We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

4.00/5 (Submit Your Rating)

Wake Forest, NC

PROFESSIONAL SUMMARY:

  • CCNA, CCNP certified professional with 8 Years of experience in design, deployment and troubleshooting of routing, switching, Firewall networks.
  • Extensive experience in configuring and troubleshooting of routing protocols RIP v1/v2, EIGRP, OSPF, BGP and TCP/IP, LDAP, 802.11 WIFI.
  • Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 3500, 4500, 5500, 6500 series switches.
  • Excellent working knowledge of TCP/IP protocol suite and OSI layers.
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems
  • Working experience with Datacenter Switches such as Nexus 2K, 5K and 7K
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for data center access architecture.
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Cisco Security:SSH, SDM, NAT/ACLs, AAA, Layer 2 Security, Layer 3 Security, IPS/IDS, Cisco (ASA, PIX) 5510, Cryptography, VPN, IPsec, Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500 (5510/5540) Series
  • Experience with convert PIX rules over to the Cisco ASA solution.
  • Worked on Load Balancers CSM and F5 BigIP LTM like 3900, 6900 for corporate applications.
  • Worked on the migration to new Checkpoint R75 firewalls from Juniper firewalls.
  • Produce and support Firewall polices configuration builds to allow implementation of customer projects.
  • Well Experienced in configuring protocols HSRP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, ATM, MPLS, SNMP, FTP, CHAP, and SNMP.
  • Ability to manage all phases of network installation and administration.
  • Excellent customer management/resolution, problem solving and debugging skills with good verbal/written communications and presentation skills.
  • Well organized, Self - starter, Quick learner, Self-Motivated, Team player with analytical, technical and communication skills.
  • Excellent skills to implement VLANS, private VLANS, Port security, STP and RSTP (802.1W), standard and extended access lists for managing access based security, creating root views for administrative privileges.

TECHNICAL SKILLS:

Networking: LAN, WAN, Wi-Fi, DNS, WINS, DHCP, TCP/IP, ISCSI, Fiber, Firewalls/IPS/IDS

Hardware: Dell, HP, CISCO, IBM, SUN, Checkpoint, Palo Alto

Operating Systems: Windows, NT, MS-DOS, Linux, Microsoft Windows 2008 R 2/ 2008/2003/2000 /2012 NOS family, Microsoft Active directory 2008/2003/2000 , VM Ware ESX/ESXi server, Cisco IOS, NX-OS

Application Servers: DNS, DHCP, Windows Active Directory Services, FTP, SFTP, Microsoft Exchange 2003/2007/2010 , Microsoft SharePoint 2007/2010

CISCO Switches: 2900 series, 3560, 3750, 4500, 6500, Nexus 2k,5k,7k and Avaya switches

JUNIPER Routers: Juniper MX480, 240, 80 series

Switches: Juniper EX4500, 4200

Firewalls: Check Point, ISA 2004/2006/ ASA 5585/5520, FWSM, Palo Alto /Checkpoint 4200/Nokia IP-560, Cisco PIX 535/525

Routing/Routers: OSPF, EIGRP, BGP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing. Cisco Routers 1700, 1800, 2500, 2600, 3200, 3600, 3700, 3800, 4000,7200, 7600.

Infrastructure Hardware: IBM, HP, Compaq, Dell desktops\laptops\servers, Cabling, Network printers, IP KVM Switches, Cisco Routers & Switches, 802.11x Wireless gateways, Access Points, Network UPS

Switching: VLAN, VTP, STP, Inter VLAN routing & Multi-Layer Switching, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging

Protocols: TCP/IP, L2TP, PPTP, IPSEC, SSL, SSH, UDP, DHCP, DNS

VPN: ASA 5520, Cisco Concentrator 3030, Nortel Contivity Extranet 1500

Security Tools: Wireshark, MBSA, MS Visio, Apache, VMWare ESXi 3.5, VMware Server, Encase

