We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

2.00/5 (Submit Your Rating)

CA

SUMMARY:

  • Cisco Certified Network Engineer with 9 years of experience in implementation, configuration and troubleshooting of Cisco Routers and switches, fine tuning of firewalls, VPN configuration, troubleshooting network related problems in Enterprise Network.
  • Deploying, implementing and providing support for Cisco 1800, 2500, 2600, 2800, 3600, 3750, 3800, 7200, ASR 1K, 9K routers, Cisco 2900, 3500, 3700, 4000, 4500, 4900, 5000, 5800, 6500, 7600, Cisco Nexus and catalyst, Arista Switches Juniper E series, J series and M series. Juniper SRX & VPN, T - Series, MX-Series Routers. Checkpoint (NGX R65, R70 and R71), Juniper Firewalls (SRX5400, SRX5600, and SRX5800), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo Alto Networks Firewall models (5060, 7060)
  • Implementing IP addressing schemes, LAN/WAN protocols, IP Services, to meet network requirements in different environments.
  • Performed Ospf, BGP, EIGRP profile, IPV6, Bundle Ethernet implementation on ASR 4300, 1K, 2K, 3K, 7K 9k, Cisco 6500 Series and Juniper routers
  • Expertise in Configuration of Virtual Local Area Networks (VLANS) using Cisco routers and multi-layer Switches and supporting STP, RSTP, PVST, RPVST along with trouble shooting of inter-VLAN routing and VLAN Trunking using 802.1Q.
  • Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology (LACP, PAgP).
  • Deploying and migrating complex layer 2 technologies such as VLAN Trunks, VTP Ether channel(LACP), Port channels(PagP), STP(PVST+), RSTP and MST from Cisco to Arista switches
  • Configuring and troubleshooting Cisco Wireless Networks: LWAPP, WLC, WCS, Standalone APs, Roaming, Wireless Security Basics, IEEE 802.11 a/b/g, RF spectrum characteristics.
  • Hands on experience in deployment of GRE tunneling, SSL, Site-Site IPSEC VPN and DMVPN.
  • Implementation of Juniper Firewall, SSG Series, Netscreen Series ISG 1000, SRX Series.
  • Knowledgeable in configuration of Voice VLAN's (VOIP), prioritizing the voice traffic over the data traffic, Telecom, using Dark Fibre created fast speed line between two campus, Wireless networks Have knowledge on various advanced technologies like VOIP, H.323, SIP, QOS, IPv6, Multicasting, and MPLS.
  • Extensive experience in configuring and troubleshooting of routing protocols RIP v1/v2, EIGRP, OSPF and BGP.
  • Experience in Cisco Data and Call manager, Unity and Contact center express UC 500 series voice equipment and VoIP related voice technologies.
  • Expertise in deployment of switches, hubs, routers, Voice gateways, CUCM clusters, Call Manager Express and Call Manager, alongside Unity Express and Unity.
  • Good knowledge of CISCO firewalls, CISCO PIX and ASA 5500 series, Palo alto Firewalls.
  • Hands on experience on the Palo Alto firewall platforms PA-7050, PA-5050, PA-2000 series, PA-200, PA-500.
  • Experience in configuring all Palo alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments. Experience in design, implementation, and support of F5's Big-IP Access Policy Manager (APM) software component in a complex enterprise environment
  • Knowledge on F5's BIG-IP Application security management and Edge Gateway Solution
  • Worked extensively on Palo Alto, Juniper Net screens, Fortinet and SRX Firewalls.
  • Extensive experience in configuring Layer3 routing and layer2/3 switching of Juniper & Cisco based and 3700 series routers & Switches.
  • Expertise in installing, configuring and troubleshooting using Cisco Asset Management Suite.
  • Troubleshooting & implementation of Vlans, STP, MSTP, RSTP, PVST, 802.1Q, DTP, HSRP, VRRP, GLBP, LACP, PAGP, AAA, TACACS, RADIUS, MD5, VTP & SVI.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • Knowledge on setting up Cisco TelePresence Server, TelePresence Conductor, CMR, DX series video end-points
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • IOS/JUNOS upgrade for Cisco & Juniper routers cum switches.
  • Implementation traffic filters on Cisco routes using Standard, extended Access list.
  • Expert Level Knowledge about TCP/IP and OSI models.
  • In-depth knowledge of private cloud and public cloud network topology design (AWS and Azure)
  • In-depth knowledge of SD-WAN architecture and technologies (physical and virtual)
  • Experience in working with Cisco Identity Services Engine (ISE)
  • Worked on Extensively on Cisco Firewalls, Cisco PIX & ASA 5500 Series
  • Extensive Knowledge on the implementation of Cisco ASA 5500 series and checkpoint R 75 firewalls.
  • Experienced working on network monitoring and analysis tools like, SOLAR WINDS, whatsup Gold, CISCO works and RIVER BED and Wireshark.
  • Networking Concepts Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi
  • Good knowledge in WAN Technologies like ACL, NAT and PAT, IPsec and VPNs.
  • Working experience with REMEDY for ticket change management process.
  • Experience in Physical cabling, IP addressing, configuring and supporting TCP/IP.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

