We provide IT Staff Augmentation Services!

Security Engineer Resume

3.00/5 (Submit Your Rating)

Southlake, TX

TECHNICAL SKILLS:

Hardware and software experience: MS Visio, Cisco WebEx, Junos Space, Juniper NSM, Juniper SRX, Juniper ISG, Juniper STRM, Forti manager, SevOne Network Monitoring, Active Directory

Cisco:  Nexus 7k, CRS1/3/10, ASR9K, ASR1K, 6500 series switches, 3900s, RLCs.

Juniper:  EX, QFX switches, MX480/960, SRX 3600/5800, STRM, NSM. F5 - Big IP LTM, GTM, Firewalls, Fortinet, Servers.

Operating Systems: Windows, LINUX-Red Hat, Centos, Cisco IOS, Cisco NX-OS, F5 load-balancer, Big-IQ

Troubleshooting tools: Ping, telnet, Trace-route, show commands.

PROFESSIONAL E XPERIENCE:

Confidential,Southlake, TX

Security Engineer 

Responsibilities:

  • Deployed and performed configuration of Cisco 4000 series, 296X series, 3850 switches and Cisco ASA firewall 5010.
  • Led the troubleshooting bridge on all the critical outages. This includes coordinating with all vendors, recovering from the outage and gathering all the necessary data for root cause analysis
  • Prepared MOPS and PLAYBOOKS for maintenance activities planned during the off hours. 
  • Install, support and maintain hardware and software infrastructure according to best practices, including routers, aggregators, switches, and firewalls.
  • Familiar with Juniper, F-5 load-balancer, Forti-manager, Forti-Analyzer
  • Implemented complex clustered failover or disaster recovery to reshape traffic with F5, Juniper SRX 5800 and Juniper ISG.
  • Strong Knowledge of Juniper products ( SRX-3600, QFX, SRX-5800, ISG )
  • Used Linux commands to perform data backups during maintenance windows.
  • Familiar with enterprise WAN connectivity (MPLS, T1 circuit, VLAN routing, VRF, LACP).
  • Implemented and support customer SSL and L2L IPSEC VPN connectivity solutions.
  • Contributed to and lead customer network integration and connectivity projects.
  • Created and maintained documentation regarding processes and procedures.
  • Identified and recommended efficiencies for systems, processes and procedures.
  • Setup new facility infrastructure as part of larger team.
  • Setup, upgrade, maintain end-user systems such as tablets, PC’s, laptops, thin-clients, printers, scanners, phones and similar, including relevant software applications.
  • Pro-actively identified and prevented customer issues by identifying problems through troubleshooting skills.
  • Manage projects and maintenance tasks in Remedy (ticketing system)
  • Performed ongoing performance tuning, hardware upgrades, and resource optimization as required.  

Contractor Junior Network Engineer

Confidential,Lewisville, TX

Responsibilities:
  • Deployed and performed configuration of Cisco Catalyst 6513 13-Slot Switch Chassis.
  • Used structured troubleshooting process to solve Switched Virtual Interface (SVI) issues and provide inter-VLAN routing.
  • Set up, allocated and implemented Wide Area Network protocols: HDLC, PPP, ATM and Frame Relay.
  • Troubleshoot inter-VLAN routing issues in the router-on-a-trunk topology.
  • Set up, allocated and implemented routing protocols, and mechanism: BGP, IBGP, QoS, EBGP, OSPF, EIGRP, and RIP.
  • Used powerful network traffic analyzer like Wire-shark to track eventual malwares or unsolicited IP address intrusions.
  • Used traffic shaping features like QOS to prioritize critical traffics, prevent bandwidth hogging, and manage network congestion.
  • Build and troubleshoot Dynamic VPN's and IPSEC tunnels.
  • Deployed and performed configuration of Cisco Nexus 7010.
  • Created VDC and assigned ports to the VDCs.
  • Set up a Nexus VDC from scratch.
  • Created layer 3 interfaces between the Nexus 7000 switches.
  • Trunked to another switch utilizing vPC on the Nexus 7010.
  • Added ports to existing VDCs and configured a L3 IP Address.

Contractor Junior LAN technician Communications

Confidential, Texas

Responsibilities:
  • Deployed and performed configuration of Cisco 4000 Series Integrated Services Routers.
  • Monitored, configured and installed company servers, computers, printers and cables.
  • Monitored and configured management protocols: SNMPv2, ICMP, Syslog, NTP and UDP.
  • Used AAA server to validate user credentials, assign appropriate users privileges, and log user activity.
  • Used packet filters tools like ACL and Cisco ASA firewalls 5510 to restrict the access of users and devices to the management network and sensitive data servers.
  • Troubleshoot Spoof-Prevention Features: DHCP Snooping, Dynamic ARP inspection, and IP Source Guard.
  • Set up, allocated and implemented network security and transport protocols: SSH, NAT, SFTP, TCP/IP, SONET, and IPsec.
  • Troubleshooting Route Maps and Policy-Based Routing.
  • Advertised Network/Host subnet via BGP.
  • Used trace-route to identify physical First Hop Router in the network.
  • Configured EIGRP split-horizon to prevent router’s loop.
  • Deployed and performed configuration of Cisco Catalyst 3560 Series Switches.
  • Set up, allocated and troubleshoot layer 2 protocols and features: STP, RSTP, HSRP, VTP, L2TP, Ether Channel, Port-Fast, Trunks, PAgp, LACP, and VLAN.
  • Troubleshoot TCAM and high CPU utilization on Cisco Catalyst 3560 Series Switches.

We'd love your feedback!