We provide IT Staff Augmentation Services!

Network Security Engineer Resume

0/5 (Submit Your Rating)

Louisville, KY

SUMMARY

  • Versatile and dynamic Cisco Certified network engineer, having 6+ years of extensive hands - on experience on configuring, upgrading and troubleshooting various types of Network and Security devices over large scale Enterprise Networks.
  • Hands-on Experience in configuring and troubleshooting firewalls like Palo Alto, Cisco ASA, Checkpoint, Juniper SRX .
  • Hands on experience on implementing User ID, custom App-ID, URL filtering, SSL decryption and optimized security rules as per requirements.
  • Implemented centralized management system, Panorama to manage large scale firewall deployments.
  • Configure Stateful Failover of Palo Alto/ASA firewalls (Active/Active & Active/Standby) for high availability (HA).
  • Implemented Zone Based Security NAT/PAT policies on the Palo Alto Firewall.
  • Implemented IDS/IPS on tap/span port to mitigate in-line and out-of-band threats and vulnerabilities.
  • Hands on experience in configuring tunnels like GRE, VPN like IPSec and DMVPN on Palo Alto firewalls.
  • Configured Global Protect gateways for LSVPN and enable SSL to set up site-to-site VPN between Palo Alto firewalls and other devices .
  • Analyzed Logs to mitigate various attacks like DDOS, DoS, Zero-Day threats and notifications by using FireEye as well as WildFire on Palo Alto Firewall appliance.
  • Configured ACS(Access Control Server) to allow access for multiple network devices and firewalls using TACACS+ and RADIUS.
  • Successfully upgraded 50+ firewalls from Checkpoint R65 to R77.20 Gaia across the globe.
  • Experience in adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications.
  • Worked on migration of existing PIX firewall to ASA firewall.
  • Capable of configuring, monitoring and resolving issues with Juniper SRX firewalls.
  • Experience in configuring and troubleshooting F5 load balancer in the enterprise network.
  • Configure and implement remote access solution for customers via P2P GRE tunnel over IPSec.
  • Proficient on configuring Routing like OSPF, EIGRP, BGP on Cisco 72XX,76XX and Juniper 7320.
  • Hands on experience with switching Protocols like VLANs, Trunking, VTP, STP, PVST, RSTP, PPP, PAP, PPTP, ICMP, IGMP, CHAP and Port Security.
  • Well versed with redundancy protocols like HSRP, VRRP and GLBP.
  • Experience in installing and configuring for DNS, DHCP server.
  • Well-Versed on configuring and troubleshooting Nodes, Pools, Profiles, Virtual Servers, SSL Certificates, iRules and SNATs on the F5 Big IPs using Web GUI and CLI.
  • Analyze traffic patterns using Monitoring and Sniffing tools like SolarWinds, Splunk ES, Wireshark, and Tcpdump to mitigate Cyber attacks like DoS and DDoS.
  • Deployed Bluecoat Proxy SG and Cisco WSA servers for web filtering.
  • Proficient in understanding Application level vulnerabilities like XSS, SQL Injection, CSRF, authentication bypass, cryptographic attacks, authentication flaws.
  • Strong experience in Black box, White box, responsive design and usability and exploratory testing, PKI (Public key Infrastructure) Encryption algorithms.
  • Experience with Change management process and Project documentation tools like Excel and VISIO
  • Good knowledge of OSI Model and TCP/IP networking standards with protocols such as SNMP, FTP, ICMP and IPv6.
  • Extensive Experienced with Symantec DLP and RSA DLP architecture and implementation for enterprise level.
  • Have extensive experience in setting up LAN, WAN and troubleshooting related issues.
  • Working on VMware vSphere to virtualize the server and expand resources as business needs.
  • Effective inter-personal skills, adaptive to any environment, keep abreast with the latest technologies and delivering solutions as an individual and as part of a team.
  • Experience in migration of data to cloud environment. Good working knowledge of Azure and AWS.
  • Expertise in customizing Splunk for Monitoring, Application Management, and Security as per customer requirements and industry best practice.

TECHNICAL SKILLS

Firewall Technology: Palo Alto Series -2k,3k,5k,7k, Checkpoint(NGX,NGAI), Cisco ASA,PIX 535 Juniper, Fortinet, Fortigate.

Network Security: ACL, IPsec, VPN, Port-security, RSA, AAA and IPS/IDS

Virtualization: Wire shark, FireEye, Fiddler, Microsoft Network Monitor, Solar Winds, Solaris, Cisco Works Guardium 8.0 NetScout and NMAP.

