We provide IT Staff Augmentation Services!

Network Engineer Resume

0/5 (Submit Your Rating)

Seattle, WA

SUMMARY

  • Cisco Certified Network Engineer with over 9+ years of experience in the industry, which includes expertise in the areas of Routing, Switching and Firewall.
  • Expert level knowledge of troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, BGP and ability to interpret and resolve complex route table problems.
  • Implementation of traffic filters on Cisco routes using Standard and extended Access list.
  • Expert Level Knowledge about TCP/IP and OSI models.
  • In - depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP services.
  • Cisco ASA Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Extensive Knowledge on the implementation of Cisco ASA 5500 series and checkpoint R 75 firewalls.
  • Hands on experience working with Cisco Nexus 7K, 5K & 2K Switches.
  • Worked on NXOS, IOS, and IOS-XR BXB to N7K-NXOS (MPLS) system test.
  • Experience in F5, Cisco ACE 4710 Load balancers.
  • Extensive understanding of the Application Security Module (ASM) technology.
  • Experience in working with load balancer for converting CSS to ACE.
  • Experience deploying BIG-IP F5LTM Load Balancers for load balancing and traffic management of business application.
  • Hands-on deployment, tuning, and troubleshooting experience, ideally with Palo Alto Networks, Check Point, Juniper, or Cisco security product suites.
  • Strong hands on experience in installing, troubleshooting, configuring of Cisco 7200, 3800, 3600, 3400, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
  • In-depth knowledge and hands-on experience in ISP Routing Policies, Network Architecture, IP Addressing, Sub netting, ARP, VLSM, TCP/IP, MPLS, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Ping Concepts.
  • In-depth knowledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
  • Experience in working with video from end-point in the network to the backend.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.
  • Experience with working on Juniper Devices like, M320 and MX80, MX960, MX480 and Juniper EX Devices such as EX2200, EX2500.
  • Extensive knowledge in different networking protocols DHCP, DNS, FTP, VOIP (SIP, H.323, MGCP), Quality of Service (QOS).
  • Experience with Layer 2 and Layer 3 protocols like LDP, RSVP/ TE, QOS, COS L2 VPWS and VPLS, FRR.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Experience in configuring HSRP and redistribution between routing protocols troubleshooting them.
  • Experience on Virtual Private Network (VPN) for operating Network and Data Center.
  • Network analysis and troubleshooting tools - Sniffer Pro, Wire shark.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.
  • Strong problem-analysis talent, driven by a global view/attention-to-detail approach. "Hands on" technical knowledge Experience with different Network Management Tools and Cisco works support 24 x 7 Network Operations Center.
  • Exceptional experience working in fast-paced, deadline-oriented environments.

TECHNICAL SKILLS

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPNVLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP.

Networking Hardware: Cisco Switches, Cisco Routers, ASA/Pix firewallsVMware.

Routing Protocols: OSPF, IGRP, EIGRP, RIP, MPLS, IS-IS, BGPMulticasting.

Security Technologies: Cisco PIX, Blue Coat.

Network Monitoring: Cisco Works 2000, Solar Winds, Wire Shark, AppNetaHRPing.

Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR.

Routers: Cisco ASR 1002/1004, 2911/2921/2951 , Cisco VG 202/204 XM, Cisco VG310, Juniper M& T series.

Capacity & performance: Cisco works, SevOne.

Switches: Cisco 2960, 3560,3850,4500,6500, Nexus 7k, 5k, 2k

Firewalls: Juniper SRX (300/550), Pix (525/535), Fortinet Firewalls ASA (5520/5550/5580 ), Palo Alto 3060/5020/5050

AAA Architecture: TACACS+, RADIUS, Cisco ACS.

Features & Services: IOS and Features, HSRP, GLBP, IPAM, NAT, NerMRINTP, DHCP, DNS, TFTP and FTP Management.

PROFESSIONAL EXPERIENCE

Confidential, Santa Ana, CA

Sr. Network Engineer

Responsibilities:

  • Involved in complete LAN, WAN, Extranet redesign (including IP address planning, designing, installation, Pre-configuration of network equipment, testing, and maintenance) in both Campus and Branch networks.
  • Working with local IT personnel on troubleshooting, problem determination, diagnosis of performance issues, bandwidth issues, throughput traffic prioritization to improve overall application response time across WAN.
  • Participating in the design and planning aspects of the network infrastructure installed in the new building.
  • Worked with MPLS for redirecting data from one network node to another network node based on the shortest paths.
  • Managing the entire OC data center, configure, troubleshoot and support Cisco routers (2900 and 3900 series, 1002/1004 ASR), Switches (3800, 6500, 4500 series, Nexus 7K, 5K and 2K).
  • Monitor and maintain wireless Access PointNetworkfor Confidential sites via Cisco Prime. This includes AP Alarms, Up/Down alerts, Configuration issues, Break / Fix requests and Facilitate Replacement reinstallation with third party hands and feet vendors at remote sites Wireless Troubleshoot tickets and Database Maintenance. AP’s include 1100 series, 3500 series and 3700 series
  • Provide network engineering and technical support for complex network related incidents, changes and projects.
  • Experience working with Infoblox Management tool and worked with Extreme networks wireless devices like Access points AP3705, AP3610.
  • Coordinate, install and maintain appropriate network systems and hardware as part of ongoing transformation/migration project in the county.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Performed layer 2/layer 3 switching configurations like 802.1q trunking, Inter-VLAN routing, port-security, STP and Ether channel configurations.
  • Responsible for Cisco ASA firewall Administration; troubleshoot ACLs, NATs, and VPNs.
  • Deploy ASA firewalls in Active/Active with multi-context to support a multi-tenant environment: using VRF-Lite.
  • Configured ASA 5540 to ensure high-end security on the network with ACLs and Firewall. Assigned a security level (0-100) on Cisco ASA and the number vary with the trust issues.
  • Plan, design, implement new cisco network infrastructure for voice and data services from scratch on every single site part of multiple government agencies across OC, evaluating and interacting with third party power, cable and circuit vendors to meet client requirements according to the migration project.
  • Installed and configured storage VMware and worked Flex team for Configuring and installing Dell Power Connect switch 5548 and increasing their Bandwidth Usage.
  • Troubleshoot/Implement Wan Connectivity in an enterprise MPLS environment: PE / P / CE Routers.
  • Configuring and implementing F5 BIG-IP,LTM,GTM load balancers to maintain global and local traffic.
  • Worked with MPLS to improvequality of service(QoS) by defining LSPs that can meet specificservice level agreements(SLAs) on trafficlatency,jitter, packet loss anddowntime.
  • Update the IOS, VLAN changes, Port configurations, Test Fiber connections, Install UPS’s, Update all databases (CMDB), work trouble tickets.
  • Worked with InfoBlox (a DNS, DHCP, IPAM appliance) updating DNS & DHCP configurations within multiple network views through InfoBlox and MS DNS/DHCP consoles.
  • Worked with voice team for transformation of sites and providedNetworkcut-over fromATOSData Center.
  • Worked onCheckpointFirewalls primarily tasks involving NAT policy changes, policy management.
  • Handled SRST and implemented and configured the Gateways, Voice Gateways.
  • Troubleshoot/Maintained/Implemented Routing in an MP-BGP enterprise environment.
  • Perform troubleshooting and monitoring of incidents queues and executing network changes as required.
  • Analysis of current system configuration and use to provide recommendations for future project planning, improved efficiency, and capacity planning.
  • Opening and Managing Cisco TAC Cases.
  • Participate on the On-call network support schedule.

Environment: LAN/WAN, DNS, DHCP, DDNS, TFTP, IP4, SevOne, VPN, F5 Load balancers, Cisco Catalyst 6500/4507/3850/3560 Switches Nexus 7K/ 5K /2K, Cisco ASR 1002/1004, ISR 2911/2921/2951 , VG 202/204/310, Cisco ASA 5545 Firewall, NAT / PAT, IPsec.

Confidential, NYC, NY

Sr. Network Engineer

Responsibilities:

  • Configuration and installation of LAN switches and wireless network infrastructure equipment and cabling all uplink and user network connections.
  • Participated in testing the internal network infrastructure in the new building, troubleshooting and remediating any issues.
  • Deployed Cisco Catalyst 6500, 4500, 3750, 3850, 3560 (Layer 2 through 7) and Cisco ASR 1000, 7000, 9000 series routers.
  • Involved in Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Intervlan routing and LAN security.
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • Expertise in configuring and troubleshooting of Palo Alto, Fortinet, Juniper NetScreen & SRX Firewalls and their implementation.
  • Enable LDAPS on Infoblox and addition of subnets in DNS andIPAMin Infoblox.
  • Experience configuring VPC, VDC and ISSU Software upgrades on Cisco Nexus 7010
  • Configuring Palo Alto policies and setting different device configurations.
  • Experienced working with Nexus OS, IOS, CATOS and Nexus 7K, 5K & 2K Switches.
  • Configured session persistence and web services.
  • Wirelesses network troubleshoot and support based on CISCO Aironet 1100,1200, Cisco 1520/1522 Mesh Access Points.
  • Deployed Juniper switches EX4500 and EX4200, M7i, M10i and MX480 routers.
  • Involved in software development and testing using C language on Linux and Unix Platforms.
  • Expertise in Cisco ASA 5525 firewalls with ACL security in a multi-VLAN environment.
  • Configured Firewall DMZ zones.
  • Troubleshooting the Juniper SRX 210 and 240 series, Juniper NetScreen routers with Site-Site VPN, and firewalls.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Responsible for the oversight of all security devices on the network i.e.CheckPointfirewalls (IPSO), IDS.
  • Design and Implement DMZ for FTP, Web and Mail Servers with Cisco PIX 506, PIX515.
  • Configured RSTP, MST and used VTP with 802.1q trunk encapsulation. Provided port binding and port security wherever required. Provided router redundancy through HSRP.
  • Experience with configuring OTV between the data centers as a layer 2 extension.
  • Worked withPaloAltofirewalls PA5050 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.
  • Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Worked and performed troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, and BGP ability to interpret and resolve complex route table problems.
  • Experience with Security- Firewalls, NAT / PAT, IPSEC, S2S.
  • Implemented many number of security policy rules and NAT policy rules onPaloAlto, created Zones, ImplementedPaloAltoFirewall interface,PaloAltoIDS and VLAN.
  • Designed and implemented F5 Big IP load balancers that resulted in improving application performance.
  • Performed successfully physical to virtual and virtual to virtual conversions of physical/virtual machines usingVMwareConverter.
  • Installed and monitored extreme networks S-series, 7100 stackable switches and E4G-400, 1800 router to support VMware machines.
  • Configured static NAT, dynamic NAT, dynamic NAT overloading.
  • In-depth expertise in the implementation, optimization, troubleshooting and documentation of LAN/WAN networking systems.
  • Analysed the Policy rules, monitor logs and documented theNetwork/Traffic flow Diagram of thePaloAltoFirewalls placed in the Data Center with MS Visio.
  • Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA) on F5 BIGIP appliances.
  • Interacted with various inter and intra-department groups on both a technical and a personal level.
  • Installed, configured and set security policies on cisco and checkpoint firewalls, VPN.

Environment: LAN/WAN, DNS, DHCP, DDNS, TFTP, IP4, IP6, VPN, F5, CISCO ACE 4710 Load balancers, GSS, Cisco Catalyst 6500/4500/4000/3750/ 3850/3560 , Nexus 7K/ 5K /2K, Juniper EX4500/EX4200, M7i/ M10i Firewalls, NAT / PAT, IPSEC, S2S, Juniper SRX 210/240 and Palo Alto Firewalls.

Confidential, Phoenix, AZ

Sr. Network Engineer

Responsibilities:

  • Involved in configuring and implementing of composite Network models consists of Cisco7600, 7200, 3800 series routers and Cisco 2950, 3500, 5000, 6500 Series switches.
  • Participated in the installation, configuration, and post installation daily operational tasks and deployment of Cisco Nexus equipment.
  • Designed 10 gigabit networks using Cisco Nexus 7000 series switches, and Cisco 3800 series routers.
  • Managed rules on Cisco checkpoint NGX firewall.
  • Worked with Juno OS and Juniper M&T series switches.
  • Configured routing protocols such as RIP, OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance.
  • Working with MPLS Designs from the PE to CE and configuring VRF on PE routers.
  • Configured OSPF redistribution and authentication with type 3 LSA filtering to prevent LSA flooding.
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Support customer with the configuration and maintenance of PIX and ASA firewall systems.
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path.
  • Allocation and designing appropriate virtual IP for F5 ADC throughIPAMInfoblox
  • Editing and Changing Palo Alto Polices and Monitoring threats on firewalls.
  • Experience with Security- Firewalls, NAT / PAT, IPSEC, S2S.
  • Worked with Management tools like CSM and Cisco ACS.
  • Worked with Cisco IOS, NX-IOS, IOS-XR.
  • Worked with Load balancing device like F5 Big-IP local traffic manager (LTM) 1600 and Cisco ACE 4710 Load balancers.
  • Experienced in working with BIG-IP Edge Portal and BIG-IP Edge Client.
  • Experience with ALG (RTP, RTSP and FTP, DNS, HTTP), DHCP.
  • Worked with Windows Power shell and power shell plus.
  • Implemented various OSPF scenarios on networks consisting of 7600 routers.
  • Security policy review and configuration in Palo Alto and Juniper SRX Firewall in US offices and Datacenter. Troubleshooting of CISCO routers with ping, trace route and basic issues
  • Configured Multiprotocol Label Switching (MPLS) VPN with Routing Information Protocol (RIP) on the customer’s site.
  • HandledVMwaresolutions to support multiple storage connectivity options such as Fiber Channel-SAN, iSCSI, NFS (NAS).
  • Managed ESXi hosts using vCenter Server/ vSphere Client andVMwareWeb Client.
  • Responsibilities also included placing order for new SFP’s, implementing inline capabilities for home agents and running network cables from Palo Alto direct to required firewall.
  • Hands on Knowledge/experience on F5 Load Balancers, its methods, implementation and troubleshooting on LTMs and GTMs.
  • Involved in Administration, Policy Service, Monitoring of Cisco ISE node.
  • Negotiated VPN tunnels using IPsec encryption standards, configured and implemented site-to-site VPN, Remote VPN.
  • Provided full visibility and notification of authorized and unauthorized network access with integration of CISCO ASA/FWSM and NAC solution.
  • Analyzed and tested network protocols (Ethernet, TCP/IP) using Wire shark tool.

