We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

3.00/5 (Submit Your Rating)

Princeton, NJ

SUMMARY:

  • Senior Network Engineer having worked with multiple clients and network environments. High level understanding of switching, Routing, Firewalls, Network security, Application Delivery controllers and Wireless .
  • Experience in Switching in campus and Data center environments . Worked on Migration projects from legacy to new hardware switches. Worked on IDF/MDF refresh projects, Access, Distribution and Core refresh projects in Data centers, Spine leaf Architecture.
  • Experience with Cisco 2960, 3750, 3850, 4500, 6500, CAT 9K switches . Juniper EX and QFX series , Arista and Aruba Switches and Extreme network switches in Campus Environments.
  • Extensive experience on Cisco ASR, Nexus 7K, 9K, 5K and 2K switches, Juniper M and T series routers, Arista 7000 series switches, Cisco 7200 series routers in Core, Distribution and Edge in Data centers.
  • Well versed with Layer2 and Layer 3 Protocols that include STP, RSTP, PVST, MST, HSRP, VRRP, LACP, PAGP, OSPF, EIGRP, BGP, VXLAN, EVPN, MPLS, IS - IS .
  • Worked on Internet core, Internet Peering, Data center Core, Distribution, Extranet, DMZ, Inter DC Circuits, BGP overlays, OSPF mesh, ISP circuits, redundant configurations in all layers, VPC, VDC, FEX modes in Nexus.
  • Hands on experience in all types of Layer 1 connectivity that includes Copper - Cat5, Cat6, Fiber 10gig, 100gig, SFP, QSFP, LC, SC, ST, MM and SM.
  • Worked on Application load balancing with Cisco ACE, F5 LTM, GTM, APM, Citrix NetScaler’s and A10 . Worked on software and Hardware load balancers. Well versed with TCP, UDP, Http/Https, SSL, tcpdump, cur and TCL scripting for iRules.
  • Worked on Legacy and Next Gen firewalls that includes cisco ASA, Palo Alto, Checkpoint and FortiGate Firewalls . Worked on Perimeter firewalls, IPSEC tunnels , Zone based Vsys, Virtual routers, NAT and ACL policies, URL filtering, SSL forward proxy, SSL decryption .
  • Worked on Application traffic security with WAF, F5 ASM, F5 APM for Authentication , Citrix NetScaler’s for ICA proxy, Citrix VDI, Microsoft Office 365, Azure AD, AWS, Zscaler Cloud based proxies, Cisco IronPort proxies and Blue Coat.
  • Experience in troubleshooting, Installation of Cisco and Aruba WLAN controllers. IAP setup, BYOD policies, Integration with cisco ISE and Clearpass. 802.1X Authentication, EAP/PEAP , Certificate based and MAC based Authentication rules . ARM profiles, Anchor controllers, AP provisioning, RF, 2.4 and 5 GHz, 802.11 a, b, g, n, ac Exposure to Cisco meraki cloud .
  • Experience with SD-WAN solutions that include Viptella and Versa. Configuration of centralized policies, ranch policies, Application aware routing, failovers in WAN, transport side and service side templates in SD-WAN.
  • Knowledge in Spine and Leaf Architecture with Nexus 9K in ACI mode. Experience in VXLAN, VTEPS, VNI, EVPN Bridge Domains , Symmetric and Asymmetric IRB.
  • Exposure to multiple ticketing tools , work flows, monitoring tools that include ServiceNow, Jira, Remedy, SolarWinds, Wireshark, NetCool, Whatsup Gold, SNMP v2c and V3.
  • Experience with project management, working with peers and peer teams, interaction with vendors, CAB proceedings, implementation and downtime procedures, On call rotation, Documentation in Visio, PPT, Network Diagramming, Troubleshooting.
  • Passionate about learning new technologies. Basic exposure to Python Scripting for network automation.

