Sr. Network Engineer Resume
Cherry Hill, NJ
OBJECTIVE:
- As a Senior Network Engineer, my responsibility is to provide supervision and management of the network administration support staff as well as support of the technical architecture, design, implementation and continuity of the organization’s production network infrastructure.
- Network infrastructure of the organization includes, but not limited to, LAN, WAN, WLAN, Wireless Bridging, VoIP (IP Telephony), QoS, Firewall, Telephony Systems and Telecommunications., work closely with members of the IT staff to ensure very high levels of network availability, security and efficiency.
PROFESSIONAL SUMMARY:
- Years of hands on experience in Network engineering, designing, integrating, deploying, maintaining and supporting broad range of communication systems.
- Experienced Configuring/Troubleshoot issues with the following types of core routers like Confidential (12404, 12010, 7200, 6500, 3500 and 4500 Series), to include: bridging, switching, routing, Ethernet, NAT, and DHCP.
- Expertise in deployment and configuration of routing protocols such as OSPF, EIGRP and BGP.
- Experience in network security protocols such as IPSEC tunnels, GRE tunnels, NAT/ PAT, ACLs and VPN,MP - BGP.
- Experienced in Deploying Wireless Network Infrastructure and Wireless Survey Best Practices Advanced knowledge in TCP/IP suite and IPAM, routing protocols, such as OSPF, EIGRP, ISIS, and BGP.
- Advanced knowledge, design, installation, configuration, maintenance and administration of Juniper SRX Firewall, Juniper EX and Juniper MX devices.
- Experience in configuring Confidential Catalyst 2960, 3750, 4500, 6500 series, and Confidential 2600, 2800, 3600, 3800, 7200, 7600 series routers, Confidential Nexus 7000 series, 5000 series, 2000 series data center switches, Juniper EX/ MX/ SRX series.
- Experience with Palo Alto Network firewalls such as security NAT, Threat prevention URL filtering.
- Experience in Networking Area especially TCP/IP, Routing Protocols (EIGRP, OSPF and BGP) and Switching using TCP/IP, DHCP, DNS, Ethernet, Frame Relay, ATM, OSPF, VoIP, BGP and any Network security tools, packet analyzers.
- Experience in monitoring, debugging, and resolving Confidential infrastructure issues like routing, Network Hardware/Software failure, configuration, WAN outages, and performance issues.
- Experience in configuration of Checkpoint 600,1100,4800,12000 appliances.
- Experience in installation, configuration and Administration of windows server 2003/2008, Active Directory,Linux,Unix OS under various LAN and WAN environment.
- Experienced in trouble-shooting both connectivity issues and hardware problems on Confidential based networks.
- Worked on routing protocols for voice: VoIP, IPSEC, Multicast, MPLS, DSCP/QoS, Confidential IOS and Wireless security protocols (I.E. 802.1x, EAP, WPA2).
- Experience in installation, configuration and Administration of windows server 2003/2008, Active Directory,Linux,Unix OS under various LAN and WAN environment.
TECHNICAL SKILLS:
Networking Equipment: Confidential 2500, 2600, 2800, 3600, 7200, 7600 series routers, Confidential 1900, 2900, 3550, 4900, 6500 series catalyst switches, Nexus 2k,3k,5kand 7k, Load Balancers F5 BigIP .
Routing Protocols: RIP v1 v2, EIGRP, OSPF, IS-IS, BGP, VRRP, HSRP, GLBP.
LAN technologies: Ethernet/ Fast Ethernet/ Gigabit Ethernet networks, VLANS, VTP, STP, 802.1q.
WAN technologies: Frame Relay, PPP, ATM, ISDN, PPP, MPLS exposure to DS1, DS2, OC3, OC12, T1/T3, E1/E3 and leased lines.
WLAN Technology: 802.11 standards, Lightweight and Autonomous systems.