Environment: Cisco routers & switches 7600/7200/3800/7000 & 2950/3500/5000/6500 , Nexus Version 4.2&5.0 Cisco checkpoint NGX firewall, Palo Alto Firewalls, NAT / PAT, IPSEC, S2S, MPLS VPN, Cisco ACE 4710 & F5Load balancers.

Confidential, Seattle, WA

Network Engineer

Responsibilities:

  • Responsible for implementing, supporting, and maintaining 24x7 network services.
  • Coordinated efforts with Engineers to ensure all network devices conformed to defined network standards.
  • Configured various Routing protocols such as RIP, OSPF, EIGRP and static routing.
  • Provided configuration of STP and Port Security on Catalyst 6500 switches.
  • Configure the Cisco CRS-1 Routing System, back out of configuration changes, and restore older versions of a configuration.
  • Troubleshooting of Cisco 2800, 2900, 3900, 7200, 7600, ASR9k, CRS, and GSR 12k Series routers.
  • Configured Cisco IOS XR security features in both owner SDR and non-owner SDRs.
  • Configured legacy route map using the new Cisco IOS XR Routing Protocol Language (RPL).
  • Worked with Juniper Net Screen 500/5200 and Juniper SRX 650/3600.
  • Worked on Fiber channel over Ethernet (FCOE) for connecting 10gigabit Ethernet networks.
  • Maintaining Core Switches, creating VLANs and configuring VTP.
  • Optimized performance of the WANnetworkconsisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Created and resolvedPaloAltoFirewall Rules, Routing, pushed Policy via Panoroma.
  • Configuring Palo Alto’s for inline use and Adding signature attacks on prevention lists.
  • Experienced working with Tomcat and Apache servers in troubleshooting network issues for our internal server teams.
  • Checkpointfirewall Engineer responsible for upgrading CP4000, IP 390, IP1280 appliances from R71 to R77.
  • Worked with Enterprise Intrusion Detection / IPS (Snort, Source fire, Juniper IDP, IBM ISS, and McAfee Intrushied).
  • Designed on - premise IVRs for integrating with the ACD and CRM systems to ensure maximum efficiency in call handling.
  • Configured with F5 Load balancers in Failover for Load balancing and SSL handling.
  • Performed redistribution with OSPF, EIGRP, RIP version 1 and 2 to enable communication with backbone.
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Auto Tuning Palo Alto Signatures and syncing between the data centers, working on PCI’s and managing it during peak if needed.
  • Executed BPDU Guard, port-fast, uplink fast and other spanning tree features on various layer 2 and layer 3 switches.
  • Troubleshooted advanced Riverbed Issues and settings.
  • Configured and optimization settings of Riverbed.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • Troubleshooting of Cisco 2900, 3900, 6500, 7500, 7200 Series routers.
  • Configured static NAT, dynamic NAT, dynamic NAT overloading.
  • Back up a Cisco IOS to a TFTP server and Upgraded and restored a Cisco IOS from TFTP server.
  • Configure and InstallF5New Virtual Servers, Profiles, IRules, Pools, Nodes, Generate CSR, SSL s Etc.,
  • Configuring ACL on ISE for making policies.
  • Route configuration and point code checks for System Technician and Network Technician.
  • Knowledge and experience of 802.11 a/b/g/n Ethernet standard for wireless Technology.
  • Worked with other team members in testing of the network architecture.
  • Participated in quality system implementation project.
  • Configure wireless routers on enterprise network.