TECHNICAL SKILLS:

Router and VoIP Platforms: Cisco Routers series 7300, 4000, 3800, 2000, 1900; Juniper T4000, MX10, MX40, ACX2200, ACX5000; OnSIP, Avaya products, cisco IP phones

Routing Fundamentals and Protocols: Routed and Routing protocols RIP, EIGRP, IS-IS, OSPF, BGP, IPX; MPLS, IPv4 and IPv6 addressing, subnetting, VLSM, Static routing, ICMP, ARP, HSRP, VRRP, Route Filtering, Multicast, 802.11, Policy Based Routing, Redistribution, Port forwarding

Switch Platforms: Cisco Catalyst series 2960, series 3560, 3850, 4500, 6500, 7000; Nexus series 2K, 5K, 7K; Nortel/Avaya 5510, 5520; Juniper EX3300, EX4600, EX4300, EX3400

Switching Fundamentals and Protocols: Ethernet technologies, LAN networks, MAC, VLAN and VTP, STP, PVST+, Multicast, RSTP, Multi-Layer Switching, 802.1Q, EtherChannel, PAgP, LACP, CDP, HDLC, RARP

Firewall Platforms: Juniper Netscreen 6500, 6000, 5400, Juniper SSG, SRX5600, SRX5800, CheckPoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo Alto Networks (PA series 2K, 3K and 5K), WAF

Security Protocols: Standard and Extended ACLs, IPsec, VPN, Port-security, SSH, SSL, IKE, AAA, Prefix-lists, Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress Firewall Design, Content Filtering, Load Balancing, IDS/IPS, URL Filtering, L2F, IDS, TCP Intercept, Router Security, SNMP trap

Network Management and Monitoring: Wireshark, Infoblox, HP OpenView, Cisco Prime, Security Device Manager (SDM), CiscoWorks; TCP Dump and Sniffer; SolarWinds Netflow Traffic Analyzer, Network Performance Monitor (NPM), Network Configuration Manager (NCM)

Load Balancers: F5 (BI G-IP) LTM 2000, 3900, 6400, 6800, AV 510, citrix NetScaler

WAN technologies: Frame-Relay, ISDN, ATM, MPLS, PPP, DS1, DS3, OC3, T1 /T3 lines, SONET OC3-OC192, SDH, POS, PDH

Cloud Computing and Automation: AWS, Microsoft Azure, Cisco Meraki, C#, Python scripting, Ansible, Cloud Migration

Other Networking Protocols and Fundamentals: DHCP and DNS server, Active Directory Management, NTP, NDP, TCP, UDP, FCP, Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP, TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, BitTorrent, SMTP, RADIUS and TACAS+, PBX servers, SDN, SAN

Operating Systems: Windows 10/7/XP, MAC OS, Windows Server, Nexus OS, Cisco IOS-XR,Linux, UNIX

PROFESSIONAL EXPERIENCE:

Confidential, Princeton, NJ

Sr. Network Engineer

Responsibilities:

  • Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.).
  • Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter Vlan routing, LAN security etc.
  • Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Planning/Design of wireless networks for data, voice, and location utilizing Cisco PI and Airmagnet.
  • Aruba wireless solution for international company. Virtual Controllers’, Clustered AP's Access points, Airwave management
  • Monitoring the network traffic with the help of Qradar and Cisco IPS event viewer.
  • Configured Juniper MX480s, EX8200s, EX4500s, EX4200s, and SRX5800s from scratch to match design.
  • Configure all Checkpoint, Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.
  • Implementing and troubleshooting (on-call) IPSec VPNs for various business lines and making sure everything is in place. Implementing IPSec and GRE tunnels in VPN technology. Designed, configured, implemented site-site VPN on Cisco ASA 5500 firewall.
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per the requirement of the Organization.
  • Use Aruba Software to manage and Monitor multi sites wireless networking
  • Worked as a part of Data center deployment where we converted from Cisco 6500 to Nexus.
  • Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
  • Experience with configuring FCOE using Cisco nexus 5548
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration. Experience in working with designing, installing and troubleshooting of Palo Alto firewalls.
  • Configuring & managing around 500+ Network &Security Devices that includes Juniper SRX Firewalls, F5 BigIP Load balancers and Nexus Devices. Experience working with JUNOS OSon Juniper Routers and Switches.
  • Actively involved in design & deployment of a new datacenter using Cisco Nexus 9000 platform in spine & leaf architecture utilizing VXLAN fabric & BGP-EVPN overlay technologies
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN. Supporting project test teams in analyzing the bandwidth utilization.
  • Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Responsible for Cisco ASA firewall administration across the network. Installing & rebuilding IP appliances, checkpoint appliances. Configuring & troubleshooting Checkpoint ClusterXL & VRRP
  • Monitored and managed networks using CiscoWorks tools and Wireshark
  • Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series, Access control lists, Configured Frame-Relay, ISDN, ATM, load balancing switches and also configured IPX/SPX, HDLC, PPP, BGP, EIGRP, OSPF and VRRP on various sites. Implemented antivirus and web filtering on Juniper SRX 240 at the web server.
  • Worked on NNMI, Infoblox, e-health monitoring tools.
  • Setup simplified and traditional VPN communities, and Cisco Any connect
  • Support customer with the configuration and maintenance of ASA firewall systems. Troubleshooting of protocol-based policies on Palo Alto firewalls and changing the policies as per the requirement and as per traffic flow.
  • Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).
  • 24x7 on-call escalation support as part of the security operations team.
  • Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs.

Environment: Cisco 2948/3560/4500/3560/ 3750/3550/3500/ switches and Cisco 3640/12000/7200/ 3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Infoblox, Checkpoint, CiscoWorks tools, Wireshark windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

Confidential, San Jose, CA

Sr Networking engineer

Responsibilities:

  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Experience with configuring FCOE using Cisco nexus 5548 .
  • Configured Nexus 5020 with multiple distribution VDC's running EIGRP for route propagation between the devices.
  • Migrated the policies from Cisco ASA firewall to Palo Alto Firewall .
  • Experience with Network Automation using Python
  • Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010 .
  • Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer3 switches to J uniper Layer 3 EX4300 & EX3300 switches .
  • Performing administrative tasks with Palo Alto Networks (Panorama) including Security, NAT policy definitions; application filtering; Regional based rules; URL filtering, Data filtering, file blocking, User based policies.
  • Hands on experience in configuring high end routers like GSR 12000 series, 7500 series and Catalyst Switches like 7600, 6500, 4500 series.
  • Configure / Troubleshoot Juniper: EX-3300, EX-4300 , EX-4500 and EX-6200 series switch for LAN /WAN connectivity.
  • Responsible for implementation of security policies on SRX 240, SRX 550 series of firewalls at branches and datacenter.
  • Help customers build scalable, resilient, and high-performance applications and services on AWS
  • Monitoring and running ISE reports. Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE . Working on Cisco ISE to authorize users based on protocols PEAP and EAP-TLS , also manage and monitor user's access privileges.
  • Actively involved in Switching technology Administration including creating and managing VLANS , Port security- 802.1x, Trunking 802.1Q, RPVST+, Inter-VLAN routing, and LAN security on Cisco Catalyst Switches 4507R+E, 6509-E and Nexus Switches 2232, 5596, 7009.
  • Involved in the configuration of MX-80 routers at hospital sites with OSPF and peer with BGP to service providers for redundancy.
  • Responsible for configure, test and implement network, firewall and security solution with appliances such as Cisco, Juniper net screen and Palo Alto Networks application firewalls
  • Configured SRX HA cluster for vendor DMZ migration project for high availability and to support multiple vendors connecting to the organization.
  • Experience with F5 GTM/LTM installation and assist in configuration of F5 APM LTM modules for BIG IP networking equipment.
  • Configured custom monitors, virtual servers, pool members and load balancing algorithms on F5 Load balancers.
  • Assisted in MPLS migrations , implemented a backup for the existing WAN connection using site-to-site IP sec VPN tunnels .
  • Cisco Meraki Appliance MX (400, 80, 60) and Meraki wireless Access points ( MR66, MR18).
  • Installed and configured Meraki (MX80, MX60) Appliance via Meraki MX400 Cloud. Installed and configured Cisco Meraki (MR66, MR18 ) wireless Access points in the warehouses
  • Deployed and configured Cisco AIR-CAP 3502 wireless access points across various health systems as a part of the refresh from the 1841 WAP's .
  • Configured SSID's on WLC 5502 wireless LAN controllers and experience troubleshooting using WCS.
  • Worked on configuration and commissioning of the MPLS circuits for various branch offices to replace the existing point to point circuits
  • Providing Daily network support for all branches and sits in the organization's WAN consisting of MPLS , VPN and point-to-point (P2P) circuits.
  • Performed Network Security Assessment and implemented security improvements such as network filtering, SSH, AAA, SNMP access lists, VTY access lists, EIGRP MD5 authentication, and HSRP authentication.
  • Configuration of ACL's Protocol Handling , Object Grouping and NAT , Zones, Routes, URL filtering , Site-Site tunnels on Checkpoint and FortiGate firewalls .

