We provide IT Staff Augmentation Services!

Sr. Security Engineer Resume

5.00/5 (Submit Your Rating)

Nashville, IL

OBJECTIVE:

Seeking a challenging position of network engineer which will give me an opportunity to prove potential in me and educate me more in the field of networking and to help reach the goal of the organization and its growth.

SUMMARY:

  • 9 years of professional experience in Planning, Implementing, Configuring, Troubleshooting of networking system on Cisco, Palo Alto and Juniper devices.
  • Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing systems like remedy and Magic.
  • Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches. Advanced knowledge in design, installation and configuration of Juniper Net Screen Firewall, SSG series and NSM Administration
  • Strong knowledge of VMware vSphere administration within Cisco Unified Computing System environment.
  • Hands - on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
  • Experience working on CISCO NEXUS data center infrastructure with 2000, 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2148, 2248).
  • Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.
  • Experience in Network Management Tools and sniffers like SNMP, Wireshark and Cisco works.
  • Hands-on experience using Cisco Virtual Switching System (VSS).
  • Configuring cisco switches with NX-OS and IOS-XE& implementing VLANs
  • Extensive hands-on experience with complex routed LAN and WAN networks, routers and switches.
  • Design, configure, troubleshoot and implement wireless and/or data networking(LAN/WAN) solutions for mid-sized to enterprise-level clients
  • Work as Layer 3 IP Network Engineer on ASR9k Edge router with IOS-XE Platform in a network lab environment.
  • Experience with DNS/DFS/DHCP/WINS Standardizations and Implementation
  • Experience in Network LAN/WAN deployment,
  • Responsible for the build out of Volo Data Center with emphasis on Fabric Path and OTV implementation
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/ GRE to GetVPN
  • Good knowledge on VLAN Trunk Protocol (VTP).
  • Team member of Configuration of cisco 7206 routers with VPN and Configuration of Catalyst switches.
  • Cisco ASA series, Juniper SRX and SSG series, Check Point VSX series, Cisco PIX and Palo Alto Firewalls Administration
  • Create and test cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs
  • Worked extensively on Cisco ASA 10/5540) Series, experience with convert PIX rules over to the Cisco ASA solution
  • Configuration of IPSEC, DMVPN and GRE tunneling technologies in cisco ASA’s
  • Implementation and administration of Juniper WX/WXC devices for WAN Traffic acceleration
  • Worked on MX-80, MX-480, SRX-100, SRX-110, SRX-550 and EX-4200 Juniper devices.
  • Installed and configured 8 Juniper MX 960 routers for WAN edge sites
  • Converted 5 Juniper SRX1400 to 5 Cisco ASA 5525 using converter tool (PX2SX) for 2 Sites
  • Palo Alto Firewall Management-Panorama
  • Palo Alto Firewall-ACE Certified
  • Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on Protocol based services
  • Troubleshooting of Protocol based policies on Palo Alto Firewalls and changing the policies as per the requirement and as per traffic flow
  • Experience deploying BIG-IP F5 LTM, GTM Load Balancers for load balancing and traffic management of business application.
  • Good knowledge on Riverbed Virtual Services Platform (VSP) and Big-IP F5 Load balancers.
  • Profiled python code for optimization and memory management
  • Developed entire frontend and backend modules using python on Django Web Framework
  • Developed widgets for GUI using Pygtk modules of python.
  • Developed tools using python and Shell Scripting to automate some of menial tasks
  • Knowledge of methodology and architecture of private cloud (Open stack) and public cloud (AWS & Microsoft Azure).
  • Experienced in AWS Cloud services including EC2, VPC, S3, Route53 and monitoring using Cloud Watch
  • Worked with Java libraries to access AWS facilities as Simple Storage Service
  • In-depth understanding in implementing and configuring F5 Big-IP LTM 3600, 4200, 6950 and 8950 Load Balancers
  • Designed and implemented the F5 LTM's (3600, 4500, 6900, 8950 etc.)
  • Implemented F5 in both Active/Active & Active/Standby mode.
  • Managed SSL offloading on the F5 LTM
  • Bluecoat Troubleshoot for Root Cause Analysis to ensure limited downtime
  • Some PAC file analysis to resolve issues connecting to various web sites and network Resourcesusingbluecoat.
  • Bluecoat Configuration modification for updates to rule sets
  • Designed and implement Citrix farm XenApp and Virtual Desktops for all over United States.
  • Installed and configured citrix NetScaler, Access Gateway and Load Balance Web Interface/CSF.
  • Provisioning Citrix PVS stream servers with VMware vSphere, HP Moonshot, XenServer.
  • Hands-on experience in using network stimulator tools like OPNET, Solarwinds Orion.
  • Strong knowledge in HSRP, VRRP redundancy Protocols.
  • Access control server configuration for RADIUS & TACACS+.
  • Knowledge of advanced technologies like Multicasting, MPLS and MPLS-VPN.
  • Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS, encryption techniques including virtual systems.

TECHNICAL SKILLS:

Firewalls & Load Balancers: Cisco ASA 5585, 5550, 5540, Juniper SRX 5400, 5600, 5800, Juniper Netscreen 6500, 6000, 5400. Juniper SSG Firewalls, Check point, Palo Alto PA-3060/2050, F-5 BIG-IP LTM (3900 and 8900), Blue Coat SG8100, AV 510, AV810, A10 Load Balancers.

Routers: Cisco routers (1900, 2600, 2800, 2900, 3600, 3800, 3900, 7200, 7600), Cisco L2 & L3, Juniper routers (M7i, M10i, M320).

Switches: Cisco switches (3560, 3750, 4500, 4900 & 6500), Nexus (2248, 5548 &7010)

Routing: RIP, EIGRP, OSPF & BGP, Route Filtering, Redistribution, Summarization, Static routing.

Routing Protocols: RIP, OSPF, EIGRP, and BGP.

Switching Protocols: VTP, STP, RSTP, MSTP, VLANs, PAgP, and LACP.

LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, NAT/PAT, FDDI.

WAN Technologies: FRAME RELAY, ISDN T1/E1, PPP, ATM, MPLS, leased lines, DSL modems.

Secure Access Control Server: TACACS+/Radius.

VOIP Devices & Wireless Technologies: Cisco IP phones, QOS, Avaya, CUCM, UCCX, CIPC and UCS.

Wireless: LWAPP, WLC, WCS, Standalone APs, Client Roaming, Wireless Security Basics, AP groups, WLANS, Cisco Prime Site Maps.

Network management: SNMP, Cisco Works LMS, HP Open View, Solar winds, ACI, Ethereal.

Layer 3 Switching: CEF, Multi-Layer Switching, Ether Channel.

Carrier Technologies: MPLS, MPLS-VPN.

Redundancy protocols: HSRP, VRRP, GLBP

Security Protocols: IKE, IPsec, SSL, AAA, Access-lists, prefix-lists.

QOS: CBWFQ, LLQ, WRED, Policing/Shaping.

Monitoring Tools: Voyence, packet tracer, Wireshark, Opnet, GNS3, Info Blox and Solar winds.

Security Technologies: Cisco FWSM/PIX/ASDM, Nokia Checkpoint NG, Juniper SRX, McAfee proxy servers, Fortinet, Bluecoat.

Operating Systems: Microsoft XP/Vista/7, 10, UNIX, LINUX, Redhat.

PROFESSIONAL EXPERIENCE:

Confidential, Nashville, IL

Sr. Security Engineer

Environment: Cisco Switches: 3500, 4500, 5000, 7000

Firewalls: Cisco ASA, Palo Alto

Load balancers: F5 (BigIP, LTM, GTM)

Responsibilities:

  • Expert in F5 Networks configuration of devices such as LTMs, GTMs, Load Balancers, DNS/DHCP services
  • Complete Devices installations, maintenance and perform regular upgrades and patch work on F5load balancer devices
  • Creating Virtual Servers, Nodes, Pools, Iapps and Irules on BIG-IP F5in LTM module.
  • Configuring and troubleshooting F5BIGIP LTM load balancing and implementing, Creating irules, Virtual servers, Pools, Nodes with health, Profiles, SNAT, SSL, NAT, Traffic Policies and QoS.
  • Configured High availability and implemented it on F5Load balancer.
  • Performed various inter platform migrations among numerous F5s such as 1500, 1600, 2000, i2600, 4500, viprion, etc.
  • Worked on monitoring tools such as SOLARWINDS, WIRESHARK, NetQos.
  • Design and Architecture of F5 LTM, GTM and application delivery network.
  • Experience in configuring all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.)
  • Support Panorama Centralized Management for Palo Alto firewalls to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
  • Successfully installed Palo Alto PA 5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls
  • Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol based services
  • Network security including NAT/PAT, ACL, and ASA Firewalls.
  • Experience in migration with both Checkpoint and Cisco ASA VPN.
  • Hands-on experience with converting Checkpoint VPN rules over to the Cisco ASA solution.
  • Configured, Monitored and Troubleshot Cisco's ASA Security appliances
  • Configured Access lists (ACL) on ASA firewall for the proper network routing and experience with convert PIX rules over to the Cisco ASA solution.
  • Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0
  • Configured networks using routing protocols such as OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure
  • Hands on experience in performing cisco device code upgrades
  • Experience with configuring Nexus 5000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000.
  • Good knowledge with the technologies VPN, WLAN and Multicast.
  • Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
  • Followed the change process as per IT policy It also includes the configuration of port channel between core devices and connected hardware
  • Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port \ Security, STP and RSTP.
  • Experience in installing and configuring DNS (BT Diamond), DHCP servers.
  • Replace branch hardware with new 3900 routers and 2960 switches.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links

Confidential, Allentown PA

Sr. Security Engineer

Environment: Cisco Switches: 2000, 3500, 4500, 5000, 7000, 7010, 9000

Cisco Routers: 7613, 7201, 3945E

Juniper routers: MX, EX, ASR

Firewalls: Juniper (SRX, SSG), Cisco ASA, Palo Alto

Load balancers: F5 (BigIP, LTM, GTM)

Responsibilities:

  • Experience in Auditing, Archiving and performance tuning of Remedy and service now Setups.
  • Strong skill set in the service now suite development including SOAP/REST integration, Web services, Discovery, Workflow, and CMDB.
  • Hands on experience on various IT services of service now tool like services Catalog Requests, Asset Management, Configuration Management, service now Administration, Incident and Problem Management, Knowledge Management, Reporting, Integration with Web services
  • Good knowledge of CMDB and Asset Management services: Business services and Configuration item relationships.
  • Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route-feedback, BGP attributes) on Cisco Routers 7613, 7201, and 3945E.
  • Experience working on CISCO NEXUS data center infrastructure with 2000, 5000 and 7000 series switches by enabling networked devices to communicate effectively
  • Hands-on knowledge in configuring cisco 3500, 4500 series switches to implement information sharing and resource allocation for increased productivity.
  • Helped in setting up P2P OSPF connection on the Cisco and juniper routers like MX, EX, ASR series devices with their current network
  • In corporate Cisco Nexus 9000 NXOS to ACI fabric to work in concert with existing Nexus 7000s and ASRs for Multi-Protocol Label Switching(MPLS)
  • Tested JUNOS images on juniper MX router platforms covering various protocols and technologies like OSPF, BGP, LDP, MPLS, Layer3 VPNs
  • Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NATing, sub-netting, also including DNS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, WISM, STP (Spanning tree Protocol), RTSP & Multicasting protocols
  • Configured networks using routing protocols such as RIP, OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure
  • Working on troubleshooting, implementing and configuring new devices and helping them to build new data center and moving devices from one data center to another by moving all devices.
  • Deployed VXLAN on the Nexus 9000 to map the physical VLANs to the Virtual Overlay VLANs.
  • Supporting EIGRP and BGP based on the network by resolving level 2 & 3 problems of internal teams & external customers of all locations
  • Working on to set up OSPF dynamic routing on Cisco ASA Firewalls by using and following their current network structure.
  • Monitor, operate and support network security devices such as cisco ASA, juniper and checkpoint VSX firewalls
  • Working on as security devices Cisco ASA series, checkpoint VSX, juniper SRX & SSG series, Palo Alto firewalls.
  • Worked extensively on Cisco ASA 10/5540) Series, experience with convert PIX rules over to the Cisco ASA solution
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing
  • Implemented Juniper SRX 0 firewall change requests while managing multiple customer firewall equipment
  • Implemented juniper SRX firewall change requests while managing multiple customer firewall equipment in the GETS-H
  • Installed and configured juniper firewall for local corporate office
  • Performed the juniper SRX 5800 deployment to replace the Net Screen 5200/5400 firewalls in the Los Angeles Data Center
  • Assisted with the design, maintenance, and troubleshooting of juniper firewalls on Confidential customer's backbone. Provided support for complications experienced with BGP and OSPF processes on juniper-series (1000) firewalls
  • Set up point to point OSPF connection on juniper SRX and SSG firewalls
  • Configured IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Implemented Zone Based firewall and Security Rules on the Palo Alto firewall
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
  • Successfully installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls
  • Security policy review and configuration in Palo Alto and Junipers firewall in US offices and Datacenter
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Configuring rules and Maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Managing data center and network by using solar winds, NPM, NTA, NCM and F5 load balancer and citrix load balancer
  • Hands on experience in F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs
  • Designed and implemented the F5 LTM's (3600, 4500, 6900, 8950 etc.)
  • Implemented F5 in both Active/Active & Active/Standby mode
  • Managed SSL offloading on the F5 LTM
  • Performing Bluecoat and F5 Overview training to various network team personnel for proper knowledge transfer
  • Bluecoat Policy optimization for Citrix User policy
  • Analyze and Interpret Sun/Solaris policy and translating into Bluecoat ProxySG format for seamless transition for the customer
  • Giving recommendations to upper-level management on Bluecoat setup throughout the Confidential enterprise
  • Python development experience which include 1+ years of experience in DJango Framework.
  • Hands-on experience to design and coding in technologies such as Python and SQL
  • Experience in building frameworks and automating complex workflows using Python
  • Generate Python Django Forms to record data of online users
  • Knowledge of methodology and architecture of private cloud (Open stack) and public cloud (AWS & Microsoft Azure).
  • Experienced in AWS Cloud services including EC2, VPC, S3, Route53 and monitoring using Cloud Watch
  • Worked with Java libraries to access AWS facilities as Simple Storage Service
  • Created AWS Route53 to route traffic between different regions.
  • Created AWS Cloud Formation templates to create/modify multiple stacks
  • Knowledge of methodology and architecture of private cloud (Open stack) and public cloud (AWS & Microsoft Azure).
  • Experienced in AWS Cloud services including EC2, VPC, S3, Route53 and monitoring using Cloud Watch
  • Worked with Java libraries to access AWS facilities as Simple Storage Service
  • Documenting workflow process, managing and implementing standard policy and procedures.
  • Worked in AWS technologies that support automation using cloud formation to create EC2 instances
  • Configured and managed tool that auto discovers auto scaling EC2 instances in VPC
  • Worked with automation tools such as puppet, implementing cookbooks in chef, Jenkins, etc.
  • Worked on In-Service Software Upgrade Infrastructure which enables user to upgrade between two different Junos OS releases with no disruption on the control plane and with minimal disruption of traffic
  • Automated network implementations and tasks and designed monitoring tools using python scripting
  • Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010
  • Deployed the Nexus 9000 Application Virtual switch to support network telemetry applications and 9000 Core with VPC and 3172 TOR.

Confidential, Santa Clara, CA

Sr. security Engineer

Environment: Cisco Switches: 1900, 2900, 4500, 6500, 3750, 3550, 5000, 7000, ASR1k

Juniper Switches: EX4200, EX3200

Juniper routers: MX, EX, ASR

Firewalls: cisco (ASR, ASA 8.4)

Load balancers: F5 (BigIP, LTM, GTM)

Responsibilities:

  • Implementation and Troubleshooting Cisco Routers such as Cisco 1900, 2900, Cisco ASR 1k and Cisco 9k.
  • Worked on various integrations and created Data sources for importing data into service now.
  • Configured service manager to service now integrations
  • Good understanding of Service Now Helpdesk / service Desk, Change Management, Asset Management, Change Tasking, service Level Agreement processes
  • Working with process owners and business stakeholders to translate business requirements into functional requirements within Service now
  • Experience working with ASR 9000 series switches with IOS-XR
  • Experience with migrating from Cisco ASA 8.2 version to Cisco ASA 8.4 Version
  • Configuring Cisco Switches Such as 4500, 6500, stack switches 3750
  • Configured LDP, OSPF, and BGP for new deployments of core/edge routers (Cisco and juniper).
  • Migrated Juniper EX series switches to Cisco 3500 series and 6500 series switches
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing
  • Serve as part of a team of network engineers responsible for network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches across multiple offices.
  • DesigningF5 solutions/support for migration work of applications and websites from Cisco CSS Load
  • Worked on Network Layer technologies including Routing & Signaling protocols, Layer3 VPN and Multicast supported by juniper core and edge, MX series routers
  • Configure and Juniper EX and MX series switches and routers
  • Experience working with JUNOS OS on juniper routers and Switches
  • Design, implement and administer enterprise network infrastructure utilizing Juniper routers across locations.
  • Network security including NAT/PAT, ACL, and ASA Firewalls.
  • Experience in migration with both Checkpoint and Cisco ASA VPN.
  • Hands-on experience with converting Checkpoint VPN rules over to the Cisco ASA solution.
  • Configured, Monitored and Troubleshot Cisco's ASA Security appliances
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Added websites to the URL filtering blocklist in bluecoat proxies
  • Involved in the TACACS+ implementation.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to Get VPN.
  • Migrated juniper firewalls to Palo Alto network firewalls and carried out troubleshooting and configuration of the same.
  • Creating and provisioning Juniper SRX firewall policies.
  • Implemented antivirus and web filtering on Juniper SRX 240 firewalls at the web server
  • Involved in configuring Juniper SSG-140 and Check point firewall
  • Working to fulfill the implementation of the Juniper SRX infrastructure, troubleshoot the JUNOS operating system running on the firewalls
  • Manage administration of Juniper firewalls, connecting offices in different locations through VPN tunnels
  • Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol based services
  • Troubleshooting of protocol based policies on Palo Alto Firewalls and changing the policies as per the requirement and as per traffic flow
  • Security policy review and configuration in Palo Alto and Junipers firewall in US offices and Datacenter
  • Configured VLAN trunking with Palo Alto interface
  • Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as Firewalls and URL and application inspection
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Hands on Experience testing I Rules using Browser (IE), HTTP watch for f5 load balancers.
  • Balancers to the F5 Big-IP Load Balancers.
  • Installed and Configured the F5 BIG-IP LTM, configured virtual servers and associate them with pools for Internal web servers.
  • Configuring Virtual Server, Service Groups and Load balancing methods in new A10 LTM.
  • Worked on fixing various custom health monitors and templates like LDAP in A10 Load Balancers.
  • Configuring WIDE IP and WIDE IP pool on F5 GTM's to support Load balancing between data centers.
  • Written firewall rules in support of application migration from F5 to A10 Load balancing.
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256
  • Traffic analysis for Bluecoat Proxy SG to ensure proper flow over the network
  • Migrating Data from Netcache Proxy device and translating to Bluecoat Policy Language
  • Gathering data from Sun/Solaris Proxy devices utilizing Linux commands to aid in building policy for new Bluecoat Proxy SG units
  • Modification of Hardware Inventory to ensure all databases are accurate and correct according to Confidential standards-5 years enterprise experience working with Bluecoat Proxy SG
  • Utilizing Bluecoat Director for updates and configuration changes to Bluecoat Proxy SG
  • Rule optimization and configuration for VPM in Bluecoat Proxy SG
  • Generated property list for every application dynamically using python
  • Used Django framework to develop frontend modules in python
  • Rewrite existing python / Django module to deliver certain data format of data
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer
  • Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data Environment
  • Created documents for various platforms including Nexus 7k, ASR1k enabling successful deployment of new devices on the network
  • Experience with configuring Nexus 5000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000.
  • Good knowledge with the technologies VPN, WLAN and Multicast.
  • Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
  • Followed the change process as per IT policy It also includes the configuration of port channel between core devices and connected hardware
  • Installed dual DS-3 SAN replication WAN with Riverbed Interceptors and 6050 Steelhead appliances to ptimize the traffic
  • Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port \ Security, STP and RSTP.
  • Experience in installing and configuring DNS (BT Diamond), DHCP servers.
  • Replace branch hardware with new 3900 routers and 2960 switches.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is usedfor local routing only) which involves new wan links.
  • Worked on configuration commissioning and upgradation of the MPLS circuits for various branch offices.
  • Knowledge of modifying and maintaining bluecoat proxy Pac files
  • Managed LAN, WAN and bluecoat proxy servers

Confidential, Mooresville, NC

Network Engineer

Environment: Cisco Switches: 6500, ASR 9K

Firewalls: Cisco (5585, 5510)

Load balancers: F5 Big-IP LTM-3600

Responsibilities:

  • Experience with converting cisco catalyst 6500 switches to Cisco Nexus in the data Center environment
  • Associate. Responsible for design, installation, configuration, administration and troubleshooting of LAN/WAN network infrastructure and security using Cisco and juniper routers
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5585 Security appliance
  • Configured cisco ASA 5510 firewall to establish logical separation between Legacy network & lab environment.
  • Migrating the policy from cisco ASA firewalls into Palo-Alto & vice versa.
  • Experience in migration with both Checkpoint and Cisco ASA VPN.
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access
  • Implemented antivirus and web filtering on Juniper SRX 240 at the web server
  • Performed network monitoring, implementation and maintenance of juniper and checkpoint firewalls
  • Performed in-depth troubleshooting of juniper firewalls and network issues to resolve issues affecting vital information transfer
  • Security firewall products SRX 1400/3400/110/210/ series, SSG-Secure Services Gateways, IDP-Intrusion Detection and Prevention Appliances
  • Implemented Zone Based firewall and Security Rules on the Palo Alto Firewalls
  • Extensive hands-on experience in Palo Alto, Juniper and Cisco network design, deployment and troubleshooting
  • Experience with Palo Alto Firewall Administration, Rule Analysis, Rule Modification
  • Designed and implemented dual layer high availability Palo Alto Firewall network with multiple layer 2 DMZs with virtual port channels
  • Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-3600 load balancers
  • Routine Administration (Design, Implementation & Operations support) of Citrix, BIG-IP and F5 load balancers
  • Dealt with creating VIP (virtual servers), pools, nodes and applying I Rules for the virtual servers
  • Regularly performed firewall audits around Checkpoint firewall solutions for customers.
  • Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing
  • DMZ environments to support new and existing application platforms.
  • Provided Layer-3 redundancy by implementing HSRP and GLBP for High availability
  • Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010
  • Experience in Configuring, upgrading and verifying NX-OS operation system with OSPF, BGP
  • Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP, MPLS
  • Implemented Access lists and policy mapping on Juniper routers installed in each branch across all the locations.
  • Worked on external customer wireless network infrastructure
  • Utilizing SSH and Putty to perform diagnostics on F5 devices and Proxy Devices
  • Performed implementation for USMC WebFilter Project to ensure deadlines are meet by creating tickets performing installs, working with SFOCs in Bluecoat Proxy setup and configuration
  • Performing troubleshooting on Windows Server 2003/2008, to limit downtime for users.
  • Installing various patches on Windows Server 2003/2008 to ensure the stability of the server OS
  • F5 configuration for newly setup web sites and Bluecoat ProxySGs
  • Performed F5 configuration for Technical Refresh Project
  • Created policy for Bluecoat ProxySG network appliances for the enterprises
  • Leverage understanding of LAN/WAN technologies to support, design, and integrate complex wireless LANs
  • Worked with a team on planning, designing, configurations, deployments and support of LAN/WAN/WLAN infrastructure
  • Worked with VMware hypervisor and virtualization monitoring tools.
  • Participated in the evaluation of vendor hardware, software, and wireless communications products
  • Operational support and troubleshooting of production wireless network issues
  • Provided technical support case escalation for customer wireless infrastructure
  • Documentation of advanced enterprise wireless solutions and designs
  • Wireless design and validation, including RF site surveys of complex indoor and outdoor deployments
  • Experience working with ASR 9000 series switches and routers with IOS-XR
  • Experience with deploying PIM Sparse-mode/Dense-mode multicasting in Campus locations.

