We provide IT Staff Augmentation Services!

Lan/wan Network Engineer Ii Resume

0/5 (Submit Your Rating)

Austin, TexaS

SUMMARY

  • CCNA / CCNP Certified & AWS (Amazon Web Services) Certified Network Engineer with over 8 years of experience in Networking and Security, Administered & Designed LANs, WAN internet/intranet with strategic budgeting for upcoming projects.
  • Experience with the escalation problems &point - of-contact for Routing, Switching and WAN connectivity issues
  • Responsible for service request tickets generated by the helpdesk in all phases as troubleshooting, maintenance, upgrades, patches with all around technical support.
  • Worked in Check Point, Palo Alto and Cisco ASA firewall across global networks.
  • Worked onCisco& Juniper routers/switches in complex environments with multiple ISPs.
  • Experience working onCiscoCatalyst Series3750, 4500, 4900, 6500; Nexus 2000, 5000, 6000, 7000 and 9000 series switches.
  • Configured and Troubleshoot on different protocols like Static, EIGRP, BGP, OSPF, VLAN, DMZ, MPLS, HSRP, VRRP, NAT, VTP & IPSEC
  • Experience inCisco7200, 3800, 3600, 2800, 2600, 1800 series Routers andCisco2900, 3500, 4500, 5500, 6500 and Nexus 5K series switches and Sound knowledge of Routing and Switching concepts and MPLS design.
  • Worked in Network Automation, specifically with respect to its configuration, documentation, troubleshooting, work flow integration, API integration using Python and Ansible
  • Managed all network and devices including Cisco routers, switches, VPNs, SSL, Check Point, Cisco PIX, Cisco ASA, Cisco FWSM as well as content delivery networks (F5 BigIP LTM and GTM 1600 and 3400 load balancers) enterprise environment.
  • Experience in working withCiscoNexus Switches and Virtual Port Channel configuration.
  • Implemented Networking Protocols and Standards such as TCP/IP, OSI, UDP, Layer 2 (VLANs, STP, VTP), Routing Protocols (RIP, EIGRP, OSPF, BGP),WANtechnologies (Frame relay, IPSec, VPNs, MPLS), QoS.
  • Worked on Cisco Catalyst (3550, 3750, 6500) series switches, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers, ASA Firewall (5505/5510), Load Balancers using Cisco ACE, F5 LTM/GTM, Security Device Manager (SDM), Cisco Works, HP OpenView, Solar Winds, Sniffer, Palo Alto Networks Firewall models (PA-2k, PA-3K and PA-5K).
  • Conversions to BGPWANrouting. Which will be to convertWANrouting from OSPF to BGP (OSPF is used for local routing only) which involves newwanlinks.
  • Experience in troubleshooting NAT configurations, Access-Lists (ACL), and DNS/DHCP related issues within the LAN network.
  • Experience in installing and configuring DNS, DHCP server.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Worked on F5 LTM, GTM, ASM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Implemented SD- WAN technologies like Viptela, Versa and Silver Peak for centralized control function to securely and intelligently direct traffic across the WAN.
  • Experience working on Cloud Computing Virtualization using VM ware ESXi 4.0 and Windows Hyper-V.
  • Worked on TAC cases with vendors such as Cisco, Fortinet, Checkpoint for devices
  • Managed network domain configuration for HP & Dell blade chassis for Virtual Infrastructure.
  • Monitored and troubleshooting network device alert through Nagios monitoring tool.
  • Installed & implemented & troubleshoot the Network Virtualization through UCS and NSX.
  • Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible, Python scripting.
  • Good Knowledge on Juniper SRX configurations on various platforms of Junos.
  • Installed and configured firewalls, IPS, IPSec VPNs and various screens for intrusion prevention on Juniper SRX equipment.
  • Provided the technical integration of public and private Cloud services, includingAWS, Microsoft Azure, Office 365, Rack space & VoIP/SIP providers to increase infrastructure agility due to business demands.
  • Experience in configuring and troubleshooting various layer 3 routing protocols like RIP, OSPF, EIGRP and BGP.
  • Worked on Cisco IOS, Cisco IOS-XR, Cisco Cat OS, Cisco NX-OS, JUNOS.
  • Implemented monitoring tools like Solar Winds & network packet capture tools like Wireshark
  • Hands on experience with Linux and Unix OS Platforms
  • Performed Migration from Cisco ACE Load Balancers to F5 LTM.
  • Configuring RIP, OSPF and Static routing on JuniperM and MX series Routers.
  • Provided L3 support for Checkpoint and Palo Alto firewalls.
  • Worked on ASA, Firepower, Checkpoint and Palo Alto firewalls. Experience on MWG, Bluecoat and Zscaler proxies.
  • Experience with TACACS/RADIUS severs, migration from ACS and Aruba ClearPass to ISE.
  • Experience with windows and Infoblox DNS and DHCP servers, IPAM, internal and external grids.
  • Knowledge and operational experience with SDN, Cisco ACI, VXLAN, VTEPS, VNI, Bridge Domain, Arista Cloud Vision, EVPN, MP-BGP, Spine and Leaf Architecture.
  • Experience with Zscaler Cloud Proxy Architecture with ZIA, traffic forwarding using GRE tunnels to Zcloud, Azure AD Authentication, Access policies, ZAPP.

