Information Security Engineer Resume
Plano, TexaS
PROFESSIONAL SUMMARY:
- Network Security Engineer with 7 years’ experience with expertise in managing networking protocols; deploying, administering and migrating firewalls, also troubleshooting and supporting enterprise level networks and Data Centers.
- Responsible for Palo Alto, Check Point and Cisco ASA firewall administration across global locations.
- Experience on Palo Alto NG Firewall configurations including URL filtering, Threat prevention, Data filtering and Zone Protection.
- Sound knowledge on Panorama, Wildfire and its integration with Palo Alto Firewalls.
- Expert in configuring Security policies using App ID, Security profiles and URL category.
- Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating VIPs, Pools& health checks.
- Deployed and managed BlueCoat Proxy SG800 as forward proxy well acquainted with functioning of reverse proxy ProxySG
- Expert level knowledge of troubleshooting, implementing, optimizing and testing routing protocols such as BGP,MP - BGP EIGRP, OSPF, and their redistribution over the networks.
- In-depth knowledge and experience in LAN and WAN technologies including MPLS, SD-WAN, DIA, Point to Point (Dark Fiber).
- Expertise in Configuration, optimization and troubleshooting of Content Delivery Network (CDN) for web caching and SSL services.
- Expertise in Redistribution, Route Filtering, Summarization, Supernetting without overlaps, PBR.
- Working experience in managing and troubleshooting the core, distribution and access switches. Also part of migrations from Cisco Catalyst to Nexus switches at access layer in complex data center environments.
- Substantial working experience on Virtual Port Channels (vPC), bonding server NICs and Virtual Device Contexts (VDC) in Nexus 7000 series switches.
- Experienced with Aruba Wireless platform (Aruba ClearPass and Aruba AirWave), Aruba Mobility controllers providing centralized internet management and also intra network access .
- Expertise knowledge on SIEM tools like Splunk, QRadar to get real-time analysis of security alerts generated by network hardware and applications. Well Acquainted with Splunk queries by Splunk Search Processing Language (SPL) and Regular expressions.
- Performed real-time proactive Security monitoring and reporting on various Security enforcement systems, such as IBM QRadar (SIEM), McAfee , Internet content filtering/reporting, malware code prevention HPE Fortify, Firewalls, IDS& IPS, Web Security, Anti-spam and FireEye.
- Experienced in configuring and deploying RADIUS, TACACS+ as part of AAA Architecture under multiple scenarios.
- Hands on experience in deploying IPSEC Tunnels, SSL-VPN, Site-Site VPN and DMVPN.
- Proficient in implementation of filters using Standard and Extended access-lists, Time-based access-lists, Route Maps.
- Extensive knowledge on vulnerability management tools like Tenable-nessus.
- Expert level troubleshooting methodologies to isolate and identify configuration, design, and software anomalies.
- Good knowledge on WPA/WPA2 - Enterprise and its RADIUS server, along with other 802.1x protocols for authentication.
- Knowledge on different kinds of encryption and its terminology- RSA,DES and AES.
- Expert knowledge in ensuring high availability (HA) of servers using Load balancers like BIG-IP, Cisco CSS
- Experienced working in Data Centers along with different teams that deal with Storage and LAN.
- Expert level knowledge of operations like installation, maintenance of racks, stacks, and cables in Data Centers.
- Experience in SolarWinds Network Performance Monitor, Network Configuration Manager, Network Traffic Analyzer (Netflow) and IP Address Manager.
- Expertise in managing network using SNMP and other tools such as Wireshark, Tcpdump and Service Now .
- Documentation and Project Management along with drawing network diagrams using MSVISIO.
TECHNICAL SKILLS:
Firewalls: Palo Alto Networks, Cisco ASA 55XX series firewalls, Checkpoint R76, R77, Panorama M- 100.
Load Balancers: F5 Networks (Big-IP), Cisco ACE.
Routers: Cisco 7600, 7200, 3800, 3600, 2900, 2800, 2600, ASR 7K, ASR 12K.
Switches: Nexus 2K/5K/7K, Cisco Catalyst 6500, 4500, 3850,3560, 3750, 2960.
Communication Protocols: TCP/IP, UDP, DHCP, DNS, ICMP, SNMP, ARP, RARP, PPP, HDLC, ISDN, SDN, and SD-WAN.
Routing Protocols: OSPF, EIGRP, BGP, MPLS PBR, Route Filtering, Redistribution, Summarization and Static Routing.
Switching Protocols: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels, Transparent Bridging.
LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, VLANs, VTP, STP, RSTP, 802.1W.
Wireless Technologies: Airwatch & WLC’s (8510, 5508, 5706), Cisco AironetAP’s (2600, 3600, 3700), Aruba 225, Aruba 3000 controller & Airwave.
Network Management and Packet Analyzers: SolarWinds, Wireshark, SNMP, Scapy and Tcpdump.
Operating systems: Windows XP/ 7/ 8/10, Windows Server 2003/ 2008, Mac OS and Linux.
Applications: MS (Office, Word, Outlook, Excel, PowerPoint, Visio), VMware, and Illustrator.
