engineer

Responsibilities:

  • Worked on Load Balancer F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Hands on Experience testing I Rules using Browser (IE), HTTP watch.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX)
  • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices
  • Configuration and troubleshooting expertise on Nokia Horizon Manager, IPSO 4.x, 6.x, CheckPoint Provider-1, (NGX) VRRP Active-standby HA, monitoring and remediating alerts with Proactive and security policy with reports from Firemon
  • Produce accurate and in-depth test cases andtesting documentation.
  • Implementing and Maintaining Network Management tools (OPAS, Solar Winds, Cisco Works)
  • Reviewing, analyzing, approving and executing all changes in the network. All Configurations of Cisco Routers and Switches.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
  • Involved in the modification and removal (wherever necessary) of BGP from the MPLS routers.
  • Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Responsible for Checkpoint firewall management and operations across our global networks.
  • Working with Checkpoint Support for resolving escalated issues.
  • Responsible for procurement and installation of Hardware, network drives and other IT infrastructure. Documented the design, implementation and troubleshooting procedures with Method of Procedure (MOPS).
  • Documented all the work done by using Visio, Excel & MS word
  • Write test cases from a variety of documentation types; business requirements, system requirements & design documentation.
  • Executes and update test cases
  • Logs and triages defects and test multiple mobile devices across multiple applications.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPSec/GRE to Get VPN.
  • Experience in working with Nexus 7010, 5548, 5020, 2148, 2248 devices.
  • Extensive experience with Juniper: EX-2200,EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240
  • Experience in configuring vdc, fex pinning, fex port-channel, port-channel, peer keep alive,peer link.
  • Experience in working and designing configurations for vPC, vPC domian, vpc peer-gateway, vPCpeer-switch, auto-discovery and VPC singlesided, vPC double sided, NX-OS, VFR, Otv, fabric path.
  • Designed, validated and implemented LAN, WLAN & WAN solution to suite client’s needs.
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Involved in DWDM ring upgradation & channel upgradation activity.
  • Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Tests & Quality assurance of web client and service level software delivering unified messaging, address contacts and digital media experience to mobile device & webtop subscribers.
  • Tracked the rearrangement of the channel as per the requirement of the customer.
  • Addressed the problem related to DCN network which included Routers & Switches.

Environment: F5 LTM, GTM 6400, 6800, 8800 load balancers, Nexus 7010, 5548, 5020, 2148, 2248 devices, Cisco 4510, 4948, 4507 switches, Nexus 2000 Fabric Extender (FEX), Juniper EX-2200,EX-4200, EX-4500 switches, Juniper MX-480, M Series routers and SRX210, SRX240 service gateways, BGP, EIGRP, OSPF.

Confidential, Oaks, PA

Network Engineer

Responsibilities:

  • Implement Cisco Works 2000 device to manage Cisco routers, switches, PIX and ASA firewall, Access Points, Concentrators.
  • Experience in working with installing Nexus 7010 License upgrade.
  • Experience in installing and configuring Checkpoint NGX R60.
  • Maintain Security policy by monitoring PIX firewalls (515 and 520).
  • Experience working with Network management software NSM primarily to manage the firewalls as well as performing changes as per the requirement.
  • Involved in effective communication with vendors, peers and clients in resolution of problems, equipment.
  • Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs / Routing / NATing with the firewalls as per the design. Primary responsibility is to design and deploy various Network Security & High Availability products like Cisco ASA and other Security Products.
  • Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series.
  • Experience with converting PIX rules over to the Cisco ASA solution.
  • Implemented Splunk to drive reporting and search for data collected from Cisco firewall devices - FWSM, Pix and ASA
  • Implemented Voice VLANS, UDP, SIP and RTP and provide QOS by DSCP and IP Precedence.
  • Used DHCP to automatically assign reusable IP addresses to DHCP clients.
  • Integrate VoIP with PSTN and setup voice Gateway ensuring QOS for Cisco based Voice over IP and CDR for voice call Accounting.
  • Experience in working with Cisco Nexus 2148 Fabric Extender and Nexus 5000series to provide a flexible Access Solution for a data center access architecture.
  • Design and implement campus switch network with Cisco Layer 3 switches (3750, 4500 and 6500) in multi VLANs environment and inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Designed MPLS VPN and QoS for the architecture using Cisco multilayer switches
  • Handling network devices such as Switches (Cisco Catalyst 2900 and 3500 series), Routers (Cisco 2600, 2800 and 7200 series), Firewalls, Load balancers etc.
  • Experience configuring Virtual Device Context in Nexus 7010.
  • Extensive experience with Juniper: EX-2200,EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240
  • Experience in Configuring, upgrading and verifying the NX-OS operation system.
  • Configuring IP, RIP, EIGRP, OSPF and BGP in routers.