TECHNICAL SKILLS:

Operating Systems: Windows (Server 2003/2008, Vista, Windows 7), Linux OS

Routers: Cisco GSR12016, ASR1001, 2900, 3900, 7200, 7600 & ASR9000

Switches: Cisco 3750, 4507, 4510 & 6500 series switches, Nexus 7010, 5548

Routing: MPLS, OSPF, EIGRP, BGP, RIP-2, PBR, IS-IS, Route Filtering, Redistribution, Summarization, Static Routing

Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch,Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.

Network security: Cisco (ASA, PIX) 5510, Palo Alto, juniper, ACL, IPSEC VPN, GRE VPN, NAT/PAT, Filtering, Load Balancing, IDS/IPSLoad Balancer: F5 Networks (Big-IP) LTM Module, Cisco ACE 30 load balancer

LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet.

WAN: Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ATM, ISDN, Load Balancing. Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Network Management: SNMP, Solar Winds, HP open view, and Wire shark

Reports and Network Diagrams: Microsoft (Visio pro.)

SD-WAN: Viptela vEdge/vseries routers, Cloudgenix ION series

PROFESSIONAL EXPERIENCE:

Confidential, CA

Sr. Network Engineer

Responsibilities:

  • Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network.
  • Hands-on experience in the network management of circuits using TDM and Frame Relay network, performing configuration and provisioning management, fault management and performance monitoring.
  • Troubleshooting, Protocols & Routing Configuration, Network Provisioning, Network Security, PM System Logs, SNMP, ICMP, ACLs, NOC Monitoring, NetCool, Network Hardware Testing.
  • Developing strategy for upgrade of Transmission High Sites to accommodate dark fibre connection.
  • Data Centers and office's LAN/WAN maintenance, routing and switching configuration.
  • Upgrades, Installation Projects, Cabling, Testing, Subsystems Restoration & System Backups, Network Failover Management & Maintenance, Method Of Procedures, Scope Of Work, SLAs, Documentation, Deployment Migration Projects, Decommission Disconnect Projects
  • Establishing the wireless network(Wi-fi) IEEE 802.11 a/b/g environment using security policies (Aruba)
  • Configured OSPF, BGP, LDP, MP-BGP on Juniper M320 and Cisco CRS-1 in the Core
  • Deploying Cisco 6500, ASR 9K /Arista/Juniper Routing/Switching - 6500/7020R/QFX
  • Deploying Layer 2, layer 3 protocols (BGP, OSPF, STP(PVST+), Ether Channel, Port channels) in Cisco and Arista platforms .
  • Designing, configuring, and troubleshooting QoS, SIP, H.323, RTP, SCCP, Session Border Controllers, Voice Gateways, Voice circuits IP /TDM, Cisco Telepresence Infrastructure, QoS, NAT, PAT, and multicast Managed ISE Policies and implementation of 802.1X on the wired network.
  • Performed Network Security Assessment and implemented security features such as network filtering, SSH, AAA, SNMP access lists, VTY access lists and HSRP authentication.
  • Configuring AAA Services on the Cisco ASR 9000 Series Router module of Cisco ASR 9000 Series Aggregation Services Router System Security Configuration Guide.
  • Work with high speed wireless technologies; 1XRTT, EV-DO, and LTE
  • Manage Trend Micro Office Scan 11.0
