We provide IT Staff Augmentation Services!

Network Security Engineer Resume

2.00/5 (Submit Your Rating)

Boston, MA

SUMMARY:

  • Over 6 years of professional experience in Deploying and Troubleshooting Enterprise level Network and Network Security Infrastructure. Provide Tier 1, 2 & 3 Data Centre support.
  • Strong hands - on experience in deploying and configuring firewalls like Palo Alto, Checkpoint, and Cisco ASA.
  • Experience on Palo Alto NXG Firewall configurations including URL filtering, Threat prevention, Data filtering, Ipsec Tunnels, SSL-VPN and Zone Protection.
  • Hands on experience in Integrating Vmware NSX Palo Alto Firewalls.
  • Expert in configuring Security policies using App ID, Services, Security profiles and URL category.
  • Experience on configuring and troubleshooting HA, Zones, VLANs, Routing, and NAT on firewalls as per the design requirements.
  • Hands on experience in configuring Pre-rules, Post-rules, object groups and templates in Panorama.
  • Working experience in creating custom URL filtering profiles and attached them to Security policy rules that allow web access.
  • Knowledge on mitigating various attacks like DOS, DDOS, KILLCHAIN, and ZERO DAY ATTACKS.
  • Profound knowledge in Cisco ASA 5000 series installation, configuration and maintenance.
  • Configured Firewall-security context modes, interfaces, objects and access list, NAT, AAA for network access and advanced network protection on CISCO firewalls.
  • Working experience in deploying Cisco appliance as a firewall, VPN, troubleshooting skills and policy change requests, enabling granular traffic inspection through network segmentation.
  • Responsible for configuring and maintaining Check Point firewalls, Cisco firewalls, and F5 Load Balancers.
  • Experience in configuring and managing Cisco and F5 Load Balancers to provide reliable distribution of traffic across some servers by creating pools, nodes, and health checks.
  • Assisted in setting up new 510 and 810 Blue Coat Proxy SG units, performed one to many proxy migrations.
  • Monitored firewall traffic through the Checkpoint firewall smart dashboard and smart view tracker and implemented dedicated SMART EVENT server and generated traffic log reports by checkpoint SMART EVENT.
  • Configured High Availability links between Checkpoint firewalls (Active/Passive) to prevent a single point of failure on the network.
  • Configured Client VPN Technologies such as Cisco’s VPN Client via IPSEC and Globalprotect from Palo Alto Networks
  • Working experience in managing and troubleshooting the core, distribution and access switches.
  • Substantial working experience on Cisco Nexus switches (2000, 3000, 5000, and 7000 series) and ASR & ISR Routers.
  • Configured and managed Cisco routers and Switches using Cisco Security Device Manager (SDM).
  • Profound knowledge of layer 2 protocols such as VTP, STP, RSTP, MST and layer 3 routing protocols like BGP, EIGRP, and OSPF.
  • Working experience on network topologies and configurations.
  • Hands-on experience with ACLs, Syslog.
  • Well Experienced in configuring protocols HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC.
  • Depth knowledge in HSRP and VRRP for Redundancy over layer 2, 3 switches.
  • Knowledge of TCP/IP suite to solve complex networking issues including IP routing protocols, ACLs, VLANs, and VPNs.
  • Working experience on packet analyzer tools like Tcpdump and Wireshark.
  • Monitored and Troubleshoot physical and virtual network infrastructure using SIEM tools like Splunk, Qradar.
  • Troubleshoot connectivity issues on Cisco ACE, GSS, CSM balancers.
  • Configured role-based access to allow the authorized users to access the servers and network infrastructure.
  • Deployed Cisco and Aruba wireless 802.1X infrastructure across the enterprise network.
  • Installed and maintained Aruba switches, Aruba Wireless AP’s and Aruba Virtual Controllers.
  • Technical proficiency with Cisco wireless (AP’s, Controllers, ISE, Prime).

TECHNICAL SKILLS:

Firewalls: Palo Alto Networks, Cisco ASA firewalls, Checkpoint, Panorama Palo Alto Networks firewall management.

Load Balancers: F5 Networks (Big-IP), Cisco ACE & Brocade Load Balancers.

