Sr. Network Engineer Resume
Dover, NH
SUMMARY
- Seven years of hands on experience in network engineering, designing, integrating, deploying, maintaining and supporting broad range of communication systems.
- Experienced configuring Virtual Local Area Network (VLAN), VLAN Trunking Protocol (VTP), Dynamic Trunking Protocol (DTP), Spanning Tree Protocol (STP), RSTP, MST and Per VLAN Spanning Tree (PVST), Virtual routing and Forwarding (VRF).
- Implemented MPLS/VPN services for various customers.
- Experience in Layer 3 Routing Protocol configurations: RIP, OSPF, BGP, EIGRP and MPLS.
- Experience in Layer 2 routing Protocol Configurations: ARP, RARP, ATM/FRAME RELAY and VPN technologies: IPSec & SSL.
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
- Experience in designing, implementing and Managing LAN, WAN solutions for different client setups.
- Checkpoint - R60/R65/R70/R75 software version with hardware Checkpoint 11000, 21000 series with VSX environment.
- Checkpoint software Blades (IPS, Anti-Bot, Anti-Virus, Identity Awareness and DLP) with managed by Checkpoint Checkpoint smart dashboard in smart domain manager/Provider-1 environment & separate Syslog servers.
- Supporting and troubleshooting Checkpoint/Cisco site-to-site VPN/IP Sec functionality.
- Experience on working, implementing, configuration and managing Juniper SA 2500/4500/6500 SA devices with secure access services 7.1/8.0.
- Checkpoint VPN-1/ Firewall-1, IPSO, SPLAT and GAIA initial setup on open servers, Nokia devices, Crossbeam/Checkpoint hardware devices.
- Implemented traffic filters on CISCO routes using Standard Access List and Extended Access list.
- Experience with installing and managing IT services such as Active directory, site replication, DNS, SSH, DHCP, DNS, NAT and Terminal service.
- Handled Load Balancing using F5 Networks.
- Experience in configuring Virtual Local Area Network (VLAN), spanning tree protocol (STP), VLAN Trunking Protocol (VTP), Dynamic Trunking Protocol (DTP), Per VLAN spanning Tree (PVST) and 802.1x authentication in access layer switches.
- Strong knowledge in HSRP, VRRP redundancy Protocols.
- Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
- Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
- Access control server configuration for RADIUS & TACAS+.
- Experience with 802.11x wireless technology.
- Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.
- Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248)
- Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
- Excellent communication skills with ability to interact effectively with employees at all level of the organization.
TECHNICAL SKILLS
Hardware: Cisco Switches (2900, 2924, 2950, 3550, 5500, 6500, 6509, 6513), Cisco routers (2600, 2800, 3640, 3700, 3825, 7200, 7204, 7206), Cisco PIX 500 series, CSU’s/DSU’s, Catalyst 6500, 7600, 4500, Juniper M320 and T640 routers.
Firewalls and Sniffers: Cisco PIX, FWSM, ASA, Juniper firewall NS50,SSG 550M, Check Point, OPNET, WIRESHARK
Protocols: RIP, RIP2, PPP, OSPF, EIGRP, IS-IS, BGP, SNMP, HTTP, FTP, TFTP, HTTP, DHCP, SMTP, ICMP
WAN Protocols and Technologies: HDLC, PPP, ATM, FRAME RELAY, IDSN, Metro Ethernet
LAN Technologies: Ethernet, TCP/IP, CDP, STP, RSTP, VTP, VLAN, Trunks, Ethernet channel, MPLS.
Redundancy Protocols: HSRP, VRRP, GLBP, RPR, RPR+, NSF-SSO.
Servers: Domain servers, DNS servers, WINS servers, Mail Servers, Proxy Servers, Print Servers, Application servers, FTP Servers
Operating Systems: Windows 2000/2003/2008 , windows XP/7, LINUX, Redhat, UNIX, Macintosh
Anti-Virus & Internet Security: MacAfee, Symantec, Trend-Micro & e-Trust.
