Network Engineer Resume
WA
SUMMARY:
- Confidential certified network engineer with around 8 years of experience in network engineering, performing analysis, design, implementing, troubleshooting with focus on performance tuning and support of large enterprise networks
- Experience in service validation, gateway support and troubleshooting network & security infrastructure on routers, switches & firewalls
- Good working knowledge with Confidential Routers, Confidential Switches, Nexus 7K, 5K and 2K series, Load Balancers and Firewalls
- Expertise in configuration of Virtual Local Area Networks using Confidential routers and multi - layer Switches and supporting STP, RSTP, PVST, RPVST along with trouble shooting of inter-VLAN routing and VLAN trunking using 802.1Q
- Extensive experience with routing protocols BGP, OSPF, EIGRP, RIP
- Responsible for validating ASR5500 SAE gateway functional testing on IPME & VoLTE
- Analyze network & system responses and determining tuning recommendations to improve performance
- Experience in working with F5 Load Balancers for LTM and GTM type load balancing between multiple centers
- In depth understanding of IPV4 and implementation of Sub netting
- Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST
- Experience in implementation, configuration & troubleshooting of Access Control Lists (ACL), NAT and Confidential IOS
- Have knowledge on various advanced technologies like VOIP, QOS, IPv4, Multicasting, and MPLS
- Extensively worked on Confidential catalyst router 6509 and implemented VSS along with VDC and VPC on Nexus 5505, 7010 switches
- Setup of site-site (IPSEC VPN) and remote VPN connections to communicate between branches
- Strong hands on experience on PIX, Firewalls, ASA 5500 series firewalls. Implemented Security Policies using ACL, IPSEC, SSL, VPN, IPS/IDS, AAA ( TACACS+ & RADIUS )
- Implementation of Data Center migration from 6500 based data center to Nexus based data center with 7k-5k-2k dual home design with multiple VDC’s, VPC, OTV and FEX
- Implemented DMVPN with hub and spoke topology for 100 plus remote sites
- Familiarity of British Telecom (LOB -BT Open reach - Plan and Build Process) in BT L2C for GIS based application
- Good understanding of the OSI reference model and the TCP/IP model
- Troubleshoot network issues using monitoring tools like Confidential Prime Infrastructure, Wireshark, Solarwinds, Confidential NCS, and Firemon
- Experience working with different wan transports MPLS, VPN, Metro Ethernet
- Configured ASR 1K routers as the companies head end WAN routers and implemented BGP with VRF and OSPF instances running parallel
- Expertise in creating test Plan, test estimation, test execution and reporting
- Understanding of 3GPP/3GPP2 standards and test requirements for LTE wireless technologies
- Expertise in use of Microsoft VISIO/Office as technical documentation and presentation tools
- Excellent interpersonal and communication skills, technically competent and result oriented with strong problem solving skills
TECHNICAL SKILLS:
LAN/ WAN Technologies: Ethernet/ Fast Ethernet/ Gigabit Ethernet networks, VLANS, VTP, STP, PVST, RSTP, 802.1W, Frame Relay, ISDN, PPP, MPLS, leased lines and exposure to PPP, HDLC, DS1, DS3, OC3, OC12, OC48, T1/T3 and E1/E3
Routing/ Switching: Confidential routers (7206 VXR, 4431, 4331, 3945, 3925, 3845, 2901, 2811, 2620, 2612, 1900, 1800, 800) Confidential catalyst switches (6800, 6509, 6506, 6513, 3750, Catalyst 37xx stack, 3550, 2960, 2800, 1900 series), Confidential Nexus (7000 series 10- slot switch, 5548P, 5548 UP, 2248TP. 2248TP-E, 2232PP), VPC, VDC, OTV Security Confidential ASA 5500 series (5505, 5512-X, 5525, 5545) and PIX 515E, 525 series, Palo Alto, Checkpoint, IPsec VPN configuration, RADIUS, TACACS+, IDS/IPS, 3060 VPN concentrator, PKI, ACL, NAT/PAT, Route maps, Load Balancers:
Wireless: Autonomous AP’s, Lightweight AP’s, Confidential Wireless LAN Controller 2400, 5500 Series, WDS, and WLSE, Standards 802.11 a/b/g