Router Platform: PA- 3060,PA-5060,PA-7050,Cisco 2811, Cisco 6509-E (Multi-layer Switch), Cisco7200, Cisco3800, Cisco 3640, and Cisco 3745

Routing Protocols: EIGRP, OSPF, BGP, RIP & IGRP

Switches: Cisco Multi-layer Switch 6500, Catalyst 4500, Catalyst3750, Catalyst2900 and Catalyst 3500XL, Catalyst 6500, 4500, 4900, 3750, 3500, 2900.

Switching protocols: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast Operations, Layer 3 Switches, Ether channels, Transparent Bridging, Data Center Switching, vPC, VDC, OTV, RBAC.

Infrastructure Services: DHCP, DNS, SMTP, FTP, TFTP, IIS

LAN Protocol: FHRP, HSRP, GLBP, VRRP, VLAN, STP, VTP, Ether Channel, Trunks.

WAN Technology: Frame Relay, ISDN, PPP, HDLC, ATM

Fiber optics: FC patch cable Assemblies, Testing with ODTR and troubleshooting.

PROFESSIONAL EXPERIENCE

Confidential, Louisville, KY

Network Security Engineer

Responsibilities:

  • Administration of Palo Alto Network Device, Configuration of New Access Policy, Firewall Rules, QOS Rules, User ID agents, Threat Policy.
  • Responsible for monitoring Large scale deployments of Palo Alto firewalls on our global network using centralized management system Panorama.
  • Implemented firewall rule to set migration for Cisco ASA to Palo Alto.
  • Configured SNMP on Palo Alto firewalls 3060, 5060, 7050 for receiving incident alerts and notification and wrote SSL decryption policies for decryption of traffic to provide Anti-virus, Malware protection.
  • Software Upgrade for Palo Alto Devices and Integrating of Active Directory/LDAP with Palo Alto Next Generation Firewalls.
  • Implemented User ID, custom App-ID and security policies for various Palo Alto series.
  • Troubleshot and resolved router, switches, and network issues by analyzing packet captures, at bit level, with Wireshark.
  • Implement URL filtering, SSL decryption to optimize the security as per customer’s requirement.
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
  • Conducted application penetration testing over various business applications.
  • Administer 15 different VPN tunnels with varied crypto environments, including ISAKMP pre-shared keys and IKEv2 certificate profiles.
  • Configuring High Availability(HA) on Palo Alto/Checkpoint as well as VRRP and monitor the Sync status for stateful replication of traffic between active and standby member.
  • Configured Radius,TACACS, LDAP, Kerberos servers to ensure secured login remotely when required.
  • Hands-on experience on migrating from ASA, Checkpoint into Palo Alto .
  • Worked on Blue Coat Proxy SG to safeguard web applications in extremely untrusted environments such as guest Wi-Fi zones.
  • Analyzed logs on Splunk, as well as Threat Intelligence analysis using Wireshark, Arcsight, and FireEye .
  • Create incident tickets with the Palo Alto Networks TAC/ServiceNow to troubleshoot and diagnose cases .
  • Enhanced Conventional incident response methods and Security Operations by employing and combining Intrusion Prevention, Cyber kill chain model analysis, and Cyber Threat Analysis.
  • Proficient in understanding Application level vulnerabilities like XSS, SQL Injection, CSRF, authentication bypass, cryptographic attacks, authentication flaws.
  • Strong experience in Black box, White box, responsive design and usability and exploratory testing, PKI (Public key Infrastructure) Encryption algorithms.
  • Hand-on experience in technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, VPN, Wireless LAN and VLANS.
  • Upgraded and updated Cisco IOS from 12.3T to 12.4.
  • Used to DHCP to automatically assign reusable IP addresses to DHCP clients.
  • Contract F5 product-specific technologist role, implement the Design with Engineering team.
  • Ensuring End-to-end design, ownership, and delivery of LTM and GTM load balancing solutions built to customer specifications and which meet project delivery goals and timelines.
  • Support and maintain Splunk enterprise environment in a highly available, redundant, geographically dispersed environment.
  • In-depth knowledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.

Environment: Palo Alto firewalls 3060, 5060, 7050, Cisco ASA5510, Checkpoint, Cisco routers: 2800,3600,3640,3845,7200 and Cisco switches: 3750,3550,3500,2960, Wireshark, WildFire,FireEye, Panorama, SolarWinds, BPDU Guard, Root Guard, Radius, Tacacs, LDAP, Kerberos, TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, NAT,Frame Relay, VPN, Wireless LAN, LTM, GTM, User-ID, App-ID,URL Filtering, VLSM, Proxy ARP,ping SSL/TLS, IPsec, SSH,Splunk ES .