Network Security: : IPSec, VPN Configuration, VPN Concentrator, PIX 506, 515, 525, 535 ASA 5505, 5510 Firewalls, NAT/PAT,FWSM/ASDM, Confidential NAC,Checkpoint, IDS Intrusion Detection System, IPS Intrusion Prevention System, Authentication AAA TACACS RADIUS Ethereal, Encryption technologies like DES, 3DES, Check point R75.
Juniper: E series, J series and M series. Juniper SRX VPN.
Infrastructure services: DHCP, DNS, SMTP, FTP, TFTP, POP3.
IP Telephony: VoIP SIP, H.323, MGCP, CCM, Gateways/Gatekeeper, Quality Of Service QOS.
Network Management: SNMP, CiscoWorks, WhatsUp Gold, HP OpenView.
Communication Protocols: TCP/IP, IPv6, ARP, VLAN 802.1q, ATM, PPP, Frame Relay, MPLS, 802.11, Wi-Fi.
Communication Concepts: VPN, Multicasting, CDMA, W-CDMA, GSM.
Platforms: Windows 98/XP/VISTA,2000,2003 Linux.
Applications: MS Office, MS Visio, Tcl/Tk Scripting, C/C, Python.
PROFESSIONAL EXPERIENCE:
Sr. Network Engineer
Confidential, Cherry Hill, NJ
Responsibilities:
- Responsible for Crossroads rollout LAN/WAN problem determination and diagnosis, provide project leadership (onsite, offsite).
- Working with local IT personnel on troubleshooting, problem determination, diagnosis of performance issues, bandwidth issues, throughput traffic prioritization to improve overall application response time across WAN.
- Install and monitor application traffic using network protocol monitoring tools such as NTOP or Wireshark to analyze network usage and bandwidth and run diagnostic programs to resolve problems.
- Configure and maintain all Palo Alto Networks Firewall models (PA-3k, PA-5k.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.
- Support Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
- Worked on BIG-IP Access Policy Manager (APM) contextually secures, simplifies, and protects user access to apps and data, while delivering the most scalable access gateway.
- Wrote Python scripts to automate Forescout Counter ACT initial configurations before deployment to the field. Including scripts to verify CounterACT Service Health and Cluster Health for all deployed clusters in the field.
- Tested Forescout CounterACT integration with Microsoft SQL Server.
- Implemented Confidential Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.
- Configure F5 Load balancers for SSL handling, Design and Implemented Virtual Server Farm for Web site load balancing in DMZ.
- Performed F5 appliance (LTM, GTM, APM, and ASM) maintenance and system upgrades including hot fixes and Security configurations.
- Managed and modified the availability of LAN and WIFI resources in the Microsoft server and active directory environment.
- Confidential ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments. Involved in the redistribution into OSPF on the core ASA firewall.
- Worked on MPLS for redirecting data from one network node to another network node based on the shortest paths.
- Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
- Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches.
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
- Configuration and troubleshooting of Confidential 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
- Worked as the Network/VOIP administrator focusing more on the voip side of the networks.
- Provided support for VOIP applications, Call Manager, Call Center and other VOIP network equipment.
- Worked with network services like DNS, DHCP, DDNS, IP4, IP6, IPSec, VPN etc.
- Worked with F5, Confidential ACE 4710 Load balancers, GSS and Wireless networks.
- Deployed Confidential Catalyst 7509, 6500, 4500, 4000, 3750, 3850, 3560 (Layer 2 through 7).
- Deployed Juniper switches EX4500 and EX4200, routers M7i and M10i and Junos OS.
- Implementation and troubleshooting of 802.11a/b/g/n technology with primary focus on Confidential Unified Wireless Network.
- Installation and troubleshooting IP Voice System PBX (Private Branch Exchange). Deployed voice gateway Confidential SPA8000 per LAN network.
- Experienced and configured firewall administration including Bluecoat, F5, Checkpoint, Citrix NetScaler App and Fortinet.
- Troubleshoot User connectivity issues on Checkpoint and Confidential ASA using CLI utilities.
