We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

Middletown, NJ

SUMMARY:

  • 8 years of experience in IP network design, network integration, deployment, and troubleshooting.
  • Extensive knowledge in configuring and troubleshooting Layer 3 Interior Gateway Routing protocols such as Link - State routing protocols (OSPF and IS-IS) and Distance Vector routing protocols (RIPv1, RIPv2, and EIGRP). Wide exposure to LAN/WAN setup, installation, configuration and commissioning of network devices.
  • Good knowledge in configuring and troubleshooting Exterior Gateway protocols such as BGPv4 including internal BGP (iBGP) and external BGP (eBGP).
  • Extensive knowledge of WAN technologies such as T1, T3, DS3, OCx, SDH, SONET, LTE, Fiber, Firewalls, Switches, Routers, load balancers, VoIP and wireless technologies of different vendors.
  • Strong hands-on experience on Cisco Catalyst (series 3850, 3560, 4500, 6500), Cisco Nexus (series 2K, 5K, 7K), Cisco Routers (series 7300, 4000, 3800, ASR 9000), Firepower (4100), Load Balancers (citrix NetScaler, Cisco ACE, F5 BIG-IP LTM/GTM ADC), IDS/IPS (HIDS, NIDS, NIPS, HIPS), Fire eye, Splunk, Palo Alto Networks Firewalls (PA-820, series PA-3K, 5K), Checkpoint IP Appliances (NXG R60, R70, 3100, 5900).
  • Hands on experience in configuring high-end routers like GSR 12000 series, 7500 series and Catalyst Switches like 7600, 6500, 4500 series. Extensive experience in the upgrade, backup and password recovery of Cisco IOS and IOS XR.
  • Experience in working with Cisco Nexus Switches like 5000 and 7000 series and Virtual Port-Channel configuration. Implemented VDC, VPC, VRF, and OTV on the Nexus 5505 and 7009 switches.
  • Migration from local cloud to hybrid cloud architecture with AWS. Good exposure to Windows server 2008/2012.
  • Proficient in monitoring and managing networks using SolarWinds NetFlow Traffic Analyzer, Network Performance Monitor (NPM), Network Configuration Manager (NCM); SAM, IP Address Manager, Additional Polling Engine, Cisco Prime, Security Device Manager (SDM), Cisco Works; Infoblox, HP OpenView, and Wireshark.
  • Knowledge on deploying and administering Cisco ACI
  • Knowledge and configuration of redundant router protocols like HSRP, VRRP, and GLBP.
  • Thorough experience in configuring Virtual Local Area Networks (VLAN) with IEEE 802.1Q, VLAN trunking protocol (VTP), shortest path bridging, Multiple VLAN Registration Protocol and VLAN Cross Connect (CC).
  • Experience in troubleshooting both connectivity issues and hardware problems on Cisco-based networks.
  • Experience in testing Cisco routers and switches in lab scenarios and deploy on site for production.
  • Good knowledge of IPv4 and IPv6 Addressing, IP Subnetting, Fixed Length and Variable Length Subnet Masking (VLSM), OSI and TCP/IP models. Experience in migration of IPv4 addresses to IPv6 addresses using mechanisms like Tunnel Broker, Transport Relay Translation (TRT), In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3, SONET POS OCX/ GigE circuits.
  • Configured and maintained Quality of Service (QoS) protocols (SIP, BroadSoft, SRTP, SDP, IAX) on VoIP along with PBX servers, VoIP Gateways and Cloud-based PBX servers, Active Directory Database.
  • Experience in configuration of LAN protocols such as Ethernet and Fiber Distributed Data Interface (FDDI) on Cisco Switches. Experience in documenting and preparing the process related operational manuals.
  • In-Depth Knowledge and experience of various wireless 802.11 standards, controllers, Access Points, Wi-Fi analytics from various vendors (Cisco Meraki, HPE, D-Link and Net gear).
  • Implemented and maintained Sourcefire intrusion detection/ prevention (IDS/IPS) system and hardened protection standards, IDS/IPS signatures on Firewall for Fine-tuning of TCP and UDP services.
  • Worked on Cisco Firewalls Cisco ASA 5500(5510/5540) Series.
  • Implemented traffic filters using standard and extended access-lists, distribute-lists and route maps.
  • Provided support that included resolving day-to-day operational issues with tickets generated by a server.
  • Good understanding of SNMP, IP SLA and Network Monitoring with experience in tools like PRTG.
  • Deployed, Managed, monitored and supported Bluecoat Proxy for content filtering, internet access between sites and VPN client users, forward proxy scenario and reverse proxy scenario for security and worked on adding URLs in Bluecoat Proxy SG's for URL filtering.