PROFESSIONAL EXPERIENCE

Confidential, Wake Forest, NC

Sr. Network Engineer

Responsibilities:

  • Experience working with Nexus 7018/7010, 5020, 5548, 2148, 2248 devices
  • Hands on experience in Cisco Catalyst 3550, 3750, 4500, 4900, 6500 series
  • Configured VLAN Trunking 802.1Q, STP and Port Security on Catalyst 6500 switches.
  • Experience in designing, implementing and troubleshooting Cisco routers using different routing protocols like OSPF, EIGRP, BGP, RIP
  • Provided redundancy in a very multihomed Border Gateway Protocol (BGP) network by tuning AS-path
  • Resolved application and network related problems using Wireshark, OPNET and other network analysis tools
  • Experience working with OTV & FCOE on the nexus between the datacenters.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
  • Have hands on experience on Network Access Control(NAC)
  • Hands on Experience testing iRules using Browser(IE), HTTP watch
  • Convert Campus WAN links from point to point to MPLS and to convert encryption from IPsec/GRE to GetVPN.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Implement and configured GLBP (on core switching and also for VPN redundancy), HSRP on different location of office on the switched network and managing the entire multilayer switched network
  • Executed commissions on information security risk assessments and controls selection activities.
  • Having hands on experience with F5 Local Traffic Managers (LTM).
  • Having hands on experience with F5 Global Traffic Management (GTM).
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
  • Successfully installed Palo Alto PA-3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls
  • Experience with convert PIX rules over to the Cisco ASA solution
  • Working closely with knowledge center management to investigate the information center sites for cabling necessities of assorted network instrumentation.
  • Good knowledge in Designing, Installing, Testing, Implementing and Maintenance of the Cisco Wireless and Aruba Wireless.
  • Experience with 802.11a/g/n/ac Cisco WLC, CAPWAP, LWAPP, can use tools such as Cisco Prime Infrastructure, AirMagnet suite to design and support WLANs
  • Configuring, Administering and troubleshooting Checkpoint and Cisco ASA firewall
  • Managed corporate Checkpoint smart console R77, R75.20 and R75.40 implementing security rules, experience on using Smart Dashboard, Smart view Tracker to mitigate network attacks.
  • Experienced in SamKnows white box testing with different band width, delay and packet drop.
  • Created a model for speed test, packet drop and delay
  • Automate test procedure using different bandwidth delay and packet drop using scripting.
  • Provided Load Balancing towards access layer from core layer using F5 Network Load Balancers.
  • Managed the F5 Big IP GTM/LTM appliances which include writing iRules, SSL offload and everyday task of creating WIP and VIPs
  • Involved in Disaster Recovery activity, like diverting all the traffic from the production data center to Disaster Recovery data center.
  • Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event of core router becoming unreachable.
  • Used shell script to execute parallel with various scenarios.
  • In-depth knowledge and hands-on experience on IP Addressing, Subnetting, VLSM and ARP, reverse & proxy ARP, Ping Concepts
  • Automated tasks using scripting Perl, Python and Bash Scripting.
  • Worked on allotted tickets to see the purpose of failure and resolve issues remotely utilizing obtainable tools and different Operation Center resources.
  • Configuring SNMP on Switches and adding them to Solar Winds for monitoring the health status of the Network devices
  • Hands-on experience and well versed in utilizing networking tools and applications, such as Cisco Works, SolarWinds and Wireshark
  • Provide step-up support to L1 members of network team.
  • Work & intensify issues effectively to satisfy client SLA's (service level agreements).
  • Perform downside management and root cause analysis for purchasers.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, PPP, VPN, Checkpoint, Palo Alto, Cisco ASA.