Confidential

Network Engineer

Responsibilities:

  • Actively participated and completed many projects based on MPLS VPN, Internet Solutions for corporate customers Backbone.
  • Actively participated Implementation and customization of customer network.
  • Hands on experience working on Cisco 7600, 12K, ASR routers & Juniper MX series and Juniper BRAS.
  • Currently working on wireless upgrade project for Allegheny Health network and their EPIC roll out.
  • Designing, Provisioning and Installation of the Customer Sites in Oracle IPSA for MPLS Backbone.
  • Verifying IPv4/IPv6 Addressing Architecture.
  • Verifying Dynamic Host Configuration Protocol for IPv6 (DHCPv6) and DNSv6 options.
  • Performed wireless network design, site surveys, as well as Troubleshooting and repairing any issues that occurred on site.
  • Managing proxy server for branches and head office for internet access through Bluecoat Proxy SG600 for URL Filtering, traffic acceleration and visibility reporting with Bluecoat reporter .
  • Configuration and troubleshooting of many link types i.e. SONET Controllers for sub E1/T1, E3/T3 and POS controllers for STM1 links.
  • Provided tier 3 support for Checkpoint Firewall -1 software to support customers.
  • Work on Checkpoint Platform including Provider Smart Domain Manager. Worked on configuring, managing and supporting Checkpoint Gateways.
  • DNS Zone administration for 13 countries across EU for COLT customers.
  • Implementation and testing of ISDN BRI/PRI circuits.
  • Migrated Vlans from ASA (perimeter firewalls) to FWSM’s for better security management
  • Responsible to troubleshoot the connectivity between CPE router and the COLT's edge router (SAR).
  • Worked closely with RIR(Regional Internet Registry) to procure PI(Provider Independent) and PA
  • Responsible for troubleshooting complex networking issues in service provider MPLS & internet
  • Aggregately) IP addresses and AS numbers for COLT and customers.
  • Set up DNS Reverse Delegation according to RIPE rules in RIPE Database.

Confidential

Network Technical Support

Responsibilities:

  • Managed network connectivity and network security, between Head offices and Branch office
  • Worked on Cisco routers 7200, 3800, 2800 and Cisco switches 4900, 2900
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols OSPF, RIP & BGP
  • Configured BGP for CE to PE route advertisement inside the lab environment
  • Spearheaded meetings & discussions with team members regarding network optimization and regarding BGP issues
  • Implemented the concept of Route Redistribution between different routing protocols
  • Switching related tasks included implementing VLANS, VTP, STP and configuring on Fast Ethernet channel between switches
  • Responsible for configuring GLBP between multilayered switch networks
  • Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series
  • Responsible for Configuring SITE-TO SITE VPN on Cisco ASA 5500 series firewall between Head office and Branch office
  • Hands on Experience working with security issue like applying ACL's, configuring NAT and VPN
  • Documented and Log analyzed the Cisco ASA 5500 series firewall
  • Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security
  • Responsible for Validate existing infrastructure and recommend new network designs.
  • Implementation of TCP/IP Networking & related services HCP/DNS/WINS
  • Network Monitoring and Network Efficiency Analysis.
  • Configure and maintain Site-to-site VPN and VPN concentrators solution for Remote users

We'd love your feedback!