TECHNICAL SKILLS:

Router and VoIP Platforms: Cisco Routers series 9k, 7300, 4000, 3800, 2000, 1900; Avaya products, cisco IP phones.

Routing Fundamentals and Protocols: Routed and Routing protocols RIP, EIGRP, IS-IS, OSPF, BGP, IPX; MPLS, IPv4, and IPv6 addressing, subnetting, VLSM, Static routing, ICMP, ARP, HSRP, VRRP, Route Filtering, Multicast, 802.11, Policy-Based Routing, Redistribution, Port forwarding.

Switch Platforms: Cisco Catalyst series 2960, series 3560, 3850, 4500, 6500, 7000; Nexus series 2K5K, 7K; Nortel/Avaya 5510, 5520.

Switching Fundamentals and Protocols: Ethernet technologies, LAN networks, MAC, VLAN and VTP, STP, PVST+, MulticastRSTP, Multi-Layer Switching, 802.1Q, EtherChannel, PAgP, LACP, CDP, HDLC, RARP

Firewall Platforms: Checkpoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo Alto Networks (PA series 2K, 3K and 5K) with panorama 8.0, WAF

Security Protocols: Standard and Extended ACLs, IPsec, VPN, Port-security, SSH, SSL, IKE, AAA, Prefix-lists, Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress Firewall Design, Content Filtering, Load Balancing, IDS/IPS, URL Filtering, L2F, IDS, TCP Intercept, Router Security, SNMP trap

Network Management and Monitoring: Wireshark, Infoblox, HP OpenView, Cisco Prime, Splunk, Security Device Manager (SDM), Cisco Works; TCP Dump and Sniffer;, SolarWinds Net Flow Traffic Analyzer, NetScout, Network Performance Monitor (NPM), Network Configuration Manager (NCM), SAM, IP Address Manager, Additional Polling Engine.

Load Balancers: F5 (BIG-IP) LTM 2000, 3900, 6400, 6800, AV 510, citrix NetScaler

WAN technologies: ISDN, ATM, MPLS, DS1, DS3, OC3, T1 /T3 lines, SONET OC3-OC192, SDH, POS, PDH

Other Networking Protocols and Fundamentals: DHCP and DNS server, Active Directory Management, NTP, NDP, TCP, UDP, FCP, Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP, TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, SMTP, RADIUS and TACAS+, PBX servers, SDN, SAN

Operating Systems: Windows 10/7/XP, MAC OS, Windows Server, Nexus OS, Cisco IOS XR, Linux, UNIX

Wireless Technologies: Canopy Wireless Devices, D-Link Point-to-point Wireless, D-Link APs, CISCO 1200 series APs, Aruba wireless and APs, Cisco Meraki, Linksys Wireless/Wi-Fi Routers, Prime Infrastructure, Ekahau, Air Magnet, Airwatch and WLC’s (8510, 5508, 5706), Cisco AironetAP’s (2600, 3600, 3700), ISE, MSE, Aruba 225, Aruba 3000 controller & Airwave, ISE, Clear Pass 6.0,6.2,6.5

