We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

3.00/5 (Submit Your Rating)

Bellevue, WA

PROFESSIONAL SUMMARY:

  • 8.1 years of strong IT experience in Network Security tasks such as day - to-day site monitoring and maintenance, infrastructure configuration, network design, network management, security, tier support of network, system installation, system backup and restoration, tuning, quality of service management, security implementation and application migration.
  • Performed various configurations using the CISCO SDM like configuring VPN, Security Audits, Firewalls, VLANS
  • Extensive knowledge and hands-on experience with the latest version 13.3 of JunOS-Space
  • Worked on Cisco ACE load balancers. Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Experience in DNS
  • Creating and managing Domain
  • Experience in Infoblox
  • Managing Infoblox 1050 appliances
  • Experience and Expertise on Cisco Iron ports - WSA S170 (Web Security Appliance) Version: 8.0.6-119, ESA C370 (Email Security Appliance ) Version: 8.5.6-074, and M670 - Content Security Management Appliance Version: 8.3.6-028
  • Hands on experience in troubleshooting and deploying of various IP Routing Protocols EIGRP, RIP v1/2, OSPF, IS-IS & BGP.
  • Knowledge and exposure to Avaya
  • Implemented security policies using ACL, Firewall, IPSec, and VPN
  • Exposure to Blue coat Proxy
  • Design and implementation of security products such as Cisco ISE
  • Implemented security policies using ACL, Firewall, IPSec, VPN, AAA Security TACACS+, and Radius on different series of routers.
  • Experience with convert PIX rules over to the Cisco ASA solution.
  • Responsible for Cisco ASA firewall administration across our global networks
  • Handled multi-Vendor / platform Security technologies including Firewall, IDS-IPS, VPN, Proxies
  • Extensive experience with Juniper SRX - Juniper SSL VPN
  • Extensive knowledge of deploying & troubleshooting TCP/IP, Implementing IPv6, Transition from IPv4 to IPv6, Multilayer Switching, Multicasting protocols, UDP, Fast Ethernet, Gigabit Ethernet, Voice/Data Integration techniques.
  • Scripting proficiency in MS Powershell, VSphere PowerCLI, Unix/Linux shell, bash
  • Strong knowledge of Cisco and Juniper software (IOS/XR and JunOS) and hardware
  • Ability to manage all phases of network installation and administration.
  • Well organized, Self-starter, Quick learner, Self-Motivated, Team player with analytical, technical and communication skills.

TECHNICAL EXPERTISE

Operating Systems: Windows (Server 2003/2008, Vista, Windows 7), Linux OS

Routers: Cisco GSR12016, ASR1001, 2900, 3900, 7200, 7600 & ASR9000

Switches: Cisco 3750, 4507, 4510 & 6500 series switches, Nexus 7010, 5548

Routing: MPLS, OSPF, EIGRP, BGP, RIP-2, PBR, IS-IS, Route Filtering, Redistribution, Summarization, Static Routing

Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.

Network security: Cisco (ASA, PIX) 5510, Palo Alto, juniper,ISE,ACS, ACL, IPSEC VPN, GRE VPN, NAT/PAT, Filtering, Load Balancing, IDS/IPS

Load Balancer: F5 Networks (Big-IP) LTM Module, Cisco ACE 30 load balancer

LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet.

WAN: Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN, Load Balancing. Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Network Management: SNMP,Splunk, Solar Winds, HP open view, and Wire shark

Reports and Network Diagrams: Microsoft (Visio pro.)

PROFESSIONAL EXPERIENCE:

Confidential, Bellevue, WA

Sr. Network Security Engineer

Responsibilities:

  • Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network
  • Configuration and Administration of Cisco and Juniper Routers and Switches
  • Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Configuration, Assigning DHCP profiles
  • Troubleshoot Websense software configuration and deployment issues
  • SME and Lead for ISE integration projects including migration from ACS to ISE.
  • Deploy and configure Radware Defense Pro devices for DDoS mitigation
  • Performing administrative tasks with Palo Alto Networks (Panorama) including Security, NAT policy definitions; application filtering; Regional based rules; URL filtering, Data filtering, file blocking, User based policies.
  • Installation and configuration of Cisco FIREPower 4110 and Cisco Advanced Malware Protection(AMP) engineering design
  • Vulnerability Assessment using Nessus and Provide analysis based on threat and vulnerability reports
  • Used Citrix Net Scaler 9.x, 10.x to set up load balancing, monitoring and website failover
  • Migration and implementation of Palo Alto Next-Generation Firewall seriesPA-500, PA-3060, PA-5060, PA-7050, PA-7080
  • Experience with deployment of Symantec DLP- Endpoint Prevent, Network Prevent for Email, and Network Prevent for Web, Network Discover, and ITA.
  • Symantec Vontu DLP upgrade 11.6.2 to version 14.5 Lotus notes environment
  • Experience with GAP Analysis, Traceability Matrices, SWOT Analysis, Risk Analysis, Data Analysis, Competitive Analysis, Impact Analysis, and Cost Benefit Analysis
  • Responsible the maintenance and configuration of Cisco Sourcefire and ASA
  • Install, configure, deploy, manage, monitor and analyze the ESXi and VMware vSphere environment tools and features.
  • Utilize NetScout, Solarwinds, and Cisco Prime network analysis and monitoring tools to identify network related issues.
  • Configured routing policies and service profiles for separate levels in an organizational hierarchy using a Cisco Prime Network Services Controller virtual machine. These policies and profiles were applied to Cisco Cloud Service Router 1000v (CSR 1000v) virtual routers.
  • Configured Wireless networks on WLC 5508 series Wireless LAN Controller and management using Cisco Prime Infrastructure.
  • Stacking of 3850 Switches.
  • Used Puppet as a compliance tool to configure and update server configurations.
  • Application logs on boarding, monitoring and dashboard creation using Splunk
  • Involved in migration of f5 to AVI load balancer
  • High Availability architecture and implementation for IWAN.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices and also configure 2k, 3k, 7k series Routers
  • Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.
  • Experience configuring VPC(Virtual Port Channel), VDC(Virtual Device Context) in Nexus 7010/7018
  • Experience with configuring FCOE using Cisco nexus 5548
  • Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network
  • Administer / Script Automation and Reports with the help of PowerShell and PowerCLI.
  • Configuration and Administration of Juniper Routers and Switches.
  • Extensive experience with Juniper: EX-2200,EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240
  • Monitored Sophos and GFI Vipre anti-virus software for security threats and cleaning infected systems
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer
  • Perform preliminary technology assessments, report generation, and statistical analysis for trend evaluation utilizing Tenable Security Center.
  • Network Device discovery using solarwinds.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new WAN links.
  • Hands-on experience administering enterprise-class endpoint security (Anti-Virus, Malware Prevention, HIPS, McAfeeDLP, Disk Encryption, etc.) solutions form Sophos and Trend Micro.
  • Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
  • Configure and troubleshoot Juniper EX series switches and routers.
  • Experience with implementing and maintaining Cisco works network monitoring systems.
  • Migrated to Juniper EX series switches from Cisco 3500 series and 6500 series switches
  • Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls
  • Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data environment
  • Worked with TCP/IP, DNS, WINS, DHCP, VPN, Terminal Services, Routing and Remote Access, Network Design, wiring and cabling.
  • Create TAC case and support technician.
  • Responsible for the deployment, implementation, and stability of Meraki infrastructure
  • Performed on staging of devices on Meraki dashboard before deployment
  • Network security including NAT/PAT, ACL, and ASA/SRX Firewalls.
  • Good knowledge with the technologies VPN, WLAN and Multicast.
  • Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
  • Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers
  • Firewall policy provisioning on Fortinet Fort iGATE appliances using FortiManager.
  • Managed 2 "Hub" 1500D firewalls that handled URL/App filtering for the entirety of our customer-base being rolled out with Fortinet firewalls and APs.
  • Switching tasks include VTP, ISL/ 802.1q, IP Sec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
  • Experience working in Cloud infrastructure with VMware ESXi Server platforms for application servers. Network Configuration for server apps and app migrations support.
  • Managed, supported and used an array of Cisco c370s IronPorts in conjunction with centralized configuration and message tracking to continually ensure SPAM and malicious emails/attachments were kept to the lowest levels possible
  • Configuration of Arista DCS7300, 7010, MX960s to replace end-of-life devices
  • Manage Arista core and distribution environment
  • Replace branch hardware with new 3900 routers and 2960 switches.
  • Implemented and troubleshooting the Virtual firewalls (Contexts) solutions in ASA