Environment: Cisco Works 2000, Checkpoint NGX R60, PIX firewalls (515 and 520), Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series, Voice VLANS, UDP, SIP and RTP, Cisco Catalyst 2900 and 3500 series switches, Cisco 2600, 2800 and 7200 series routers, HSRP, ISL Trunk, Ether channel, IP, RIP, EIGRP, OSPF and BGP.

Confidential, Indiana

Network Administrator

Responsibilities:

  • Maintenance and Troubleshooting of LAN connectivity problems using Ping, Trace route.
  • Performed Switching Technology Administration including VLANs, inter-VLAN Routing, Trunking, STP, RSTP and Port Aggregation & Link Negotiation.
  • Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.
  • Experience on a mesh 6500 and 5500 series routes and switches to support the core trading system.
  • Involved in designing and applying QOS and policy MAP QOS to WAN to 2800 series routers for all the branches
  • Involved in Troubleshooting IP Addressing Issues and Updating IOS Images using TFTP.
  • Troubleshooting problems on a day to day basis & providing solutions that would fix the problems within their Network.
  • Configured RSTP, LACP, VTP on Nexus devices.
  • Worked on Riverbed devices for WAN bandwidth Optimization in the data centers for the sensitive
  • Involved in Troubleshooting of DHCP and other IP conflict problems.
  • Monitored performance of Network and Servers to identify potential problems and bottleneck.
  • Worked on 4500 Catalyst switches for the purpose of LAN requirement and for troubleshooting LAN issues.
  • Experience in deploying EIGRP/BGP redistribution and the changing the metrics for the primary and backup
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access
  • Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Maintained Corporate Firewalls & Analysis of firewall logs using various tools. Configured and troubleshooting of HSRP on Cisco routers.
  • Network consists of Heavy Cisco equipments such as Cisco 2500, 2600, 3640, 3945, 7200 series Routers, Cisco 6500, 4500, 3560, 2950, 2924 Switches, Cisco Pix firewall 500 series and Wireless Access points.
  • Involved in New Branch Network Systems. Resolved Network Issues, Ran Test Scripts and Prepared Network Documentation.
  • Performed RIP & OSPF Routing Protocol Administration.

Environment: Cisco 6500, 4500, 3560, 2950, 2924 Switches, Cisco Pix firewall 500 series, Wireless Access points, Checkpoint, IPSEC VPN,HSRP, NAT, RSTP, LACP, VTP, EIGRP, BGP, OSPF, RIP.