TECHNICAL SKILLS

Cisco &other vendor Equipment: Nexus 9k, 7K, 5K, 2K & 1K, Cisco routers (7600, 7200, 3900, 3600, 2800, 2600, 2500, 1800, 2900, 4300 series) & Cisco Catalyst switches (6500, 4500, 4900, 3750, 3500, 4500, 2900, 9200, 9300, 9500 series). PIX Firewall (506/515/525/535 ), ASA (5505/5510/5580 ),Meraki MX, Arista, Meraki vMX,Cisco ACE Load Balancers and Checkpoint (IP Series/NGX R65/IPSO)

Routing Protocols: OSPF, EIGRP, BGP, RIP v1/v2, PBR, Route Filtering, Redistribution, Summarization, and Static Routing, IS-IS, ICMP, FTP, SMTP, HTTP/HTTPS

Cloud Networking: AWS, Azure. Google Cloud

Juniper Platforms: SRX, MX, EX Series Routers and Switches, VXLAN

Load Balancer: F5 Networks (Big-IP) LTM 8900 and 6400, Citrix Netscaler, GTM, Cisco CSM, APM

LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet

WAN& SD-WAN: PPP, HDLC, Channelized links (T1/T3), Meraki MX, Meraki vMX, Fiber Optic Circuits, Frame Relay, MPLS, ISP Leased Lines, SilverPeak, SONET, Viptella, Versa.

WLAN: Autonomous AP’s, Lightweight AP’s, WLC, Channels- 802.11b/g; Air Magnet, Ekahau, Map Info

Comm. Protocols: ARP, Wi-Fi, WiMax, CDMA, 3G

Gateway Redundancy: HSRP and GLBP

DHCP and DNS: Infoblox, QIP

Various Features & Services: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP, FTP.

AAA Architecture: TACACS+, RADIUS, Cisco ACS.

Network Management: Wireshark, SNMP, Solar winds, HP Open View, KTLO, Cisco Prime, Infoblox, HP OpenView, Cisco Prime, Splunk, Riverbed, Security Device Manager (SDM), Cisco, TCP Dump and Sniffer; SolarWinds Net Flow Traffic Analyzer, XSOAR, Forcepoint, NetScout, Network Performance Monitor (NPM), XDR, Network Configuration Manager (NCM), SAM, IP Address Manager, Additional Polling Engine.

Scripting Languages: C, C++, Java, Python, Perl, Bash, Ruby

Switches: Nexus 2K/5K/7K, Cisco Catalyst 6500, 4500, 3850,3560, 3750, 2960; UCS-C, UCS-D, UCS-M, CUCM

Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Etherchannels, Transparent Bridging.

Network Security: Cisco ASA 5540, ACL, IPSEC, F5 Load Balancer, Checkpoint, Blue Coat, SCADA, Process Control Domain (PCD), NGFW Palo Alto, Panaroma, FirePower, CiscoISE, Juniper on JUNOS ASA, Zero Trust Security, XDR, ZscalerTufin, Forcepoint, Cloud, CheckPoint, F5's BIG-IP, Fortinet, Barracuda, Juniper

Change Management: ServiceNow

PROFESSIONAL EXPERIENCE

Confidential, Austin, Texas

LAN/WAN Network Engineer II

Responsibilities:

  • Installed, configured, tested, maintained and troubleshooting of a wide range of Cisco products; Firewall, various switch and router product lines
  • Designed, implanted and installation on AWS cloud engg. for AWS internal business units.
  • Installed, configured and troubleshooting of Cisco Routers (3945, 3800, 2800, and 3600) and Switches (6509E, 4507, 4500-X, 4900M, 3850, 3650, 2960) to perform functions at the Access, Distribution, and Core layer.
  • Configure and installationCiscoprime infrastructure to deploy IWAN.
  • Implementations of Network and Devices for Network SD-WAN environment.
  • Used Zscaler asa cloud-based proxy and firewall, routing all traffic through its software to apply corporate and security policies
  • Engineered, configured, deployed, and maintained Web Application Firewall solutions
  • Demonstrable knowledge of defending systems using WAF technologies
  • Designing & Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) & Ether channel onCISCOCatalyst Switches 3500, 3650, 3850 6500, 7600.
  • Worked on routing protocols like EIGRP, OSPF, RIP, BGP also MPLS, VPN, IPSEC
  • Experience in F5, Cisco ACE 4710 Load balancers. Migration Experience from ACE to F5 and NetScalers to F5. Worked on critical applications on Layer 4 and layer 7 load balancing. Experience with Virtual server, Pool, Node, Profiles - TCP, http, https, ftp, fastl4, Persistence - Source IP, SSL, Cookie, SNAT, iRules, iAPP, SSL offloading.
  • Experience with F5 GTM and in-depth knowledge of DNS, Global level load balancing, Wide IP’s, Zones, Prober pools, Delegation from Windows DNS server to listener IP.
  • Deployed ZscalerPrivate Accessfor zero trust network access (ZTNA) to secure services.
  • Maintained multi-vendor devices (Cisco, Juniper, Checkpoint, Arista etc) of the AWS
  • Worked in Solarwind to log and even the suspicious activity and security threats, conducting an investigation and respond to mitigate issues in real-time, which include blocking IP addresses, disable accounts, changing privileges and permissions and killing applications.
  • Worked with offensive security team members to test the efficacy of WAF configurations against adversary emulation and enhance team knowledge.
  • Understanding of OWASP Top Ten, threats and vulnerabilities, and tactics used to compromise applications.
  • Experience with using F5 Load balancer in providing worldwide data and file sharing, continuous internet connectivity, optimized web performance.
  • Planned, designed, scale, deployed, operate and maintained multi-vendor devices (Cisco, Juniper, Checkpoint, Arista etc) of the AWS core MPLS cloud engineering backbone.
  • Processed automation with Cisco SecureX's no/low-code drag-and-drop interface, and helped SecOps, ITOps, and NetOps teams save critical working hours.
  • Used Cisco Umbrella for flexible, cloud-delivered security .
  • Installed, configured and troubleshot Cisco wireless network, Wireless LAN controllers.
  • Used Cisco Umberalla to combine multiple security functions into one solution
  • Worked as Network Consultant for Nexus Next-Generation project. Built out several MPLS/BGP VRFfor multiple clients. Included implementation of 9K, 7K, 5K, 3Kand 2K configuration for integration witch UCS and legacy systems.
  • Advanced knowledge of OSI model,TCP/IP,Internet technologies,systemsecurity,firewall infrastructure, network architecture andCisconetworkrouting/switching(Layer 2 & 3) experience, including LAN and WAN, design and implementation which includes Layer 1 to Layer 7 experience.
  • Worked in Security issues related to Cisco ASA/PIX, Checkpoint, IDS/IPS and Juniper Netscreen firewalls.
  • Performed Palo Alto design and installation (with Application and URL filtering, SSL decryption, SSL Proxy). Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls. Successfully installed PA-5000 series in Data Center as perimeter firewall
  • Migrated ASA firewalls to PA next gen using the migration tool in PA. Migrated all IPSEC tunnels, ACL’s, NAT rules and policies
  • Worked on Juniper devices like M, MX, T routers on advanced technologies like MPLS VPNs, TE and other service provider technologies (EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240)
  • Configured and designed OSPF, EIGRP and BGP at Distribution and Core layers. Configured OTV layer 2 connection between Data centers on Nexus (Cisco ASR 9K, Nexus 7k and 9K)
  • Worked on MPLS for redirecting data from one network to another network node based on the shortest paths.
  • Hands-on experience with WAFs, next-generation firewalls, IDS/IPS and proxies.
  • Managed Active Directory Domain Controllers, DNS and DHCP Servers
  • Migrating Users, Groups, Workstations and Application windows servers from source domain to Target domain using QMM and AD Domain