Environment: RIP, OSPF, EIGRP, Cisco 2800/2900/3900/7200/7600 , ASR9k, CRS&GSR 12k Series routers, juniper SRX 650/3600, static NAT, dynamic NAT, Palo Alto Firewalls, Cisco 3550/4500/6500 switches.

Confidential

Network Engineer

Responsibilities:

  • Worked on Network design and support, implementation related internal projects for establishing connectivity between the various field offices and data centers.
  • Configuration, maintenance and troubleshoot of Cisco 3640, 7200 Series Routers and Cisco 2960 & 3550, 3750 series Catalyst Switches and Modems for clients.
  • Enable STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
  • Design solutions and proof of concepts (POC) and troubleshooting Support for Fortinet UTM/Firewalls,
  • FortiWeb Web Application Firewalls, FortiMail Email Security Appliance FortiDoS Appliance, Fortinet Wireless LAN and Fortinet link and application load balancer to the customers.
  • Configuring VPN Site to Site Connection and Mobile VPN Dialer and PPTP.
  • Provided solution for identity based authentication based on their existing LDAP users and protection of Public hosted servers by using FortiGate-1240B (HA).
  • Installed Solaris patches on Unix Servers.
  • Configuring and troubleshooting various WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Implemented and Migrated T1's Circuit to new redundant DS3 Circuits. Achieved higher Bandwidth with higher availability.
  • Troubleshoot and hands on experience on security related issues on CheckpointIDS/IPS.
  • Using provided documentation, apply quarterly updates to communications equipment (i.e servers, routers, switches, IPS/IDS, virtual servers, encryption devices).
  • Maintain a thorough understanding of the basics behind the Internet and its workings (DNS, Security, IP Routing, HTTP, VPN, Email Routing, SPAN, etc.)
  • Provisioning Testing and Configuration of New DS3, STM and Metro Ethernet circuits.
  • Configured Ironport Email Security Appliance for email gateway with different dominos.
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst switches.
  • Configuring Gateway Antivirus and Intrusion Prevention System.
  • Monitor LAN/WAN and device activities utilizing Cisco Works, SolarWinds Orion, and SNMP and make hard/software upgrade and change.
  • Plan and upgraded existing Cisco Call Manger Server from Version 4.1 to Version 7.0.
  • Created dedicated VLANs for Voice & Data with QOS for prioritizing VOICE over DATA.
  • Involved in internal network's OSPF, MPLS & BGP Internet service redesign activities.

Environment: Cisco Routers & Switches 3640/7200 & 2960/3550/3750 , Fortinet UTM/Firewalls, LDAP, TCP/IP, DNS, HSRP, VPN.

Confidential

NOC Engineer

Responsibilities:

  • Provided Tier1 technical support; assisted users facing network problems. Perform advanced troubleshooting, diagnostics and provide tier/level-1 solutions to network failures.
  • Configured IT LAN/WAN elements and held responsibility of maintaining and monitoring performance of network
  • Network Migration from RIP to OSPF and EIGRP.
  • Network infrastructure support to routing and switching equipment’s.
  • Redistribute routing protocols and Frame-Relay configuration.
  • Designed the layout for cable installations.
  • Configured RIP and EIGRP on 2600, 2800 and 3600series Cisco routers.
  • Implemented ISL and 802.1Q for communicating through VTP.
  • Managed installations, configuration and administration of Cisco equipment in IT architecture of organization.
  • Used Wireshark to analyze the networks.
  • Configured of IP Allocation and sub netting for all applications and servers and other needs throughout company using FLSM, VLSM addressing.
  • Designed network connectivity and network security, between various offices and data center. Installed and configured routers including 1800, 2600 along with Cisco switches including 3750 and 6500.
  • Design of a multiple network installations including a new building, extensive work with Gigabit Ethernet, Cisco hardware and IOS, customer network architecture and implementation.
  • Responsible for generation of requirement documentation, technical planning, design and detailed systems engineering of voice and data networks as well as the required network infrastructure of various requirements of clients.
  • Support customer with the configuration and maintenance of ASA firewall systems.
  • Troubleshoot and resolved dynamic routing, Ethernet switching and host connectivity issues in a window and network environment.
  • Troubleshoot wiring problems and serial communication lines.
  • Develop, plan and maintain documentation necessary for operation in support of LAN to WAN connectivity.
  • Maintained excellent communication with the IT Manager on all tasks and projects.

Environment: Cisco routers 2600/2800/3600 , RIP V2, OSPF, BGP, RIP, OSPF, EIGRP, ASA firewalls, LAN/WAN.

We'd love your feedback!