We provide IT Staff Augmentation Services!

Network Security Engineer Resume

2.00/5 (Submit Your Rating)

Voorhees, NJ

PROFESSIONAL SUMMARY:

  • 8.4 years of experience in Cisco/Palo Alto Networking, Security which includes designing, Deployment and providing network support, installation and analysis for a broad range of LAN / WAN protocols.
  • Hands On experience Cisco IOS/IOS - XR/NX-OS, Juniper JUNOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS.
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.
  • Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.
  • Upgrading code on Palo Alto firewalls PA5050/3020 to meet company security policy.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Deployed VMware Esxi server and created high-availability clusters as per requirements.
  • Hands On experience with VMware Esxi and Microsoft Hyper V.
  • Configured and deployed Cisco 9K catalyst series.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 7010, 5000 series to provide a Flexible Access Solution for datacenter access architecture.
  • Supported to VoIP and handled VPN services as per service requirements.
  • Developed, executed and maintained Cisco Unified Communication networks.
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
  • Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210
  • Responsible for Check Point (Secure Platform R70) and Cisco ASA firewall administration across global networks.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.
  • Experience in testing Cisco routers and switches in laboratory and deploy them on site production.
  • Used Cisco ACI Fabric which is based on Cisco Nexus 9000 series switches and Cisco Application Virtual Switch (AVS).
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
  • Worked extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series
  • Knowledge in preparing Technical Documentation and presentations using Microsoft VISIO/Office.
  • Have Extensive Work Experience on Python Scripting and create Framework as Ansible
  • Worked on MPLS while ensuring secure networking, improving the network performance by prioritizing network traffic and allocating bandwidth according to usage and service requirements.
  • Collected requirements from the client and selecting appropriate AWS service with required capacity and to design and deploy applications based on given requirements
  • Worked on Multicast to use the bandwidth more effectively while reducing the load on the sender.
  • Knowledge of WAN Optimization Technology, Riverbed.
  • Also worked with the physical server migration to AWS data center
  • Involved in designing and implementation of AWS network and connectivity b/w physical and AWS DC
  • Worked with the Python 2 & 3 version
  • Assisted in designing and programming of object oriented databases with Python and other languages.
  • Worked with Automation script with Python module like Chef, Ansible.
  • Managed relational database applications with UI designing services and Python languages.
  • Configuring Cisco Wireless Controllers and AP’s.
  • Configuring Cisco WAAS.
  • Configuring the Network Admission Control (NAC).
  • Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analyzes results and implement and delivering solutions as an individual and as part of a team.
  • Hands on Experience testing iRules using Browser(IE), HTTP watch

TECHNICAL SKILLS:

Cisco Platforms: Nexus 9K, 7K, 5K, 2K & 1K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 6807 series), Nx-OS, IOS-XR, Cisco ASA, Cisco ACI

Juniper Platforms: SRX, MX, EX Series Routers and Switches EX4600/9200, QFX 10002/QFX5100

Networking Concepts: Access: lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VDS,VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi, Citrix Metaframe XP Citrix Provisioning Server, Netscaler

Firewall: ASA, ACI, Firewall (5505/5510), Checkpoint, Cisco ASA, Fortinet

Network Tools: Solar Winds, VMware,SNMP, Cisco Works, Wireshark, HIPPA

Load Balancers: Cisco CSM, F5 Networks (Big-IP)

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1,DS3,OC3, T1 /T3 & SONET

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port-channel, VLANs, VTP, STP, RSTP, 802.1Q

Security Protocols: IKE, IPsec, SSL: VPN

Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System: Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

PROFESSIONAL EXPERIENCE:

Confidential, Voorhees, NJ

Network Security Engineer

Responsibilities:

  • Worked on Design implementation of new data center with products ranging from cisco, ASA with Firepower, Dell Switches, Cisco Meraki and VMware NSX.
  • Configured VMware NSX and administration. Implementing edge routers, Access policy on the distributed networks.
  • Deployment of firewall rules on the NSX according to group policy and LANs.
  • Configured and maintained Cisco Call Manager, Unity and related Cisco Unified Communications configurations.
  • Experience in Implementing Checkpoint Firewalls (R65, R70, R76, R77), adding Security Policies and Monitoring Checkpoint Firewall traffic through Smart Dashboard applications
  • Used Python scripting for network sniffing and managed parameters for pool of servers and updated, automated and migrated different services and software by means of Ansible.
  • Expertise with Installation of Arista 7250QX series switches on Spine Platform, Deploying and decommission of VLANs on Nexus 9K, 7K, 5K and its downstream devices and update DNS records, and release IP addresses when the VMs are taken down by using Infoblox
  • Configuring and maintaining the Network connectivity to Cloud Providers such as AWS, Azure using AWS VPC, AWS Direct.
  • Reviewed and optimized firewall rules using Tufin firewall monitoring tool by creating customized firewall audit reports. Migrated datacenter firewall rules based on Analysis/query and Reports.
  • Experienced in installation, configuration and maintenance of Cisco ASR 9K, 7200, 3900, 2800, 2600, 2500 and 1800 series Router / Cisco Nexus 9000, 7010, 5548, 2148 Catalyst Cisco 6500 (sup 720), 4500 (SUP 6), 3750, 2950 series Switches.
  • Handled SRST, Voice Routing Protocols, QoS and Voice Gateways and even maintained network engineering framework.
  • Deploy, scale and automate network across multiple global datacenters supporting Amazon Web Services (AWS).
  • Planning and Development of a migration strategy to ACI from the exiting fabric path design
  • Implemented Cisco Application Centric Infrastructure (Cisco ACI) as a solution for data centers using a Spine and Leaf architecture
  • Used security groups, network ACL's, internet gateways and route tables to ensure a secure zone for organization in AWS public cloud.
  • Reconfigured Data Center core routing with Nexus 9K in VPC using HSRPExperience working with JUNOS OS on Juniper Routers and Switches.
  • Coordinate with multiple vendors (Cisco, Juniper, etc.) to troubleshoot network outages and issues
  • Reconfigured Data Center core routing with Nexus 9K in VPC using HSRPExperience working with JUNOS OS on Juniper Routers and Switches.
  • Handled ICM and CVP routing scripts, Cisco Auto-dialer campaigns, and Cisco Agent and Supervisor Desktop clients.
  • Experience configuring Virtual Device Context in Nexus 9K, 7k, 5k and 2k.
  • Configured Cisco ASA with firepower implementation.
  • Configured multiple VPNs ranging from Site to site, SSL, Any connect VPN, Cisco AMP.
  • Migration of site to site VPNs on ASA and resolving tickets on daily basis for CISCO ASA.
  • Migration of CISCO ASA legacy OS to ASA with 9.10 for data center.
  • Enterprise experience with Cisco 6500, 3750, Nexus 9K, 7K, 5K and 2K, F5 LTM design and implementation.
  • Deployment of Cisco Meraki Full Stack for the whole organization.
  • Products Implemented Meraki firewall- MX450, MX64, Meraki Switches- MS250, MS220, MS120, Meraki Access point- MR73, MR53, MR42
  • Upgraded with Nexus 9k, 7k and 5k switches to deal with the vulnerability issues.
  • Worked with Meraki MDM solution for remote devices. Pushing in security policies with Meraki MDM.
  • Implemented Policy Based routes on the DELL switches- S4048 ON, S3048 ON. Working on with switching and routing for the switches.

Confidential, Oakland, CA

Network Security Engineer

Responsibilities:

  • Performed network engineering, design, planning (WAN & LAN) & implementation. Studied single point failures & designed WAN structure in such a way that there are no failures in network in case of any device or link failure.
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • Configured Cisco ASR routers such as ASR 1013, 1009-X, 1006, 1006-X, 1004, 1002-HX, 1002-X, 1001-X routers.
  • Configure SIEM tool performance and event data quality to maximize SIEM system efficiency.
  • Experience in configuring all Palo alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments
  • Support Panorama Centralized Management for Palo alto firewall PA-500, PA-200 and PA3060, to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration.
  • Successfully conducted maintenance and upgrade on arc sight SIEM products such as, conapps, ArcMC, and loggers. Work daily incident tickets and service requests.
  • Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible, Python scripting.
  • Configured RBAC and VPN User access management on checkpoint firewalls. Used LDAP for identifying user groups.
  • Worked heavily on Firemon v8 and Tufin to see the rule usage activity, object usage activity and to delete/disable unused rules (over 365 days) and to keep the track of changes.
  • Implementing and configuring Checkpoint VSX for security gateways.
  • Integration of Configuration Management Systems like Ansible with AWS for code deployment.
  • Proficient in AWS services like VPC, EC2, S3, ELB, Auto Scaling Groups(ASG), EBS, RDS, IAM, Cloud Formation, Route 53, Cloud Watch, Cloud Front, Cloud Trail
  • Successfully executed change on Nexus 9K and 7Ks to support redundant platform.
  • Configuring and installation Windows Server 2003,2008,2012,2016.
  • Creating active directory and domain for user.
  • Conducted provisioning and Repair on Cisco Routers 920, 9k's and 2900, 3668, 3850, 4500, Nexus 2K, Nexus 3K, Nexus 5K, and Nexus 9K Switches.
  • Actively involved in Switching technology Administration including creating and managing VLANS, PortSecurity-802.1x, Trucking 802.1Q, RPVST+, Inter-VLAN routing and LAN security on Cisco Catalyst Switches 4507R+E, 6509-E and Cisco Nexus Switches 2232,5596,7009
  • Network-wide implementation of F5 Traffic steering nodes with TCP acceleration,
  • Migration of traditional Palo Alto email security products to Cisco IronPort email servers.
  • Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.
  • Used security groups, network ACL's, internet gateways and route tables to ensure a secure zone for organization in AWS public cloud.
  • Worked on Great exposure to SDN and Network virtualization technologies like Cisco ACI .
  • Experience with Cisco ACI (Application Centric Integration) technology implementation
  • Maintain and administer Cisco Nexus 7k's, Nexus 9k, Nexus 5k's, 3750, 3850, and wireless infrastructure.
  • Juniper, Checkpoint Cisco ASA, Cisco PIX and Palo Alto Firewalls Administration
  • Configured EPG, update APIC, implement access and fabric policies in Cisco ACI environment.
  • Checkpoint Firewall Deployment, Upgrade and Administration
  • Integration of services appliances to Cisco ACI fabric that includes storage, Load balancers, application delivery controllers and firewalls.
  • Design and Implement Catalyst/ASA Firewall Service Module for various LAN’s.
  • Experience in Adding Rules and Monitoring Checkpoint Firewall traffic through smart dashboard and smart view Tracker applications.
  • Experienced on working with Checkpoint firewalls R75/R77 such as installing/deleting and troubleshooting the networks.
  • Created Virtual Servers on F5 Load balancer.
  • Writing i-Rules and i-Apps on the F5 load Balancer and Renewing the Certificates.
  • Implementation of F5 includes configuration/creation of Network Element, Pool, pool members and virtual servers.
  • Deployment of enterprise firewalls (Palo Alto Networks, Cisco ASA, Check Point) in production environments.
  • Worked with network services like DNS, DHCP, DDNS, IP4, IP6, IPSec, VPN etc
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS AAA(TACACS+ & RADIUS)
  • Configured Multiprotocol Label Switching (MPLS) VPN with Routing Information Protocol (RIP) on the customer’s stages.
  • Managed Cisco PIX firewall for ACL and VPN. Also worked with the physical server migration to AWS data center
  • Involved in designing and implementation of AWS network and connectivity b/w physical and AWS DC
  • Developed a python script, which will parse all trace files and calculate throughput, latency and drop rate.
  • Developed and implemented a web crawler program in Python that gathers data from social networking site.
  • Distributed system and infrastructure. Clustered distributed controller for Cisco Application Centric Infrastructure (ACI), SDN. Model-based ACI/SDN controller. Network orchestration.
  • Application Centric Infrastructure (ACI) L4-L7 services deployment: Develop L4 to L7 service chaining and traffic steering for ACI controller. Develop ACI model and implement resource management for service deployment
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
  • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices
  • Designed and implemented security policies using ACL, firewall. Configured and maintained 26 NOS network security team devices including IDS, Palo Alto firewalls, Bluecoat web proxies, and load-balancers.
  • Cisco ISE 1.3 Deployment and Profiling Policies
  • Assist with IPS deployments and perform any necessary build configurations.
  • Worked extensively on Cisco Firewalls, Cisco (506E/515E/525/) & ASA 5500(5510/5540) Series
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Worked extensively on Controlling the Traffic, creating the groups SSL of load and SSL certification on F5 load balancer
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Configuring and implementation of Juniper Firewall, SSG Series, Netscreen Series ISG 1000, SRX Series.
  • Configured routing policy for BGP. Switching related tasks included implementing VLANs and configuring ISL trunk and 802.1Q on Fast-Ethernet channel between switches
  • Implemented Cisco IOS Firewall IDS using 2600 series router.
  • Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers and Cisco ASR 9K routers
  • Provided application level redundancy and availability by deploying F5 load balancers LTM.
  • Troubleshooting on network problems with Wire shark, identify problem and fix.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Configuring and troubleshooting type of routing to route traffic flow per customer requirement as primary, backup/F5 load balanced and load splitting.
  • Operation and troubleshooting of Juniper routers, HP/H3C network switches and Riverbed accelerators.
  • Deploying and decommissioning the VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices.
  • Performed the maintenance of Active Directory and replication scheme, DNS/DHCP services and time services; wrote step-by-step procedures for implementing upgrades.
  • Dealt with creating VIP (virtual servers), pools, nodes and applying iRules for the virtual servers like cookie persistency, redirection of the URL.