Confidential, Chicago, IL

Network Security Engineer

Responsibilities:

  • Configured, Installed and upgraded Palo Alto and Checkpoint Firewalls for managed client which included network/resource access, software, or hardware problems.
  • Integrated Panorama with Palo Alto firewalls, for managing multiple Palo Alto firewalls with single tool.
  • Configuring and troubleshooting remote access and site to site VPN in Palo Alto Firewalls.
  • Update and configure App-ID, User-ID and Zones based on traffic pattern .
  • Implement various policies like NAT, QoS, Decryption, DoS protection in Palo Alto as per requirement.
  • Build and configure Active/Standby, Active/Active for High Availability (HA) Failover on Palo Alto with stateful replication.
  • Analyzed traffic pattern and implemented URL filtering using the Palo Alto Firewall.
  • Global Traffic Manager (GTM) designs providing multi-site load balancing and global availability of generic hosts and/or LTM virtual servers, iQuery-based monitoring of LTM virtual servers .
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewalls and centralized GUI Panorama.
  • Performing URL filtering and content filtering by adding URL's in Bluecoat Proxy SG's and in Palo Alto.
  • Experienced with common encryption schemes such as symmetric/asymmetric encryption, hashing, SSL/TLS, IPsec, SSH etc.
  • Using open SSL commands to troubleshoot issues related SSL certificates.
  • Wireshark is used to capture packets to analyzed, troubleshot and resolved router, switches, and network issues .
  • Ensure dynamic updates are up-to-date for antivirus, apps & threats, wildfire.
  • IPsec and ISAKMP protocols with MD5 and SHA hash algorithms for safe transport of sensitive information.
  • Troubleshooting on the network issues using firewall logs, Running TCP DUMP.
  • WildFire, FireEye tools are used for the notification and prevention of Zero-Day threats.
  • Ana Splunk enterprise environment in a highly available, redundant, geographically dispersed environment.
  • Performed Log analysis using Splunk on SIEM as well as use Kali Linux environment and effectively neutralized DOS, DDOS, XSS and SQL Injection Attacks.
  • Conducted onsite penetration tests from an insider threat perspective.
  • Strong experience in Black box, White box, responsive design and usability and exploratory testing, PKI (Public key Infrastructure) Encryption algorithms.
  • Analyzed malware behavior, network infection patterns and security incidents.
  • Perform Splunk agent deployment, configuration and troubleshooting across a variety of platforms.
  • Experience with Splunk technical implementation, planning, customization, integration with big data and statistical and analytical modeling.
  • Migrated company from Exchange 2003 to Exchange 2010 using VMware Sphere 4.1 Virtualization
  • Implement and manage load balancing using F5 GTM load balancers.
  • Provide consulting services to customers recommending best practices for their security posture and their environments.
  • Configuring BGP/OSPF routing policies and designs, worked on implementation strategies for the expansion of the MPLS VPN networks.
  • Implemented and administered Web sense Web Security Gateway for web content filtering and DLP.
  • Coordinating with Security team for NAT configuration and troubleshooting issues related to access lists and DNS/DHCP issues within the LAN network.
  • Managed inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, NTP.
  • Actively involved in resolving network tickets pertaining to IP Phone VLAN and IP Helper address, Adding Secondary IP address to the existing VLAN, High CPU Utilization.
  • Hands-on experience in configuring and troubleshooting protocols like OSPF, EIGRP, RIP, MPLS, LDP, BGP, BGP v4. Configured IP access filter policies.
  • Configured features on SolarWinds to help gather data on traffic patterns.

Environment: Palo Alto firewall series-PA-2k,3k,5k,7k,CiscoASA-5510, Checkpoint, Panorama,Cisco switches: 3750,3550,3500,2960,Cisco routers: 2800,3600,3640,3845,7200, Wireshark, WildFire, Tcpdump, Tufin, Sourcefire,Arcsight,SNMP,ACL, IPSec, IDS, ISAKMP,PKI, SSL/TLS, IPsec, MPLS, EIGRP, OSPF, RIP, HSRP, VLAN, VRRP, GLBP,SSH,DNS,DHCP,UTM,VMware.

