We provide IT Staff Augmentation Services!

Network Engineer Resume

0/5 (Submit Your Rating)

San Francisco, CA

SUMMARY

  • Over 8 years of experience in the design, implementation, troubleshooting and documentation of LAN/WAN networking systems in Branch, telecommunication and Data Center environments
  • Proficient with network hardware and technologies including routers, switches, firewalls, Ethernet, Fast Ethernet, Gigabit Ethernet.
  • In depth expertise in routing protocols (BGP, OSPF, EIGRP, RIPv1&2), Switching architecture and protocols ( VLAN’s, Truncking and Spanning Tree)
  • Hands - on experience in configuring Cisco routers/ Switches to perform functions at the Access, Distribution, and Core layers.
  • Experience in working with Confidential .
  • Excellent working knowledge of TCP/IP protocol suite and OSI layers.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Implemented traffic filters using Standard, Extended and Named access-lists.
  • Experience in configuring and troubleshooting IPSEC site to site VPN solutions.
  • Working experience with Datacenter Switches such as Confidential 2K, 5K and 7K.
  • Hands-on experience of working on ALU 7705 SAR / 7750 SR, Cisco 2941 MWR/7609,ALU 7670 RSP, Tellabs 8860 and Ericsson equipment.
  • Solid understanding of GSM, UMTS & LTE Network architecture, Call flow and Traffic Engineering
  • Working knowledge of transport connectivity such as T1, CAT5&6 Ethernet, DS1, DS3, Fiber, OC3 and OC12, OC48
  • Responsible for Checkpoint and Cisco ASA firewall administration across our global networks.
  • Expertise in telecom OSS support and integration of new network elements through OSS
  • Experience in Tier- 2 support, BMC Remedy tool, NMS ticketing system, network troubleshooting, handling escalation, Root cause analysis (RCA) and SLA’s
  • Understanding of latest security trends, vulnerability assessment techniques and attacks like DOS and Man in the middle attack
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN, Trunks, VTP, Ether channel, STP, RSTP and MST
  • Proficiency in configuration of VLAN setup on variousCiscoRouters and Switches
  • Implementation of HSRP, VRRP and GLBP for Default Gateway Redundancy
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, AAA(TACACS and LDAP)
  • Experience in trouble-shooting both connectivity issues and hardware problems on Cisco based networks
  • Proven ability in problem-solving, decision analysis, Prioritizing work flow, multitasking and team collaboration and Demonstrated leaderships skills and have ability to lead team if necessary
  • Team player with excellent verbal and communication skills with ability to lead varied team sizes and capable of working with minimum supervision.
  • Experience with F5 Load Balancing.
  • Strong hands on experience on PIX, Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ &RADIUS).
  • Expertise in VOIP protocols like H.323, MGCP, SIP, and SCCP.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.
  • Working Knowledge with monitoring tools like Solar Winds and Network packet capture tools like Wire-shark.
  • Provided 24x7x365 availability and on-call support as required by the projects.
  • Excellent working knowledge of TCP/IP protocol suite and OSI layers.
  • Experience of communicating with customers, solving complex problems in a timely productive manner.

TECHNICAL SKILLS

LAN Technologies: VLAN, VTP, Inter-Vlan routing, STP, RSTP, PVST, IGMP, 802.1x

WAN Technologies: Frame Relay, ISDN, PPP, ATM, MPLS, Channel & Leased lines, SES

WLAN: Autonomous AP’s, Lightweight AP’s, WLC, WDS, WLSE, Standards - 802.11a, 802.11b, 802.11G

Network Securities: NAT/PAT, VPN, Filtering, Load Balancing, IDS/IPS, IPSec, ACL

Firewall: Cisco ASA5585X, ASA5525, ASA5510, Pix525, 535

Devices: Routers (1700, 1800, 2500, 2600, 2800, 3200, 3600, 3700, 3800, and 7200), Cisco L2 & L3 Switches (3750, 3560, 4500 & 6500) Series, Confidential 2k, 5k and 7k’s, Cisco FWSM’s, ASA Firewalls (5510, 5520, 5540 & 5585)