Routers: Cisco 7600, 7200, 3800, 3600, 2900, 2800, 2600, ASR 7K, ASR 12K.

Switches: Nexus 2K/5K/7K, Cisco Catalyst 6500, 4500, 3850,3560, 3750, 2960.

Communication Protocols: TCP/IP, UDP, DHCP, DNS, ICMP, SNMP, ARP, RARP, PPP, HDLC, ISDN, SDN, and SD-WAN.

Routing Protocols: OSPF, EIGRP, BGP, MPLS PBR, Route Filtering, Redistribution, Summarization and Static Routing.

Switching Protocols: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels, Transparent Bridging.

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, VLANs, VTP, STP, RSTP, 802.1W, Cisco Prime.

Wireless Technologies: Airwatch & WLC s (8510, 5508, 5706), Cisco AironetAP s (2600, 3600, 3700), Aruba 225, Aruba 3000 controller & Airwave.

Network Security: Cisco ASA 5540, ACL, IPSEC, F5 Load Balancer, ISE, SSL, IPSec VPN, GRE VPN.

Network Management and Packet Analyzers: SolarWinds, Wireshark, SNMP, and Tcpdump.

Operating systems: Windows XP/ 7/ 8/10, Windows Server 2003/ 2008, Mac OS and Linux.

Applications: MS (Office, Word, Outlook, Excel, PowerPoint, Visio), VMware, Adobe Photoshop, and Illustrator.

PROFESSIONAL EXPERIENCE:

Confidential - boston, MA

Network Security Engineer

  • Configuring, Administering and troubleshooting the Palo Alto, ASA firewall.
  • Investigate security incidents, troubleshoot, resolve and recommend actions needed to resolve vulnerability issues.
  • Managing Cisco ASA 5585, 5555, 5545 series, upgrade and maintain security policies.
  • Worked with PA-500, PA-3020, PA-5020, PA-5050 and PA-5060 and PA-7050 to perform the day to day operations.
  • Deployed Palo Alto firewalls using VMware NSX through L2 and L3 interfaces on models such as VM-300, VM-500, and VM-1000-HV.
  • Responsible for installation, configuration of Palo Alto using Panorama.
  • Performing migration from old network to a new network of millions of users.
  • Provide on call support with network operations teams resolving incidents.
  • Deployed Paloalto-7000 series device to the production environment, managed them via Panorama.
  • Worked on the migration of ASA firewalls to Palo Alto firewalls, in cloud environments.
  • Performed code upgrades on the ASA 5585, 5555 series.
  • Worked on Splunk to gather generated logs for the firewalls, to maintain application flow on firewalls.
  • Trouble shooting Layer 3 issues, also assist layer 2 team with the troubleshooting issues with BGP, OSPF.
  • Creating NATs as per user's requirement to getting access for different servers like internal firewalls, DMZ firewalls and Internet firewalls and worked on Splunk for troubleshooting.
  • Migrate management, host and transit interfaces of the firewalls to new IP, without affecting data traffic.
  • Migrating NAT rules with counter NATs as per the new IP request
  • Participated daily scrum meetings, maintain project flow to meet deadlines.
  • Setup Global Protect VPN in the production environment, test and maintain VPN firewalls.
  • Created and implemented firewall policy to allow/block services on specific TCP/UDP ports in production firewall.
  • Created and run the automation script to push configuration into the firewalls.
  • Maintain definitions in bluecoat proxies, with Splunk integration.
  • Performed Cisco ASA and Palo - Alto Firewall Code upgrades.
  • Creating Perform and fulfill service now request for Port service, create policies and migrate rules to new subnet.
  • Troubleshooting and escalation of P1 & P2 incidents includes in day to day responsibilities.
  • Administration Big IP F5 LTM for all Local Load balancing and use GTM for load balancing across Data Centers.
  • Worked with applications transport protocols SSL, IPSEC, DNS, NTP, SSH, LDAP, RADUS, TACACS+ and AAA on ASA Firewalls.
  • Worked with Panorama 8.1.3 to configure the perimeter Palo alto firewalls.