Confidential, TX

Sr. Network Engineer

Responsibilities:

  • Configuring Static, IGRP, EIGRP, BGP and OSPF routing protocols on Cisco 1600, 2600, 2800, 3600, 7300 series routers.
  • Installed and Powered F5, Palo-Alto Firewall.
  • Migrated with a team from a predominantly Checkpoint environment to a Palo Alto global solution.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550).
  • Worked on AWS, High Availability Practices and deploying backup/restore infrastructure.
  • Configuring, Monitoring and Troubleshooting Cisco's ASA 5500 security appliance, Failover DMZ zoning and configuring VLANs/routing/NAT with the firewalls as per the design.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices configure 2k, 3k, 7k series Routers
  • Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series).
  • Provided design and Contrail SDN/NFV networking support using Cisco ACI, Cisco wireless controllers, Open-Stack, Juniper Contrail and Big Switch Networks LABs using Apple Configurator.
  • Experience with devices Palo Alto Network firewalls such as security NAT, Threat prevention & URL filtering. PANDB migration and code upgrades for Palo Alto Firewall
  • Involved in configuring Juniper SRX 550, Cisco ASA 5585 firewall and PALOALTO 5050 firewall.
  • Set up and troubleshoot secured wireless access points (WAP) and wireless LAN controller (WLC) across the Corporate Network.
  • Enterprise experience with Cisco 6500, 3750, Nexus 9K, 7K, 5K and 2K, F5 LTM design and implementation
  • Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark tool.
  • Configured various LAN switches such as CISCO CAT 2900,3550,4500,6509 switches and Access layer switches such as CISCO 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.
  • Configuring VLANs/routing/NATing with the firewalls as per the network design.
  • Configured EBGP load balancing and ensured stability of BGP peering interfaces.
  • Experience with converting 6500 to Cisco Nexus in the data Center environment.
  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers.
  • Experience configuring Virtual Device Context in Nexus 7010.
  • Performing troubleshooting on slow network connectivity issues, routing issues that involves OSPF, BGP and identifying the root cause of the issues.
  • Planned for the implementation of a new architecture at legacy Web Hosting Data Centers.
  • Experience with converting Cisco 6500 to Cisco Nexus in the data center environment.