  • Exposure to cloud managed SD-WAN with Cisco Meraki, cloud-based wifi implementation and provisioning. Working with various WAN vendors troubleshooting circuit relation issues.
  • Network Management with Cisco-Meraki Cloud Management.
  • Assisted lead engineer in implementation of the IWAN (Intelligent WAN - Cisco SD-WAN) and VPN (Secure Transport) for enterprise networks.
  • Configured and implemented centralized Syslog server on both production and corporate network and enable SNMP traps for monitoring traffic and check the health of servers and network devices.
  • Co-ordinates with Vendors to replace the faulty hardware like power supply, fans, modules, cables, SFP, access points & LWAPS.
  • Successfully migrated multiple data centers from NetScreen to FortiGate Firewalls.
  • Installed, configured, and troubleshot Juniper, Cisco, and FortiGate firewall equipment.
  • Configured and managed multiple VPN connections to AWS and other third parties.
  • Deploying Cisco Nexus 7k,5k,2k for the datacenters with FabricPath
  • Supports MPLS/BGP,OSPF/EIGRP and all vendor circuits intranet/internet accessing
  • Worked extensively on Cisco ASA 5500 (5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.
  • Migrating Palo Alto 5060 & 7060 firewalls and configuring IPS/IDS and content Filtering
  • Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0.
  • Complete testing to ensure that call flow is operating properly
  • Implementation and administration of network security hardware and software (UTM) Unified Threat Management System. Internet/intranet, inter-access, VPN/DMVPN firewall, Intrusion Prevention plan design configuration to PIX/ASA, Checkpoint/Juniper.
  • Migrated L3VPN Traffic from Juniper M320's to Cisco CRS-1 with minimum disruption
  • Configured MPLS VPN on EDGE routers (ASR9K)
  • Analysis of VPN technologies like Encryption-DES,3DES, hash algorithm-MD5, SHA1.
  • Remote access solution support: VPN, Terminal Services, and Citrix .
  • Implementing Cisco NAC for ASA firewalls and checkpoint firewalls
  • Implementing and troubleshooting Cisco H323, MGCP voice gateways
  • Goble/ Local network GTM/LTM/DNS application traffic load balance, Intranet /Internet traffic routing load balance design/ installation, maintenance and troubleshooting Responsible for managing IP address schema with in internal domain.
  • Responsible for managing change management requests raised by users.
  • Implementing Network Control to secure DNS, DHCP, Software Defined Networking SDN
  • Responsible for maintaining SLA's agreed with the customer, working experience in tools like remedy.
  • Documentation of network design documents in Microsoft Visio.
  • Managing restricted Internet access as per organizational security policy using URL filtering tool, Surf control.
  • Implemented integration of Microsoft ISA server with Active directory for authentication, to prevent unauthorized access to Internet.
  • Configured Checkpoint Firewall’s Web Defense to mitigate malicious traffic with MacAfee
  • Support services for virtualization technologies: VMware, Citrix, and Microsoft
  • Responsible to facilitate Internet access to the users following Organization's Internet Security Policy.