Microsoft Office: Visio, Excel, PowerPoint, Word

PROFESSIONAL EXPERIENCE:

Confidential, Middletown, NJ

Sr. Network Security Engineer

Responsibilities:

  • Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.).
  • Involved in Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter VLAN routing, LAN security etc.
  • Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, EtherChannel implementation on ASR 9Kredundant pair.
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series, Access control lists, ISDN, ATM, load balancing switches and configured IPX/SPX, HDLC, BGP, EIGRP, OSPF and VRRP on various sites.
  • Setup simplified and traditional VPN communities, and Cisco Any connect.
  • Experience with Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater visibility and scalability in a data center environment.
  • Worked with Cisco Channel partners to build practices around Cisco ACI.
  • Responsible for the secure development lifecycle environment form NX-OS to Application Centric Infrastructure (ACI) in Data center, implemented in the lab environment.
  • Used Cisco ACI Fabric which is based on Cisco Nexus 9000 series switches and Cisco Application Virtual Switch (AVS)
  • Implemented Cisco ACI infrastructure for supporting rapid application change by reducing complexity with a common policy framework that can automate provisioning and resource management.
  • Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.
  • Knowledge on deploying and administering Cisco ACI
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2Bnetwork connectivity.
  • Researched, designed, and replaced Checkpoint firewall architecture with new next generation Palo Alto PA3000 and PA5000 appliances serving as firewalls and URL and application inspection.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
  • Successfully installed Palo Alto PA-3000/PA-5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls and implemented Zone Based Firewall and Security Rules on the Palo Alto Firewall. Exposure to wild fire feature of Palo Alto.
  • Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.
  • Configured systems log on the Palo Alto firewall and moved the logs to Splunk.
  • Worked with Palo Alto firewalls PA5050 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Palo Alto with ACL, NAT, Object Groups, Failover and Multi-Contexts.
  • Responsible for Palo Alto and Cisco ASA firewall administration across our global networks Maintenance and configuration of Cisco ASR1000 series
  • Configured, troubleshoot, and upgraded Checkpoint Firewalls for Manage clients, which included network and/or resource access, hardware or software problems.
  • Develop processes and implement tools and techniques to perform ongoing security assessments of the environment.
  • Work on multiple projects simultaneously, set priorities and meet deadlines.
  • Central tracking and management of enterprise vulnerabilities.
  • Keep current with vulnerabilities, attacks, and countermeasures as well as devoting time to research and development activities.
  • Understand approaches for addressing vulnerabilities including system patching, deployment of specialized controls, code or infrastructure changes, changes in development processes.
  • A working knowledge of vulnerabilities and configuration settings and their exploitation in order to gain access to networks, applications, hosts and desktops.
  • Implementing and troubleshooting (on-call) IPSec VPNs for various business lines and making sure everything is in place. Implementing IPSec and GRE tunnels in VPN technology. Designed, configured, implemented site-site VPN on Cisco ASA 5500 firewall.
  • Experience with Cisco Prime for Data center network manager (DCNM).
  • Worked with Data Center Network Manager offers intuitive, multi-fabric topology which supports VXLAN, Layer 2, Virtual Port Channel, Virtual Device Context, Virtual SAN.
  • Installing, configuring, managing and modifying cisco Data Center Network Manager version 10.3 and 10.4.
  • Strong experience with monitoring and troubleshooting the data center network infrastructure.
  • Configured Trunk ports and implements granular control of VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets that can extend further across the network.
  • Datacenter experience create new cable run list (L1), document runbook and Solution planning and upgrading, architect VXLAN, ACI and ASA cluster firewall with NAC, ISE
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per the requirement of the Organization.
  • Experience with Cisco Nexus switch technologies such as VDC, vPC, VXLAN.
  • Worked as a part of data center deployment where we converted from Cisco 6500 to Nexus.
  • Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
  • Experience with configuring FCoE using Cisco Nexus 5548
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Hands-on experience in using network monitoring tool SolarWinds NetFlow Traffic Analyzer, NetScout, Network Performance Monitor (NPM), Network Configuration Manager (NCM).
  • Monitored and managed networks using Cisco Works tools and Wireshark.
  • Utilize network monitor tools such as Solar Winds to track network problems and outages
  • Managed successful delivery of massive security response portfolio including Splunk, Cisco ISE, Infoblox.
  • Support customer with the configuration and maintenance of ASA firewall systems. Troubleshooting of protocol-based policies on Palo Alto firewalls and changing the policies as per the requirement and as per traffic flow.
  • Experience with F5 load balancers and Cisco load balancers (CSM, ACE, and GSS).
  • Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs.
  • Hands-on experience in using VMware machines.
  • Experience working in SD-WAN technology. Part of a migrating team from MPLS to SD-WAN.
  • Implementation experience with SD-WAN, SD-LAN