Confidential, Houston TX

Responsibilities:

  • Worked onCiscoLayer 2 switches (spanning tree, VLAN).
  • Worked with the basic communication protocols like TCP/IP.
  • Proactively monitored including a weekly review of log files, reports, weekly Knowledge Base updates, etc. to determine the health and performance of Secures appliances.
  • Established development lab for testing of network equipment. Models included EX4200, EX3200, J2350, J6350, Cisco 6500, and Cisco 3560.
  • Planed and performed quarterly microcode, firmware and driver updates on all SAN switches, arrays and hosts
  • Implemented security Solutions using PaloAlto (PA-5020/PA-3020), Cisco 5580/5540.

Environment: Aruba,Nexus9K,7K,5K,Cisco2960s,3560/3750s,Juniper2200/EX3300/EX4200/EX4300/EX4500,VPC/VDC on nexus 2k, 5k, and 7k, Cisco Nexus 7018, 7700 and Nexus VLAN’S, port security,Riverbed,Zscaler,SilverPeak, Arista, CitrixNetscaler, Versa, Viptella, SD-WAN, Trucking, STP, Inter VLAN routing, LAN security, Cisco ASA, Juniper firewalls, Cisco Firepower Cisco ASA, F5 ASM, LTM,AWS Spanning tree, ASA 5520, EIGRP,Meraki MX, Meraki vMX,OSPF and BGP, MPLS, VPN, Checkpoint and ASA firewall, EX-2200, EX-4200, EX-4500, MX-480, M Series, Junos and Screens, SRX

Confidential

Sr. Network Engineer

Responsibilities:

  • Installed, configured, tested, maintained and troubleshooting of a wide range of Cisco products; Firewall, various switch and router product lines
  • Installation and Configuration of Composite Network models consisting of Cisco7600, 7200, 3800 series routers and ASR 9k, GSR 12K routers and Cisco 2950, 3500, 5000, 6500 Series switches.
  • Configured routing protocols such as OSPF, EIGRP, and BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy. It also includes the configuration of the port channel between core switches and server distribution switches.
  • Worked in day to day management of Cisco Devices, Traffic management & monitoring.
  • Configured Multiprotocol Label Switching (MPLS), VPN with Routing Information Protocol (RIP) on the customer’s Site.
  • Monitored Networks & Infrastructure withCisco Prime, NetBrain, Solarwindsfor Data Center operation.
  • Provided application level redundancy and availability by deploying F5 load balancers LTM, GTM. metrics Support on-call teams for operational issues and performance degradation- Enhance CDN monitoring and performance tracking.
  • Configured and implemented F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic.
  • Provided operation support for Cisco ACI, ASA, VMWare, Checkpoint and Palo Alto, VMWare NSX Firewalls.
  • Troubleshoot the F5 VIPRION LTM and GTM/AVI (VMWare software-based load-balanced applications when needed.
  • Configured networks using routing protocols such as RIP, OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure.
  • Implemented Hot Standby Router Protocol (HSRP) by tuning parameters like preemption.
  • Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LANs of network.
  • Experience working with Active Directory (as a centralized system) to automate network security management and user data.
  • Used Cloud Watch for monitoring AWS cloud resources and the applications that deployed on AWS by creating new alarm, enable notification service.
  • Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting.

Environment: Aruba,AWS,F5 Load Balancer,ZScalar, Juniper SRX, Cisco ASR 1001/ISR 7206/3845/3945/2951 routers, AWS VPC, NEXUS 7010, 5020, 2248 / 6500 / 4500 / 3750 / 3850 switches, TACACS, BGP, SD-WAN, OSPF, Mobile Iron, Palo Alto, Cisco ASA 5580/5505/5520 , Cisco ACE.