Confidential, OH

Network Security Engineer

Responsibilities:

  • Firewall migration from 8.1 to 9.X on 5540 and 5545
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA Security appliance
  • Upgrading code on Palo alto firewalls PA5050/3020 to meet company security policy
  • Configure and install Sophos Web Appliance SM2000 for security monitoring
  • Configure and install Sophos Email Appliance ES1000 for email spam/virus monitoring
  • Configure and installation Cisco prime infrastructure to deploy IWAN.
  • Migration and implementation of Palo Alto Next-Generation Firewall seriesPA-500, PA-3060, PA-5060, PA-7050, PA-7080.
  • Design & administer public wireless using Cisco 5500 WLC and Cisco Prime for network monitoring.
  • Experience with IWAN acceleration technologies, such as Cisco WAAS with UCS-E and SRE
  • Actively participate in researching cyber security vulnerabilities, exploits, and threat actor groups
  • Use Carbon Black (CB Defense), McAfee Nitro and Splunk Enterprise SIEM security tools to monitor environment
  • Consolidated multi-tiered environment into a pair of Nexus 7000 switches using VPC and VRF.
  • Involved in automated deployment process using Ansible. Used cloud for deployments.
  • Create MOP for CRQ
  • Worked with Cisco ASA 5585-X with firepower firewall rules, IPSEC VPN, NAT, Active-Standby Failover, EIGRP and Any Connect VPN technologies.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
  • Conducted workflow, process diagram and GAP analysis to derive requirements for existing systems enhancements
  • Experience in deploying several sets of Linux guest builds from VMware Templates and using PowerCLI to further customize the build.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x authentication for Wireless users. Upgraded the version of the ASA with Firepower services and applied the Patches including the Hotfix to the version
  • End-point Security and breach monitoring with Confer and Tenable Security Center.
  • Worked on Converting the Partner IPSEC VPN from one Data Center to Another Data Center
  • Working knowledge of frame relay, MPLS, OSPF, BGP and EIGRP routing protocols, NATing, sub-netting, DNS, WINS, LDAP, DHCP, HTTP, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RSTP & Multicasting protocols.
  • High availability architecture and implementation of IWAN.
  • Designed and developed rolling upgrade support for IWAN cloud PAAS layer
  • Worked as a team on migration from IP v4 to IP v6
  • Utilized application groups, SSL decryption, IPS, antivirus, anti-spyware, URL filtering, NAT, VPN, and the Reporting features of Palo Alto.
  • Involved in initiating new iWAN design for remote sites that will result in infrastructure costs reduction.
  • Successfully built a new, fully redundant and scalable global core backbone network interconnecting 4 point of presence (POP) with VPLS transport in support of IWAN solution.
  • Worked on network Automation using Python
  • Experience deploying BIG-IP F5 LTM, GTM Load Balancers for load balancing and traffic management of business application.
  • Maintained Fortigate firewalls and web filter
  • Installed and Configured the F5 BIG-IP LTM, configured virtual servers and associate them with pools for Internal web servers.
  • Provide Level 3 support for Aruba WLAN mobility controllers, Access Points and Aruba Instant Access Points.
  • Migrated, created, and managed pools and clusters in F5 BigIP GTM 3DNS load balancers across multiple Datacenters.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IP Sec/GRE to Get VPN.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports
  • Involved in configuring Juniper SSG-140 and Cisco ASA firewall
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
  • Configured Checkpoint with OSPF for Layer 3 routing.
  • Managed certificates using Comodo
  • Confidential &T AVPN/EVPN co-ordination for sites
  • Bluecoat proxy upgrade

Confidential, WA

Sr. Network Security Engineer

Responsibilities:

  • