We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

0/5 (Submit Your Rating)

Dallas, TX

SUMMARY:

  • Confidential is a Degreed Sr.Network Engineer and with extensive professional experience, dealing hands - on with a wide array of technology to include CISCO Routers and Switches, Checkpoint and Juniper Firewalls with EIGRP, OSPF and BGP across a large corporate enterprise infrastructure deployments and installations.
  • As a Network Engineer, he has performed the configuration and installation of Cisco firewalls, routers, switches and VPN, as well as connectivity to servers and desktops and printers. He has designed and implemented moving client sites using Cisco 1800/1900, 2800, and Cisco 2900 switches using c2500 routers and worked with F5 Load Balancers

TECHNICAL SKILLS:

CISCO: Switches: 1900, 2900, 2950, 3550, 3560, 3750, 6500 series

Routers: 1600, 1800, 2500, 2600, 2800, 6509, with sup 720, 7200

Firewalls: 501 pix 525 FWSM ASA 5520 ASA 5505

VPN: Wireless: AP1242, 1130

VOIP: CUCM Version 9.x, 10.x,CUC, Telepresence

Firewalls: Palo Alto, Cisco ASA

Software: F5 Load Balancers, ADMT, Exchange 2003|2007|2010|2013, Lync 2010|2013, Windows Server 2003|2007|2008R2|2012, OCS 2007R2, VMware ESX 4|5|5.1Office 365, DAG,SAN|NAS.

Tools: Internal/External DNS, of Authority, SAN\Wildcard s, PKI

Network: NAT / PAT, SNAT, EIGRP, OSPF, BGP, DNS, TCP/IP, STP, MST, HSRP, LTM, GTM, Frame Relay, F5 LTM/GTM, Cisco CSS and Local Director, Wireshark, SolarWinds, Sniffer, GigaStor, Unified Fabric, Cloud

VMware: ESXi: 5.x, 6.x, DRS, fault tolerance, NFS, ISCSI, Replication, vMotion,P2V, Vcenter appliance, Vcenter Standalone.

PROFESSIONAL EXPERIENCE:

Confidential, Dallas, TX

Senior Network Engineer

Responsibilities:

  • Provided Support for Tier I, II and III teams.
  • Highest Level of Escalation for Troubleshooting.
  • Troubleshooted Site-to-Site VPN issues.
  • Resolved long lasting Printing issues over Site-to-Site VPN tunnel.
  • Configured Site-to-Site VPN Tunnel between Cisco ASA in the Datacenter and Meraki MX65W in a branch.
  • Automated Security Policy Configuration using Solarwinds Kiwi Cattools
  • Documented the Network Devices
  • Designed a Central business office Expansion, configured 2 stacked 2960X switches.
  • Upgraded software of Cisco ASA 5545s Active/Standby failover mode.

Confidential, Irving, TX

Network Engineer

Responsibilities:

  • Configured Site to Site VPN using Palo Alto 5520 in Datacenter to branch 891F Router.
  • Troubleshooting Network issues including application connectivity to Vcloud air and Azure
  • Trained Network Administrator with effective troubleshooting commands on cisco 4331 routers and cisco catalyst 2960 POE+, 3750X and 6560 switches.
  • Blocked port 3389 to server in Vcloud air with little direction from resident CCIE
  • Monitored 170 United states branches and 100 international sites using Solarwinds
  • Configured and implemented TACACS+ using ACS
  • Configured and implemented Authentication profiles for Palo Alto using ACS, Radius
  • Lead SD-WAN (Aryaka) project for 200 United States branches.
  • Lead and directed level One Network Admins in the process of troubleshooting
  • Used XML scripts to configure 200 sites for SD-WAN project.
  • Configured Zscaler URL filtering on Palo Alto Firewall
  • Configured Backend routing for SD-WAN project
  • Configured and Implemented BGP on Palo Alto and Cisco 4331 and Cisco 2911 Routers.
  • VLAN Implementation on Cisco 3750, 2960 and Nexus 5548 Switches.
  • Configured Share point we portal to track SD-WAN Project Implementation.