Environment: PA firewalls, ASA, F5, Juniper EX, Fortigate Firewalls, Cisco Meraki, Nexus 2k, 5k, 7k, 9k, Solarwinds.

Confidential, Portland, Oregon

Sr Network Engineer

Responsibilities:

  • Assisted in troubleshooting LAN connectivity and hardware issues in the network of 500 hosts.
  • Performed client requirements to provide solutions for network design, configuration, administration, and security.
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 router with HSRP.
  • Created a backup and recovery policy for software application and verified peripherals are working properly.
  • Monitor performance of network and servers to identify potential problems and bottleneck.
  • Performed RIP & OSPF routing protocol administration. Support services to reduce the downtime on leased lines.
  • Troubleshoot problems day to day basis & provide solutions that would fix the problems within their Network.
  • Maintenance and Troubleshooting of connectivity problems using Ping, Trace route.
  • Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issue Other responsibilities included documentation and support other teams
  • Designed and Implemented plan for migration from existing Catalyst switches to Nexus and configured NX-OS Virtual Port Channels, Nexus port profiles, Nexus VPC peer links on Nexus 5k and 7k .
  • Acquitted with Cisco Meraki for Cisco Wireless devices Monitoring, Managing and troubleshooting Cisco Wireless devices using Cisco Meraki.
  • Creating individualized configurations for Juniper and Cisco routers to make changes to meet new standards.
  • Cisco ASA/Checkpoint, Palo Alto Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Supported and executed migration to F5 BIG-IP LTM/GTM ADC Appliances from Citrix NetScaler.
  • Participated in the installation, configuration, and post installation routine operational tasks and configuration of the Cisco Nexus Switches. Worked with JunOS maintaining Juniper EX4600, EX3400, EX4300 series switches and ACX1000 router to maintain some sites and stations
  • Worked with Host Master for shared web hosting and managed Web Application firewall (WAF), DNS and DHCP management using Infoblox and Analyzed networks using Wireshark
  • Worked with Nagios for monitoring of network services (SMTP, POP3, HTTP, NNTP, ICMP, SNMP, FTP, SSH) .
  • Provided full visibility and notification of authorized and unauthorized network access with integration of CISCO ASA and NAC solutions. Performed Load balancing using F5 BIG-IP LTM ADC 6400, Cisco ACE 4710.
  • Configured OSPF over frame relay networks for NBMA and point to multipoint strategies
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 & 6000 series.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Responsible for Checkpoint, ASA, Palo Alto Firewall management and operations across global networks.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope.
  • Monitoring and troubleshooting Juniper SRX210/650, EX 4200/4500/8200 series device. Configured Juniper EX8200s, EX4500s, EX4200s, and SRX5800s from scratch to match design
  • Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and troubleshooting. Responsible for implementing QOS parameter on switching configuration.
  • Experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Involved in Design and Implementation of complex networks related to extranet clients.
  • Troubleshooting the N/W Routing protocols (BGP, EIGRP and OSPF) in Migrations and new client connections.
  • Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.
  • Worked towards the key areas of the project to meet SLA’s and to ensure business continuity. Involved in meetings with engineering teams to prepare the configurations according to the requirement.
  • Creating change tickets according to the scheduled network changes and implementing the changes.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/ 0/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K,Checkpoint,Cisco ASA, Nexus-5k and 7k, NX-OS, Meraki, BIG-IP, LTM/GTM, ADC, Citrix NetScaler, Juniper EX4600, EX3400, EX4300, ACX1000, JunOS, Infoblox, DNS, DHCP,Web Application firewall (WAF), POP3, HTTP, NNTP, ICMP, SNMP, FTP, SSH, Wireshark, NAC, Cisco ACE 4710, OSPF,Frame Relay, MPLS, BGP,VLAN, IPSec, QOS,RIP.

