We provide IT Staff Augmentation Services!

Network Engineer Resume

2.00/5 (Submit Your Rating)

Weehawken, NJ

SUMMARY:

  • 7 years of experience in cisco routing, switching, security, and load balancers, firewalls, deployments and maintenance.
  • Experience working with security devices such as Firewalls, VPN switches and Intrusion Detection Systems.
  • Extensive experience working on Cisco and Juniper routers/switches in complex environments with multiple ISPs.
  • Expert in dealing with Networking Protocols and Standards such as TCP/IP, OSI, UDP, Layer 2 (VLANs, STP, VTP), Routing Protocols (RIP, EIGRP, OSPF, BGP), WAN technologies (Frame relay, IPSec, VPNs, MPLS), QoS.
  • Experience on Network Monitoring & Testing tools such as Wireshark/Ethereal, Cisco Works, and IXIA.
  • Good understanding of VoIP implementation and protocols such as H.323, RTP, and SIP.
  • Experience in troubleshooting NAT configurations, Access - Lists (ACL), and DNS/DHCP related issues within the LAN network.
  • In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP services.
  • Good understanding of cable management such as CAT3/4/5, Fiber-Optic (Multi & Single mode fibers).
  • Knowledge of Subnetting IPv4/IPv6 addresses and IP address management.
  • Experience in configuring HSRP and redistribution between routing protocols troubleshooting them.
  • Familiar with security products such as Cisco ISE.
  • Implementation of HSRP, VRRP and GLBP for Default Gateway Redundancy.
  • In-depth knowledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Hands-on experience with TCP/IP, LANs, WANs, and WLANs (WiFi) Cisco VPN Concentrators, F5 Fire pass SSL VPN, 6509 Core Datacenter designs.
  • Worked on Palo Alto Firewall.
  • Worked on Cisco ASA 5500 series firewalls.
  • Worked on Cisco Nexus 5010 Switch.
  • Experience in F5, Cisco ACE 4710 Load balancers.
  • Exposure to Cisco WAAS, WCS.
  • Expert Level Knowledge about TCP/IP and OSI models.

TECHNICAL SKILLS:

Routers: Cisco 17XX, 18XX, 26XX, 28XX, 37XX, 38XX, 39XX &72XX series with IOS, IOS-XE & IOS - XR.

Switches: Cisco Catalyst 3550, 3750, 45XX, 65XX series, Nexus 7000, 5000, 2000 & NX-OS, Cat-OS, IOS.

Routing: OSPF, EIGRP, BGP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing

Switching: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging, Data Center Switching, vPC, VDC, OTV, RBAC.

LAN: Ethernet, Fast Ethernet, Gigabit Ethernet, 10 Gigabit, 40 Gigabit Ethernet.

WAN: Leased lines 64k - 155Mb (PPP / HDLC), Channelized links (E1/T1/E3/T3), Fiber Optic Circuits (OC12/OC18/OC192), Frame Relay, ISDN, and Load Balancing.

Monitoring Tools: Wire shark, Fiddler, Microsoft Network Monitor, Solar Winds.

Load Balancer: Cisco CSS, F5 Networks (Big-IP).

Fiber optics: FC patch cable Assemblies, Testing with ODTR and troubleshooting.

Features & Services: IOS and Features, HSRP, GLBP, VRRP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management.

AAA Architecture: TACACS+, RADIUS, Cisco ACS, LDAP.

PROFESSIONAL EXPERIENCE:

Confidential, Weehawken, N J

Network Engineer

Responsibilities:
  • Primary responsibilities include performing move changes to network following standard ITIL ticketing process, design, implement & troubleshooting of networks.
  • Created Operational, Standard & Emergency Changes for network design, raised demands, worked on tickets of various levels (P1, P2, P3) for troubleshooting user issues.
  • Responsible for configuration and troubleshooting of Cisco 4331, 4431, 3945, 1941 and similar routers, Cisco 3650, 3560, 2960 and other switches. Configurations involved routing protocols like OSPF, BGP, and EIGRP, DMVPN, IWAN, MPLS, QoS, Static routes, Vlans, VRFs etc.
  • Implemented Cisco IWAN at 25 sites till now. Worked on turning a site into IWAN involving provision of two circuits, one for MPLS, other for Internet, activating these circuits, forming DMVPN over MPLS and DMVPN over Internet with our IWAN-MPLS and IWAN- INET head end routers at Datacenters.
  • Involved in MPLS, Internet activations, worked with Confidential, Confidential and other ISPs on implementing and deploying BGP, MPLS during circuit activations.
  • Built, deployed and maintained Cisco Meraki Wireless Access Points. Created Networks, Implemented Firewall Policies, Defined Access, and Formed Tunnels and maintained all devices on Meraki Cloud in separate networks with their respective SSIDs.
  • Built, deployed and maintained Cradlepoints for Internet access to various sites using Confidential 4G. Managed all the Cradlepoints on Cradlepoint ECM portal. Built some of them as main Internet providers, some to provide Internet offload and many others to work with Cisco ASAs to provide secure 4G VPN offload.
  • Built Site to Site VPN tunnels between Cisco ASAs at required sites to the main hub ASAs at our Datacenters. Configured access lists, NAT statements, DHCP scopes, allowed the subnets on our main Checkpoint Firewall, redistributed these subnets on our main Nexus switches.
  • Built, configured and maintained PRTG Network monitoring probes. Deployed probes with VMWARE-ESXi OS and communications established with main PRTG servers at Datacenters. Uploaded sensors for various applications like OTM, Salesforce, EDX, Hyperion, O365 etc. to monitor traffic utilization, latencies.
  • All PRTG network monitors managed and maintained on the main PRTG server. Reports pulled out regularly when a change is made to a site to monitor the network performance.
  • Worked on Checkpoint Firewalls to monitor traffic drops, implemented NAT rules to allow specific subnets on specific ports. Checked logs to monitor traffic hits, worked on failover to secondary firewall, troubleshooting of various bugs and fixes.
  • Monitored & managed all Cisco network devices at Univar on Solarwinds. Cradlepoints, UPSs, Riverbeds and other devices are monitored as well. Pulled out utilization reports, error reports etc. regularly for required sites, Voice systems monitored separately and percentage of traffic utilized is closely observed.
  • Supervised and worked at site locations to build sites from scratch with cabling vendors like COMNET, circuit provides like Confidential, Confidential . Laid cables from User desks, MPOE to MDF & IDF. Performed surveys for WAP positioning using heat maps. Worked on POTS lines for security alarms, fire, and fax, tested fiber connection from the service provider and between our buildings connecting network switches. Racked devices and provided connections.
  • Designed and built a number of sites to work on site to site VPN. Configured the core switch to have separate VLANs for different Wireless SSIDs, Data, Voice and Spare networks and traffic being routed to ASA. Underlying downstream switches connected to core using fiber.
  • Designed sites to have just MPLS or just Internet where DMVPN is established. Cradlepoints are designed to work alongside MPLS or Internet connections to provide offload.
  • Design, Build & Troubleshoot networks for Univar locations and its acquisitions. Network Diagrams.
  • Monitor nodes and troubleshoot any issues, TACACS, Cisco ACS, Cisco Prime, Cisco WCS, and Amazon Web Services.
  • Work with Cisco switches and routers, HP switches, Juniper and magnablend devices, Riverbed systems, Phone systems, Cisco ASA, Checkpoint firewalls, UPS systems, cradlepoints and PRTG network monitors, Opengear out of Band devices.
  • 2960, 2950, 3560, 3650 cisco PoE & Non PoE switches. 1941, 3945, 4431, 4331 cisco routers, nexus 5k, 7k switches, riverbed 555 series, cisco ASA 5505,5506, Siemens phone system, Avaya phone systems
  • IWAN deployment, MPLS & Internet circuit activations and configurations, cabling process, orders and quotes.
  • Cisco Meraki configuration and cloud management. Configuration of APs, Firewall & Traffic Shaping, ACLs, Radius Server and wireless networks.
  • Configuration and deployment of Cradlepoints for internet offload
  • Configuration and deployment of PRTG network monitors using VMWare EsXi and vSphere.
  • DNS Management (NS, A, PTR records), DHCP management, IPAM. Licenses and IOS of devices, TFTP Servers.
  • Request and implement Operational, Standard & Emergency changes, raise and resolve incidents (High, Medium & Low Priorities), Raise Demands, ITIL ticketing system.

