Cloud Network Engineer Resume
0/5 (Submit Your Rating)
Suffolk, VA
PROFESSIONAL EXPERIENCE
Confidential
Cloud Network Engineer
Responsibilities:
- Contributes to the development or modification of network architectures to make efficient use of infrastructure and resources by identifying deficiencies in existing tooling and in existing architecture; works towards improving tools or create new tooling.
- Resolve live site issues by troubleshooting complex network components and features as part of a team.
- Contributes to the design of workflows and automation solutions that identify and resolve platform, system and deployment issues.
- Collaborates with teams across the organization to support and manage network infrastructure deployments.
- Supports innovation and cost management by developing new ideas for network systems and tools that meet customer and/or business needs.
Confidential
GSMO - SDN Engineer - Lead
Responsibilities:
- Assist in the design, development, test, implementation and sustainment of SDN components.
- Support troubleshooting, incident and problem management as necessary
- Apply working knowledge of technical domain to develop solutions to routine technical problems.
- Collaborate with GSM-O request fulfillment and engineering teams to obtain network configurations/templates for various services and implement them in lab environments.
- Interface with DISA IP engineering team on a continuous basis to ensure that the developed SDN solutions align with DISA architectural evolution plans and implementation of new capabilities.
- Support operationalization of new SDN networking solutions in the production environment.
Confidential
JRSS Network Engineer
Responsibilities:
- Analyze discovery information and determine requirements for migration; Provides gap analysis at the start of the project.
- Deconflict inconsistencies between engineering implementation plans (EIPs) and directs changes to EIP authors.
- Maintain current network diagram for COI/Base (end-to-end)
- Controls all variables and allocations e.g., IP Addresses, VLANs, VRFs, shims, process IDs, etc.
- Define migration requirements to Tools and CND teams, this includes acceptable deadlines tracked by Project Manager (PM)
- Tracks task status against ASI schedule and adjusts implementations.
- Conduct various authorized service interruptions (ASI) in migrating bases to the Joint Regional Security Stacks.
- MPLS L3VPN, BGP, OSPF, MP-BGP, L3VPN, ASR9K, ASR1K, Nexus 5K/7K, 6500 Virtual Switching System (VSS)
- Self-Development:
- Conducted AWS training for personal as well as professional development. During this training period I became very familiar with the AWS offering and deployment the core services such as:
- VPC and components, IAM, CloudTrail, CloudWatch, EC2, ELB and Application LB, Autoscaling, Route3, S3, EBS, RDS, CloudFront, Elastic Beanstalk and ECS.
- Currently working on Ansible to solidify automation skills and commenced studying for the AWS CSA-Professional.
Confidential
Network Consulting Engineer
Responsibilities:
- As a Cisco Network Consulting Engineer (NCE) I delivered various technologies, solutions and services to the Defense Information Systems Agency (DISA) and the Federal Bureau of Investigation (FBI). In this role, I served as Cisco’s face to the customer working in a fast paced, high-impact environment as a visible contributor delivering on Cisco’s commitments. As a trusted advisor, assisted Cisco’s Public Sector National Security Organization (NSO) team build a solid long-term relationship with its customers.
- Designed and engineered an ISP MPLS backbone network for the Federal Bureau of Investigation. This network runs the IS-IS protocol in the core. The customer network is deployed with a BGP free core while running L3VPNs for customer interconnections. The ISP backbone will interconnect to 56 core sites and will serve over 18 agencies for DOJ. The design of the backbone takes into consideration the scalability required for future growth and the resiliency expected for the redundancy of an ISP. For high-availability mpls-rsvp-te, bfd, with respect to auto-tunnels for primary and backup tunnels have been configured.
- Performed backbone testing to validate redundancy within the core of the network. Conducted end-to-end customer testing to validate high availability of the transport network. Captured the test results and created a test report for decision makers in management. Very proficient with traditional Cisco IOS, IOS XE, and IOS XR for the ASR9K platforms. Current design is based on the ASR1k platforms running IOS XE code.
Confidential
Principle Network Engineer
Responsibilities:
- Provided escalation support for the O&M organization managing the FBI’s classified and
- Unclassified networks. Performed Network analysis and provided solutions for improving sub-optimal design. Conducted training on Virtual Switching System, DMVPN, MPLS and HAIPE encryption devices.