PROFESSIONAL EXPERIENCE
Confidential, Dover, NH
Sr. Network Engineer
Responsibilities:
- Worked on Converting the Partner IPSEC VPN from one Data Center to Another Data Center.
- Experience working with Nexus 7010, 5020, 2148, 2248 devices
- Worked on Juniper J series j230, M 320 routers and EX 3200 series switch.
- Coordinated precise scheduling for all migration events including all equipment and resources for the data center migration on an extremely accelerated schedule with for a high profile client.
- Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
- Working experience on upgrading Checkpoint old devices/Software to new platforms like R70 to R75.20.
- Worked on Juniper J series j230, M 320 routers and EX 3200 series switch.
- Troubleshooting application and network traffic on Checkpoint smart view tracker along with FW monitor and TCP dumps on CLI based.
- Working on smart view monitor get statistics for the checkpoint hardware/software CPU’s, memories and overall health of the devices.
- Migrating Cisco ASA firewalls policy to new Checkpoint appliance with support of vendor specific tool.
- Managing URL Content Filtering on Websense Proxy.
- Adding exemption, editing policy groups on Websense Management Server.
- Adding/removing ARM bypass rules on Websense appliances.
- Perform Firewall OS upgrades using CLI, Splat and Voyager GUI.
- Backup and restore of checkpoint Firewall policies.
- Experience on designing and troubleshooting of complex BGP and OSPF routing problems,
- Convert Branch WAN links from TDM circuits to MPLS
- Experience with Network Redesign of branch and Campus Networks. This includes changes to both the voice and data environment.
- Configured application load balancing using F5 LTM.
- Experience with configuring VIP, Pools on F5 LTM and working with irule management on LTM
- Assisted campus for VOIP network management and troubleshoot
- Set up network connectivity for Cisco training.
- This involved connecting the routers, switches and firewall physically and loading them with a base configuration.
- It also involved connecting the PCs to the network and providing Internet connectivity
- Worked on Data, VoIP, security as well as wireless installations and technologies
- Complete understanding of feature testing of switches (RFC 2889 and RFC 2554) using IXIA's IP testing system.
- Replace branch hardware with new 2851 routers and 2960 switches.
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
- Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture
- Experience configuring Virtual Device Context in Nexus 7010
- Experience in Configuring, upgrading and verifying the NX-OS operation system.
- Experience in design and implementation of new branch test and turn up.
- Implementing & Troubleshooting of T1, MUXES, CSU/DSU and data circuits.
- Involved in designing and implementing QOS and policy map to 2800 series routers for all the branches
- Experience Branch Relocation: Connect workstation, servers, etc. Rack and stack Pre-configured new hardware and connect the circuits.
- Work with Carrier to test and turn-up circuits.
- Manage and provide guidance to junior members of the team.
- Experience with Project documentation tools & implementing and maintaining network monitoring systems and experience with developing network design documentation and presentations using VISIO
- Developing and testing the Customer Network Management System (CNMS) R6.0/7.0 as network performance FCAPS utility.
- Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment
- Involved in configuring IP Quality of service (QoS)
- Involved in Datacenter build and support, Implementation, migrations network support, Interconnectivity between an old Datacenter and new Datacenter.
- Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
- Installed new purchased Hardware to the new DC, Migrate data over WAN connection, also greatly involved in virtualization of physical servers.
- Contact determining a list of application for the migration, Stakeholder management, vendor management, and change management.
Environment: Router 2900, 3900; Cisco Catalyst Switch 3550, 2960. T1 Controllers, Juniper J series, Checkpoint R70 to R75.20, Cisco ASA,DS3 Lines (T3 Lines), Fiber and Ethernet cabling.
Confidential, Winston-Salem, NC
Sr. Network Engineer
Responsibilities:
- Implemented LAN/WAN utilizing CISCO 7200, 7204, 7206.