Routing Protocols: RIP, EIGRP, OSPF, BGP

Routed Protocols: TCP/IP, IPX/SPX

Infrastructure Services: DHCP, DNS, SMTP, POP3, FTP, TFTP

Network Managements: SNMP, SSH, Telnet, ICMP, Cisco Works, HP Open-view, Solar Winds, Cyber Ark, Wireshark, NetMRI, VSphere5.0

IP Telephony: VOIP, T1/ISDN/ PRI, Call manager Express, SIP, H.323

Documentation: MS Office, MS VISIO

Scripting Language: Shell scripting, Python

Operating Systems: Windows 10/8.1/ 7 /Vista/XP/NT/2003, UNIX, Ubuntu Linux

PROFESSIONAL EXPERIENCE

Confidential, San Francisco, CA

Network Engineer

Responsibilities:

  • Installation, configuration and maintenance of Palo Alto Firewalls, Cisco ASA firewalls.
  • Deployed and managed Varonis specifically Data Governance, Data Advantage and Data Alert modules in complex environments.
  • Demonstrate the features and benefits of Varonis software to the staff and documented the operations.
  • Used Varonis Data advantage and Data Alert to monitor and analyze and alert file system activities on NAS.
  • Switch experience includes Cisco Catalyst switches: CISCO 3750, 4500, 6500 series switches and Cisco Confidential switches 7000 and 7700 series.
  • Performed Checkpoint firewall upgrade of 50 firewalls from R55 to R65. Administered Juniper 50, 200, 500, and SSG 520 firewalls.
  • Troubleshoot and hands on experience on security related issues on Cisco ASA/PIX, Checkpoint, IDS/IPS, Palo Alto and Juniper Net screen firewalls.
  • Configuration and maintenance of Juniper Net Screen SSG-550.
  • Configured Routers for OSPF, EIGRP, BGP protocols.
  • Hands on experience and Good Understanding of OSPF, BGP, MP-BGP, MPLS-VPN.
  • Configuration and maintenance of OSPF protocol which was the enterprise IGP.
  • Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Creating Stub Areas & configuring Summarization for effective Routing.
  • Using PBR with Route Maps for route manipulation/filtering. Troubleshooting routing issues like suboptimal routing and asymmetric routing.
  • Provided technical support for full setup, debugged the problems of OSPF, switching and HSRP.
  • Switching related tasks included implementing VLANs, VTP and configuring and maintaining multi VLAN environment and inter-VLAN routing on Fast-Ethernet channel.
  • Configured Object Grouping, Protocol Handling and Code up gradation on Palo Alto Firewalls.
  • Conductedvulnerability assessments and generic security scans of both systems andnetworks to identify and mitigate security vulnerabilities using Nessus Vulnerability Scanner.
  • Design, implement and provide second level support for hostload-balancingsolutions at SWA.
  • Working knowledge of the UNIX and CLI based command to implement the networking tools.
  • Configured and monitored Firewall logging, DMZ’s and related security policies.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support.
  • Configuration of ACLs in Cisco 5540 series ASA firewall for Internet Access requests for servers in LAN and DMZ and also for special user requests as authorized by management.

Confidential, Birmingham, AL

Network Engineer

Responsibilities:

  • Implemented Voice VLANS, UDP, SIP, and RTP and provide QOS by DSCP and IP Precedence.
  • Used DHCP to automatically assign reusable IP addresses to DHCP clients.
  • Integrate VoIP with PSTN and setup voice Gateway ensuring QOS for Cisco based Voice over IP and CDR for voice call Accounting.
  • Experience in working with Cisco Confidential 2148 Fabric Extender and Confidential 5000series to provide a flexible Access Solution for datacenter access architecture.
  • Design and implement campus switch network with Cisco Layer 3 switches (3750, 4500, and 6500) in multi VLANs environment and inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Designed MPLS VPN and QoS for the architecture using Cisco multilayer switches
  • Implement Cisco Works 2000 device to manage Cisco routers, switches, PIX and ASA firewall, Access Points, Concentrators.
  • Experience in working with installing Confidential 7010 License upgrade.
  • Experience in installing and configuring Checkpoint NGX R60.
  • Maintain Security policy by monitoring PIX firewalls (515 and 520).
  • Experience working with Network management software NSM primarily to manage the firewalls as well as performing changes as per the requirement.
  • Involved in effective communication with vendors, peers and clients in resolution of problems, equipment.
  • Configuring Vlans, Self IP's& Routes on F5 load balancers.
  • Worked with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs / Routing / NATing with the firewalls as per the design. Primary responsibility is to design and deploy various Network Security & High Availability products like Cisco ASA and other Security Products.
  • Worked extensively on Cisco Firewalls, Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series.
  • Experience with converting PIX rules over to the Cisco ASA solution.
  • Implemented Splunk to drive reporting and search for data collected from Cisco firewall devices - FWSM, Pix and ASA
  • Handling network devices such as Switches (Cisco Catalyst 2900 and 3500 series), Routers (Cisco 2600, 2800 and 7200 series), Firewalls, Load balancers etc.
  • Experience configuring Virtual Device Context in Confidential 7010.
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access
  • Experience working with ASR 9000 series switches with IOS-XR
  • Experience working with design and deployment of MPLS Layer 3 VPN cloud, involving VRF, Route Distinguisher(RD), Route Target(RT), Label Distribution Protocol (LDP) & MP-BGP
  • Functional and Regression Testing.
  • Experience in Configuring, upgrading and verifying the NX-OS operation system.
  • Configuring IP, RIP, EIGRP, OSPF and BGP in routers.

Confidential, Berkeley Heights, NJ

Network Engineer

Responsibilities:

  • Responsible for configuring firewall rules in between DMZ’s, from external vendors to the systems in DMZ’s for TDQ (Test, Development & Quality Analysis) as well as production Environments.
  • Responsible for building and maintaining Private Frame Relay Circuits between Lowes and different banks to ensure secure transfer of the credit card and gift card data.
  • Responsible for building and maintaining site to site VPN tunnels with other business partners based on the business requirements.
  • Designing, implementing and configuring virtual device contexts (vDCs), virtual port channels (vPCs), and virtual routing and forwarding instances (vRFs).
  • Designing, configuring and Handling complaints for intranet and extranet VPNs over MPLS backbone. Checking the connectivity between different locations.
  • Responsible for maintaining DMVPN tunnels from Hong Kong and Mexico to two of the Data Centers in US.
  • Worked on Cisco PIX 500 series and ASA 5500 series Firewall providing support and configuring for NAT, PAT & advanced Firewall rules implementation. IPS on ASA’s with Botnet protection
  • Created dynamic access policies on the ASA’s for the offshore vendors to be able to VPN in and access the resources they needed for their testing purposes.
  • Upgraded the code on multiple ASA’s from 8.2 to 8.4 which required a very great deal of configuration changes especially due to the change of syntax for building NAT’s on 8.4.
  • Planning, designing and implementation of moving multiple DMZ’s on FWSM’s to ASA’s by creating Multi-Context Environments on the ASA.
  • Installing and configuring FWSM and ACE modules on Cisco 6509 distribution switches.
  • Used CyberArk for a small cluster to provide multi-layer security, monitoring and maintaining activities in the network.
  • Maintained security of the cluster by maintaining updated ACL using CyberArk. Creating, Managing and maintaining rules to adhere corporate security standards using checkpoint Firewall
  • Developed shell scripts to automate the maintenance process.
  • Involved in managing and maintaining around 100 + firewall of CISCO PIX, ASA and checkpoint, Netscreen firewalls and Cisco VPN concentrators
  • Installing & Configuring Checkpoint NG AI (R-65) in a standalone environment.
  • Configured Routing protocols such as OSPF, BGP static routing and policy based routing.
  • Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Confidential 7k, 5k and Catalyst 6500 switches.
  • Assisted in planning, designing and implementation of NAC for network access control throughout the Lowes network. Administrated Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trucking using Pap for layer 2 forwarding. Utilize VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.
  • Effectively utilizing complex lab setups to duplicate and solve Enterprise and Cisco Partners voice and video problems as well as possible interoperability issues between Cisco Video and Voice Platforms and third party video and voice platforms. Troubleshooting large video and voice networks on a daily basis, where protocols such as H323, SIP, ISDN are in use.
  • Assisted in migration process of moving Proxy services from Websense to Bluecoat at multiple Lowes corporate locations including Hongkong.
  • Participated in On-call rotation along with just one other person throughout the period of work to provide level 3 support for the OCC on issues related to Firewalls.