Confidential, Atlanta, GA

Network Engineer

Responsibilities:

  • Monitored network performance to improve the backup strategy using Splunk.
  • Maintained and Troubleshot IP connectivity problems using PING, and Trace route utilities and packet capture tools such as Wireshark.
  • Configured and administered Cisco Routers 7200/3900/2900 as well as Cisco Switches 6500/3750/3550.
  • Configured 802.1q Trunk Link encapsulation and Ether channel using LACP in Corporate LAN Environment.
  • Implemented network security for remote access by configuring site -to- site and clients- to- site VPN tunnels through multiple Cisco VPN concentrators and Checkpoint firewalls and maintained access policies for remote users.
  • Deployed Cisco ASR9000 series Routers for MPLS in Data Centers.
  • Experience with converting Cisco ACE load balancer to F5 LTM load Balancer in data center environment.
  • Maintained secure connection using SSH and making authentication MD5, Plain text in routing protocols like EIGRP, OSPF, RIP, HSRP, VRRP, GLBP.
  • Worked on checkpoint UTM, VPN and activated blade licenses to be used as Intrusion prevention and antivirus appliance.
  • Configured and Deployed BIG-IP LTM 8900 for providing application redundancy and load balancing.
  • Configured NAT and Simple Network Management Protocol (SNMP).
  • Experience in troubleshooting VLAN, STP (Spanning tree protocol), & Switch Trunk and IP subnet issues.
  • Experience creating and maintaining Splunk reports, dashboards, forms, visualizations, alerts.
  • Real- time monitoring of the network devices using Solarwinds Network monitoring tools Orion.
  • Experience in Risk Assessment and analysis of Vulnerabilities & Threat and their impacts in the business.
  • Scheduled proposed network changes and worked with major business units to identify their impact. Familiar with Content Filtering, SNMP, Solar Winds and Cisco-works.

Environment: Cisco routers: 2800,3600,3640,3845,7200, Cisco switches: 3750,3550,3500,2960, PaloAlto firewall series-PA-2k,3k,5k,7k,CiscoASA-5510, Checkpoint, Panorama, Wireshark, WildFire, Tcpdump, IDS, Arcsight, Cisco ACE load balancer, VLAN, STP,PAT,NAT, BIG-IP LTM 8900, MPLS, EIGRP, OSPF, HSRP, VRRP, GLBP, UTM1, VPN, Trunk Link encapsulation-802.1q,SSH,MD5.

Confidential

Network Engineer

Responsibilities:

  • Monitoring various cellular operator’s voice and data traffic that passes through the gateway in network operation center(NOC).
  • Analyze the traffic pattern and create various KPI reports for better performance.
  • Provide Tier III Level Load Balancer expertise on F5 BigIP Local Traffic Managers (LTM).
  • Designing F5 solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BigIP Load Balancers.
  • Troubleshoot and repair of local area network outages using Fluke Optiview, Telnet, Sniffer, Ping, Trace Route and Internet Technologies.
  • Hands on experience by configuring and troubleshooting of routing protocols: MP-BGP, OSPF, MPLS, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Solarwinds features were configured to analyze data on traffic patterns.
  • Installed Licenses, Certificates, and Upgraded the existing code on Cisco 3750 Switch, and Aruba 7010 Standard, Extended, and Named Access Lists(ACL) to allow users all over the company to access different applications and blocking others.
  • Deployed Netflow Controller.
  • Configured Switching Protocols(RPVST+,VTP, Portfast, BPDU Guard, UDLD), and Macros on Cisco 3560, 4500 Platforms.
  • To ensure high availability(HA) of system resources to the end users and to maximize the uptime of doing the necessary work to diagnose, detect and rectify the faults in time.
  • Monitoring & Troubleshooting Cisco core Routers (7200, 3600, 1700 and 1600) and Switches (Cisco 2900, 6500, 3500, 3700 and 3Com Switches).
  • Coordinating the technical activities with their vendors & Telco to keep the systems and network uptime to 98% and submission of monthly reports on the project.
  • Identify missing neighbor relations and performing neighbor optimization to improve retain ability KPI.
  • Created wireless LANs and configure interface associated with it as well as security parameters.
  • Configured and troubleshoot Juniper Servers as per customer’s requirement.
  • Work with PHP, Perl, Python, Shell scripting, Cisco Internetwork Operating System (IOS) and Red Hat/Centos/Kali.
  • Assure IP allocation for dynamic and static assignments.
  • Isolate and repair basic routing, translations, and circuit related issues on a predominately VoIP, SIP, and IP based Network.

Environment: Cisco routers: 7200, 3600, 1700,1600, Cisco switches: 2900, 6500, 3500,3560, Macros, 3700,4500, 3Com, Tcpdump, VLAN,ACL STP,PAT,NAT, BIG-IP, LTM 8900, MPLS, EIGRP, OSPF, RIP, HSRP, VRRP, GLBP, UTM1, VPN RPVST+,VTP, Portfast, BPDU Guard, HA, UDLD, F5 BigIP, Telnet, Netflow, Sniffer, Ping, Trace Route,NOC,SOC, Aruba 7010, IDS/IPS, PHP, Perl, Python, Shell scripting,IOS,Linux, VoIP,SIP.

We'd love your feedback!