Confidential, Austin, TX

Network Security Engineer

Responsibilities:

  • Configured L2 and L3 security features on devices
  • Experience with design and implementation of Virtual Switching System (VSS) on 6500 Switches
  • Manage a very large DNS environment using Lucent QIP and manual management of DNS for DMZ/External servers broad Hands on Experience in Inter-VLAN routing, redistribution, access-lists, and dynamic NAT
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience
  • Experience CSM, F5 (LTM) Load balancers to provide efficient switching and routing for local and global traffic.
  • Implemented many numbers of security policy rules and NAT policy rules on Palo Alto, created Zones, Implemented Palo Alto Firewall interface, Palo Alto IDS, and VLAN.
  • Designed and implemented remote dial-up solution for clients
  • Installed and configured workstations for IP based LAN’s
  • Worked, managed and maintained LAN networks, VLANs and database, Port Security on Nortel 5510, 5520; Cisco Catalyst 3850, 4500 and 6500 switches and implemented VDC, VPC, and OTV on Nexus 5k and 7k switches, Reviewing & creating the FW rules and monitoring logs as per the security standards in Palo Alto FW.
  • Worked on Palo-alto Next-Gen PA-5000 Firewalls implementing and managing NAT, IPsec, site-to-site and remote VPNs, advanced inspection, anti-spoofing and AAA policies
  • Monitored network and provided analysis, improvement scopes & support using monitoring tools as Wireshark, NetScout, SolarWinds Performance Monitor, monitoring tools and coordinated with off-shore support teams to ensure flawless operations
  • Implemented Meeting place server 7.0 and integrated with CUCM 8.0 through SIP Trunks.
  • Configured VoIP devices and IP phones such as 7940, 7942, 7960, 7961, 7971G-Ge, 7975G.
  • Implemented VoIP solutions using SIP & H.323 for Cisco routers 2851 and practiced sound knowledge of Avaya VoIP products and BroadSoft phone switches.
  • Configured and managed with Cisco wireless access points 205 series supporting 802.11 ac
  • Configuring Virtual Device Context in Nexus 7010 and Worked on Network support, implementation related internal projects for establishing connectivity between the various field offices and data centers
  • Coordinated with a team to upgrade network by changing primary routing protocol to OSPF from EIGRP and Participated in the modification of BGP from multiple MPLS powered routers
  • Contributed to implementation and configuration of F5 BIG-IP LTM-6400 load balancers, redistribution into OSPF on the core ASA firewall, Working with Checkpoint Support for resolving escalated issues.
  • Extensive Knowledge in configuring and troubleshooting Secure Web Gateway
  • Expert in configuring, implementing and troubleshooting A10 load balancer in the enterprise network
  • Worked on implementation of the basic F5 ASM, F5 LTM and F5 APM.
  • Installed and configured DHCP Client/Server
  • Implementation Route redundancy protocols like HSRP, VRRP, GLBP
  • Configured and managed networks using L3 protocols like RIPv2,
  • Configured VLANs, Private VLANs, VTP and Trunking on switches.
  • Recommended Security considerations for the Intranet data center, integrating security, providing solution design details and configuration details
  • The configuration of Access List ACL (STD, Ext, Named) to allow users all over the company to access different applications and blocking others.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPSec/GRE to GetVPN.
  • Efficient in cabling as per co-location contracts with loop-back testing, including all DS1, DS3, T1, T3, CAT 6 and CAT 5 connections as per defined cabling procedures
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3, and ISDN. Supporting project test teams in analyzing the bandwidth utilization.
  • Configured and supported wireless controllers, access points, switches and routers.
  • Participated in pre and post-sale job walks and survey to help evaluate environments for optimal Wi-Fi operation.
  • Knowledge on wireless survey products like AirMagnet, Ekahau.
  • Identify and troubleshoot hardware and software technical problems related to wireless.
  • Knowledge of 802.1x authentication and wireless encryption technologies.
  • Experience in deployment and Management of Bluecoat proxies in forward proxy scenario as well as for security in reverse proxy scenario.
  • Configured Bluecoat as a forward proxy for all Web URL Filtering.
  • Worked with F5 Load balancing, IDS/IPS, Bluecoat proxy servers and Administrating.
  • Drafted and installed Checkpoint Firewall rules, ACL on Bluecoats with regular upgrades on firewalls and Bluecoats.
  • Proficient in Palo Alto Next-Generation Bluecoat web proxy, HP ArcSight, Splunk Enterprise, Wireshark, FireEye, and various internet tools to assist in analysis.
  • Used Bluecoat Proxy SG Appliances to effectively secure Web communications and accelerate the delivery of business applications.