- Configured Routing Protocols such as OSPF and policy based routing.
- Design OSPF Areas for reliable Access Distribution and for Core IP Routing.
- Fine-tuned OSPF metrics to avoid routing loops and ensure redundancy in case of link failures.
- Redistribution of routing protocols and Frame-Relay configurations
- Implement and manage all the firewalls in smart domain manager/Provider-1 with CMA to organize enterprise and remote locations.
- Managing URL Content Filtering on Websense Proxy.
- Adding exemption, editing policy groups on Websense Management Server.
- Adding/removing ARM bypass rules on Websense appliances.
- Perform Firewall OS upgrades using CLI, Splat and Voyager GUI.
- Backup and restore of checkpoint Firewall policies.
- Monitoring, maintaining, and implementing security policies on Cisco firewalls.
- Change Management: Need to make sure that all the change designs and implementations are completed and tested as per the schedule required by the customers.
- Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
- Migrated to R75.xx in various Checkpoint 4k/11k/21k appliances from R65, R62, R60, etc., and building the new Smart Center server.
- Implemented SNMP on Cisco routes to allow for network management
- Implementing NAT solutions on CISCO IOS routers.
- Network Migration from RIP to OSPF
- Implementation and configuration of VPN Tunnels.
- Configuring VLAN trunking Protocol (VTP) on core switches.
- Configured HSRP and VLAN trunking 802.1Q, VLAN routing on catalyst 6500 switches.
- Maintained a Network with more than 600 Network devices, some 20,000-end hosts, and the other Network devices like DHCP, DNS Servers, and Firewall Servers.
- Implementation of TCP/IP and related services - DHCP/DNS
- Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
- Study single point failures & design WAN structure in such a way that there are no failures in network in case of any device or link failure
- Cisco IPT Migration Projects from legacy PBXs with Nortel.
- Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between switches
- Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.
- Load Balancing using F5 Networks Big IP
- Setup simplified and traditional VPN communities and CISCO Anyconnect.
- Installed and configured Routers, Bridges, Terminal Servers and CSU/DSU’s to support WAN links
- Work with application developers and systems engineer to migrate applications and systems to a new Border Gateway network.
- Installed and configured CISCO ASA and Checkpoint firewall.
- Leveraged two Nexus 2232 Fabric Extenders and two 2248 Fabric Extenders, making them ‘dual-homed’ to both N5Ks and implementing Enhanced Virtual Port-Channel (EvPC).
- Involved smart view tracker to check the firewall traffic.
- Documented all the work done by using MOPS, Visio, Excel and MS word.
Environment: Cisco 3750/3550/3500/2960 switches and Cisco 12000/7200/3845/3600 routers, Cisco ASA5510, Checkpoint.
Confidential, Richmond, VA
Network Engineer
Responsibilities:
- Responsible for the implementation and maintenance of firewall based security zones (DMZ*s).
- Provide support to internal project teams by adding firewalls, switches and routers to managed DMZs.
- Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.
- Implementing & Troubleshooting of T1, MUXES, CSU/DSU and data circuits.
- Experience on designing and troubleshooting of complex BGP and OSPF routing problems,
- Have sound knowledge of Firewall architecture, routing and VPN.
- Have experience working on HP Open view Network Node Manager.
- Upgrade firewalls in accordance with change management & Document changes to firewalls.
- Monitor traffic and access logs in order to troubleshoot network access issues.
- Have experience with CiscoWorks LAN Management Solution.
- Experience in migration of Frame-relay based branches to MPLS based technology using multi layer stackable switch like 6500 series and 2800 series router.
- Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.
- Hands on experience with Cisco 3500, 3750, 4500, 6500 series equipment and configuring and deploying and fixing them with various modules like Gig card, VPN SPA card, WIC card.
- Cisco IOS experience on 3600/7200 class hardware in complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data centre environment.
- Involved in configuring IP Quality of service (QoS).
- Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.