Confidential

Sr. Network Engineer

Responsibilities:

  • Installed, configured, tested, maintained and troubleshooting of a wide range of Cisco products; Firewall, various switch and router product lines.
  • Maintained, troubleshooted, Configured and deployed various multiple Palo Alto / Panorama platform: M-100, M-200, 7050, 5060, 3060, 3020, 850, 820, 200 in production and non-production environments.
  • Worked in FortinetFirewall(model 100 D and 60 C) IOS Upgrade (version 4.0 and 5.0).Fortinet firewallpatching,Fortinet firewall IPSEC and SSL VPN Configuration.
  • Provided services on more than 250 Juniper firewalls at Meijer stores on different locations using Junos Space Security Director (Version 16.2 R1).
  • Worked on Solarwind to log and even the suspicious activity and security threats, conducting an investigation and respond to mitigate issues in real-time, which include blocking IP addresses, disable accounts, changing privileges and permissions and killing applications
  • Designed, builded and implement enterprise-class security systems for a production environment. Prepares system security reports by collecting, analyzing, and summarizing data and trends.
  • Deployed and decommission of VLANs on core ASR 9K, MIX routers, Nexus 9k, 7K, 5K, HP switches and its downstream devices
  • Designed, implemented and maintained VPN tunnels to remote offices and Data Center using Palo Alto firewall. Solid experience with Access Control and Firewalls/UTM devices, DMZ Architectures.
  • Installation and maintenance of Cisco Layer 3 switches 3750, 4500X, 6500 in multi VLAN environment.
  • Maintained and configured of Cisco ASR1000 series and 7200VXR routers at data center and deployment of 3900, 3800, 2951 and 2821 for branch connectivity.
  • Contributed to the backup/recovery and disaster prevention/recovery of Palo Alto firewall, Panorama, F5 load balancers and Juniper Firewalls.
  • Worked with deployment, management and troubleshooting of Palo Alto Networks firewalls in a global environment, ensuring optimization and full adoption of advanced feature sets, including but not limited to, device groups, templates, security profiles, App-ID, SSL decrypt and user-ID.
  • Migrated SAP based applications from old Cisco ACE load balancers to new VMware NSX edges.
  • Implemented SD-WAN: Silver Peak, Viptela, Versa and Meraki.
  • Facilitate the use of Palo Alto Networks automation capabilities to automate manual and repetitive tasks where possible, engaging the support of the broader Palo Alto Networks consulting and engineering team when necessary.
  • Managed Palo Alto firewalls using panorama and I have deployed more than 25 Palo Alto firewalls in Panorama management. Excellent work experience to setup firewall from stretch.
  • Worked and deployed on High Availability configuration (Active/Passive & Active/Active) for new firewalls.
  • Migrated policies, objects and applications fromover 40 Juniper SRX firewalls into Palo Alto Firewalls using Expedition Tool.
  • Created day-to-day firewall policies, F5 VIPs and pools, add new Infoblox entries as per clients demands and requirements.
  • Validated technical issues resolved by L2. Leading - Firewalls life-cycle management. Creation of new service and operational reports in- line with customer needs. Evaluating new product updates/upgrades. Leading System Integration/Consulting engagements associated with PoC/implementing - Firewalls and VPN in-line with customer needs.
  • Configured and Troubleshooted of F5 LTM features such as Virtual Servers Load Balancing, Pools, Profiles, Policies, HA, Monitoring, SSL Decryption, iRules, Persistence profiles.
  • Provided F5 Customers, Sales Engineers and Escalation Teams consistently high-quality remote technical assistance over email/phone. Assist customers with implementation and troubleshooting F5 products such as Appliance based, F5 software deployed.
  • Maintained DNS, BGP, OSPF, LACP, 802.1q, 802.1x, MPLS, TCP/IP, IPv4, IPv6, Ethernet, WAN Technologies, VPN tunneling
  • Supported operational business systems by providing 1st and 2nd line IT support, utilizing a high standard of technical and customer service skills, knowledge and ability
  • Installed, configured, tested, maintained and troubleshooting of a wide range of Cisco products; Firewall, various switch and router product lines
  • Configured, modified and worked on F5 ASM policies (Access Policy) as per client’s requirements. Also, creating profiles, CSR creation, checking ciphers, IP mapping to webservers and installing SSL offloading in F5 Load balancer for clients.
  • Installed, configured, tested, maintained and troubleshooting of a wide range of Cisco products; Firewall, various switch and router product lines
  • Provided root cause analysis by analyzing the logs (Syslog and debug logs), traffic c aptures analysis of entire 'grid' communications. (Grid - Term used by Infoblox to represent its network of servers managed by a single appliance called 'Grid Manager').
  • Provided supporting license installation, renewals and RMA's of Infoblox appliances (3000 & 5000 Series).
  • Worked on SD-WAN and managed using Viptela in encryption for security, enforced policies locally and from a central location.
  • Responsible for 6500, 3500, Nexus 5500-7009 switching, ASA, FWSM Firewalls, CSS and F5 load balancers, Riverbed WAN accelerators, IronPort Proxy, and Linux/Bind DNS servers
  • Worked in Juniper Devices, Junos Space, Implementing policy, IPsec VPN, NAT etc. Also, strong general knowledge of common networking and security protocols and applications such as TCP/IP, HTTP, SMTP, FTP, DNS, IPsec, PKI, OSPF, BGP, VLANs.

