Network Security Engineer Resume
5.00/5 (Submit Your Rating)
Middletown, NJ
SUMMARY:
- 7.9 years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and Testing of networking system on both Cisco and Juniper Networks
- In - depth knowledge of deploying and troubleshooting LAN, WAN,Ether-channel, IP Routing Protocols - (RIPV2, OSPF, EIGRP & BGP), NAT, VLAN, STP, VTP, HSRP & GLBP.
- Strong hands-on experience in layer-3 Routing and Layer-2 Switching. Dealt with Nexus 9000, 7000 and 5000 series switches. Cisco catalyst switches like 6500, 4500, 3650, 3750, 3500, 2900 switches. Cisco ASR and ISR Routers. Juniper routers MX & T-Series and Juniper EX switches EX8200, EX4500, EX4200, EX3200, EX2500, EX2200 Series.
- Strong Understanding of Data center Technologies Like VPC, VDC, Fabric Extenders, VXLAN, Underlay and Overlay Networks including storage architectures like SAN, NAS and DAS.
- Good Understanding of Cisco ACI framework and have hands on Experience working ACI graphical user Interface (GUI).
- Migrated and implemented new solutions with Cisco ASA Firewall series 5505, 5510, 5512-X, 5545-X, 5585-X.
- Advanced knowledge in the installation, configuration, maintenance and administration of Palo Alto Network firewalls, Panorama, Checkpoint and Fortinet Firewalls.
- Performed Network Security Assessment and implemented security improvements such as network filtering, SSH, AAA, SNMP access lists, VTY access lists, EIGRP MD5 authentication, and HSRP authentication.
- Configured Palo Alto Networks Firewalls (PA-3K, PA-5K, PA-7K) and integrated them to centralized management system Panorama to manage large scale firewall deployments.
- Automated network implementations and tasks and designed monitoring tools using python and shell scripting.
- Configured Security appliance, configuring VLANs/routing/NAT with the Palo Alto Panorama 5000 series.
- Experience in deploying and maintain Cisco ASA, Checkpoint and Palo Alto Firewalls.
- Experience on Check Point Firewalls NG, NGX, NG R55, NGX 60, NGX R65, R70, R75, UTM.
- Experience in configuring Client-to-Site VPN using IPSec VPN on Cisco and Palo Alto Firewalls.
- Worked on F5 Local Traffic managers (LTM), Global traffic manager (GTM) of series 8900, 6400, 6800, 3400, 5100, 3600.
- Experience in configuring, implementing and troubleshooting F5 load balancer in the enterprise network.
- Proficient using the F5 based profiles, monitors, VIP’s, pools, pool members, iRules for virtual IP’s.
- Deployed F5 Enterprise manager of 4000 series for the all cluster devices over the network for easier management of configurations like SSL certificates, disable and enable of nodes states.
- Coordination with the Cisco TAC/Cisco AM, Checkpoint Consultant, for the critical cases/projects.
- In-depth Cisco technology experience/knowledge in design, implementation, administration, and support.
PROFESSIONAL EXPERIENCE:
Confidential, Middletown, NJ
Network Security Engineer
Responsibilities:
- Involved in the deployment and decommission of VLANs on core Nexus 7K, 5K and its downstream devices.
- Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
- Implemented SSL VPN solutions including Palo Alto Networks Global Protect with single and multiple gateway solutions including integration of PKI certificates. Integrate multiple vendor IPSEC site to site VPNs, including Palo Alto Networks and Cisco ASA firewalls.
- Responsible for major aspects of network specification and design within the organization making recommendations for the improvement of network design operation and economics, wherever and whenever possible.
- Performed Network Security Assessment and implemented security improvements such as network filtering, SSH, AAA, SNMP access lists, VTY access lists, EIGRP MD5 authentication, and HSRP authentication.
- Configured ACLs in Cisco 5550 ASA firewall for internet Access requests for servers, protocol handling, object grouping and NAT.
- Migrated Cisco ASA firewalls to Palo Alto Network Firewalls using the PAN Migration Tool (Expedition) and integrated wildfire to identify zero-day exploits.
- Implemented Global-Protect VPN for mobile workforce replacing traditional Remote access VPNs.
