We provide IT Staff Augmentation Services!

Network Engineer Resume

5.00/5 (Submit Your Rating)

Paterson, NJ

SUMMARY:

  • Design, develop, and document comprehensive test plans to a setup of test scenarios, both hardware and software components.
  • Designed and Implemented Chassis based Juniper SRX, EX, M, and MX series products.
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Hands on experience of data center environment, Support, Troubleshooting and implementation of VPC, VDC and Fabric path on Nexus 9K, 7K, 6K, and 2K Switches. Experience in Configuring, upgrading and verifying the NX - OS operating system.
  • Experience to run independently with Checkpoint and Network Engineering like Routing/Switching and Protocols VPN along with ASA Firewall.
  • Experience in installing, configuring and troubleshooting Checkpoint Firewalls.
  • Responsible for Checkpoint and Juniper firewall administration across global networks.
  • Configuring Client-to-site VPN using SSL Client Cisco ASA 5540, 5510.
  • Advanced knowledge of IPsec VPN design connection and protocols, IPsec tunnel configuration, encryption and integrity protocols.
  • Cisco Nexus 7000, 5000 series installation and configuration, implementation with Port channel and troubleshooting in a TCP/IP OSPF environment.
  • Experience with F5 load balancers - LTM, GTM series like 6800 and 8900 for the corporate applications and their availability.
  • Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, MPLS QoS.
  • Good knowledge of juniper SRX240, SRX220, and SRX550 series Firewalls.
  • Perform Checkpoint and PIX firewall/IDS design, integration and implementation of Cyber Trap client networks.
  • Hands-on experience on Checkpoint Firewall R77, Palo Alto Pa 3000 and Cisco ASA 5520 firewalls.
  • Experience in connecting enterprise networks using SD-WAN technology.
  • Re-engineered Firewall policies on Juniper SSG320 and SSG140 Firewalls. Configured policies on checkpoint Firewall and involved in resolving production issues.
  • Implemented Cisco Meraki wireless managed network infrastructure.

TECHNICAL SKILLS:

Cisco Platforms: Nexus 7K, 5K, 2K, 1K

Cisco Routers: 1700,1800,2500,2600,2800,2900,3600,3800,3900,7200,7600

Cisco L2 & L3 Switches: 2900,3500,3560,3750,4500,4900,6500

Juniper Platforms: SRX, MX, EX Series Router and Switches

Networking Concepts: Access-lists, Routing, Switching, Sub netting, Designing, CSU/DSU, IPsec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall: ASA Firewall (5505/5510), Checkpoint, Cisco ASA

Network Tools: Solar Winds, SNMP, Cisco Works, Wireshark

Wireless Managed Networks: Cisco Meraki

Load Balancers: Cisco CSM, F5 Networks (Big-IP)

Wan Technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3,0C3, T1 /T3 & SONET

Lan Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port-channel,VLANs, VTP, STP, RSTP, 802.1Q

Security Protocols: IKE, IPsec, SSL-VPN

Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System: Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

Documentation: MS Office, MS Visio

Cloud Technologies: Amazon Web services, Microsoft Azure

PROFESSIONAL EXPERIENCE:

Confidential,Fort Worth,TX

Senior Network Engineer

Responsibilities:

  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
  • Design Planning and Commissioning of new Wi-Fi network equipment across Hybrid Fiber Coax Networks for WAN/LAN Broadband Wi-Fi solutions.
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Configuration and implementation of Juniper and Palo Alto firewalls.
  • Configured and troubleshoot Cisco WAP and Cisco prime.
  • Configured Cisco Meraki's Security Appliance, MX 100 to enable Access Control Policies, Port Address Translation (PAT), Routing, and distinct network zones for the lab.
  • Worked on different types of Network Design using IPsec, GRE Tunneling, VPN, Frame Relay and MPLS Core.
  • Worked with Load balancing device like F5 Big-IP local traffic manager (LTM) 1600.
  • Performed upgrade of Palo Alto firewall from old platforms to new platforms 6.1.5 to 6.1.10.
  • Remote access and site-to-site VPN administration using Cisco ASA/ASR and Palo Alto
  • Checkpoint policy Implementation, Data and URL filtering.
  • Connecting enterprise networks using SD-WAN technology.
  • Site-to-Site IPsec based VPN Tunnels for all 020 Communications.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wireshark, Deployed the Nexus 7000/5000/2000 architecture.
  • Implemented site to site VPN in Juniper SRX as per customer and various EX, SRX & J series Juniper devices.
  • Hands-on experience with cloud infrastructure technologies like Azure, AWS.
  • Excellent knowledge of Cisco ISE and TACACS authentication servers with Palo Alto.
  • Troubleshoot and Worked on Security issues related to Cisco ASA, and IDS/IPS firewalls. Large-scale Deployment and installation of Juniper SSG5, Cisco ASA, and Fortinet firewalls.
  • Responsible for NAT traffic flow in the Juniper SRX 3600 and support Juniper Space.
  • Negotiate VPN tunnels using IPsec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
  • Successfully installed Palo Alto PA-7050 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.