Environment: Aruba,Cisco Routers (3945, 3800, 2800, and 3600) and Switches (6509E, 4507, 4500-X, 4900M, 3850, 3650, 2960) Cisco ASA Firewalls,Check point, AWS, Azure,Catalyst, Trunks, OSPF, VPLS, EVPL, RSVP. UNIX, LINUX Cisco Identity Services Engine (ISE), Palo Alto firewall, Juniper EX4200 & EX4550, Checkpoint Firewall (R75, R76, R77, Nexus 9k, 7K, 5K

Confidential

Network Engineer

Responsibilities:

  • Maintained and configured AT&T Accelerated 6200 -FX Wireless device for Back-up Circuits.
  • Provided access control Processed visitors; escorted emergency personnel
  • Support operational business systems by providing 1st and 2nd line IT support, utilizing a high standard of technical and customer service skills, knowledge and ability
  • Installed, configured, tested, maintained and troubleshooted for a wide range of Cisco products; Firewall, WSA, various switch and router product lines
  • Installed, configured and troubleshooting of Cisco Routers (3945, 3800, 2800, and 3600) and Switches (6509E, 4507, 4500-X, 4900M, 3850, 3650, 2960) to perform functions at the Access, Distribution, and Core layer.
  • Created multiple ISE authorization rules for 7 sites.
  • Envision and drove Cisco's SD-WAN (IWAN) and VPN for Enterprise and MSP networks
  • Deployed Cisco ISE on mid to enterprise project.
  • Configured high availability protocols like HSRP, VRRP, GLBP
  • Strong Knowledge in WAN technologies including T1, T3, ISDN, HDLC, Point to Point, ATM and Frame Relay
  • Worked with multi-vendor devices (Cisco, Juniper, Checkpoint, Arista etc) of the AWS
  • Designed and configured OSPF, BGP on Juniper Routers (MX960) and SRX Firewalls (SRX240)
  • Configuring and deployment of Juniper ERX310 router.
  • Worked on juniper switches like EX2200, EX2500, and QFX switch with Spanning tree.
  • Performed IP address planning, designing, installation, configuration, testing, maintenance, and troubleshooting in complete LAN, WAN development.
  • Worked with High performance data center switch like nexus 7K series.
  • Worked with Nexus 7010, 7018, 5020, 2148, 2248 devices.
  • Implemented EIGRP, BGP & OSPF and mutual redistribution on Core Routers & Core Switches for proper routing and fail over for customer.
  • Troubleshooting various issues during the running network and at the time of implementation.
  • MPLS Link management with ISP includes link commissioning, closing, up gradation &billing.
  • ImplementedPBRfor somelocationstoprefercertainpathwhileusingsomespecificapplications.
  • Working in a team of 6 associates working 24x7 and assisting them if any issue is unsolved.
  • Prepared SOP for L1 team for assuring proper escalations are followed and Incident tickets are resolved within agreed SLA.
  • Provided service improvement plan (SIP) viz. hardening of devices,IOS up gradation, sharing End of Life &support of devices.

Environment: Cisco Routers, F5, Cisco Switches, Cisco Nexus 9k/7k/5k/2k,NAT, IDS/IPS, firewalls,, AES/AES-256 with ASA Firewalls, Arista, Nexus Switches, Palo Alto, AWS, F5 BigIP Load balancers, Virtual servers, Pool, SSL Profiles,HTTP profiles,Curl, Cisco ACE load balancers, Blue Coat Proxies, Data center, Spanning Tree, Checkpoint Juniper Routers, Juniper SRX, Network2/3/4G.

We'd love your feedback!