PROFESSIONAL RESPONSIBILITIES:
Confidential, Plano, Texas
Information Security Engineer
Responsibilities:
- Managing IT Security & Disaster recovery Management Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol based services.
- Experience working with Palo Alto's Panorama appliance managing multiple firewalls simultaneously.
- Experience with Virtualization using Multi-VSYS on Palo Alto, Multiple Context on ASA and configured static routes on virtual routers.
- Migrating Cisco ASA 5500 firewalls to Palo Alto 5060 firewalls using PAN migration tool and expedition
- Replacing Palo Alto 5060 firewalls with 5250 firewalls on the production environment.
- Creating Application specific rules set for the traffic by customizing objects, security profiles(antimalware), service groups, dynamic block lists.
- Create new zones for segmenting the DMZ from internal network and enforcing stringent security profiles to reduce the threat landscape.
- Configure APP-ID feature in Palo Alto firewalls to reduce attack surface, regain visibility and control over traffic and create custom URL-filtering profiles and use them in writing Security policy rules that allow web access to users.
- Expertise in configuring User ID both Agent based and Agentless for multiple users by using LDAP servers for authentication.
- Create Portal, configure Gateways and install the Global Protect Agent on client devices and configure two-factor authentication on those to provide VPN connections for Global Protect.
- Configured High Availability links (Active/Passive) between Firewalls to prevent a single point of failure on the network.
- Configure Log Forwarding to forward logs from the firewall to Panorama M-500 and then configured Panorama to send logs to the servers.
- Integrating the Palo Alto firewalls with Wildfire cloud inspection engine to protect against zero-day, APT and Malware threats.
- Managing location specific Cisco ASA Firewalls and also data center internet gateway firewalls.
- Performed Network address translation on Cisco ASA 8.2, 8.3 and 9.1 versions.
- Firewall policy administration and support on PIX Firewalls as well as Cisco ASA Firewalls.
- Handling new application load balancing requirements through F5 LTM devices.
- Involved in configuring and implementing of composite Network models consists of Cisco ASR 1K, 7600, 7200, 3800 series routers and Cisco 2950, 3500, 5000, 6500 Series switches.
- Designing and implementing LAN/WAN solutions across locations.
- Configured OSPF redistribution and authentication with type 3 LSA filtering to prevent LSA flooding.
- Configured OSPF over frame relay networks for NBMA and point to multipoint strategies.
- Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
- Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path.
- Configured NAT and SNAT in F5 12.0 LTM. Managed virtual servers in F5 12.0 LTM.
- Upgrading and deployment of Nexus 7k, 5k and 2k
- Configured VPC, FEX and VDC’s on Nexus 5K, 7K.
- Created ACI EPGs (End Point Groups) contract policies, VRFs and bridge domains for tenants
- Experience with Cisco ASR’s, Catalyst 6500 series switches, 2800 series, and 3800 series. 2900 series and 3900 series routers.
- Coordinating with service providers like AT&T, Verizon etc. for all network outages /restoration/new implementations.
- Integrating new locations with existing MPLS Network and enabling standard corporate application access.
- Implementation of Site to Site VPN s with direct vendors and customers.
- Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
- Deployed a Cisco Identity Services Engine (ISE) solution (wired, wireless, and VPN users) for a commercial client with converged access switches and Cisco ASA firewalls.
- Responsible for Cisco ASA firewall administration across our global networks.
- Performed Network address translation on Cisco ASA 8.2,8.3 and 9.1 versions.
- Worked on Windows layered products including MS Exchange, DNS and Active Directory.
- Used Infoblox for documentation and tools updates.
- Configuration and maintain Active Directory, DNS, DHCP and Domain Controllers.
- Attending weekly CAB meetings and ensuring all changes were going through the change process.
- Capacity planning and providing recommendations for infra upgrades
- Infrastructure upgrades and new Infra deployments.
- Responsible for all aspects of TCP/IP functionality across multiple Enterprise environments.
- Performed OSPF, BGP, DHCP profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
- Configure and deployed BIG-IP LTM 6900 for providing application redundancy and load balancing.
- Used DHCP to automatically assign reusable IP addresses to DHCP clients.
Confidential, San Francisco, CA
Network Security Engineer
Responsibilities:
- Performed migrations from Check Point firewalls to Palo Alto using the PAN Migration Tool .
- Integrated wildfire to identify zero-day exploits.
- Migrated PA-4020 Firewalls to PA-5250 Firewalls.
- Enforced policy checks on north-south and east-west data center traffic.
- Assisted in VPN configuration, NAT policies, failovers, maintaining and analysis of firewall logs.
- Implemented Global-Protect VPN for mobile workforce replacing traditional Remote access VPNs.
- Configured and replaced legacy IPSec VPN for Site-To-Site network connectivity.
- Worked on DNS Sinkhole in Anti-Spyware profile of Palo Alto Firewall to identify infected hosts on network.
- Configured Panorama to send logs received from the firewalls to log servers.
- Configured SSL-Forward Proxy and SSL-Inbound inspection on Palo Alto Firewalls
- Performed firewall policy optimization using third party tools like Tufin to ensure policy auditing across our environment.