Infrastructure Architect
Confidential
Responsibilities:- Senior Network Engineer assigned to Confidential -A J65 Plans & Projects to devise the necessary plans to ensure the network design, installation, implementation and tracking of tasks required to complete the projects, as well as ensure that responsible parties perform their assigned tasks in a timely manner. As Project Manager, facilitate communication between stakeholders and provide overall project oversight and reporting to the Confidential -A Headquarters.
- Provide guidance and technical oversight to outside vendors and Task Force 236 Iraq and Task Force 236 Afghanistan. As Infrastructure Architect, redesigned the LAN for Northern Kabul Compound to provide redundancy for users by deploying Cisco’s Virtual Switching System for the NIPR, SIPR and CXI classification. Designed and engineered remote sites as Tier 2 or CAN sites off the hub site.
- Configure the Black Core Network to support NIPR, SIPR, CXI and JWICS utilizing MPLS L3VPN, BGP, OSPF, MP-BGP, L3VPN, RSVP-TE, Class Based Tunnel Selection (CBTS), KG175As and KG175D, SafeNet KG345 and Virtual Switching System (VSS) and ASR1K platform
Senior Network Engineer
Confidential
Responsibilities:
- Provide full life-cycle support for all network services to include NIPR, SIPR and JWICS. Perform network design, installation, implementation, testing and O&M of the garrison and deployed network assets.
- Dynamic Multipoint Virtual Private network (DMVPN), VLANs, VTP, 802.1q and DISA STIGS.
WAN Engineer
Confidential
Responsibilities:
- Design, install, implement, operate and maintain routing within the USF-I Strategic and Tactical Networks. Perform detailed network analysis and diagnostics utilizing SolarWinds and Scrutinizer. Implement network optimization utilizing Quality of Service (QoS), traffic engineering (TE) and policy-based routing (PBR). Worked with DISA Europe, DISA SWA and DISA CONUS in performing diagnostics to circuits or links that these entities provided transport for
- Coordinate with other contractors to repair and make improvements to both the physical and logical WAN infrastructure to support Military communications in the IRAQI area of operation. Gained solid understanding of NIPR and SIPR enclaves during this effort supporting Operation Iraqi Freedom (OIF).
- Border Gateway Protocol (BGP), Open Shortest Path First (OSPF), Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), Quality of Service (QoS), Hot Standby Router Protocol (HSRP), Gateway Load Balancing Protocol (GLBP), Routing and Forwarding (VRF-Lite), Spanning Tree Protocol (STP) Multiple Spanning Tree Protocol (MSTP), 802.3AD link aggregation Control Protocol and Cisco Port Aggregation Protocol (PaGP) ether-channel.
Principle Network Engineer
Confidential - Suffolk, VA
Responsibilities:
- Designed and engineered the Next Generation Joint Training Enterprise Network (NEXGEN JTEN). Tested NEXGEN JTEN using hardware and software from various vendors, such as Juniper, Cisco, McAfee,
- Tipping Point, Breaking Point and Spirent Communications hardware and software. Engineered a Service Provider network with the latest technology innovations such as OSPF, BGP, MPLS, MP-BGP, VPLS, VRF and IPv6. Perform testing and evaluation of various network infrastructure devices, intrusion prevention sensor (IPS) appliances and firewalls in a Research, Development, Testing and Evaluation (RDT&E) environment.
Senior Network Engineer
Confidential - Virginia Beach, VA
Responsibilities:
- Project team leader for network and security analysis of the AAUSN metropolitan area network, TBEN metropolitan area network and RDT&E networks. Responsible for conducting initial investigation of the network and obtaining pertinent network documents such as network diagrams and IP schemes. Facilitate briefings for customer sites on the asset discovery tools utilized for the network scan. Generate trip reports and summary of the entire scanning evolution.
- Conducted network and security analysis of US Navy legacy networks that will be migrated to the NMCI enterprise enclaves or decommissioned.
- Informed and advised site representatives, Central Design Authorities and Program Managers on the process by which legacy systems are transitioned to Navy enterprise enclaves.
- Ensured the end-state posture of enterprise networks is not significantly diminished due to the
DCGS Network Security Manager
Confidential - Hampton, VA
Responsibilities:
- Monitored AF DCGS network utilizing HP Open View. Isolate any technical problems that may affect the normal operations of data flow from site to site on a global scale network.
- Performed centralized change control functions to support DCID 6/3 change requirements.
- Analyzed threats to the DCGS systems and networks.
- Provided continuous intrusion detection monitoring.
- Monitored computer network for incident and technical vulnerabilities and provided the status to the ISSM.