Management Tools: Confidential Prime Infrastructure, Solarwinds, Firemon, Confidential NCS, NetMRI, Show and Share, Wireshark, NetQos Super-Agent
Tools: Snooper, Balance Manager, IWOS
Operating Systems: UNIX, LINUX, Sun Solaris, Mac OS, Windows server 2000, 2003, 2008, Windows 7/NT/XP/Vista, Confidential IOS, Confidential IOS-XE, Confidential NX-OS
Programming: C, C++, MATLAB
Documentation: MS-Office (PowerPoint, Excel, Word), MS-Visio, SharePoint, Google Docs
PROFESSIONAL EXPERIENCE:
Confidential, CA
Network Engineer
Responsibilities:
- Working on a broad range of topics such as routing and switching, dedicated voice access, planning and implementation, large-scale high-visibility outages, change management coordination, proactive monitoring and maintenance, disaster recovery exercise and core network repairs
- Working in high availability Nexus environment and provide Level 3 network support
- Configuring, upgrading and verifying the NX-OS operating system
- Worked with F5 Balancers and their implementation in various networks
- Designing and installing new branch network systems. Resolving network issues, running test scripts and preparing network documentation
- Translating Confidential IOS Route maps to Confidential IOS XR routing policies
- Working with Confidential Nexus 2148 Fabric Extender and Nexus 5500 series to provide a flexible Access Solution for datacenter access architecture
- Ensuring problems are satisfactorily resolved in a timely manner with focus in providing high level of support for all customers
- Implementing security solutions using Palo Alto PA-5000, Checkpoint Firewalls R75, R77.20 Gaia and Provider-1/MDM
- Implemented Positive Enforcement Model with the help of Palo Alto Networks and deployed PAN-5050
- Working with Confidential Nexus 7000, Nexus 5000, and Nexus 2000 platforms
- Working with BGP, OSPF protocols in MPLS Cloud
- Good knowledge on Confidential RSA
- Used VLAN Trunk Protocol (VTP) while configure a new VLAN on one VTP server
- Establishing VPN Tunnels using IPSec encryption standards and also configuring and implementing site-to-site VPN, Remote VPN
- Working with Juniper JUNOS operating system and working on M and MX series routers
- Proactively monitor and manage all productions network systems to maximize system availability in Netscaler
- Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site
- Configuring HSRP between the 3845-router pairs of gateway redundancy for the client desktops
- Configuring GLBP, VLAN, VTP's, Trunking 802.1Q, STP, Port security on Catalyst 6500 switches
- Configuring, monitoring and troubleshooting Confidential 's ASA 5500/PIX security appliance, Failover DMZ zoning and configuring VLANs/routing/NATing with the firewalls as per the design
- Converting Confidential IOS to Confidential IOS XR configurations
- Working on HP open view map for network management system and ticketing
- Involved in L2/L3 Switching technology administration including creating and maintaining VLANs, Port security, Trunking, STP, Inter Vlan Routing, LAN security
- Working on Confidential Secure ACS (RADIUS/TACACS+) authentications
- Experienced working with Confidential Virtual Switching System (VSS)
- Work experience on Bluecoat Proxy SG for Content filtering and URL filtering
- Has good experience working with the Trouble Tickets on F5 Load balancers
- Provide technical expertise, guidance, recommendations, and assistance in the planning, administration, testing and use of new applications, devices, services, and security tools in the ITsecurity domain
- Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support
Environment: Confidential Routers, Switches, OSPF, EIGRP, Application Visibility and Control (AVC), Netflow, Access Control Server (ACS), DMVPN, VPN, MPLS, LAN, WAN, ASA, Solarwinds, Confidential Prime, VMware, Confidential ISE, PfR, Netscaler, F5 Load Balancer, Bluecoat.