- Using SolarWinds, NetScout and windows performance and resource monitor to figure out that we were losing PCoIP packets that was degrading the VDI environment.
- Configured Confidential ASA 5510 for VPN Network Access Control integration with Confidential ISE (Inline PEPs).
- Worked with ITIL (Information and technology information library) for managing our services.
- Designed WLAN network in newly constructed emergency management center. maintaining and operation including design and rollout of over 360 Confidential Wireless devices utilizing Confidential WLAN controllers.
- Implementation of TCP/IP & related Services-DHCP/DNS.
- Experience in Physical cabling, IP addressing, configuring and supporting TCP/IP.
- Monitoring and capturing the traffic with multiple network management tools like Confidential Works, Wire shark, NetFlow Analyzer, source fire, HP Open View.
- Participating in the design and planning aspects of the network infrastructure that is installed in the new building and testing of the internal network infrastructure the new building, and troubleshooting and remediating any issues.
- Worked independently, met deadlines provided detailed written status reports, documentation, work on multiple simultaneous projects and track status and progress on each.
- Interaction with various inter and intra-department groups on both technical and personal level.
- Documenting network configuration for all new equipment and creating equipment configuration backups and monitoring work with existing DIRM network systems.
Sr. Network Engineer
Confidential, Baltimore, MD
Responsibilities:
- Installation, configuration and maintenance of Check Point R77.XX firewalls.
- Configured and monitored Firewall logging, DMZ's and related security policies.
- Performed Checkpoint firewall upgrade of firewalls from R76 and to R77 to R77.20 and R77.30.
- Troubleshoot remote access services like Citrix Netscalar, Confidential VPN clients and for the users to access their enterprise network.
- Performed Checkpoint firewall upgrade of 50 firewalls from R55 to R65. Administered Juniper 50, 200, 500, and SSG 520 firewalls.
- Accountable for SAN migrations, LUN creations, and masking removal; Citrix XenApp, XenServer, and XenDesktop design and implementation; and Citrix NetScaler configurations and maintenance.
- Designed 10 gigabit networks using Confidential Nexus 7000 series switches, and Confidential 3800 series routers.
- Contribute in meetings and presentations on ForeScout feature.
- Executed Forescout CounterACT installation, and configuration.
- Configured ForeScout CounterACT Manager and Sensors to send SYSLOG system and policy events to Splunk indexer.
- Upgrade of Checkpoint Gateways in Cluster with Minimal downtime.
- Extensive Knowledge on the implementation of Confidential ASA 5500 series and checkpoint R 75 firewalls.
- Expertise in maintenance of layer2 switching tasks which advocate VLAN, VTP, STP, RSTP, PVST, RPVST, inter-VLAN routing.
- Support Infoblox IP Address Management (IPAM) for the entire Enterprise Network. This includes 3rd Level design and support of BOOTP, DNS schemes, DHCP schemes, TCP/IP.
- Troubleshoot User connectivity issues on Checkpoint and Confidential ASA using CLI utilities.
- Skilled in using Checkpoint - R60/R65/R70/R75 software version with hardware Checkpoint 11000, 21000 series with VSX environment.
- Handling Break/Fix things, monitor, configure, creating on Checkpoint R75, R76, R77, R80, VFX sensible Center Server running on Secure Platform.
- Installation and administration of Checkpoint R 77 Firewall.
- Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for stateful replication of traffic between active and standby member.
- Worked with Juno OS and Juniper M&T series switches.
- Implemented traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
- Migrated 25 remote sites from Frame Relay to MPLS with no downtime.
- Worked in projects converting P2P circuits into MPLS circuits, commissioning and decommissioning of the MPLS circuits for branch offices.
- Traced OSI layers and extracting the packet information at each and every layer. Worked on Wireshark, TCP/IP, and OSI Layers for packet tracking and Drafted & finalized progress reports, final report. Technologies: Java, JSP, Servlets, Wireshark, TCP/IP, JQuery.
