Network Engineer Resume
Orange, CA
SUMMARY
- Network engineer with overall 15+ years of Experience in the field of routing, switching, firewall technologies and troubleshooting of complex network systems.
- Strong hands on experience configuring, and troubleshooting of Cisco 7600, 7200, 3800, 3600, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches
- Experience working with Nexus 7010, 5020, 2148, 2248 devices
- Experience with converting Cisco 6500 IOS to Cisco Nexus NX - OS in the data center environment.
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000, Fabrication, MX960, CRS, MPLS, IosXR
- Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K.
- Experience configuring VPC, VDC and ISSU Software upgrades on Cisco Nexus 7010
- Experience on Juniper QFX 5100, EX4200, EX 4300, EX 2200, MX 480, MX 960
- Familiar with Cisco firewalls PIX 515, ASA 5500 series, Juniper SRX 240 and Net screen Firewalls. Knowledge of Palo Alto and Checkpoint Firewalls, Fireman
- Worked in Configuring, Monitoring and Troubleshooting Palo Alto firewall
- Experience in creating MoPs for configurations changes to production devices
- Extensive Experience in WAN Technologies, Switching Technologies along with Failover Mechanisms & Inter Vlan Routing types.
- Extensive experience in configuring and troubleshooting of routing protocols Tipping Point, RIP v1/v2, EIGRP, OSPF, IS-IS, Fire Eye, BGP and MPLS.
- In depth understanding of IPV4, implementation of Subletting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
- Security appliance, Failover, DMZ zoning, &Configuring VLANs/routing/NATing with the firewalls as per the design
- Experience with URL filtering
- Experience in Cisco ASA firewall administration across networks
- Support customer with the configuration and maintenance of ASA firewall systems
- Experience testing Cisco routers and switches in laboratory scenarios and then design and deploy them on site for production.
- Working experience on tools and devices like Source Fire, Fire eye, Cisco ASA, Cisco ISE.
- Involved in troubleshooting of DNS, DHCP and other IP conflict problems. knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subletting, Mandiant, Tipping Point, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
- Used Varonis Data advantage and Data Alert to monitor and analyze and alert file system activities on NAS.
- Experience in Configuring, upgrading and verifying the NX-OS operation system
- Experience with F5 load balancers LTM, GTM series like 6400, 6800, 8800 for the corporate applications.
- Moderate knowledge in configuring and troubleshooting Cisco Wireless Networks: LWAPP, WLC, WCS, Standalone APs, Roaming, Wireless Security Basics, IEEE 802.11 a/b/g, RF spectrum characteristics
- Demonstrate the features and benefits of varonis software to the staff and documented the operations.
- Good knowledge and experience in Installation, Configuration and Administration of Windows 2000/2003, HTTP,FTP,DNS,NTP,DHCP servers under various LAN and WAN environments.
- Proficiency in handling Network Monitoring tools and Packet capture tools
Technical Skills:
Routers: Cisco 7600, 7200, 3800, 3600, 2900, 2800, 2600, 2500, 1800, MX480, MX 960
Routing: OSPF, EIGRP BGP, RIP v1/v2, PBR, Route Filtering, Redistribution, Summarization and static routing
Juniper Platforms: SRX, MX, EX Series Routers and Switches
Switches: Nexus 2K/5K/7K, Cisco Catalyst 2900, 3500, 4500, 3750, 2960, QFX 5100, EX 4200
Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels, Transparent Bridging
Firewall: PIX Firewall (506/515/525/535 ), ASA Firewall (5505/5510), SRX 240, Checkpoint
Cisco Platforms: Nexus 7K, 5K, 2K & 1K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series)
Network Security: Cisco ASA 5540, ACL, IPSEC, F5 Load Balancer, Checkpoint
Load Balancer: F5 Networks (Big-IP) LTM 8900 and 6400
LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet
WAN: PPP, HDLC, Channelized links (T1/T3), Fiber Optic Circuits, Frame Relay, VOIP
Gateway Redundancy: HSRP and GLBP, WAN Optimizer Riverbed, Steelhead Appliance, Dhana DNS Infoblox
Various Features & Services: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP, FTP
AAA Architecture: TACACS+, RADIUS, Cisco ACS
Network Management: Wire shark, SNMP, Solar winds
PROFESSIONAL EXPERIENCE
Confidential, Orange, CA
Network Engineer
Responsibilities:
- Working as Juniper Resident Engineer in supporting Time warner Cable onsite
- Supporting TWC during P1- critical and P2 troubleshooting on Network with Juniper product line QFX5100,QFX10K, EX4300
- Deployed and managed Varonis specifically Data Governance, Data Advantage and Data Alert modules in complex environments. Provide guidance for the new Network deployments
- Reviewing known bugs and providing workaround during the MW to prevent any issue
- Acted as a point of contact between TWC teams and Juniper support teams (JTAC)
- Carry out testing of new feature and functionality in a laboratory
- Open and track JTAC cases through Problem resolution
- Conduct technology workshops with customer to discuss equipment and network problems and provide case status updates with reasons for any problem encountered
- Assist customer during RMA process for hardware failures in devices
- Security appliance, Failover, DMZ zoning, &Configuring VLANs/routing/NATing with the firewalls
- Working knowledge on python, Unix/Linux scripting.