Confidential, Seattle, WA

Network Engineer

Responsibilities:

  • Assisted in troubleshooting LAN connectivity and hardware issues in the network of 500 hosts.
  • Performed client requirements to provide solutions for network design, configuration, administration, and security.
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
  • Created a backup and recovery policy for software application and verified peripherals are working properly.
  • Monitor performance of network and servers to identify potential problems and bottleneck.
  • Performed RIP & OSPF routing protocol administration. Support services to reduce the downtime on leased lines.
  • Troubleshoot problems day to day basis & provide solutions that would fix the problems within their Network.
  • Maintenance and Troubleshooting of connectivity problems using Ping, Traceroute.
  • Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issue Other responsibilities included documentation and support other teams
  • Designed and Implemented plan for migration from existing Catalyst switches to Nexus and configured NX-OS Virtual Port Channels, Nexus port profiles, Nexus VPC peer links on Nexus 5k and 7k
  • Acquitted with Cisco Meraki for Cisco Wireless Devices Monitoring, managing and troubleshooting Cisco Wireless devices using Cisco Meraki.
  • Cisco ASA/Checkpoint, Palo Alto Firewall troubleshooting and policy change requests for new IP segments that either come online or that may have been altered during various planned network changes on the network.
  • Supported and executed migration to F5 BIG-IP LTM/GTM ADC Appliances from Citrix NetScaler
  • Maintained BIG IP F5 APM VPN and provided solutions for intricate issues.
  • Participated in the installation, configuration, and post-installation routine operational tasks and configuration of the Cisco Nexus Switches.
  • Worked with Host Master for shared web hosting and managed Web Application Firewall (WAF), DNS and DHCP management using Infoblox and Analyzed networks using Wireshark
  • Worked with Nagios for monitoring of network services (SMTP, POP3, HTTP, NNTP, ICMP, SNMP, FTP, SSH)
  • Provided full visibility and notification of authorized and unauthorized network access with the integration of Cisco ASA and NAC solutions. Performed Load balancing using F5 BIG-IP LTM ADC 6400, Cisco ACE 4710.
  • Provided redundancy in a multi-homed Border Gateway Protocol (BGP) network by tunings AS-path
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 & 6000 series.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Responsible for Checkpoint, ASA, Palo Alto Firewall management and operations across global networks.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits and built cost-effective network solutions to accommodate customer requirements and project scope.
  • Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and troubleshooting. Responsible for implementing QoS parameter on switching configuration.
  • Experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3, and ISDN.
  • Involved in Design and Implementation of complex networks related to extranet clients.
  • Troubleshooting the N/W Routing protocols (BGP, EIGRP, and OSPF) in Migrations and new client connections.
  • Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.
  • Worked towards the key areas of the project to meet SLA’s and to ensure business continuity. Involved in meetings with engineering teams to prepare the configurations according to the requirement.
  • Creating change tickets according to the scheduled network changes and implementing the changes.
  • Worked with F5 Load balancing, IDS/IPS, Bluecoat proxy servers and Administrating.