Confidential, Menlo Park, CA

Network Engineer

Responsibilities:

  • Negotiate VPN tunnels 10G using IPSec encryption standards and configured and implemented site-to-site VPN, Remote VPN.
  • Configuring IPSEC VPN on SRX series firewalls
  • Proactively involved in upgrade, maintenance, monitoring and support for the PA500 Palo Alto devices.
  • Configuration and troubleshooting on HSRP, VRRP, GLBP, RSTP, MST. 10G related issues coming in network environment
  • Handled Various Cables and allotted networks(NAC)
  • Configuration and extension of VLAN from one network segment to their segment between Different vendor switches (Cisco, Juniper)
  • Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.
  • Working on Network design and support, implementation related internal projects for establishing connectivity between the various field offices and data centers.
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls Juniper MX series Internet service providers.
  • Managed teams of front line security analysts, investigators, and change/incident engineers.
  • Developed a deep understanding of the prospective customer purchase process and assist with pre-sales activities.
  • Developed future leadership within the organization.
  • Troubleshooting and installing of CRS, ISR, GSR, ASR and Nexus devices.
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade. Supporting EIGRP and BGP based PwC network by resolving level 2 &3 problems of internal teams & external customers of all locations.
  • Worked on the migration to new Checkpoint R75 firewalls from Juniper firewalls.
  • Firewall Policy implementation on Checkpoint NGX R52 and R54.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to point site.
  • Worked on different Cisco & Juniper devices of access, distribution and core.
  • Working on Cisco ASA 5580, Cisco PIX 535, Juniper NS5400, Juniper SRX550, Juniper MX ISP.
  • Configuration changes to F5 GTM devices
  • Having hands on experience with F5 Local Traffic Managers (LTM).
  • Having hands on experience with F5 Global Traffic Management (GTM).
  • Configuring objects such as Load Balancer pools for local traffic management on F5 Load Balancers.
  • Worked on commissioning and decommissioning of the MPLS circuits for various field offices.
  • Worked on F5 BIG-IP LTM 6900, configured profiles, and provided and ensured high availability
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc)
  • Configuring HSRP between the 3845 router pairs for Gateway redundancy for the client desktops.
  • Configuration and extension of VLAN from one network segment to their segment between Different vendor switches (Cisco, Juniper).
  • Ability to self-direct and work independently when necessary and clearly articulate technical concepts / issues to both technical and non-technical peers and management.
  • Contribute to overall DLP process improvements and documentation.
  • Represent and contribute to the overall DLP solutions and methodologies.
  • Work with Human Resources for documenting and reporting DLP violations.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling.
  • Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Updated the HP open view map to reflect and changes made to any existing node/object.
  • Handled SRST and implemented and configured the Gateways, Voice Gateways.
  • Worked on a broad range of topics such as routing and switching, dedicated voice access, planning and implementation, large-scale high-visibility outages, change management coordination, proactive monitoring and maintenance, disaster recovery exercises, and core network repairs.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support
  • Having Hands on experience with (LDAP) Lightweight Directory Access Protocol.
  • Designed and implemented Cisco VoIP infrastructure for a large enterprise and multi-unit office environment. Met aggressive schedule to ensure a Multi-office reconfiguration project which was successfully delivered
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Experience with the quality department Cisco QOS and maintenance teams.
  • Network Cabling, dressing, labeling and troubleshooting various network drops onsite

Confidential, Bowie, MD

Network Engineer

Responsibilities:

  • Monitor the operability and reliability of the network.
  • Configured STP for loop prevention and VTP for Inter-VLAN Routing.
  • Configuration and troubleshooting of EIGRP, OSPF, BGP, LACP.
  • Experience with moving data center from one location to another location, from Cisco 6500 based data center to both Cisco 6500 & Nexus based data center.
  • Strong hands on experience on ASA (5525/5545/5585 ) Firewalls. Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Configuration of Standard and Extended ACLs for Security.
  • Technical assistance for LAN/WAN management and complex customer issues.
  • Troubleshooting the issues related to routing protocols.
  • Have hands on experience on network cables. (NAC)
  • Managing, troubleshooting and monitoring the network using Network Monitoring tool.
  • Network Security implementation with Cisco IOS Feature Set, NAT, and Simple Network Management Protocol.
  • Provided support for troubleshooting and resolving Customer reported issues.
  • Performed IOS upgrades on Catalyst 3550, 2950, 1900 switches, and 3600, 2600 and 2500 routers.
  • Provided support for global network including T1/T3, ATM connections using HDLC and Frame Relay on 2600, 4000 series Routers.
  • Installed wireless access points (WAP) at various locations in the company.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP and VRRP.
  • Implemented and configured routing protocols like EIGRP, OSPF.
  • Monitor the operability and reliability of the network.
  • Responsible for SNMP Monitoring and Performance Tuning software.
  • Designed WAN structure to prevent single point of failure in case of link failure.
  • Maintenance and Troubleshooting of connectivity problems using PING, traceroute.
  • Planning and Implementation of Subnetting, VLSM to conserve IP addresses.
  • Experience with the quality department Cisco Qos and maintenance teams
  • Upgraded IOS on the different ASA flavors like 5510, 5520 and 5585 firewalls

Confidential

Network Engineer

Responsibilities:

  • Creating a rule on the checkpoint firewall for a NAT (used ACLs to block unauthorized users) to the VLAN IP and allowing the IPSec traffic.
  • Configured Juniper M320 routers and T640 routers.
  • Redistributed static routes into OSPF using Juniper M320. 
  • Implement Cisco Works 2000 & ALTERPOINT device to manage Cisco routers, switches, firewall, Access Points, Concentrators. 
  • Plan and implement Juniper Netscreen 204.
  • Configured and maintained juniper SRX 210,220,240,650 routers.
  • Installing and configuring Checkpoint NG R55 & NGX R60
  • Monitoring and maintaining LAN/WAN networks using Snort and sniffer trace.
  • Design and Implement Remote access VPN server using Checkpoint NGX R60 and NG R 55 & Cisco ASA.
  • Big IP F5 Load Balance experience; setting up, monitoring and configuring F5 load balancer.
  • Configuring IP, RIP, EIGRP, OSPF and BGP in routers.
  • Time to time upgrade network connectivity between branch office and regional office with multiple link paths and routers running HSRP, EIGRP in unequal cost load balancing to build resilient network.
  • Configured and installed multi-protocol (IP, IPX) multi-interface Cisco routers.
  • Used DHCP to automatically assign reusable IP addresses to DHCP clients.
  • Implement ACLs and authenticate (EIGRP, BGP) to ensure high security on the network.
  • Time to time upgrade network connectivity between branch office and regional office with multiple link paths and routers running HSRP, EIGRP in unequal cost load balancing to build resilient network.
  • Used Protocol analysis tools to assess and pinpoint networking issues causing service disruption

Confidential

Network Engineer 

Responsibilities: 

  • Develop and implement strategies to support the current and future needs of the company.
  • Configured Cisco Routers 2600 series using RIP, OSPF, and EIGRP.
  • Configured Cisco Switches 2900.
  • Troubleshot Cisco hardware: Inspected devices, read device LEDs, loose connections, interior IOS upgrade, switch port configuration, port monitoring, watch over Flooding Control/Network port.
  • Worked on configuration and installation of new desktops for users using GHOST, EZ copy and Disk-to-Disk copy
  • Installed and configured DHCP, DNS Server.
  • Identifying technical problems and debugged hardware and software related to LANs/ WANs.
  • Switching related tasks included implementing VLANS, VTP and configuring ISL trunk on Fast - Ethernet channel between switches.
  • Strategies include operating systems, virus protection, mail systems and Internet services.
  • Updated the anti-virus, spam blockers, and other security software so that the systems are always secured
  • Resolved all computer related problems, monitored and maintained system functionality and reliability by identifying ways to prevent system failures

We'd love your feedback!