Confidential - Ashburn, va

Network Security Engineer

  • Excellent Troubleshooting Skills and Customer Centric approach.
  • Expertise in Configuring, Monitoring and Troubleshooting Palo Alto (5040, 3020), Checkpoint firewalls.
  • Responsible for writing firewall rules based on applications, users and content.
  • Implementing USER-ID on Palo Alto firewall, which identifies supported IP-to-USER mapping strategies.
  • Configured and installed the Firewall pair in High Availability mode as Active/standby and managed through the management port.
  • Migrated Checkpoint Firewalls to Palo Alto Firewalls using migration tool.
  • Monitored network logs and security events generated by the security appliances and determined the correct action or escalation path.
  • Worked Extensively on Checkpoint firewalls.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Palo Alto Firewalls.
  • Experienced in configuring and managing F5 Load Balancers to provide reliable distribution of traffic across some servers by creating pools, nodes, and health checks.
  • Involved in Installing and Configuring a Cisco secure ACS server for AAA authentication.
  • Implemented process to eliminate inconsistencies between network documentation and the actual network configuration.
  • Installed and maintained Aruba switches, Aruba Wireless AP’s and Aruba Virtual Controllers.
  • Configured role-based, device-based access and self-service capabilities using Clear Pass access management system.
  • Configured 802.1X port-based authentication on Cisco switch-to-TACACS+ server communication.
  • Configured and troubleshoot Cisco 4k, 5k and 6k Nexus Switches in the data center.
  • Managed and troubleshooting the Core, Distribution, and Edge Routers.
  • Worked on implementation strategies for the expansion of the MPLS VPN networks.
  • Experience with manipulating various BGP attributes such as Local Preference, MED, and Extended Communities.
  • Provided BGP routing protocols for implementing multi-homing connection and carried out Route-redistribution between different routing protocols like OSPF, BGP, and EIGRP for increased efficiency.
  • Configured redundancy protocols like HSRP, VRRP and GLBP.
  • Switching tasks include VTP , ISL/ 802.1q , VLANs, Ether Channel, Port security , STP and RSTP .
  • Analyzed packets using Tcpdump and WIRE SHARK.
  • Worked on Linux and Windows Platforms and involved in planning of Network Maintenance.
  • Implemented and configured SNMP, Syslog and traps on Cisco routes to allow for network management.
  • Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-round technical support.

Confidential

Network Engineer

  • Involved in administrating and maintaining corporate infrastructure including Network Connectivity and Internet access.
  • Hands on experience with WAN (ATM/Frame Relay), routers, switches, and TCP/IP addressing.
  • Installed and configured Cisco switches and routers series.
  • Responsible for managing and monitoring network devices.
  • Maintenance of STP, HSRP, VTP, and VLANs.
  • OSPF protocol administration.
  • Designed and implemented VLANs, Trunking, VTP and Ethernet channels.
  • Configuration experience of EIGRP protocols on CISCO routers.
  • Performed DNS and DHCP troubleshooting.
  • Provided support for installation and troubleshooting of configuration issues.
  • Implemented & Integrated Cisco switches, routers, and security devices.
  • Involved in L2/L3 Switching Technology troubleshooting.
  • Creating and managing VLANs, Port security, Trunking, STP, INTER-VLAN routing, LAN security.
  • Analysed log messages by Syslog server, issues related to high CPU utilization and parameters which degrades the performance of the network.
  • Support Network Technicians in training and resolution including performing diagnostics & configuring network devices.

Confidential

JR. Network Engineer

  • Basic knowledge of wireless networking and web browsing content filtering.
  • Necessary connection management of network equipment in the organization.
  • Worked with facilities management to relocate the network equipment.
  • Diagnosing and resolving the hardware, software and networking issues.
  • Provided First level technical support to users.
  • Created and maintained documentation for Network diagrams and Network configuration.
  • Experience in LAN/WAN cabling and racking.
  • Basic knowledge of routing protocols like OSPF, BGP, EIGRP.
  • Knowledge of IPv4 subnetting and IP management.
  • Backing up the Network devices configurations and testing the network conditions to ensure that the network infrastructure is good to meet the company requirements.

We'd love your feedback!