Confidential,Monterey Park,CA

Network Security Engineer

Responsibilities:

  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA 5500 Firewalls, and MPLS switching for stable VPNs.
  • Technical Knowledge of Cisco PIX/ASA series, Juniper Net screen/SRX firewall gateways.
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, Cisco ASA, Firewalls, VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall. Successfully installed Palo Alto Next-Generation PA-3060, PA-5060 firewalls to protect Data Center with the use of IPS feature.
  • Implemented site to site VPN in Juniper SRX as per customer.
  • Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210.
  • Worked on Juniper J Series J 230, M 320 routers and EX 3200 series switch.
  • Implemented, Tested and troubleshoot Juniper Firewall to establish VPN network Datacenter and wireless for the local network.
  • Build IT security infrastructure including Checkpoint, Juniper, and Palo Alto firewalls.
  • Load Balancing with F5 GTM and LTM across multiple data centers.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.
  • Successfully installed Palo Alto PA-3060 firewalls to protects Data Center and provided L3 support for routers/ switches/firewalls.
  • Responsible for Check Point and Juniper SRX firewall administration across our global networks.
  • Implementation, maintenance and monitoring of IDS/IPS, WAF, antivirus and Syslog Servers.
  • Configure and maintain Cisco IDS/IPS, ASA firewalls, and Bluecoat web proxies.
  • Troubleshoot and Worked on Security issues related to Cisco ASA, and IDS/IPS firewalls. Large-scale Deployment and installation of Juniper SSG5, Cisco ASA, and Fortinet firewalls.
  • Implemented site to site VPN with IPSEC via. GRE ISKAMP.
  • Configured IPsec VPN access for client to site remote access.
  • Responsible for Cisco ASA firewall administration across our global networks.
  • Involved in the redistribution into OSPF on the core ASA firewall.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling.
  • Hands on experience with Cisco Nexus 7K, 5K and 2K series equipment including configuration of protocols.
  • Attended few conference on Cisco Meraki wireless managed network.

Confidential,Paterson,NJ

Network Engineer

Responsibilities:

  • Responsible for Working in high availability Nexus Environment and provide Level 3Network Support.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Translating Cisco IOS Route maps to Cisco IOS XR Routing policies.
  • Working with Cisco Nexus 2148 Fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.
  • Successfully executed change on Nexus 9K and 7Ks to support redundant platform.
  • Establishing VPN Tunnels using IPSec encryption standards and also configuring and implementing site-to-site VPN, Remote VPN.
  • Experience in Configuring Site-to-Site and Remote Site VPNs, NAT/PAT policies.
  • Providing daily network support for wide area networks consisting of MPLS, VPN and point-to point site.
  • Configured network access servers and routers for AAA Security (RADIUS/ TACACS+).
  • Technical Knowledge on Cisco PIX/ASA series, Juniper Net screen/SRX firewall gateways.
  • Troubleshoot and hands on experience on security related issues on Cisco ASA/PIX, Checkpoint, IDS/IPS, Palo Alto and Juniper Net screen firewalls.
  • Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Config, Assigning DCHP profiles.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Creating new nodes and Pools in F5 load balancers to support newly added servers in Layer 3 environment.
  • Configuring, Monitoring and Troubleshooting Cisco's ASA 5500 security appliance, Failover DMZ zoning and configuring VLANs/routing/NATing with the firewalls as per the design.
  • Worked on migrating the F5 LTM 5100 version 9.2 to 5100 LTM version 9.4 and F5 GTM configurations.

Confidential

Network Support Engineer

Responsibilities:

  • Configured VLANs with 802.1Q Tagging according to the Server team’s requirements.
  • Checkpoint Level3 operations support with hardware operations fixed all problems & RMA’s, taking any escalations that dealt with the equipment and its connection interfaces, VLAN’s, routes, etc.
  • Responsible for level 2 support of existing network technologies /services& integration of new network technologies / services.
  • Installed and managed multiple instances of a Routing table using VRF and VRF Lite.
  • Working knowledge on LAN/WAN setup, installation, configuration, and troubleshooting.
  • Strong hands on experience in Troubleshooting for QOS, connectivity and hardware problems on Cisco Networks.
  • Configuration and implementation of various Cisco Routers and L2 Switches.
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
  • Implemented static routing, routing protocols (OSPF, and BGP), switching (VLANS, VTP Domains, STP, and trucking).
  • Working on physical interfaces such as Gigabit, Fast Ethernet and Serial interfaces.
  • Knowledge and skill of 802.11 a/b/g/n LAN normal for wireless Technology.
  • Excellent leadership with good written and oral communication.

Confidential

Network Admin

Responsibilities:

  • Responsible for implementation and day to day operations of all associated hubs, routers, bridges, gateways and Network related equipment.
  • Upgraded Cisco 7200, 3600 Router IOS Software, backup Routers and Catalyst 3560, 4500 switch configurations.
  • Active participation on operational support for routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.
  • Network Migration from RIP to OSPF and EIGRP, Design OSPF areas for reliable Access Distribution and for Core IP Routing.
  • Installing the Network devices in datacenter environment and clearly articulate complex network designs and drawings through documentation (Visio) as well as verbal training sessions.
  • Experience in Configuring Site-to-Site and Remote Site VPNs, NAT/PAT policies
  • Maintenance and Troubleshooting of connectivity problems using PING, trace route.
  • Switching related tasks included implementing VLANS, VTP and configuring ISL trunk on Fast - Ethernet channel between switches.

We'd love your feedback!