We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

0/5 (Submit Your Rating)

Redmond, WA

SUMMARY

  • 7 years of professional experience with CCNP and CCNA certification in Network Planning, Implementing, Configuring, Troubleshooting and Testing on Cisco Networks.
  • Worked on Cisco 7200, 3800, 3600, 2900, 2800, 2600, 1800 series Router andCisco Catalyst 2900, 3500,4500, 5500, 6500 series switches and Nexus 9K,7K&5K switches.
  • Experience of routing protocols like EIGRP, OSPF, RIP, and BGP.
  • Experience in the setup of Access - Lists, and RIP, EIGRP, and tunnel installations.
  • Good experience and knowledge in tunneling technologies like GRE, IPsec, DMVPN, MPLS.
  • Proficiency in configuration of Setup, migrate and remove VLANs on variousCiscoRouters and Switches.
  • In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
  • Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (2232, 2248).
  • Configured RACL (Router ACL), VACL (VLAN ACL), PACL (Port ACL).
  • Well experienced in configuring gateway redundancy protocols like HSRP, GLBP, and VRRP.
  • Access control server configuration for RADIUS & TACAS+.
  • Expertise in working with Cisco ASA and PIX firewalls with Ip sec tunnels, zones, global protect mode, Zone based tunnels, IKE Crypto.
  • Worked extensively in configuring, monitoring and troubleshooting Cisco ASA 5500(5510/5540) and PIX (506E/515E/525) security appliance, failover DMZ zoning & amp.
  • Experience on configuring protocols like VLANS, NAT, DHCP, and Routing for Cisco ASA firewalls as per design.
  • Experience in firewall security context like configuring AAA services using ACS servers.
  • Creating multiple virtual firewalls with their own policies like routing protocols, NAT, access policies.
  • Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
  • Experience in ASA Clustering for high availability and load sharing to ISP.
  • Configured and worked with Zone Based Firewalls (ZBF).
  • Experience in physical cabling, IP addressing and Subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Expert knowledge of cable connectors and replacement as RJ-11, RJ-45, V.35, RS-449.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.
  • Extensive hands-on experience with complex routed LAN and WAN networks,routers and switches.
  • Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
  • Expertise on cisco IOS, Cisco IOS-XR, Cisco CatOS, Cisco NX-OS.
  • Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.
  • Level 1 experience in Red hat Linux and Unix (IBM AIX) operating systems.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
  • Experience in Monitoring Tools like Zenoss, Solar Winds, and Net Brain to monitor the alerts and traffic flow.
  • Experience with ticketing systems like Service-Now, Remedy for escalation and troubleshooting the problems occurred on Network environment in the Company.

TECHNICAL SKILLS

Cisco & other vendor Equipment: Nexus 9K,7K, 5K & 2K, Cisco routers (7600, 7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4500, 4900, 3750, 3500, 2900 series). PIX Firewall (506/515/525/535 ), ASA (5505/5510/5580 ), Cisco ACE Load Balancers and Checkpoint (IP Series/NGX R65/IPSO)

Routing Protocols: RIP, IGRP, EIGRP, OSPF, IS-IS, BGP, HSRP, VRRP & GLBP

Network Management: Solar Winds, SNMP, Cisco Works, Wireshark

Infrastructure services: DHCP, DNS, SMTP, FTP, and TFTP

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

Network Security: NAT/PAT, Ingress & Egress Firewall Design, VPN Configuration, Dynamic, Reflexive ACL, and authentication AAA (TACACS+ & RADIUS)

Platforms: Cisco IOS-XR, Cisco Cat OS, Cisco IOS (11.x, 12.x), PIX IOS (6.7.x), CAT-OS UNIX, LINUX, Windows XP, NT, 2000, 2003

PROFESSIONAL EXPERIENCE

Confidential, Redmond, WA

Sr. Network Engineer

Responsibilities:

  • Create, extend and remove VLAN as per the requirement.
  • Worked on VLAN Extensions on cisco switches 9k, 7k and 5k.
  • Extend Vlan from ACI to 7ks over layer 2 links and subordinate switches that connect to the ESX hosts.
  • Added VLAN to Port and did setup for lab Port Configurations to VLANS.
  • Remove unused VLAN definitions from core.
  • Remove ACI L3 point-to-point VLANs from vPC Peer-Link.
  • Troubleshooting issues with DHCP in VLANs.
  • Document VLANs on Core.
  • Worked in a project to move EOL hardware/OS configurations, which will enable users to migrate from old development servers to new development servers.
  • Host or Site specific logging configuration modification: Modify logging level of ACL matches from debugging level 7 to level 5 - acllog match-log- level 5.
  • Removed hardware access-list capture option on chassis as recommended by Cisco for VDC deployments.
  • Upgrade firewalls to PanOS 7.1.12.
  • Worked on PCI Firewall ACL Addition change which enabled the new antivirus, Carbon Black, to get updates.
  • Revert changes and change VPN to production.
  • Worked on VPN login failures after changes.
  • Removing NAT routes From VPN.
  • Worked on doing modifications to Corp Internet routing: restore service on VPN tunnels, investigation of traceroutes and tunnel stability.
  • Move Site to Site AWS VPN and VPN router links to DMARC switches.
  • Implementing IPsec and GRE tunnels in VPN technology.
  • Creating networks in the environment like VLAN, VPN tunnel, VPN (ASA), vPC tunnels, WLAN, VIP on Big/IP to redirect traffic.
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments.
  • Updated emergency account credentials on network switches and routers.
  • Added 16-port modules to Access layer 5Ks.
  • Changed the existing DNS entry for the servers.
  • Enabled SyncIQ replication between two data centers for IT Network testing/tuning.
  • Worked with secondary Internet connection to PCI Firewall and create policy based routing for ncrsecurepay redundancy.
  • Moved trunk ports in data center between ethernet ports.
  • Moved PDU management and device management connections between DMARC switches.
  • Configured Network devices to send Netflow to Sentinel.
  • Moved WLC uplinks on Access5k FEX.
  • Experience on vPC Domain ID deduplication in the contagious layer 2 network.
  • Enabled LLDP (Link layer Discovery protocol) on all Network devices.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/ switches and Cisco 3640/12000/7200/3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA5510, Checkpoint, Aruba Controllers 6000, 3600,3400,650: windows server 2003/2008: F5 BIGIP LTM.

Confidential, Grafton, WI

Sr. Network Engineer

Responsibilities:

  • Involved in the team for designing and Configured Nexus 7000/5000/2000 switches in a Multi-Tenancy environment using VPC, VDC & VRF.
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • Create and testCisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
  • Migration of existing IPSEC VPN tunnels from one Data Center to another Data Center.
  • Experience with implementing Cisco 6500 VSS at the distribution/core switches.
  • Configuring Vlan’s, VTP’s, enabling trunks between switches.
  • Experience configuring Virtual Device Context in Nexus 7010.
  • Plan Design and assist in deploying enterprise wide Network Security and High Availability Solutions for ASA.
  • Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525) & AMP, ASA 5500(5510/5540) Series.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco ASA 5500 with ACL, NAT, Object Groups, Failover, Multi-Contexts.
  • Experience in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating access/distribution and core layer switching architecture.
  • Implemented DHCP, DNS, IPAM configuration on the servers to allocate, resolute the IP addresses from Subnet.
  • Worked with TACACS+ and RADIUS Servers.
  • Familiar with various MSIT Tools to check Networking Connectivity, Testing, Configuration and Adding or removal of IP address blocks, Decommission or Adding the Devices.
  • Checking the Access-list configuration and uploading them in the Solar winds, which make the ORPOS (Oracle Retail Point-of- Service) rollouts easily.
  • Worked in UNIX and Linux environment and involved in installing and configuring all the Linux servers in the network per specifications of clients.
  • Monitoring the network traffic with the help of Qradar and Cisco IPS event viewer.

Environment: Cisco 7206/3845/3945/2951 routers, NEXUS 7010,5672UP, 2248/6500/4500/3750/3850 switches TACACS, EIGRP, OSPF, and Vulnerability Assessment tools like Nessus, Red Hat, Solaris, VPN’s, and SSL.

Confidential, OKC, OK

Network Engineer

Responsibilities:

  • Experience in working with cisco Nexus 5000 series and catalyst 6500 switches.
  • Installation and Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
  • Experience with LAN protocols like STP, RSTP, MSTP, VTP, VLAN and Port Channel Protocols like LACP, PAGP.
  • Create and testCisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
  • Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Deployment of Cisco 6500 switches in standalone and VSS modes with SSO and NSF.
  • Configuring, Monitoring and Troubleshooting Cisco’s ASA 5500/PIX security appliance, Failover DMZ zoning and configuring VLANs/routing/NAT with the firewalls as per the design.
  • Adding and modifying the servers and infrastructure to the existing DMZ environments based on the requirements of various application platforms.
  • Configured Security policies including NAT, PAT, VPN, Route-maps and Access Control Lists.
  • Configuring BGP, MPLS in Cisco IOS XR.
  • Configure Corporate, Wireless and Lab Devices which includes Bandwidth Upgrade, Adding New Devices, Decom the Devices, and Testing.
  • Experience in WAN technologies like T1/T3, DS3, STM1 and STM4 circuit types.
  • Optimized performance of the WANnetworkconsisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and worked with BGP WAN towards customer.
  • Negotiate VPN tunnels using IPSec encryption standards and configured and implemented site-to- site VPN, Remote VPN.
  • Worked on the security levels with RADIUS, TACACS+.
  • Experience in working with application layer protocols such as Telnet, FTP, SMTP, POP3, HTTP/HTTPS, SSH, SSL and DNS.
  • Strong Knowledge in working with F5 Load Balancers and their Implementation in various Networks.
  • Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel.

Environment: Environment: Cisco routers (7200, 3800, 2800) and Cisco switches (6500, 3700, 4900, 2900), Nexus (7K, 5K & 2K) Routing Protocols (EIGRP, OSPF, BGP), Switching protocols (VTP, STP, GLBP, HSRP), Cisco PIX (525, 535), ASA (5505, 5510) firewall

Confidential, Edison, NJ

Network Engineer

Responsibilities:

  • Worked on a broad range of topics such as routing and switching, dedicated voice access, and high-visibility outages.
  • Supported change management coordination, proactive monitoring and maintenance, disaster recovery exercises, and core network repairs.
  • Worked onCiscoLayer 2 switches (spanning tree, VLAN).
  • Supported nationwide LAN infrastructure consisting ofCisco4510 and catalyst 6513.
  • Support various Routers like 2600/2900/3600/7200 series routers.
  • Configured and troubleshoot OSPF, EIGRP and Tested authentication.
  • Supporting EIGRP, OSPF and BGP based network by resolving level 1 &2 problems of internal Sites.
  • Providing daily network support for Global wide area network consisting of MPLS, VPN and point-to point site.
  • Experience in migration of Frame-relay based branches to MPLS based technology using multi-layer stackable switch like 6500 series and 2951, 2800 series routers.
  • WAN Infrastructure running OSPF & BGP as core routing protocol.
  • Design and implementation of Networks using TCP/IP.
  • Deployed the switches in high availability configuration with HSRP.
  • Worked on HP open view map for Network Management System and Ticketing.
  • Used CiscoWorks 2000 for NetworkMonitoring.

Environment: CISCO routers and switches, Access Control Server, VLAN, Trunk Protocols, CISCO ASA, DHCP, DNS, Spanning tree.

Confidential, Chicago, IL

Network Operation(NOC) Engineer

Responsibilities:

  • Worked as L2 network (NOC) Engineer support and responsible for escalation client’s issues.
  • Responsible for monitoring and reporting error incidents for remote location servers.
  • Create tickets for cloud database servers using Maxima Cloud and MS. Leigh tools.
  • Installation and configuration of DNS, DHCP,IIS WEB and FTP servers. worked on Installing, removing and cabling physical servers in the data center.
  • Experience testing and troubleshooting layer1 circuit, layer 2 devices and WAN connections establishment and protocol debugging.
  • Experience in working with various tools like VMWARE Vsphere Client for working with virtual servers, SolarWinds for traffic analyzing.
  • Decision making and incident Management for the issues and alerts received and handling them in the best way as possible.
  • Creating tickets using Service-now, updating and documenting the information in the tickets.
  • Creating proper documentation for the devices and linking it to the monitoring tools.
  • Running Backups for the systems on iSeries systems and expertise in doing daily and monthly Backups for the partitions.
  • Actively participating in team bringing up new ideas and projects for better performance.

Confidential

System Engineer

Responsibilities:

  • Installation and maintenance of new network connections for the customers.
  • Installation and maintenance of new network connections for the customers.
  • Configuring all the required devices and equipment for remote vendors at various sites and plants.
  • Installing new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations.
  • Installing and maintaining local as well as network printers.
  • Validating existing infrastructure and suggesting new network designs.
  • Working on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path, Community, MED.
  • Installing and maintaining Windows NT Workstations and Windows NT Server.
  • Providing technical support to LAN & WAN systems.
  • Monitoring Memory/CPU on various low end routers in a network.

We'd love your feedback!