Confidential, Boston MA

Network Implementation Engineer

Responsibilities:

  • Performed network administration tasks such as creation and management of VLANS, Port security, Trunking, RPVST+, Inter-VLAN routing, and LAN security.
  • Worked with Cisco Catalyst 6500, 4500, 3500, 4900 switches and Cisco 2800, 3600, 3800, 7200, 7600 series and ASR 5k/9k series Routers.
  • Responsible for entire LAN and WAN maintenance and troubleshooting of the company network. Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements.
  • Involved in Network Designing, Routing, DNS, IP Subnetting, TCP/IP protocol.
  • Worked with Routing Protocols of EIGRP and BGP.
  • Verified IDS platform coverage using multiple testing suites.
  • Performed extensive traffic engineering to best utilize upstream transit providers and peering relationships.
  • Implemented Juniper Router and Switches.
  • Created IPAM platforms with protocols and networking services.
  • Configured PVSTP+ for loop prevention and VTP for Inter-VLAN Routing.
  • Ensured compliance with the standard procedures as applicable to data center operations.
  • Worked on commissioning and decommissioning of the MPLS circuits for various field offices & POPs
  • Collaborating with Application owners, Network Team, DNS Team, and Firewall Team to migrate websites from Cisco ACE Load Balancer to New F5 BIG-IP Local Traffic Manager.
  • Deployed code upgrade from version 11.5.1 HF4 to version 11.5.4 on the F5 LTMs.
  • Configured F5 GTM solutions, which includes Wide IP (WIP), Pool Load Balancing Methods, probers and monitors.
  • Implemented and configured F5 Big-IP LTM-6400 load balancers.
  • Manage Cisco Routers and troubleshoot layer1, layer2 and layer3 technologies for customer escalations.
  • IP Allocation& Maintenance for users and other needs throughout company.

Environment: Cisco ASA 5520, 5505, BIG-IP LTM 6400, Nexus, STP, RSTP, VTP, HSRP, Port-Channel, BGP, OSPF, EIGRP, PPP, HDLC. SNMP, DNS, DHCP.

Confidential

Network Administrator

Responsibilities:

  • Worked with the Help Desk for circuit troubleshooting to give Support to the Tech persons at the site.
  • Configuring routers and sending it to Technical Consultants for new site activations and giving online support at the time of activation.
  • Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access.
  • Experience in Cisco 7200, 7600 routers, Cisco series switches, Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay and ATM).
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.
  • Configured the Cisco router as IP Firewall and for NATting.
  • Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.
  • Installed and configured PIX 520, 525, 535 series firewalls, configured standard and extended access-lists and policy- based filters.
  • Configured ASA 5510 appliance and VPN.
  • Responsible for implementing Qos prioritizing voice traffic over a data.
  • Implemented SNMP on Cisco routes to allow for network management. Completed the installation and configuration of T1, T3 & OC3 circuits.
  • Troubleshoot TCP/IP problems, troubleshoot connectivity issues.

We'd love your feedback!