Confidential, Lubbock, TX

Network Project Engineer

Responsibilities:

  • Duties include configuration and installation of Cisco firewalls, routers, switches, VPN, as well as connectivity to servers and desktops and printers. Designed and implemented moving client sites using Cisco 1900, and Cisco 2900 switches using c2500 routers; worked with F5 Load Balancers
  • Supported BGP, OSPF and EIGRP Networking operations; troubleshooted issues with internet failover using OSPF and BGP redistribution. Designed and Implemented moving client sites from c1900, and 2900 switches to 3500 and 3750 switches upgraded c2500 routers to 2800 routers.
  • Maintained, administered, and monitored networking devices (Cisco ASAs, Palo Alto IPS, VPN
  • Concentrators) to ensure protection of the CSD network for the city of Andrews office.
  • Configured Cisco ASA 5505, 5515 for medium sized and small sized businesses.
  • Knowledge of databases, logs, mail routing and protocol support for Exchange Server and Microsoft SQL
  • Configured ASA 5506X, Cisco 5585X firepower feature. Installed and configured ASA 5506X and Cisco 5585X in multiple sites
  • Linked with Dark Fiber. Configured the 5506Xs to act as a router feeding of the Main Site.
  • Researched available products, solutions, and emerging technologies and participated in efforts to review products and secure solutions; investigated, recommended and implemented new technologies, security enhancements and purchases.
  • Configured and implemented CUCM for 3 locations
  • Troubleshooting internet failover issues for and midsized company.
  • BGP Configuration, implementation and troubleshooting.
  • EIGRP Design, implementation and Configuration for a Mid-sized company.
  • Installed and Configured Cisco Stacked 2960X switches in multiple sites for a client.
  • Troubleshooting Routing issues with Cisco IPsec Site-to-Site VPNs
  • Provided and knowledge transfer to FTE staff on network devices.
  • Configured Folder Redirection using Group Policy.
  • Administered Dell EqualLogic SAN using SAN Headquarters
  • Virtualized Physical Servers using VMware Converter
  • Migrated quick books to server 2012 R2.
  • Configured SSL VPN, remote access VPN on Cisco ASA and Palo Alto firewalls
  • Configured an implemented Cisco ACS for VPN access, using RADIUS
  • Configured 802.1x for wireless authentication using Cisco ACS
  • Deployed virtual servers and drive virtual configurations using VMware
  • Installed and configured Dell Power Connect N3024 Switches for SAN.
  • Installed and configured Dell EqualLogic PS Series SAN Array.
  • Installed and Configured Cisco Anyconnect Remote Access VPN.
  • Worked in support of F5 load balancers.
  • Configured Exchange 2010 to use Kemp load balancers for CAS load distribution.

Confidential

Lead Exchange Engineer

Responsibilities:

  • Migrated Exchange 2007 to Exchange 2013 for a 300 user based Seattle Casino; Angel of the
  • Winds Casino, organization, with Exchange Service
  • Migration tool to perform a Batch Migration
  • Designed Remote site module for a 200 user capacity.
  • Implemented design for remote site for 200 user capacity
  • Vmware ESXi 5.5, 6.0 configuration and installation
  • Windows Server 2012 installation and configuration
  • OpenDNS configuration and implementation
  • Implementation and configuration of Site to Site VPNs
  • Troubleshooting Phase 1, Phase 2 Site to Site VPN issues
  • Configuration of IPsec Remote Access VPNs
  • Managed e-mail gateways and policies
  • Implemented and configured DMZ and Site to Site VPN, SSL VPN on Palo Alto Firewalls
  • Configured an implemented Cisco ACS for VPN access, using RADIUS.
  • Configured 802.1x for wireless authentication using Cisco ACS.
  • Develop and maintain security standards related to messaging systems and services
  • Configured and designed active directory
  • Created technical specs, diagrams and documents to satisfy project deliver
  • Created custom PowerShell scripts and commands for automation of active directory and
  • Exchange server.
  • Skilled in effectively communicating with all levels of customers/users within an organization.
  • Skilled in giving and following technical instructions.

Confidential

Network Engineer

Responsibilities:

  • First point of contact for customer computer and network issues.
  • Configured Remote Access VPNs
  • Configured Site to Site VPNs
  • Migrated exchange mailboxes from
  • Configured IP SLAs for Internet Access Failover
  • Configured Policy Based Routing
  • Provided highly complex Tier II-III support for VPN, Firewall/IPS and WAN/LAN network.
  • Troubleshooting of Routing Issues that prevented VPN access to resources
  • Troubleshooting and resolved site to site VPN Speed Issues
  • Monitoring Bandwidth for MPLS Circuits, VPNs with PRTG
  • Configured Netflow
  • Configured Email and Active directory Accounts on several exchange Versions.
  • Performed EIGRP configuration
  • VLAN Configuration
  • Configured and Implemented Cisco ISE
  • Configured an implemented Cisco ACS for VPN access, using RADIUS
  • Configured 802.1x for wireless authentication using Cisco ACS
  • Resolved issue with Directory File Services and replication between Microsoft Active directory
  • Implemented and configured DMZ and Site to Site VPN on Cisco and Palo Alto Firewalls
  • Implemented and configured Remote Access VPN, SSL VPN on Cisco and Palo Alto Firewalls
  • Resolved Group policy issues.
  • Used Texas data Vault(Backup Solution) to restore user email.
  • Used Powershell to Create, delete and troubleshoot user accounts.
  • Integrated MS Exchange with other systems to enable key workflows and business processes.
  • Maintained, administered, and monitored networking devices (Cisco ASAs, Palo Alto IPS, VPN concentrators) to ensure protection of the CSD network