Confidential, Newark, CA

Network Engineer

Responsibilities:

  • Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches.
  • Involved in Local Area Network (LAN) design, troubleshooting, and maintenance as per company’s requirements.
  • Worked with snipping tools like Ethereal to analyze the network problems.
  • Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
  • Performed replacements of failed hardware and upgraded software.
  • Configured VLANS to isolate different departments.
  • Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
  • Configured IPSEC VPN on SRX series firewalls.
  • Used TFTP server to backup Cisco configuration files.
  • Worked on Cisco Nexus 9K family of switches whose hardware is based on Cisco ACI
  • Designed and implemented security systems including various Cisco IOS ACLs, Context-Based Access Control, PIX Firewall (PIX 506, 515), Network Intrusion Detection Systems, AAA Cisco Secure Access Control Server (Radius/TACACS+) and Linux syslog servers. Planned, configured and operated IPsec VPNs.
  • Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company.
  • Knowledge of Cisco ASA firewall, VPN, GRE over IPSec tunnel configuration and Route-maps.
  • Performed scheduled Virus Checks & Updates on all Servers & Desktops.
  • Implementing Routing and Switching using the following protocols; IS-ISOSPG, BGP on Juniper M series routers.
  • Working as a Network SME for the NextGen Datacenter Cloud Architecture, using Cisco ACIand Nexus 9K. Working with Cisco Account team onsite for creating and testing the POC
  • Design, installation and troubleshooting networks with hand-on experience with OSPF, ISIS, BGP, VPLS, Multicast, VPN, MPLS, & Traffic engineering.
  • Configured STP for loop prevention on Cisco Catalyst Switches.
  • Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.
  • Worked in setting up Inter-VLAN routing, redistribution, access-lists and dynamic routing.
  • Involved in configuring and implementing of Composite Network models consists of Cisco 3750, 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.
  • Implemented various Switch Port Security features as per the company’s policy
  • Configured RIP, and EIGRP on 2901 and 3925 Cisco routers.
  • Provided technical support for expansion of the existing network architecture to in corporate new users

Confidential

Network Support Engineer

Responsibilities:

  • Used TFTP server to backup Cisco configuration files.
  • Provided technical support for expansion of the existing network architecture to in corporate new users.
  • Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company
  • Configured STP for loop prevention on Cisco Catalyst Switches
  • Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.
  • Worked in setting up inter-Vlan routing, redistribution, access-lists and dynamic routing.
  • Involved in configuring and implementing of Composite Network models consists of Cisco 3750, 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.
  • Implemented various Switch Port Security features as per the company’s policy
  • Configured OSPF, and EIGRP on 2901 and 3925 Cisco routers.
  • Configured VLANS to isolate different departments
  • Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
  • Configured IPSEC VPN on SRX series firewalls
  • Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco ASR 9000, 9001, 9006, 6500 series Routers.
  • Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning and configuring VLANs/routing/NATing with the firewalls as per the design
  • Converting Cisco IOS to Cisco IOS XR configurations. Configuring BGP4, MPLS in Cisco IOS XR.
  • Design, installation and troubleshooting networks with hand-on experience with OSPF, BGP, VPLS, Multicast, VPN, MPLS, & Traffic engineering.
  • Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches
  • Worked with snipping tools like Ethereal (Wireshark) to analyze the network problems.
  • Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
  • Performed replacements of failed hardware and upgraded software
  • Performed scheduled Virus Checks & Updates on all Servers & Desktops.
  • Upgrade of Cisco ASA Firewall in Active/Standby mode with no down time.
  • Designed and built SOAP and RESTful Web service interfaces implemented in Java.
  • Configuring VPN both B2B and remote access SSL and centralized policy administration using FortiManager, building Fort iGATE High Availability using Fort iGATE Clustering Protocol (FGCP).
  • Implementing Routing and Switching using the following protocols; OSPF, BGP on Juniper M series routers.
  • Involved in Local Area Network (LAN) implementation, troubleshooting, and maintenance as per company’s requirements.

We'd love your feedback!