Confidential, WA
Network Engineer
Responsibilities:
- Configured and deploying Confidential catalyst 6500, 4500 switches and Confidential 3660 and 7609 series routers
- Worked extensively in configuring, monitoring and troubleshooting Confidential 's ASR 5500
- Involved in the troubleshooting aspects of complex network infrastructure using the routing protocols like EIGRP, OSPF & BGP
- Implementation of Access Lists for allowing/blocking desired traffic
- Responsible for Confidential ASA firewall administration, Rule Analysis, Rule Modification
- Good knowledge in systems integration, software hardware emulation experience
- Experience working in Datacenter environment, configuration changes as per the needs of company
- Manage project task to migrate from Confidential ASA firewalls to Check Point firewalls
- Configured and performed troubleshooting on link state protocols like OSPF in single area and multiple areas
- Assisted in migrating core switches from 6500 to 6800
- Configuring, implementing and troubleshooting VLAN’s, VTP, STP, Trunking, Ether channels
- Designing, implementing LAN/WAN configurations on Confidential 5K, catalyst 6500 switches
- Configuring and testing Multicast for both IPv4 and IPv6 routing in Data Center Environment
- Installing, configuring Confidential Catalyst switches 6500, 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design
- Extensive knowledge in implementing and configuring F5 Big-IP Local Traffic Manager 3900, and 6900 Load Balancers
- Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority (PKI) for purpose of scaling
- Troubleshoot issues with network connectivity and issues related to neighbor relationship and peers
- Experience configuring Core, Access, OTV in Nexus 7k series switch management
- Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K
- Designed, configured, implemented site-site VPN on Confidential ASA 5500 firewall
- Implemented, configured redundancy protocols HSRP, VRRP, GLBP for Default Gateway Redundancy
- Performed troubleshooting on slow network connectivity issues, routing issues involving EIGRP, BGP and identifying the root cause of the issues
- Integrated Checkpoint firewall into client's existing network to provide security for applications
- Maintenance and trouble-shooting of LAN, WAN, IP routing, Multilayers switching
- Implementing Confidential Wireless access points using LEAP and Confidential Radius for authentication, greatly increasing Wireless security
- Set up the Citrix Command Center with the Netscalers to actively monitor the server status and alerting has been set up in the event of server down
- Configuration and troubleshooting of many link types i.e. SONET Controllers for sub E1/T1, E3/T3 and POS controllers for STM1 links
- Gathering details from customers and providing best security infrastructure solutions with F5 Load Balancers, Check Point/Netscreen firewalls and Bluecoat proxies
- Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support of 24*7
- Configuration the access-list rules, network object-service group based on well-known port the port i.e. FTP/SFTP, SSH, HTTPS/HTTPS (SSL) and etc
- Performing network monitoring, providing analysis using various tools like Wire Shark, Solarwinds etc
- Worked on change management documentation of network infrastructure design using Microsoft Visio
Environment: s: Nexus 7k, 5k, Checkpoint firewall, Confidential ASA 5500, BGP, EIGRP, OSPF, MPLS, VPN, F5 Load Balancer, HSRP, QoS, VPN, Core switches 6800, 6500, 4500, Confidential routers 3660, 7609, ASR 5500, Wire Shark, Solarwinds, Netscaler, Bluecoat.
Confidential ., Atlanta
Network Engineer
Responsibilities:
- Served as part of a team of network engineers responsible for base wide network troubleshooting of Confidential Layer 3, Layer 2 devices
- Design, implement and administer IPv4 enterprise network infrastructure utilizing Confidential routers
- Experience working with design and deployment of MPLS Layer 3 VPN cloud, involving VRF, Route Distinguisher (RD), Route Target (RT), Label Distribution Protocol (LDP) & MP-BGP
- Implemented antivirus and web filtering on Confidential devices
- Implementation and operational support of routing protocols and topologies including BGP, OSPF, MPLS, DMVPN
- Implemented EIGRP, OSPF & BGP and configured security policies- NAT, PAT & Access Control Lists (ACL)
- Experience working with cat6000, 6500, 7600 devices
- Managed LAN and Wireless network and performed troubleshooting On LAN, WLAN, Customer modems (NTL 250, MOTOROLA) And CPE router
- Experience in configuring, upgrading and verifying NX-OS operation system with OSPF, BGP
- Experience working on Confidential ACE Load Balancer
- Tests scope to include application modules, integration layer and full end-2-end testing incorporating various device & web-top clients
- Demonstrated that the video segmented system works reliably with the actual satellite network going through the core node, network infrastructure accelerator, and receive via satellite modem