Confidential, Chicago, Illinois

Network Engineer

Responsibilities:

  • Prepared Engineering documents and Network diagrams in Microsoft Vision.
  • Delivered Departmental Efficiency through advanced engineering, technical support, and documentation procedures.
  • Juniper: EX-2200,EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240
  • Implemented new ultra secure networks in multiple data centers that included Cisco 6500 s, Juniper security devices, and F5 Big IP’s.
  • Implement QOS for Voice, Video against DATA by Ip Presidence and DSCP.
  • Designed VLAN’s and set up both L2 and L3 logicals to have it communicate to the Enterprise network.
  • Implemented Load Balancing between Cisco L3 Switch by HSRP and GLBP.
  • Configure Firewall, IPS and QOS by SDM and provide security by Prefix list, Access- List and By Distribution List.
  • Utilize MS Windows, Word, and Excel for reporting/documenting process.
  • Provide high level technical support, including identifying and resolving problems on Cisco supported products for e-Commerce infrastructure.
  • This included external routing and internal/intranet routing for DMZ servers.
  • Moved Core switches and several non-Cisco devices under strict deadlines to maintain network functionality
  • Satisfactorily Resolved Problems in timely manner with focus on providing a high level of support for all customers.
  • Implemented Splunk to drive reporting and search for data collected from Cisco firewall devices - FWSM, Pix and ASA
  • Implemented cable multi-service operator (MSO) to capture traditional Telco subscribers with IP telephony and provide relevant QOS.
  • Configured EIGRP, BGP, and MPLS.

Environment: HSRP, GLBP, Cisco firewall devices-FWSM, Pix and ASA, DMZ servers, Juniper EX-2200,EX-4200, EX-4500 switches, Juniper MX-480, M Series routers and SRX210, SRX240 service gateways, EIGRP, BGP and MPLS.

Confidential

System/Network Administrator

Responsibilities:

  • Configured and supported TCP/IP networks.
  • Monitored the network with Cisco Works 2000.
  • Documented the design, implementation and troubleshooting procedures.
  • Configured and troubleshoot VLAN, VTP, STP and Trunks.
  • Responsible for procurement and installation of H/W, network drives and other IT infrastructure.
  • Network Administrator responsible for the full Planning, designing, installation and administration of the Corporate WAN (wide area network).
  • Worked on the datacenter environment, with routers and switches.
  • Configuration, Management, Troubleshooting of Network devices (Routers, Switches, Firewalls, Servers, DSL Modems etc.). Maintained the Telecommunication Connectivity using DSL and T1 Lines.
  • Maintained complex LAN/WAN networks with several VLANS and provided support for routing protocols.
  • Managed IP addressing and implemented IP Access Lists.
  • Evaluate and recommend inter-connectivity hardware, software, and services to fulfill various businesses needs as requirements develop.
  • Worked on Routers Cisco 2620, Cisco 3750, and Cisco 2950 Switches & Linksys wireless access points.

Environment: TCP/IP, WAN, IP Access lists, Cisco Works 2000, Cisco 2620, Cisco 3750 Routers, Cisco 2950 Switches & Linksys wireless access points, DSL Modems, VLAN, VTP, STP and Trunks.

Confidential

Network Engineer

Responsibilities:

  • Was Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support?
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
  • Configured and debugged policy based routing for special traffic, route filtering with route maps, route redistribution.
  • ConfiguredVLANTrucking802.1Q, STP, and Port Security on Catalyst 6500 switches.
  • Ensurednetwork, system and data availability and integrity through preventativemaintenance and upgrade.
  • Configuring RIP, OSPF and BGP Static Routing on JuniperM and MX series Routers.
  • Performed OSPF, BGP routing protocol administration.
  • Router memory & IOS upgrade with TFTP.
  • Implement Cisco IOS Firewall IDS using 2600 series router
  • Network Assessment and Documentation (including technical, operational, and economic assessment)
  • Responsible for designing and implementation of customers network infrastructure
  • Help negotiate hardware, software, and circuit contracts for customers
  • Redesign customers office copper and fiber cable plant for scalability
  • Build and maintain Visio documentations for Clients

Environment: VLAN, Spanning tree, VSTP, SNMP, Port Security, RIP, OSPF, BGP on Juniper M and MX series, Cisco IOS Firewall IDS using 2600 series, Cisco firewall devices - FWSM, Pix and ASA.

We'd love your feedback!