- Configured HA in Active-Passive and Active-Active mode on Palo Alto Network Firewall.
- Configured Panorama to send logs received from the firewalls to log servers.
- Installed, configured and maintained Splunk universal forwarders and indexers on various platforms.
- Deployed IBM QRadar as logging tool for an enterprise to manage its network and analyzing,collecting the events. Used QFlow processors for performing deep packet inspection of Layer 7 application traffic .
- Implemented and managed SIEM - IBM Qradar suite of products, QRadar SIEM, Qradar Vulnerability Manager (QVM), Qradar Risk Manager (QRM), Qradar Incident Forensic (QIF) , Splunk.
- Expertise in design / architecture of QRadar suite of products which includes SIEM, QRadar Vulnerabilities Manager (QVM), QRadar Risk Manager (QRM).
- Integrated other security products to QRadar SIEM through various communication protocols, event correlation for vulnerability detection and flow (JFlow, Netflow) analysis.
- Performed real-time proactive Security monitoring and reporting on various Security enforcement systems, such as IBM QRadar (SIEM), McAfee, Internet content filtering/reporting, malware code prevention HPE Fortify, Firewalls, IDS& IPS, Web Security, Anti-spam and FireEye .
- Configured Universal forwarders from CLI and configuration files like inputs.conf, outputs.conf, server.conf, deploymentclient.conf.
- Created Reports, Pivots, alerts, advance Splunk search and Visualization in Splunk enterprise.
- Experienced in configuring and managing F5 Load Balancers to provide reliable distribution of traffic across some servers by creating pools, nodes, and health checks.
- Dealt with WAN based support technologies like MPLS Circuits, BGP , OSPF and DMVPN
- Responsible for resolving support tickets, configuring network equipment and efficiency of the network.
- Mitigating STP attacks by enabling Root Guards , BPDU Guard, PortFast and BPDU filters as required.
- Worked with multi-vendor managed and un-managed switches.
- Involved in troubleshooting of HSRP , VRRP configuration and Virtual Port channel management in Nexus switches.
- Had experience in optimizing firewall rules using Tufin, firewall audit reports.
- Created network diagrams and documentation for design using MS VISIO.
- Troubleshooted CDN servers network performance related issues using different tools such as web analyzer, TCP dump, cache headers.
- Maintained CDN architecture and provided cloud-based security from DDos attacks to it.
Confidential
Network Engineer
Responsibilities:
- Established, managed, and optimized network uptime and provided end-user support for users.
- Worked closely with the security team on the deployment and troubleshooting of Cisco ASA firewall to apply policies.
- Establishing VPN Tunnels using IPsec encryption standards and configuring site-to-site VPN, Remote VPN.
- Administration and configuration of Cisco Firewalls as well as NAT’s.
- Troubleshooting connectivity, routing and configuration issues with routers, switches, Cisco firewalls and complex network issues.
- Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA Firewalls.
- Involved in Installing and Configuring a Cisco secure ACS server for AAA authentication.
- Provide Tier III Level Load Balancer expertise on F5 Big IP Local Traffic Managers (LTM).
- Conducted security audits of perimeter routers to identify missing ACL’s.
- Worked on BGP configuration for providing redundant internet connectivity using BGP attributes, route maps and prefix-lists.
- Configured whole routing access to the local network infrastructure by implementing OSPF as the major routing protocol.
- Configured VLAN trunking 802.1q and VLAN routing on Cisco 5500 catalyst switches.
- Worked with Link aggregation protocols (LACP/PAGP).
- Established, managed, and optimized network uptime and supplied end-user assistance for users.
- Used MD5 authentication for VTP, disabling all unused ports, keeping them in unused VLAN and ensuring DHCP attack prevention wherever required.
- Establishing VPN Tunnels using IPsec encryption standards and configuring site-to-site VPN, Remote VPN.
- Worked on service request tickets such as troubleshooting, maintenance upgrades, patches and solutions with all round technical support.
- Involved in the installation and administration of IP telephony and VoIP communications using Cisco's CUCM and Unity platform.
Confidential
Jr. Network Engineer
Responsibilities:
- Configured Routing Protocols like EIGRP, and OSPF.
- Implemented the concept of Route Redistribution between different routing protocols.
- Responsible for day-to-day management of Cisco Devices, Traffic management and monitoring.
- Set up and troubleshoot secured wireless access points for broadband Internet.
- Configured & maintained LAN, WAN, VPN, and WLAN on Cisco Routers.
- Configured network access servers and routers for AAA Security (TACACS+).
- Managing and configuring of Wide Area Networking Protocols like HDLC, PPP.
- Configuring Routing Protocols like EIGRP, BGP, and OSPF
- Dealt with NAT configuration and its troubleshooting issues related to access lists and DNS/DHCP issues within the LAN network.
- Performed troubleshooting in TCP/IP related problems and connectivity issues.
- Configured STP for loop prevention.
- Worked on optimization of the network performance by troubleshooting network issues and outages by participating with the network architects.
- Used Wireshark to analyze and Nmap to monitor and troubleshoot networks.
- Involved in configuration and management of different Layer 2 switching tasks, which includes address learning, efficient switching etc.