- Experience in designing, installing & configuring of Cisco PIX, ASA & FWSM (Firewall service module).
- Evaluate, Analyze & Implement firewall policies to meet business requirements
- Experience in creating and maintaining firewall configurations, updating documentation and log analysis.
- Applying crypto maps and security keys for the branches, ISAKMP (Internet security association key management protocol) for establishing Security associations (SA) cryptographic keys.
- Experience in configuring routing protocols like EIGRP, RIP v2, OSPF & BGP and Cisco ACS protocols like RADIUS and TACACS.
- Experienced in WAN environments, installing and troubleshooting data circuit problems (MPLS, T1).
- Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment.
- Involved in designing and applying QOS and policy map to 2800 series routers for all the branches.
- Involved in designing GRE tunnels for encryption of data flow from source to destination.
- Implementing VoIP solutions using SIP & H.323, also have sound knowledge of Avaya VoIP products.
- Experience in configuring VLAN’s STP (Spanning tree Protocol) & RTSP (Rapid Spanning Tree Protocol).
- Experience with Project documentation tools & implementing and maintaining network monitoring systems (Cisco works & Netinfo, Infoman Virtual Change) and experience with developing network design documentation and presentations using VISIO.
- Understanding & Implementation of IPSEC & GRE tunnels in VPN technology.
Environment: Router 2800, 3800, 7200, 7600; Cisco Catalyst Switch 6500, 6509, 3550
Confidential
Network Engineer
Responsibilities:
- Maintaining the Network Infrastructure, Installation, migration and configuration of routers and switches for clients.
- Provide alternative means from dial-up connection to bring down the damage or loss that occurs for the client.
- Configured Routing protocols such as OSPF and policy based routing.
- Team member of Configuration ofCISCO7206 router and Configuration of Catalyst switches.
- Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
- Create and testCisco router and switching operations using OSPF routing protocol.
- Configuration and troubleshooting link state protocols like OSPF in multiple areas.
- Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
- Optimized performance of the WANnetworkconsisting of CISCO 3550/4500/6500 switches by configuring VLANs.
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
- Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
- Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
- Configured IP access filter policies.
- Providing Technical Support and solutions forNetwork Problems.
- Implementing NAT solution's on Cisco IOS routers.
- Upgrading IOS, troubleshootingnetworkoutages.
- Worked on Cisco Routers, Active /Passive Hubs, Switches.
- Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel.
- Design and implemented network infrastructure and configured all the network Infrastructure devices including Network Printers and Registers.
Environment: Cisco 3550/4500/6500 switches and Cisco 2500, 2600, 3000, 6500, 7500, 7200 routers, Checkpoint.
Confidential
Network Engineer
Responsibilities:
- Worked as part of a team for Cisco Product Support. Troubleshooting by providing relevant knowledge base articles and other information.
- Network solutions for complex networks for VAR (Value added resellers) users of Cisco.
- Configured & maintained LAN, WAN, VPN, WLAN, and Firewalls on Cisco Routers for end users.
- Configuring MPLS, VPN (IPSEC, GRE) in VPN concentrators and QOS in integrated networks (Data, Voice, and Video).
- Installed and configured of Juniper J-Series (J2350) and M-Series (M10) routers.
- Installed and configured the ACE and CSM for firewall/Server Load balancing for Cisco Catalyst switches.
- Configuring IPS, IDS, VLAN, STP, Port security, SPAN, Ether channel in Cisco Composite Networks.
- Configured routers and modems, troubleshot issues related to broadband technologies for Residential and Business Customers.
- Apache Web Server & MRTG, BIND DNS Server configuration and optimization over UNIX and Active directory implementation of Windows 2003 Server.
- Configured & Maintained Cisco 2600, 2800, 3200 series routers including IOS upgrades.
- Prompt technical support to customers on routers and switches.
- Remote management of large networks.
Environment: Cisco Routers - 1700, Cisco GSR 12416. Cisco Switches - 1900, 6509, and 6513