- Performing administrative tasks with Palo Alto Networks (Panorama) including Security, NAT policy definitions; application filtering; Regional based rules; URL filtering, Data filtering, file blocking, User based policies, maintained and analyzing firewall logs
- Act as a part of the Migration project for Data-center switches from Cisco Nexus 7010, 5548 switches to Arista 7308 and 7300X-32Q switches, Leveraging spine-leaf architecture.
- Performed software upgrades of Arista EOS (from 4.14.11M to 4.18.3.1F) using Accelerated Software Upgrades to reduce the downtime.
- Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with Palo Alto Firewalls
- Worked with Cisco ASA 5585-X with firepower firewall rules, IPSEC VPN, NAT, Active-Standby Failover, EIGRP and Any Connect VPN technologies
- Performed administrative tasks with Palo Alto Networks (Panorama) including Security, NAT policy definitions; application filtering; Regional based rules; URL filtering, Data filtering, file blocking, User based policies.
- Selecting appropriate AWS service to design and deploy an application based on given requirements
- Migrated complex, multi-tier applications on AWS
- Define and deploy monitoring, metrics and logging systems on AWS
- Involved in Implementation and Configuration (Profiles, I Rules) of F5 Big-IP C-4400 load balancers.
- Automated network implementations and tasks and designed monitoring tools using python scripting
- Network security including NAT/PAT, ACL on Palo Alto Firewall.
- Experience with F5 load balancers to provide Land Balancing towards Access layer from core layer and configuring F5 LTM both by GUI and TMSH/CLI and Cisco load balancers (CSM, ACE and GSS).
- Have a good experience working with the Trouble Tickets on F5 Load balancer.
- Implementation and configuration of F5 Big-IP LTM-6400 load balancers.
- Migrated the policies from Cisco ASA firewall to Palo Alto Firewall.
- Involved in Configuration of Access lists (ACL) on Palo Alto firewall for the proper network routing for the B2Bnetwork connectivity
- Setup and Configured Cisco Meraki MX security appliance and MS switches Confidential local and remote sites
- Worked on VPN, WLAN and Multicast.
- Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PAP, CHAP, and SNMP.
- Experience Configuring BGP, OSPF on ASR Core routers
- Switching tasks include VTP, 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP.
Confidential, Richmond, VA
Network Engineer
Responsibilities:
- Experience in developing cloud strategies, roadmaps, architecting (hands-on) new cloud solutions end to end or enterprise level AWS/Azure migrations
- Designing and Deploying dynamically scalable, Highly available, fault tolerant and reliable applications on AWS
- Migrated complex, multi-tier applications on AWS.
- Defined and deployed monitoring, metrics and logging systems on AWS. Migrated existing on-premises applications to AWS
- Monitored infrastructure with Nagios like Firewalls, Servers, Services, Network devices, applications, web portals etc. Resolution of tickets fresh & pending
- Selecting appropriate AWS service to design and deploy an application based on given requirements.
- Configuring & managing around 500+ Network &Security Devices that includes Cisco Routers & Switches, Nexus Switches, Juniper and Palo Alto Firewalls, F5 Big IP Load balancers, Blue Coat Proxies and Riverbed WAN Optimizers
- Automated network implementations and tasks and designed monitoring tools using python scripting.
- Working on creating VIP (virtual servers), pools, nodes and applying I Rules for the virtual servers like cookie persistency, redirection of the URL
- Provided Load Balancing towards access layer from core layer using F5 Network Load Balancers.
- Operations and management of company LAN, WAN, and wireless networks, including routers, switches, Access Points, Firewalls and another network i.e. Riverbed, Bluecoat, F5 LTM/GTM.
- Supplied documentation, escalation, training and standard operating procedures as needed to allow for a smooth transition within the NOC.
- Modified internal infrastructure by adding switches to support server farms and added servers to existing
- DMZ environments to support new and existing application platforms.
- Designed and installed new Branch network systems. Resolved network issues, ran test scripts and prepared network documentation.
- Experience with setting up IPSEC VPN on Cisco 5585 Firewalls towards the multiple vendors
- Experience working with Nexus 7010/Nexus 7018, 5020, 2148, 2248 devices
- Regular upgrade and maintenance of Infrastructure including Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, F5 BIG IP, Palo Alto Firewalls, BlueCoat Proxy and Riverbed Steelhead appliances.
- Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
- Experience working with data center deployment where we converted from Cisco 6500 to Nexus.
- Experience with configuring FCOE using Cisco Nexus 5548.
- Troubleshoot WAN related problems including OSPF, EIGRP, BGP, Spanning tree switching and routing designs.
- ExperienceSupporting EIGRP, OSPF and BGP based network by resolving level 2 & 3 problems of internal teams & external customers of all locations
- Experience with configuring BGP, OSPF in Juniper M and MX series routers for branch/Back office locations.
- Experience in configuring all Palo alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments
- Support Panorama Centralized Management for Palo alto firewall PA-500, PA-200 and PA3060, to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration
- Helped team to deploy 100 APs with 15 Switches, Cisco Nexus, Cisco Meraki and 2 Wireless controllers.
- Experience working with F5 LTM 3600/6400 and GTM 2200/4200 in data center
- Configured Virtual Servers, Configure Nodes, and configuring the load balancing Pools and also used to workwith configuring load balancing algorithms.
- Performed switching technology administration including VLANs, interVLAN routing, Trunking, STP, RSTP,port aggregation & link negotiation.
- Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment
- Work as a part of the DMZ migration and consolidation for external vendors into a new environment on ASA 5585 devices.
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/Juniper security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
- Multipoint VPN: IPSec, IKEv2, DES, 3DES, AES (-128, -192, -256), Pre-Shared Key, X.509v3 Certificate, MD5, SHA-1, NAT-T, firewall rules for each VPN connection, configuration assistance via web interface, remote-controlled activate/ deactivate connection.
- Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Config, Assigning DHCP profiles.
Confidential, St. Louis, MO
Network Support Engineer
Responsibilities:
- Established VPN Tunnels using IPsec encryption standards and configuring and implementing site-to-site VPN, Remote VPN.
- Worked on F5 load Balancer, configured Virtual servers, pool, pool members, worked on load balancing methods for LTM
- Designing and installing new branch network systems. Resolving network issues, running test scripts and preparing network documentation.
- Configure / Troubleshoot Juniper MX 480, MX960 series routers and EX4200 & EX3200, 3560 series switch for LAN/WAN connectivity.
- Implemented Access lists and policy mapping on Juniper router installed in each branch across all the locations.
- Ensuring problems are satisfactorily resolved in a timely manner with focus in providing high level of support for all customers.
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
- Configured Cisco ASA firewalls in various contexts and modes to enhance security and implemented changes to the firewall rule base, network routing tables and ACL to allow only authorized users to servers.
- Experience in migration from Cisco infrastructure to Juniper MX routers and switches such as EX and QFX-3500, QFX-5100.
- Configure and troubleshoot Juniper EX series switches and routers working with the Trouble Tickets on F5 Load balancers and ASA Firewalls
- Worked with wireless technologies troubleshooting and configuration.
- Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
- Developed Python regression and performance test suite.
- Automated network implementations and tasks and designed monitoring tools using Python scripting
- Configured BGP features such as as-override, Local pre, EBGP load sharing on client connections
- Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
- Providing Level 3 support to customers, resolving issues by attending to conference calls.
- Configuring multiple route reflectors within a cluster.
Confidential
Network Operations Engineer
Responsibilities:
- Experienced in Planning and Organizing Change Management, Maintenance/updating of Network diagrams, Maintenance & Monitoring Base station infrastructure.
- Commissioning of New Links by coordinating with BSO.
- Ensure standard Router and Switch Configurations are maintained and also Responsible for Capacity planning, Contingency planning & disaster recovery.
- LAN Segments monitoring/Troubleshooting LAN related issues and the periodic backup of Router/ Switch Configurations.
- Monitoring the NMS system for different Network Alerts.
- Performed switching technology administration including VLANs, inter-VLAN routing, Trunking, STP, RSTP, Port Aggregation & link negotiation.
- Design, execution of installation and configuration of VPN/VPN, LAN/WAN as per organizational requirements.
- Troubleshoot connectivity issues involving VLAN's, OSPF, QoS etc.
- Resolving routing and switching related real time performance issues.
- Performance monitoring of various applications and web servers to maintain quality of service and network stability.