Confidential, Hartford, CT

Network Engineer

Responsibilities:

  • Configuring and troubleshooting multi-customer network environment.
  • Involved in network monitoring, alarm notification, and acknowledgment.
  • Implementing new/changing existing data networks for various projects as per the requirement.
  • Troubleshooting complex networks layer 1, 2to layer 3 (routing with MPLS, BGP, EIGRP, OSPF protocols) technical issues.
  • Providing support to networks containing more than 2000 Cisco devices.
  • Performing troubleshooting for IOS related bugs by analyzing history and related notes.
  • Carrying out the documentation for tracking network issue symptoms and large-scale technical escalations.
  • Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-around technical support.
  • Monitor the traffic of the network via NTA and IPAM
  • Provided Technical Support to customers and partners on Palo Alto security appliances
  • Commissioning and Decommissioning of the MPLS circuits for various field offices.
  • Preparing feasibility report for various upgrades and installations.
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-VLAN routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc.)
  • Identify, design and implement flexible, responsive, and secure technology services
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configured switches with port security and 802.1 xs for enhancing customer’s security.
  • Monitored network for optimum traffic distribution and load balancing using Solar winds.
  • Validate existing infrastructure and recommend new network designs.
  • Created scripts to monitor CPU/Memory on various low-end routers in the network.
  • Installed and maintained local printer as well as network printers.
  • Handled installation of Windows NT Server and Windows NT Workstations.
  • Handled Tech Support as it relates to LAN & WAN systems

Confidential

Network Engineer

Responsibilities:

  • Worked with the Help Desk for circuit troubleshooting to give Support to the Tech persons Confidential the site.
  • Managed servers, workstations, computers, laptops, printers, switches, routers and existing network applications.
  • Conducted daily system health checks.
  • Diagnosed and resolved all technical issues related to hardware and software.
  • Performed quarterly audits for improving efficiency of systems.
  • Performed daily audits on all systems, frameworks, hardware and server resources.
  • Configuring routers and sending it to Technical Consultants for new site activations and giving online support Confidential the time of activation.
  • Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter, and port access.
  • Experience with Cisco 7200, 7600 routers, Cisco series switches: Physical cabling, IP addressing, Wide Area Network configurations.
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.
  • Configured the Cisco router as IP Firewall and for NATing.
  • Switching (Ethernet) related tasks included implementing VLANs and configuring ISL trunk on Fast-Ethernet channel between switches.
  • Installed and configured PIX 520, 525, 535 series firewalls, configured standard and extended access-lists and policy-based filters.
  • Monitor routers and switches via SAM
  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification, and administration. Experience in working with designing, installing and troubleshooting of Palo Alto firewalls.
  • Configured ASA 5510 appliance and VPN.
  • Responsible for implementing QoS prioritizing voice traffic over a data.
  • Implemented SNMP on Cisco routes to allow for network management. Completed the installation and configuration of T1, T3 & OC3 circuits.
  • Troubleshoot TCP/IP problems, troubleshoot connectivity issues

Hire Now