- Commissioning and decommissioning, configuring, URL and Web filtering, SSL Certificates, monitoring, SNMP traps, logging, blocking on Palo Alto devices, migrating from one network to other.
- Designing, implementing LAN/WAN configurations on Confidential 5K, catalyst 6500 switches.
- Implemented, configured redundancy protocols HSRP, VRRP, GLBP for Default Gateway Redundancy.
- Involved in complete LAN, WAN, Extranet redesign (including IP address planning, designing, installation, pre configuration of network equipment, testing, and maintenance) in both Campus and Branch networks.
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
- Implementing, configuring, and troubleshooting routing protocols like EIGRP, OSPF and BGP.
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
- Strong knowledge and experience in implementing, configuring VPN technologies like IPSEC, MPLS.
- Packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems.
- Performing network monitoring, providing analysis using various tools like Wireshark, Solar winds etc.
Network Engineer
Confidential, Washington, DC
Responsibilities:
- Documented the company's design, implementation and troubleshooting procedures.
- Managed Nexus 2k, 5K, 7k and 9k switches.
- Worked on F5 load balancers deploying many load balancing techniques with multiple components for efficient performance.
- Configuring and deploying Confidential ASA 5505; Confidential 594/294; I500 web sense manager at customer locations with minimum downtime possible.
- Drafting and Installation of Checkpoint Firewalls rules and policies.
- Adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications.
- Consultant for Security (implementation, administration) on Checkpoint Firewall, Network Management.
- Support Infoblox IP Address Management (IPAM) for the entire Enterprise Network. This includes 3rd Level design and support of BOOTP, DNS schemes, DHCP schemes, TCP/IP.
- Configured and managing Wireless LAN controllers.
- Extensive Knowledge on the implementation of Confidential ASA 5500 series and checkpoint R 75 firewalls.
- Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices and also configure 2k, 3k,7k series Routers.
- Provided application level redundancy and accessibility by deploying F5 load balancers long-term memory. Facilitated the team for IP network, using tools such as Backtrack, Wire shark. Attained a list of tools in Wireless LAN network and provided an equipment list for (WLAN/WIFI) network security testing.
- Deployed 802.1x authentication for office users using Aruba clearpass access management system. Configured wireless LAN (WLAN/WIFI) and monitored the workstations using OPNET (Riverbed) under the guidance of Network Engineer.
- Implementing traffic engineering on high of Existing Multiprotocol Label shift (MPLS) network mistreatment Frame Relay and Open Shortest Path First (OSPF).
- Provided redundancy in a very multi homed Border Gateway Protocol (BGP) network by tunings AS-path.
- Extensive active expertise with complicated routed local area network and WAN networks, routers and switches.
- Managed VPN, IPSec, Endpoint-Security, status policy, and Application control, IPS, Monitoring, Anti-Spam, Smart Provisioning and DLP using Checkpoint Firewalls.
- Area reports include Computer Operations, Network Operations, System Administrators, and Data base Administrators with 12 direct reports.
- Troubleshot WAN, LAN, security, access, and Confidential wireless connectivity using BBSM for guest wireless access and Sniffer software for troubleshooting, Confidential Works, HP Openview, Tivoli or related tools.
- Maintenance and configuration of Confidential ASR1000 series and 7200VXR routers at data center and deployment of 3900, 3800, 2951 and 2821 for branch connectivity.
- Implementation of Active Directory infrastructure and Network fundamentals, protocols (such as TCP/IP, DHCP, DNS), Group Policy and Profile Management..
- Involved incomplete LAN, WAN, Extranet redesign (including IP address planning, designing, installation, pre configuration of network equipment, testing, and maintenance) in both Campus and Branch networks.
- Installing, configuring Confidential Catalyst switches 6500, 3750 & 3550 series and configured routing protocol.
- Integrate with business owners and Scheduled Windows servers patch using patch management and install Windows service pack.
- Performing network monitoring, providing analysis using various tools like Wireshark, Solar winds.
- PCI compliance responsibilities; provide all documents, configs, diagrams for PCI audit.