Confidential, Midland, TX

Systems Engineer

Responsibilities:

  • Day to Day Exchange 2010 support analyst; added Additional Storage for Mailbox Servers and designed Active Directory infrastructure. Implemented and Configured ASA 5520 for publishing Microsoft Outlook web Access
  • Configured ACS 5.4 for Clientless SSL VPN Authentication through ASA 5520. Provided highly complex Tier II-III support for VPN, Firewall/IPS and WAN/LAN network. Installed and configured Right Fax Server.
  • Performed thorough audit of Firewall rules and configuration, PTP connections, VPN connections, and make/implement best practice. Used EMC Avamar backup solution to backup SQL server databases and Exchange 2010. Automated User accounts and day to day tasks in active directory using PowerShell Scripts.
  • Troubleshooted external email issues and fixed external email issues including owa and out of office replies(OOF) in exchange 2010
  • Administered Barracuda email Firewall. Installed MacAfee EPO 5.0 and deployed Antivirus to 2000 client machines. Renewed SAN s for Client Access Servers.
  • Developed PowerShell script for deleting multiple users from Active Directory; managed e-mail gateways and policies and developed and maintained security standards related to messaging systems and services.
  • Configured and designed active directory; also performed network diagramming of Firewall, Configured IPS, including connected devices and remote office connections. Created technical specs, diagrams and documents to satisfy project deliver
  • Created custom PowerShell scripts and commands for automation of active directory and exchange server.
  • Configured and Implemented Cisco ISE
  • Configured an implemented Cisco ACS for VPN access, using RADIUS
  • Configured 802.1x for wireless authentication using Cisco ACS
  • Extensive knowledge of databases, logs, mail routing and protocol support for exchange server and Microsoft SQL.
  • Integrated MS Exchange with other systems to enable key workflows and business processes
  • Developed and deployed a Network Security Baseline and other security controls.
  • Researched available products, solutions, and emerging technologies and participated in efforts to review products and secure solutions; investigated, recommended and implemented new technologies, security enhancements and purchases.
  • Implemented and configured DMZ and Site to Site VPN, SSL VPN on Palo Alto Firewalls
  • Implemented and configured Remote Access VPN on Cisco and Palo Alto Firewalls
  • Provided and knowledge transfer to FTE staff on network devices.
  • Skilled in effectively communicating with all levels of customers/users within an organization.
  • Skilled in giving and following technical instructions.

Confidential, Atlanta, GA

Microsoft Exchange Consultant

Responsibilities:

  • Served as the Exchange 2003, 2007, 2010 Engineer and the Lync 2010, 2013 engineer
  • Deployed to onsite for exchange projects, deployed newly built Exchange 2003 servers, for 7500 potential users; planned, documented, and designed the infrastructure.
  • Gathered customer requirements to create a suitable architecture and implementation of design document.
  • Used MacAfee for virus detection and performed Physical and Virtual Installation and Configuration.
  • Installed and configured domain controllers and Windows 2003 Server installation and configuration.
  • Managed offline address book, created storage groups, and databases.
  • Installed and Configured Blackberry Enterprise server (BES 4.0, SP3).
  • Creation and Execution of Functional Test Plans.
  • Performed Testing and Troubleshooting.
  • Performed instructional design and Web development for delivery,, and on-site.
  • Planned architecture and implemented migration of 20,000 mailboxes from Exchange 2003/2007 to Exchange 2010 architecture.
  • Integrated High Availability and Site resiliency by implementing Data Availability Groups (DAG) among 6 mailbox servers.
  • Quest Migration Manager for Exchange tool was used for mailbox migration.
  • Used tools pre-deployment analyzer, and HP capacity planner for capacity planning.
  • Prepared Failure Mode Effective Analysis (FMEA) to mark vulnerable/critical phases during migration.
  • Prepared co-existing lab environment for exchange 2007, and 2010.
  • Supported the Exchange 2003, OWA, ActiveSync, Blackberry Enterprise Server 4.3, Mail Marshal, Antigen antivirus, Right Fax.
  • Lync 2010 was introduced for IM, and Archiving purposes.
  • Worked with GFI essentials for anti-virus, and anti-spam, and attachment filtering.
  • Configured Solutions for name resolution methodology - DNS & WINS.
  • Implemented and Configured Threat Management Gateway Firewall.
  • Configured Routing, Remote Access, & VPN using TMG.
  • LAN's architecture, including IP subnet calculations & configuration.
  • Worked with other groups to provide a functional backup / recovery solution for Exchange/email issues during different phases.
  • Daily user support, on-call rotation, SMTP troubleshooting, SPAM filter configuration.
  • Managed e-mail gateways and policies
  • Documented all the Firewalls connections and rules
  • Develop and maintain security standards related to messaging systems and services
  • Configured and designed active directory
  • Created technical specs, diagrams and documents to satisfy project deliver
  • Created custom PowerShell scripts and commands for automation of active directory and exchange server.
  • Extensive knowledge of databases, logs, mail routing and protocol support for exchange server and Microsoft SQL
  • Researched available products, solutions, and emerging technologies and participated in efforts to review products and secure solutions; investigated, recommended and implemented new technologies, security enhancements and purchases.
  • Provided and knowledge transfer to FTE staff on network devices.
  • Skilled in effectively communicating with all levels of customers/users within an organization.
  • Skilled in giving and following technical instructions