- Experience with URL filtering
- Experience with MP-BGP and MPLS LDP protocols
- Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
- Help TWC in testing new feature in the lab before it goes live and provide suggestions to optimize the network
Confidential, Los Angeles, CA
Sr. Network Engineer
Responsibilities:
- Troubleshooting the TCP/IP networks for connectivity, outages and slow network issues and recommended appropriate and cost-effective solutions for the congestion.
- Network consists of Heavy Cisco equipment such as:
- Cisco 2924 switches, Cisco 5500 series Layer 3 switches, Cisco 7200 series routers, Cisco Pix firewall 500 series and Wireless Access points Cisco 1230.
- Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.
- Worked on F5 and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance.
- Lead Engineer for Network refresh project for Multinational insurance company. Providing remote assistance for replacing exiting switches with new Cisco switches.
- Configuring routing protocols OSPF, EIGRP, RIP, MPBGP, LDP and BGPV4
- Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst
- Build Logical design and Implementation of Wireless Solution
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 and Radware for the corporate applications and their availability
- Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience
- Responsible for Cisco ASA firewall administration across our global networks
- Experience with migration Hybrid based Cisco CatOS and Native Cisco IOS on 6500 switches.
- Configured various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters, Route-maps and route policy implementation.
- Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
- Converting CatOS to Cisco IOS Config Conversion on distribution layer switches
- Configured various Router interfaces like ATM interface, T3 & Channelized T1 interfaces
- Configuring and troubleshooting CISCO catalyst 6509, 7609, 7613 with Supervisor cards, Cisco 3640, Cisco GSR 12416,21418(with PRP and RPR processors)
- Excellent Troubleshooting Skills and Customer Centric approach.
- Worked on Firewall Administration, Rule Analysis, and Rule Modification.
- Configuring and implementing F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic
- Hands on experience with Nexus Switches 2K, 5K and 7K.
- Responsible for Check Point and Cisco ASA firewall administration across global.
- Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
Confidential, Bloomington, Illinois
Network Administrator
Responsibilities:
- Responsible for the Global design, engineering, and level 2/3 support of existing network technologies services and the integration of new network technologies / services
- Key contributions include troubleshooting of complex LAN /WAN infrastructure that include routing protocols OSPF & BGP.
- Providing daily network support for national wide area network consisting of MPLS, VPN and point-to point site.
- Worked with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for data center access architecture.
- Create Mops for configuration changes to production devices while adhering to the company change management process.
- Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
- Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.
- Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
- Worked on the security levels with RADIUS, TACACS+.
- Verified the existing configuration on every interface meets the standard (like access ports having Portfast and BPDU guard enabled).
- Upgraded the IOS on the 6500 switch and saving the old system configuration and running-configuration.
- Responsible for Checkpoint firewall management and operations across our global networks.
- Working with Checkpoint Support for resolving escalated issues.
- Design and configuring of OSPF, Fire Eye, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls(SRX240, SRX550)
- Experience working with Nexus 7010, 5020, 2148, 2248 devices
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
- Experience with network based F5 Load balancers with software module GTM & Checkpoint
- Experience configuring VPC, VDC and ISSU Software upgrades on Cisco Nexus 7010
- Experience in Configuring and implementing VLAN, VTP domains, LAN switching and STP/RSTP
- Experience on Wide area application services
- Experience in QOS on multicast VPN
- Design and configuring of OSPF, BGP, Mandiant on Juniper Routers (MX960, MX480) and SRX Firewalls(SRX240, SRX550)
- Experience with implementing Cisco 6500 VSS on the User distribution switches.
- Carried out Route-redistribution between different routing protocols like OSPF, BGP, and EIGRP for increased efficiency.
- Implemented Access lists and policy mapping on Juniper router installed in each branch across all the states.
- Administration of ASA firewalls in the DMZ and FWSM in the Server Farm to provide security and controlled/restricted access.
- Handled SRST and implemented and configured the Gateways, Voice Gateways.
- Tested and implemented various BGP attributes such as Local Preference, MED, AS-PATH, Community, Extended community using route-maps.