Environment: Cisco 2948/3560/4500, 4900/3560/3750/3550/3500, 3700/2960 6500 switches, Aruba 3810, 5412 switches. Enclosures Switches and Cisco 3640 /12000/7200/3845/3600/2800, ASR 4300 routers, Arista routers Cisco Nexus 7K/5K, Cisco ASA 500, F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, FabricPath, Software Defined Networking (SDN)

Confidential, CA

Sr. Network Security Engineer

Responsibilities:

  • Dealt with implementation, deployment related to Cisco devices and applying security policies.
  • Administration of the AWS cloud environments and Working with virtual environments.
  • Troubleshoot issues related to VLAN, VLAN Trucking, HSRP failovers and related issues.
  • Planning for upgrade of IOS on devices and performing the upgrade.
  • Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IP Networking.
  • Responsible for maintaining the entire Routing and switching domain across the campus / Branch to head office
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
  • Worked with the data center planning groups, assisting with network capacity and high availability requirements.
  • Deploying, configuration and Administering of Trend micro office scan server 10.5 and SIFMSMSE 6.0V Antivirus and content filtering for e-mail server
  • Configure and troubleshoot Bluecoat as forward proxy for all Web URL Filtering.
  • Configure Bluecoat proxies using bluecoat director for content and URL filtering.
  • Managed and Upgraded the SecureAuth, UCS Firmware and Mobile Iron.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
  • Performed network-engineering tasks like designing, planning in F5 LTM, GTM, EM, AFM & APM load balancing implementation and Deployed F5 Enterprise manager of 4000 series for the all cluster devices over the network.
  • Created ISE Documentation and training for Network team as well as Network Security org.
  • Good knowledge of CISCO firewalls, CISCO PIX and ASA 5500 series, Palo Alto Firewalls.
  • Hands on experience on the Palo Alto firewall platforms PA-7050, PA-5050, PA-2000 series, PA-200, PA-500.
  • Operate, Upgrade and Troubleshoot Riverbed 5050 WAN Accelerators (familiarization - no DR site)
  • Experience in configuring all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments. Managed the deployment of Cisco ISE and migration of all Wireless authentications
  • Aided in troubleshooting potential network issues in rolling out ISE.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer
  • Design an available and secure firewall solution for the Cloud program
  • Set up and maintain various VPN tunnels between AWS and our different co-locations, utilizing static routes and BGP with Fortigate Fortinet firewalls and Juniper firewalls and Cisco ASA.
  • Used to raise tickets and work with Cisco TAC and Juniper JTAC in case of devices hardware issues
  • Reviewing all changes to network configuration for technical accuracy and providing solutions to Multi-Protocol Network problems
  • Configured and managed VLANs, 802.1Q Trunk, RPVST+, Inter-VLAN routing, HSRP and LAN security for Layer-2 and Layer-3 switching domains as per the organization's requirement plan
  • Worked with Palo Alto - Firewall Administration, Rule Analysis, Rule Modification
  • Experience Working on Traffic generating tools like IXIA and LANDSLIDE SPIRENT.
  • Worked with F5 Load-Balancers and the following software modules: LTM, ASM, AFM, GTM
  • Tested various BGP attributes like local preference, MED, Weight and replicated customer issues in the testing environment lab
  • Routing protocol configuration such as OSPF, IS-IS, EIGRP and BGP, Router redundancy configuration (HSRP, VRRP and GLBP)
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view) and experience with developing complex network design documentation and presentations using VISIO
  • Design, implementation and operational support of routing/switching protocols in complex environments including IS-IS, BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.

Environment: Cisco 3750/3550/3500/2960/6807 switches and Cisco 3640/ 12000 / 1900 / 2900 /7200 /3845 /3600/2800 routers, Cisco ASA5510, Checkpoint, Aruba Controllers 6000, 3600, 3400,650, Cisco Nexus 7K/5K, 2248/3560/5020/6509, Mobile Iron

Confidential, Santa Clara, CA

Network Engineer

Responsibilities:

  • Designed, validated and implemented LAN, WLAN, WAN solutions as per the client's requirements
  • Have upgraded from SUP1 to SUP2 on Cisco Nexus 7000 Series and have hands on experience on Nexus 7010, 5020, 2148, 2248 devices
  • Worked on setting up MPLS Layer 3 VPN cloud in data center
  • Configuration of routing protocols OSPF, BGP and policy based routing
  • Providing support for the Layer 2 and Layer 3 devices in the Network
  • Perform IOS upgrades in Cisco Routers and Switches including Nexus 3K and 5K
  • Successfully implemented a nationwide Air-Gap (Wi-Fi/Wireless) network with the latest offering form Aruba/Delland ClearPass (NAC) security with WIPS by TELUS Air-Defense
  • Used HTTPS to manage network devices such as mobility controllers, mobility access switches, or Clear Pass servers
  • Design and Implementation of OSPF Areas for reliable Access Distribution and for Core IP Routing
  • Redistribution of routing protocols - OSPF to BGP and BGP to OSPF
  • Network Migration from Layer2 to Layer3 at access level
  • Involved in Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Configuration and troubleshooting F5 LTM and providing level 2 and level 3 support for the customers.
  • Extensively worked on virtual F5 LTM module on VMware for application testing.
  • Design and deployed F5 LTM and GTM load balancer infrastructure per business needs from the ground up approach.
  • Good knowledge of CISCO firewalls, CISCO PIX and ASA 5500 series, Palo Alto Firewalls.
  • Upgrading code on Palo alto firewalls PA5050/3020 to meet company security policy
  • Deployed the switches in high availability configuration with HSRP.
  • Configured udld, port-fast, uplink fast and other spanning tree features.
  • Setting up VLANS and configuring inter-VLAN routing, Trucking, STP, RSTP, port aggregation & link negotiation on Ethernet channel between switches
  • Troubleshoot various security issues related to Cisco ASA firewalls
  • Implementation of TCP/IP and related services - DHCP/DNS
  • Responsible for validating ASR5500 SAE Gateway functional testing on IPME & VoLTE
  • Perform Wireless Administration and troubleshooting for the corporate Wireless infrastructure.
  • Build Logical design and Implementation of Wireless Solution
  • Working on various 802.11x technologies for additional regulatory domains, Quality of Service, Inter Access Point Protocol etc.
  • Extensive Working & Configuring experience of firewalls like Check Point R65, R75.20, R75.45 (Gaia), R76, R77 and Cisco ASA Appliance ASA 5510, 5520, and 5540.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.
  • Performing day to day network operations using Remedy and HP Service Manager tool for ticketing system and change management
  • Integrated static NAT/PAT to provide access to services located on a server in the private network to the public network and implemented standard and extended access-lists to filter network traffic
  • Worked on multiple projects related to Branch networks, Campus networks, extranet clients and Data Center Environments involving in data center migrations from one data center to another
  • Experience with Infoblox to work on DDI DHCP, DNS, & IP Address Management in large enterprise organizations. Experienced with Infoblox tool, to ensure high performance of Network services like DDI.

Environment: Cisco 3900/4400/7200/7600 Routers, Cisco 3650/6500/6800 Switches, Nexus 7k/5k/2k FEX RIP, OSPF, BGP, EIGRP, LAN, WAN, CISCO ASA 5500, HSRP, VRRP, GLBP, VLAN, QoS, Wireshark, and Solarwinds.

Confidential, Wilmington, DE

Network Engineer

Responsibilities:

  • Experience in configuring responder policies using the header values.
  • Routed the traffic based on URL path, header values to different backend servers.
  • Experience with Nexus 5000 3000 and 2000 series switches.
  • Upgraded Nexus 5k switches.
  • Provided estimated bandwidth requirements for data replication, to best determine adequate timing for migration service levels
  • Created data migration strategies to help with completion of migration of data center from one point to another
  • Configured Cisco 6500 (sup 720), 4500 (SUP 6) & 3750 Catalyst Switches for network access
  • Worked extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution
  • Configured RIP, OSPF and Static routing on Cisco Routers
  • Configured VLAN, Spanning tree, VSTP, SNMP on EX series switches
  • Performed time to time upgrade network connectivity between branch office and regional office with multiple link paths and routers running HSRP, EIGRP in unequal cost load balancing to build resilient network
  • Responsible for Cisco ASA firewall administration across our global networks
  • Customer support service in the configuration and maintenance of PIX and ASA firewall systems
  • Managed cabled LAN and wireless access, with switching technologies and wireless technologies
  • Configured RIP, OSPF and Static routing on Juniper M and MX series Routers
  • Configured VLAN, spanning tree, VSTP, SNMP on EX series switches
  • Provided Load Balancing towards access layer from core layer using F5 NetworkLoad Balancers
  • Implemented TCP/IP and related services like DHCP and DNS
  • Load balanced the HTTP trafficby installing theCisco CSS 11000
  • Installedand configured Active Directory in Windows server2003/2008
  • Designed and implemented Catalyst/ASA Firewall Service Module for various LAN's
  • Performed troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF, & BGP
  • Maintenance and Troubleshooting of connectivity problems using Ping, Trace route.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configured Client VPN technologies including Cisco's VPN client via IPSEC
  • Configured ACL to allow only authorized users to access the servers
  • Participated in on call support in troubleshooting the configuration and installation issues
  • Performed installation, maintenance, troubleshooting of local and Wide Areas Network (ISDN, DDR, NAT, DHCP, TCP/IP)

Environment: Switching, Routing, Nexus, Access-lists, Sub netting, STP, RSTP, VTP, HSRP, Port-Channel, EIGRP, RIP, PPP, HDLC. SNMP, DNS, DHCP

Confidential

Sr. Network Engineer

Responsibilities:

  • Configured and troubleshooting HSRP, BGP, OSPF, EIGRP, MPLS WAN, QoS and Route Maps.
  • Configured and maintaining Cisco 7200, 4400, 5000 and 6500 platforms.
  • Troubleshoot connectivity issues involving VLAN's, OSPF, QoS etc.
  • Support, monitor and manage the IP network.
  • Performance monitoring of various applications and web servers to maintain quality of service and network stability.
  • Maintained core switches, creating VLAN's and configuring VTP.
  • Designed IP Addressing schemes, VLAN tables and Switchport assignments, Trunking and Ether-channel implementation.
  • Gained hands on experience with VLSM, STP, VTP, VLAN Trunking.
  • Installed and set up Cisco routers and switches according to deployment plans.
  • Applied access lists and NAT configurations based on implementation guidelines.
  • Managed and developed network projects designed to strengthen network continuity and deploy security elements in an attempt to meet and exceed contract requirements, including system analysis and troubleshooting.
  • Change management, monitoring network performance with network tools.
  • IP Distribution for existing devices and new devices as they were added.
  • Preformed maintenance on equipment as necessary, performing device upgrades, modification of configurations, password changes and diagnostic testing.
  • Worked with vendors and Engineering team to test new hardware and procedures.
  • Prepared and maintained documentation using MS Visio.

Environment: TCP/IP, RIP, Access-lists, LAN/WAN, Trunking 802.1, ISL

Confidential

Network Engineer

Responsibilities:

  • Planned, deployed and maintained wireless and wired LAN network using Cisco 3600 routers, 2960, 3500 switches, and 7960 IP Phones.
  • Designed IP addressing schemes, VLAN's, subnetting and trunking to meet requirements.
  • Preformed installation, cabling and cable testing.
  • Setup Access list and configured Firewall.
  • Planned and executed the migration from PSTN to IP Telephony, CUCME and 7960 IP Phones.
  • Designed and implemented IT security policies and networked backup systems.
  • Documented and maintained technical diagrams, documented logical and physical topology, and other IT procedures.
  • Reviewed, approved, procured various IT hardware and software products to fulfill strategic and operational needs of various departments.
  • Worked with management and various departments to develop procedures and troubleshoot problems as they arose.
  • Managed Windows Server 2003, Exchange Server and Active Directory.
  • Installed and maintained local printer as well as network printers.
  • Handled installation of Windows NT Server and Windows NT Workstations.
  • Handled Tech Support as it relates to LAN & WAN systems.
  • Created account groups and managed group members.

Environment: TCP/IP, Racking, Stacking, VLSM, IP addressing, Sub netting, Routing Protocols

We'd love your feedback!