- Experience working with Transaction Language 1 (TL1), which is used as a management protocol in telecommunications
- Experience converting Cat OS to Confidential IOS on the Confidential 6500 switches
- Experience with deploying PIM Sparse-mode/Dense-mode multicasting in Campus locations
- Actively involved in Switching technology Administration including creating and managing VLANS, Port security- 802.1x, Trucking 802.1Q, RPVST+, Inter-VLAN routing, and LAN security on Confidential Catalyst Switches 4507R+E, 6509-E and Confidential Nexus Switches 2232, 5596, 7009
- Tested various networks, which works on the protocols like of TCP/IP (IP, TCP, UDP, SNMP, DNS, DHCP, FTP, HTTP, HTTPS, ICMP, SMTP, ARP, IPSEC and NAT)
- Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
- Assisted in the installation of a new DS3 MPLS WAN backbone implemented throughout the entire corporate network
- Implemented Positive Enforcement Model with the help of Palo Alto Networks
- Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing. Worked on different phases of testing such as Sanity Testing, Functionality Testing, Smoke Testing, System Testing, Installation Testing, Compatibility Testing, Regression Testing, Stress Testing and UAT Testing
- Identify, design and implement flexible, responsive, and secure technology services
- Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP, MPLS
- Monitored and resolved network device issues identified by Solarwinds in a timely manner
Environment: s: Checkpoint firewall, Confidential ASA 5500, BGP, EIGRP, OSPF, MPLS, VPN, HSRP, QoS, VPN, Confidential switches 2232, 5596, 7009, Confidential routers 3660, 7609, ASR 5500, Wire Shark, Solarwinds.
British Telecom, Pune
Network Test Engineer
Responsibilities:
- Gathered business and system requirements and designed test cases
- Track work orders in IWOS and verify call flow diagrams
- Managed production environment zone test sessions and guided field testers as per test plan
- Managed SIM assignment and provisioning for production environment zones
- Verified the timestamp in the CDR logs by coordinating with the mediation team
- Update the validation report on the IWOS & HPQC
- Scheduling the maintenance window for production environment for LTE, 3G, and 2G services
- Daily/Weekly Configuration backup and device Configuration changes as per the request
- Reproducing the Bugs in the pre-production environment for RCA to get the bugs fixed by the vendor
- Collaborated with the onsite team to resolve issues found posttest execution
- Set up and troubleshoot secured wireless access points (WAP) and wireless LAN controller (WLC) for broadband Internet and continuous network mobility
- Used multiple network monitoring tool Solarwinds, Confidential Prime for supporting the existing core network environment and Network edge devices
- Maintained bug status reports and drove to resolution including verification of fixes
- Network up gradation & migration (Hardware / Software) from ATM/Frame relay to MPLS
- Wrote documentation of newly addressed issues and lessons learned for Network Operations Center (NOC)
- Execute the Commands & extract the logs from Confidential ASR 5500
- Assisted in migration of existing B2B VPN tunnels with the vendors from the 3060 VPN concentrator to ASA Firewall and configured site-to-site IPSEC VPN
- Troubleshoot the Issues during service validation and verifying the gateway logs
- Highlight configuration errors/changes to the deployment team
Environment: s: ASR 5500, IWOS, Quality Center, Balance Manager, WAP, WLC, Snooper, Solarwinds, Wire Shark.
Confidential,
Network Test Engineer
Responsibilities:
- Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, Frame relay, NAT, DHCP, TCP/IP)
- Configured Routing protocols such as OSPF, BGP, RIP, static routing and policy based routing
- Performed network QA test, executed system analysis and troubleshooting in order to resolve problems on servers, workstations and other network devices
- Planned and executed 802.11 Wireless LAN adapter testing to model potential customer setups and deploy wireless solutions
- Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches
- Responsible for Internal and external accounts and, managing LAN/WAN and checking for security
- Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture
- Provided Technical support for improvement, upgradation, and expansion of the existing network architecture
- Done troubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment
- Monitored the network performance regularly to improve performance and functionality
- Configured static routes, default routes, Frame Relay and provided security by using ACL, NAT
- Implemented VLANS between different departments and connected them using trunk by keeping one VLAN under server mode and rest falling under client modes
- Configured site-to-site IPSec VPN to provide communication between the branch office and headquarters
Environment: s: RIP, OSPF, BGP, and VLAN, HSRP Spanning tree, IP Sec tunnels, Windows Server, Confidential routers and switches