We provide IT Staff Augmentation Services!

Firewall Security Engineer Resume

Newark, CA

SUMMARY:

  • Highly dedicated and self - motivated Network Engineer trained to oversee the complex network of an organization to reach efficiency with perfection and focusing on optimizing the performance. Self-driven and proactive with robust troubleshooting knowledge and outstanding communication skills backed with analytical aptitudes.
  • Over 9+ years of practical work experience in the field of IT as a network engineer, with in-depth knowledge and hands-on experience on Routing and Switching, Wi-Fi portfolio and troubleshooting protocols such as RIP, VOIP, OSPF, IS-IS, BGP, SNMP and EIGRP.
  • Complete knowledge about the installation and configuration of Cisco switches 2960, 3560, 2900, 3750, 4500, 6500, Nexus 7000, Nexus 5000, Alcatel 7705 SAR series, WS-C4948 and Juniper EX.
  • Hands-on experience in implementing and troubleshooting of VLAN, VTP, STP, Trucking, Ether Channel MSTP, 802.1Q, VRRP, LACP, AAA, RADIUS, DTP, HSRP, GLBP, TACACS, RSTP, PVST, RADIUS VTP, STP.
  • Designing and configuration of BGP, OSPF on Juniper routers (MX960, MX480), Bluecoat Proxy SG300/600 and SRX Firewalls (SRX240, SRX550)
  • Professional expertise in the department of implementation and analysis, troubleshooting and documenting the results of LAN/WAN architectures and excellent knowledge on IP services.
  • Excellent knowledge on Sub netting, IP addressing, reverse & proxy ARP, VLSM and ARP and various ping concepts.
  • Expert in handling routers such as 2600, 2900, 3600, 3900, 7200, 7600, ASR-901, ASR-903, ASR 5500, ASR-9010 and Juniper ACX, E, M, MX960 series.
  • Clear concept about Physical cabling and IP addressing with VSLM implementing QIP configuration and DNS, TCP/IP and installation and configuration of proxies.
  • Excellent knowledge and experience on GRE tunneling deployment, SSL, DMVPN and Site-Site IPSECVPN.
  • Configuration of security policies including NAT, PAT, VPN, SSL-VPN, Route-maps and Access Control Lists.
  • Hands-on with convert Checkpoint VPN rules over to the Cisco ASA solutions.
  • Capable of observing and recording the traffic with various network management tools such as source file, Net flow Analyzer, Sniffer Infinistream, HP open View, Wire shark, solar winds, Cisco Works and Cisco ISE.
  • Capable of creating the Access list design the route maps and distributed list.
  • Good understanding and hands-on experience on multiple protocols such as EAP, PEAP, EAP-TLS, IEEE 802.1, IEEE 802.3, IEEE 802.11 and 802.1x.
  • High level of expertise in multiple operating system like Windows 8, Windows 7, Windows 2008, Ubuntu, Asterisk, Linux, Red Hat Linux and MS Office Suite.
  • Good experience in installation of VoIP and troubleshooting the issues, Digium Phone configuration and maintaining VoIP over VLAN.
  • Implementation and tuning of management capabilities and basic security features related to PA-2000 series security appliance using PAN-OS 6 including SSH and WebGUI access, custom rules, virtual-wire and routed interfaces, trust/untrust and dmz zones along with logging and auditing. Configured an IPsec connection between two routers using GRE tunneling to encrypt the multi-cast traffic.
  • Professional expertise on Network Scanning and management, Hands on Altering and logging tools such as Solar Winds, Science and Log Logic, nCircle, PRTG, Net cool and Wire shark.
  • Capable of Planning and Designing of small and medium size organizational LAN, VLAN, WLAN and WAN on both wired and wireless networks.
  • Have designed and configured switches for VLANS and managed communication between multiple switches.
  • Managed the A10 networks for balancing the traffic of the network.
  • Hands-on IOS, NXOS and IOS-XR BXB to N7K-NXOS (MPLS) system test.
  • Good understanding of various Palo Alto firewalls which works with different managing tools such as Palo Alto PAN, desktop antivirus, AMRD, IPS, NextG Firewalls, Authentication and VPN.
  • Experienced in troubleshooting DNS/DHCP issues within the LAN network.
  • High knowledge on troubleshooting and configuring DNS, DHCP, TFTP, TELNET, SSH, FTP and NFS.
  • Hands on experience on several Ticketing Tools like JIRA, Change Management, Service Catalog, ePCR, SR, Remedy and IP center.
  • Managed and monitored all the network hardware inventories using SSH, NTP, Syslog and SNMP.
  • Hands-on with Load Balancers F5 LTM like 3900, 6900 for multiple application.
  • Excellent communication skills to interact with team members and support personnel and also can act as a mentor to less experienced personnel.