Confidential, Reston, VA

Network Engineer

Responsibilities:

  • Planning, designing and implementing high availability solutions with Netscreen & SRX Firewalls (500 & 650 series).
  • Ticketing system (Hp Service Desk) and keeping the customer up-to-date on problem resolution.
  • Planned, coordinated, implemented and supported the 802.11x, VPN over wireless, security, LAN/WAN hardware, software and Internet/Intranet/Extranet integration network connectivity, diagnosed network failures and resolved any problems.
  • Configuring the VLAN and enabling IP routing in order to allow restricted connections from the enterprise network for some resources.
  • Configuring the Cisco 3650 Layer 3 switches & HSRP for redundancy.
  • Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
  • Configured Intrusion detection, logging and reporting of all suspicious activity.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
  • Installing and Configuring F5 load balancer in failover mode.
  • Managing Servers using Hardware Load balancer F5and Cisco ACE load balancer by managing internal customized tools and creating of SSL and Digital Certificates.
  • Provided support for teams in activities such as Load testing, troubleshooting, and performance tuning.
  • Creating, Managing and maintaining rules to adhere corporate security standards using checkpoint Firewall.
  • Study the single point failures and design the WAN structure in such a way that there are no failures in the Network in case of any device or link failure.
  • Multi-user support, system integrations and PCI ASV scanning to Nessus in an easy-to-deploy cloud-hosted package.
  • Designing and configuring LAN in Cisco 3 tier architecture (Core, Distribution and Access)
  • Configuring 2960 switches as the distribution and access switches, the access level switches will be extended from distribution layer.
  • Working on Cisco ACS, Cisco works, HP NNMI tools for ticketing system and authentication.
  • Installed and supported UNIX servers at 20+ departments
  • Configuring a VPN server on Cisco ASA for the ODC users to work remotely.
  • Utilized Sniffer, Observer & Solarwinds Bandwidth for Network Monitoring.

Confidential

Network Engineer

Responsibilities:

  • Upgraded Cisco 7200, 3600 Router IOS Software, backup Routers and Catalyst 3560, 4500 switch configurations
  • Installed and managed Cisco Catalyst 3500XL, & 2960 series Switches and Cisco 1800, 3900 series routers
  • Involved in all technical aspects of LAN and WAN projects including, short and long term planning, implementation, project management and operations support as required
  • Configuring RIP, OSPF and BGP Static Routing on Juniper M and MX series Routers.
  • Conducted thorough analysis, problem solving, and infrastructure planning
  • Configured RSTP, LACP, VTP on Confidential devices.
  • Provided assistance to Network Manager and served as Secondary Network support.
  • Involved in Troubleshooting and fixing any backup and monitoring systems related issues in conjunction with Systems team and external vendors.
  • Configured Remote Access Servers with Frame Relay, Leased Line circuits
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems. Implementation of name resolution using WINS&DNS in TCP/IP environment
  • Administration of Cisco 11.x and 12.1 versions and higher
  • Monitored all Cisco equipment’s using Cisco Works
  • Involved in SNMP Network management. Worked on various scanning and Sniffing tools like Ethereal
  • Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity.
  • Upgrades and backups of Cisco router configuration files to a TFTP server
  • Implementing and maintaining backup schedules as per the company policy
  • Configured VLAN Trucking 802.1Q, STP, and Port Security on Catalyst 6500 switches.
  • Ensured network, system and data availability and integrity through preventative maintenance and upgrade.
  • Implemented Splunk to drive reporting and search for data collected from Cisco firewall devices - FWSM, Pix and ASA

We'd love your feedback!