Confidential, Chicago, IL

Network Engineer

Responsibilities:
  • Apply Cisco ISE configuration to switches
  • Provide level 2/3 support for ISE related issues, including off-shift and weekend support functions
  • Escalating and Engaging with L4 vendor support teams
  • Engaging across other GIS infrastructure domains to address level 2/3 ISE support issues (e.g. PKI, Server, Load Balancer, WAN, Web Acceleration, Security, AnyConnect)
  • Monitoring and alert management of all components related to the ISE solution (VNOC)
  • Ongoing maintenance and support of solution components (e.g. patching, upgrades, capacity reviews, lifecycle management)
  • Ongoing moves, adds, changes to ISE solution (e.g. new device profiles)
  • Hardware replacement management
  • Monitoring and running ISE reports
  • Managing administrative access controls
  • Managing of switch configuration templates
  • Perform implementation and integration tasks for medium to large, complex projects.
  • Documentation of configurations and changes
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Working on Cisco ISE to authorize users based on protocols PEAP and EAP-TLS, also manage and monitor user's access privileges.
  • Experience in configuring RSTP on Cisco switches.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
  • Deployed the Cisco 3500 Access Points using Cisco Wireless controllers 5500 and 2500 and WCS System.
  • Virtual Port Channel configuration on the Cisco Nexus 5000 series.
  • Virtual Device Context configuration on the Cisco Nexus 7000 series.
  • Used Spanning Tree Protocol and also configured BPDU Guard, Port-Fast, Up-Link Fast.
  • Experience with installing and configuring Spanning Tree Protocol, Trunking (dot1q and ISL) and Ether channel on Campus network Design Architecture.
  • Configuring, testing, and troubleshooting routing and switching issues and related protocols associated with packet networks including MPLS and traffic engineering (QoS).
  • Performed installation and configuration Cisco Secure Access Control Server (ACS) configuration for AAA (RADIUS) authentication

Confidential

Network Engineer

Responsibilities:
  • Performed network engineering, design, planning (WAN & LAN) & implementation. Studied single point failures & designed WAN structure in such a way that there are no failures in network in case of any device or link failure.
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between Switches.
  • Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.
  • Configuring Virtual Chassis for Juniper switches EX-4200,Firewalls SRX-210
  • Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
  • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices
  • Designed and implemented security policies using ACL, firewall.
  • Worked on Extensively on Cisco Firewalls, Cisco (506E/515E/525/) & ASA 5500(5510/5540) Series
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Configured routing policy for BGP. Switching related tasks included implementing VLANs and configuring ISL trunk and 802.1Q on Fast-Ethernet channel between switches
  • Implemented Cisco IOS Firewall IDS using 2600 series router.
  • Troubleshooting on network problems with Wire shark, identify problem and fix.
  • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices
  • Redistribution of routing protocols and Frame-Relay configurations.
  • Configuring and troubleshooting type of routing to route traffic flow per customer requirement as primary, backup/load balanced and load splitting.
  • Performed the maintenance of Active Directory and replication scheme, DNS/DHCP services and time services; wrote step-by-step procedures for implementing upgrades.
  • Dealt with creating VIP(virtual servers), pools, nodes and applying iRules for the virtual servers like cookie persistency, redirection of the URL
  • Configured VLANs on a switch for inter-VLAN communication. Configured VLAN Trunking Protocol (VTP) on Core Switches. Configured various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches for STP, VTP Domain, VLAN, Trunking, Fast Ether Channel configuration.
  • Documented all the work done by using Visio, Excel & MS word.

Confidential

Junior Network Engineer

Responsibilities:
  • Implement Cisco IOS Firewall IDS using 2600 series router
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
  • Configured and debugged policy based routing for special traffic, route filtering with route maps, route redistribution.
  • Configured VLAN Trucking 802.1Q, STP, and Port Security on Catalyst 6500 switches.
  • Performed OSPF, BGP routing protocol administration.
  • Router memory & IOS upgrade with TFTP.
  • Network Assessment and Documentation (including technical, operational, and economic assessment)
  • Responsible for designing and implementation of customers network infrastructure
  • Help negotiate hardware, software, and circuit contracts for customers
  • Redesign customers office copper and fiber cable plant for scalability
  • Build and maintain Visio documentations for Clients
  • Was Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support.
  • Ensured network, system and data availability and integrity through preventative maintenance and upgrade.

We'd love your feedback!