TECHNICAL SKILLS:

Networking: - OSI Model, TCP/IP, UDP, IPV4, IPv6, Sub-netting, VLSM, Layer2/3, Advanced switch and router configurations (Cisco IOS).

Switching: - V-lans, Trunking, Ether Channel, Port Fast, Up-link, STP, RSTP, PVST+, DTP, MLPPP, IEEE 802.1q, MPLS, ISL and dot1q, SMTP, Inter-VLAN Routing, Light weight access point.

Routing: - RIP2, EIGRP, OSPF, BGP v4, IS-IS Static Routing, Route.

Infrastructure services: DNS, ICMP, SNMP, ARP, IRDP, NAT, SNMP, SYSLOG, NTP, InfoBlox, DHCP, CDP, TFTP and FTP.

Layer 3 Switching: CEF, Multi-Layer Switching, Ether Channel.

Carrier Technologies: MPLS, MPLS-VPN.

Network Security: - Cisco ASA5550/ 5540, NetScreen, Juniper SRX, Palo Alto, CheckpointsAAA, Firemon:, FREE RADIUS, CADA, LDAP, IPsec VPN, SSL VPN, IDSIPS, Source: Fire, Fire Eye, Cisco NAC (4.9.3), Cisco ISE, Aruba, RSA, RSA

2 Factor:, SIEM, Qradar, Tripwire.

Management tools: - Wire shark, SNMP, Ethereal, Solar Winds, Net cool, Science Logic, Log

Logic:, EM7, Indeni, nCircle, PRTG, Blue Coat, Websense, Cisco NAC, ISEActive: Directory.

Firewalls & Load Balancers: Cisco ASA 5585, 5550, 5540, Juniper SRX5400, 5600, 5800, Juniper Netscreen 6500, 6000, 5400. Juniper SSG Firewalls, Palo Alto PA-3060/2050, F-5 BIG-IP LTM (3900 and 8900), Blue Coat SG8100, AV 510, AV810.

OS: - Windows (98, ME, 2000, XP, Sv2003, Sv2008, Sv2012, Vista, 7, 8), Ubuntu, Linux, Kali Linux, CentOS, FreeBSD, Red Hat.

Language: Unix, Turbo C / C++, basics in Perl and Shell scripting.

PROFESSIONAL EXPERIENCE:

Confidential - Newark, CA

Firewall Security Engineer

Responsibilities:

  • Proficient in using firewall technologies including general configuration, security policy, rules creation and modification of cisco ASA, Juniper SRX and Fortigate.
  • Strong experience in creating firewall policies as per the requirements on Checkpoint, Palo Alto, Cisco ASA, Juniper and Fortinet firewalls.
  • Responsible for implementing firewall technologies including general configuration, optimization, security policy, rules creation and modification of ASA and SRX and fortigate Firewalls.
  • Configured ACLs to allow only authorized users to access service.
  • Working on Traffic Migration from Cisco ASA firewalls to Juniper SRX and Fortigate.
  • Extensive Packet level debugging and troubleshooting on Cisco ASA firewalls and Juniper SRX to resolve numerous network issues.
  • Configuration, Troubleshooting and Maintenance of ASA Firewalls (40+ firewalls) 5505, 5510, 5520, 5540, 5585.
  • Have applied ACLs for Internet access to servers using Cisco 5550 ASA firewall and performed NAT.
  • Responsible for overall firewall configuration implementations and policy installations across all platforms during maintenance windows including Juniper, ASA, and Fortinet for major enterprise network.
  • Configuring, maintaining and troubleshooting with Fortinet firewall and security.
  • Extensive implementation of firewall rules on Juniper SRX 3600, SRX 650 and SRX 220 on a daily basis, using SPACE as well as CLI when needed.
  • Resolved Customers request to create firewall policies for Cisco ASA, juniper SRX, Fortigate and NX-OS.
  • Configured ASA 5520/5500to ensures high-end security on the network with ACLs and Firewall.
  • Resolved 8 to 10 tickets per day which involved creating Access Control List, removing ACLs and migration.
  • Resolving customers query over the phone as well as emails regarding the flow of traffic between different hosts and subnets to allow them to get a seamless connectivity between different networks.
  • Worked on the CLI for tracing and creating ACLs between the source and destination for Cisco ASA, juniper SRX, Fortigate and NX-OS.
  • Drafted, installed, and provisioned Cisco ASA, juniper SRX, Fortigate and NX-OS rules and policies.
  • Have created Delta Config on Juniper networks where ever required.
  • Experience with the deployment of network and/or server hardware within both corporate IP Networks and DMZ security Firewalled Zones, including design, specifying requirements, and troubleshooting network connectivity, routing, and firewall rules.
  • Supervising the administration of systems and servers related network to ensure availability of services to authorized users via ACL.
  • Security auditing of perimeter/ Edge routers, identifying missing ACL's, writing and applying ACL's
  • Configuring standard and Extended Access Control list (ACL) and ASA Firewalls.
  • Provide Service Support to Clients regarding LAN/WAN connectivity Configuring and Modification of ACL, NAT Rules and Port numbers in ASA Firewalls using CLI and SecureCRT.

Confidential - Los Angeles, CA

Sr. Network Engineer

Responsibilities:

  • Deployed ISE Wireless solution for the organization.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
  • Installed Cisco Identity Services Engine and configured and customized Guest Portal for self-registration.
  • Supported enterprise environment including: Aruba controllers, Airwave and APs/Cisco wireless controllers.
  • Deployed 802.1x with PEAP for Employee Wireless Access.
  • Create infrastructure performance reports and daily monitoring of ALL Cisco Wireless Devices.
  • Resolve network/wireless related incidents on wide range of technologies including: Cisco Prime Infrastructure, Cisco Wireless LAN Controllers, Access Points, Cisco ISE, SolarWinds. Majority of Wireless issues were resolved via Cisco Prime.
  • Assisted with AP placements throughout the site using Cisco Prime AP Maps and AirMagnet.
  • Monitoring the performance of all the access points connected to the Wireless LAN controller of different locations.
  • Used Air Magnet Survey and Spectrum Analyzer, analyzing collected RF data to determine cell boundaries, AP power settings, and noise and interference sources is preferred, but not required. Will determine AP placements and deploy APs, and perform post-implementation surveys in order to optimize WLAN performance.
  • Updated Wi-Fi networks, conducted surveys of existing wireless networks.
  • Manage Local Area Network by Maintaining VLANs and Wireless Aps.
  • Worked with Solarwinds to monitor the health of network devices throughout the organization in different locations.
  • Replaced old Access Points with new once in various locations and deployed the entire configuration process.
  • Single handedly performed the HA configuration, configuring the secondary controller in a redundant mode.
  • Undertook the project of converting all the access points connected to the network from local mode to flex connect mode.
  • Configured Cisco, Catalyst 3850 Series IOS XE 3.6E, Using the Command-Line Interface and Web Graphical User Interface, CleanAir, Interface and Hardware Component, IPv6, Layer 2/3, Lightweight Access Point, Mobility, Network Management, QoS, Radio Resource Management, Routing, Security Stack Manager and High Availability, System Management, VideoStream, VLAN, WLAN.
  • Upgraded Prime Infrastructure from 2.1 to 2.2.
  • Involved in complete LAN, WAN, Extranet redesign (including IP address planning, designing, installation, pre-configuration of network equipment, testing, and maintenance).
  • Configured and designed LAN networks with Access layer switches such as Cisco4510, 4948, 4507 switches.
  • Installed EIGRP and OSPF routing protocols on cisco routers.
  • Monitoring and troubleshooting of wireless issues in the network.
  • Implemented HSRP on the Cisco 2948G Layer 3 switches and EIGRP, OSPF on 2 Cisco 2610 routers, the Layer 3 switch, 3 Cisco 350XL Switches, Cisco 3524XL switches for load balancing and failover.
  • Configured for Wi-Fi Standard QoS, Command Line Interface (CLI), Web interface (WebUI), Logical and Physical Interfaces, Creating Firewall Roles and Policies.
  • Experience with Supporting both Network and Security infrastructure in the data center environment and Campus environment, which involved with devices such as routers, switches, firewalls and wireless access points.
  • Involved in designing and implementation of wireless IPT devices.
  • Performed physical connection of switches, routers, Access Points and controllers in the data center.

Confidential - Philadelphia, PA

Network Support Engineer

Responsibilities:

  • Configured and aided in troubleshooting several networking issues including OSPF, EIGRP and BGP routing issues.
  • Configured and provided support for S2S IPsec tunnels as well as remote users. Assisting in troubleshooting of LAN\WAN issues. proactively participated in configuring, implementing and troubleshooting of Cisco Routers (1911, 2851, 2921, 3945, series), Switches (2900-3500 series) while monitoring Cisco routers (2900-ASR1001 series) and Cisco Switches (Cat 2900, 3850, 4500E, 6504).
  • Develop and maintain the baseline Cisco IOS. Provide upgrade instruction to the Network O&M team on new Cisco IOS VoIP can be a benefit for reducing communication and infrastructure costs.
  • Implemented Ticketing tools like JIRA, Remedy, IP-Center and related tools for logging the troubleshooting issues and the resolutions.
  • Worked as point of escalation for operations team at Level 3 support on network related issues both during • normal operations as well as during major project role outs.
  • Undertook Tier 2 technical support responsibilities consisting of detection, diagnosis and correction of issues.
  • Perform the task to complete the Hub Installation, configuration and making sites UP and running on the network.
  • Good knowledge and experience on commercial Wi-Fi configuration on wireless devices such as Cisco, Ruckus, Aruba.
  • Was a part of the Architecture team who evaluates design details and provides information on current and proposed network infrastructure considerations.
  • Assisting various departments to meet their needs regarding Site-to-Site and Remote Access VPN using Cisco ASA 5510 5520.
  • Configuring the Layer 2 and layer 3 routing and switching.
  • Configured Wi-Fi settings for the organization.
  • Serve as technical leadership for Cisco Identity Services (ISE) Security Consulting Services projects. Act as a delivery engineer within our strategic Cisco Identity Services Engine (ISE) specialization team.
  • As an ISE Senior lead primary responsible to provide design, consulting and implementation documents to support ISE security services to the client.
  • Configuring routers using multiple routing protocols such as EAP, PEAP, EAP-TLS, IEEE 802.1, IEEE 802.3, IEEE 802.11 and 802.1x.
  • Plan and execute changes to Websense Web Security Gateway proxy in response to evolving business requirements; increasing team member productivity and network security posture while providing timely internet usage reporting to management.
  • Monitor, maintain and secure an upgraded wireless infrastructure using 802.1x; improving guest and team member satisfaction while resolving a high visibility network deficiency.
  • Acting as a Technical Point of Contact and lead engineer for the implementation and upgrading of projects related to Network and Data Center Services (NDCS), Data Center implementation included Nexus 7000 Series & Fabric Extenders (FEX) Nexus 2000.
  • Provided remote support with little or no physical access to the sites using various remote access tools, including, but not limited to Team Viewer, PCAnywhere, Remote Desktop, SSH, and SFTP.
  • Working on Wi-Fi Portfolio by Configuring and Troubleshooting Wireless Access Points (WAP) and Wireless Controllers (WLC) for limited connections issue In Wireless Local Area Network (WLAN).

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960 6500 switches and Cisco 3640/12000 / 7200/3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Checkpoint, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

Confidential - Raleigh, NC

Network support Engineer

Responsibilities:

  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Configured Cisco IOS Feature Set, NAT and Simple Network Management Protocol (SNMP) for Network Security implementation.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network infrastructure and configured the entire network Infrastructure devices including Network Printers and Register.
  • Managed, supported and provisioned LAN/WAN equipment for a new network IDF deployment pertaining to Juniper J2320 and J2350 devices.
  • Worked in data center for client TIAA CREF. Responsibilities included the provisioning & installation of the IOS image onto Cisco router series 3750 and catalyst switch series 6509.
  • Responsible for administration and support of the Network Infrastructure comprised of Juniper devices J2320, J2350, and J4350.
  • Responsible for monitoring network performance, routing infrastructure, and packet conditions with video conferencing units, video/audio codecs (H.261, H.263, H.264 / G711 & G729), crestrons, codian, TMS, MGC Manager, CMA, and MCUs.
  • Responsible for P2P, ISDN, SIP, and WAN technologies using protocols such as PPP, LCP, ICMP, HDLC, SNMP, EIGRP, H.323, and E.164.
  • Experience working with HP layer 2 and layer 3 devices such as 3500, 5900, 5930, 6600, 12504.
  • Support Engineer in Installation of juniper router MX104, MX240 and connect them on HP network with HP router, switches and firewall in DC, it includes coordinating with AT&T.
  • Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking, Route aggregation, Bridge aggregation and protocol.
  • Migrated cisco3550 switches to 3750 PoE switches to provide support to Wireless APs.
  • Configuring and troubleshooting of the wireless Access points (AP1140, AP1231, AP2600, and AP3600, AP3702I), Wireless LAN Controller (WLC2106, WLC4400, WLC5500) and Wireless client issues.
  • Involved in configuring and implementing of composite Network models consists of Cisco7600, 7200, 3800 9000, CSR-1 series routers and Cisco 2950, 3500, 5000, 6500 Series switches.

Environment: Cisco 7200, 7204, and 7206 Routers, Switches: Cisco Distribution layer switches such as 4510, 4948, 4507, 7k, 5k and 2k series. Firewalls 5GT, 208, EIGRP, RIP, OSPF, CISCO ASA, DHCP, DNS, SAN, Spanning tree, Windows Server, Windows NT

Confidential - Irvine, CA

Network Engineer

Responsibilities:

  • Designing MPLS VPN and QoS for architecture using Cisco multi-layer switches.
  • Cisco IOS experience on 3600/7200 class hardware in complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data center environment.
  • Configured DUO dual factor authentication integrated with Cisco ASA VPN and NetScaler 5500 FIPS.
  • Installation, Configuration and Administration of ADS, DNS, DHCP and Web proxy(ISA)server.
  • Installed and configured the Cisco routers 2800 in two different customer locations. It includes coordinating with Verizon and AT&T to bring the serial interface up for T3 link. Also, configuration includes frame relay, BGP and VPN tunnel on GRE.
  • Troubleshooting and installing of CRS, ISR, GSR, ASR9000 and Nexus devices.
  • Configuring Nexus 2000 fabric extender which acts as a remote line card for the Nexus 7000. Configuring VDC & VPC in Nexus 9k,7k,5k and 2k.
  • Configured HSRP and VLAN trunking 802.1Q, VLAN routing on catalyst 6500 Switch.
  • Worked extensively on firewalls and VPN gateways checkpoint, CISCO, juniper, Forti-Gate GUI and arista equipment's.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Installation configuring and troubleshooting of cisco 7200VXR, ASR1K, ASR4k, ASR9K series routers and catalyst 6500, 2900 series switches.
  • Involved in configuring juniper SSG-140, cisco PIX firewall and check point firewall.
  • Established development lab for testing of network equipment. Models included EX4200, EX3200, J2350, J6350, Cisco 6500 and Cisco 3560.
  • Troubleshoot and hands-on experience on security related issues on cisco ASA/PIX, checkpoint, IDS/IPS, Palo Alto and Juniper Net screen firewalls. Installed and configured DNS and DHCP server.
  • Implementing 3750 stackable switches using cisco stack wise technology experience to review and evaluate current and future design issues as required maintaining network integrity, efficient data flow.

Environment: STP, RSTP, Cisco IOS-XR, ASA, VTP, VOIP, DMZ, HSRP, Palo Alto, Port-Channel, BGP, OSPF, EIGRP, PPP, HDLC, SNMP, DNS, DHCP.

Confidential

Network Support Engineer

Responsibilities:

  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches.
  • Configures Nexus 7010 including NX-OS virtual port channels, Nexus port Profiles, Nexus port profiles, Nexus version 4.2, 5.0, Nexus VPC peer link.
  • Involved in configuring and implementing of composite network models consists of cisco 7600, 7200, 3800, 9000, CSR-1 series routers and cisco 2950, 3500, 5000, 6500 series switches.
  • Involved in L2/L3 switching technology administration including creating and maintaining VLANs, port security, trunking, STP, RSTP, LAN security.
  • Extensive implementation of firewall rules on juniper SRX 3600, SRX 650, and SRX 220 on a regular basis using space as well as CLI when needed.
  • Maintain redundancy on cisco 2600, 2800, and 3600 routers with HSRP and VRRP.
  • Configuration of Access List ACL (STD, Ext, Named) to allow users all over the company to access different applications and blocking others.
  • Responsible for Checkpoint and Cisco-ASA-firewall administration across global networks.
  • Configured IPX/SPX, HDLC, PPP, TCP/IP, BGP, EIGRP, RIP, &HSRP.
  • Supporting EIGRP and BGP based PwC network by resolving level 2 &3 problems of internal teams & external customers of all locations.
  • Coordinated with LAN/WAN engineers the development and implements security policy.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
  • Replaced outdated Cisco switches and routers in existing Data center and installed new Cisco switches and routers including migration of 2500 to 2600 series router
  • Responsible for network evaluations, troubleshooting a variety of network problems, and implementing various software and hardware upgrades efficient performance.
  • Troubleshoot Cisco hardware, Inspected devices, read device LEDs, loose connections, cards, dirty devices, interior IOS upgrade, switch configuration usage of Visual Switch Manager, switch port configuration, port monitoring. Watch over Flooding Control/Network port.

Environment: Cisco 7200/3845/3600/2800 routers, TACACS, EIGRP, RIP and Vulnerability Assessment tools like Nessus, Red Hat, Solaris, Juniper VPN's and SSL.

Confidential

Jr. Network Engineer

Responsibilities:

  • Involved with the Systems team to Install, configure, & maintain AD, DNS, DHCP on Windows 2000 Server, also configured a FTP server; Installed configured & maintained MS Exchange Server.
  • Knowledge and experience with DNS, DHCP, VPNs, Spanning Tree Protocol, and Virtual LANS.
  • Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security Settings of the networking devices (Cisco Router, switches) co-coordinating with the system/Network administrator during any major changes and implementation.
  • Designed network connectivity and network security, between various offices and data center. Installed and configured routers including 1800, 2600 along with Cisco switches including 3750 and 6500.
  • Responsible for Configuring SITE TO SITE VPN on VPN Concentrators series between Head office and Branch office.
  • In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
  • Configuring and maintaining file sharing services using SMB, FTP, WebDAV, and HTTP/HTTPS protocols.
  • Maintain domain controllers, DHCP, DNS, active directory, IIS, file share, MS Exchange Server, and SharePoint.
  • Basic to advanced L2/L3 switching implementation using VLAN(s), QoS, Port Security, and STP.
  • Installation of small, medium, and large VoIP solutions using either ShoreTel, Digium, or Cisco hardware.
  • Implementing 3750 Stackable switches using Cisco Stack Wise technology. Experience to review and evaluate current and future design issues as required maintaining network integrity, efficient data flow.
  • Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NAT, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP& Multicasting protocols.
  • Responsible for all new product (Access Switches, Distribution layer switches, F5 load balancers, Routers) deployments for BOA forecasted growth and ad-hoc requests. Configuring, deploying server load balancers.
  • Maintained and prepared network documents and diagrams of data centers and operational sites using VISIO. Provided support for troubleshooting and resolving Customer reported issues. Interacting with the clients by creating tickets for the issue and dispatching to the correct queues for resolution.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960, 6500 switches and Cisco 3640/12000/7200/ 3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

Hire Now