- Configuring Big-IP F5 LTMs (virtual servers, pools, SNATs, health monitors, irules) for managing the traffic and tuning the load on the network servers.
- Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.
- Design, implement and administer IPv4/IPv6 enterprise network infrastructure utilizing Juniper routers.
Confidential Chicago, IL
Network Admin
Responsibilities:
- Worked on Network design and support, implementation related internal projects for establishing connectivity between the various field offices and data centers.
- Responsible for the installation, configuration, maintenance and troubleshooting of the company network. Duties included monitoring network performance using various network tools to ensure the availability, integrity and confidentiality of application and equipment and to provide support for Cisco network.
- Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
- Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
- Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
- Performing the daily health Check in Telecomm and Networking.
- Worked on cisco policy trace, Access policies, and URL categories to either give or block the
- Access to particular websites using Iron Port Proxies.
- Worked on CLI to enable the ports and configuration of switches and routers.
- Upgrading the IOS to the newest version using the console, TFTP server on Firewalls, switches and
- Physically connecting the ports between the switches and the servers on to the racks.
- Setting up the WIFI connections whenever needed as per the users requests.
- Enabling the TCP, UDP, SMTP ports to allow the traffic from one server to another server by
- Performing the trace route to find out where the traffic is blocked by the firewall.
- Setting up the Agents in Cisco Unified Call Manager (UCM), unity, ICM.
- Performed testing of agent Extension mobility phones.
- Assigning the Channels to each agent on VOIP ULTRAVAM devices.
- Troubleshooting the VAM and HUB servers when an issue arises.
- Troubleshooting issues with vendors in case of failures in call recording.
- Troubleshooting connectivity issues to web links on both internal and external domains
- Worked on configuring internet connection within the organization by consulting with different .Proactively involved in upgrade, maintenance, monitoring and support for the PA500 Palo Alto devices.
- Implemented Positive Enforcement Model with the help of Palo Alto Networks.
- Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
- Regular upgrade and maintenance of Infrastructure, Installing, configuring, Tipping point, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) & ASR 1K & 9K Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Bluecoat Proxy and Riverbed Steelhead appliances
- Involved in Configuration of Access lists (ACL) on Juniper and Palo Alto firewall for the proper network routing for the B2Bnetwork connectivity.
- Configured Juniper MX480s, EX8200s, EX4500s, EX4200s, and SRX5800s from scratch to match design.
- Troubleshoot the BIG-F5 1600 LTM through constant contact with the vendor.
- Configuring and troubleshooting site-to-site IPSEC VPN tunnels on VPN concentrators and ASA firewalls with private vendors.
- Experienced with Juniper: EX-2200, EX-4200, EX-4500, MX-480 and M Series, Tipping point, SRX210 and SRX240.
- Worked on Organization’s cell phones issues.
- Weekly documentation of updates on our technical work.
Confidential, Bloomington, Illinois
Network Engineer
Responsibilities:
- Part of team responsible for the Global design, engineering, and support of existing network technologies services and the integration of new network technologies / services
- Key contributions include troubleshooting of complex LAN /WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
- Providing network support for national wide area network consisting of MPLS, VPN and point-to point site.
- Configured RIP, OSPF and Static routing on Juniper M and MX series Routers.
- Data center to new Juniper M120.
- Racking, stacking, configuring NEXUS 5K and 2K and 7K.
- Worked with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for data center access architecture.
- Configuring Cisco ACS 4.0 along with TACACS+ server authentication.
- Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
Confidential, Warren, NJ
Jr. Network Engineer
Responsibilities:
- Worked as part of a team to manage Enterprise Network Infrastructure as a Support Engineer.
- Has a good experience working with the Trouble Tickets on F5 Load balancers.
- Switch experience includes Cisco Catalyst switches: CISCO 3750, 4500, 6500 series switches.
- Managing enterprise BGP setup by configuring and troubleshooting BGP related issues. My responsibility was also to add new BGP peers for remote branch offices and business partners.
- Scaling of IGP and BGP in the core.
- Administration of ASA firewalls in the DMZ and FWSM in the Server Farm to provide security and controlled/restricted access.
- Dealt with implementation of deployment related to Cisco devices and applying security policies on it.
- Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
- Configuration of NAT.
- Maintain effective communications with vendors, peers and clients in resolution of trouble-tickets, equipment RMAs, and support requests.
- Planning for upgrade of IOS on devices and performing the upgrade.
- Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IP Networking.
- Monitored network traffic and developed capacity planning initiatives, making necessary recommendations for additional resources or hardware.
- My responsibilities also include writing and executing Test Plan, Desk level procedures and Test Case Documents for smooth network operations of the remote location, assisted in design guidance for infrastructure upgrade.