Confidential, Indianapolis, IN

Network Administrator

Responsibilities:

  • Configured User VLANs on Cisco 6513 and Cisco Nexus 7000 and changed user ports from unsecured VLANs to Secured VLANs after approval from security personnel to meet security policies.
  • Created and Managed Cisco VPN user Account Authentication on Windows Server 2008 RSA server.
  • Installed and Managed Several VPN Cisco AnyConnect Connection profiles the firewall using ASDM to speed up configuration time and I achieved this with no help.
  • Configured Access Lists on the Firewall (Cisco FWSM) to allow Network object access to specific resources with little help. Solved several connectivity problems with the Remote VPN.
  • Migrated Users from Microsoft VPN to Cisco VPN using the RSA Security Console this helped to improve security and access to resources.
  • Used Perl scripts to automate configuration of remote VPN profiles with help from the Network Engineer.
  • Migrated Layer 3 from Cisco 6513 to Nexus 7000 to improve bandwidth for server applications and the network as a whole.
  • Solved issues with browsing the internet via VPN.
  • Migrated all Regional loss prevention Managers and District Managers..
  • Successfully Migrated the call-center department to Cisco 3750X from Cisco 4750.
  • Developed network standards for Enterprise network
  • Configured and Supported WAN and LAN infrastructure.
  • Configured an implemented Cisco ACS for VPN access, using RADIUS
  • Configured 802.1x for wireless authentication using Cisco ACS
  • Configured and administered cisco Nexus 7000 and 5000 series switches
  • Configured and administered juniper netscreen appliance.
  • Solved a big connection issue with Netscout monitoring tool.
  • Configured and managed juniper router and switches.
  • Configured QOS and COS on head router and core switches to separate Voice data and credit-card data from every other data.
  • Installed and configured CISCO ISE and 802.1X to secure and authenticate wireless devices at the stores and the HQ to improve security.
  • Implemented and configured DMZ and Site to Site VPN on Palo Alto Firewalls
  • Implemented and configured Remote Access VPN, SSL VPNs on Cisco and Palo Alto Firewalls
  • Designed and implemented firewall high availability for the firewall infrastructure.
  • Configured Cisco IP phones for call Center.

Confidential

Network Administrator

Responsibilities:

  • Supported and oversaw; full configuration of twenty Cisco routers and switches. Involved in the migration from exchange 5.5 to exchange 2003. Successfully engineered; Virtual Private Network solution (VPN) Utilizing windows 2003 server and Cisco IOS. Implemented RSA and Administered Cisco VPN.
  • First ever Microsoft Systems engineer in the company achieved by self-.
  • Promoted to mid-senior level Network Administrator.
  • Used VMware to virtualize servers for domain controllers and exchange servers.
  • Configured installed and Administered RHEL6.0 that served as vsftp server.
  • Configured and managed Storage area Network(SANs)
  • Configured and implemented apache web server using RHEL6.0 and Debian.
  • Completely managed, installed and configured Active Directory.
  • Implemented Fibre Channel over Ethernet (FCoE) and Fiber channel protocol(FCP) SANs.
  • Facilitated Software update patches using Windows Software Update Services(WSUS).
  • Completely managed and configured NEXUS 5000 and 7000 switches for the data center.
  • Configured and maintained IIS Services for Microsoft Exchange server.
  • Implemented disaster and data recovery for web servers and domain controllers.
  • Configured and Implemented VOIP on the Network, to allow for Cisco IP phones.
  • Implemented Hyper-V.

We'd love your feedback!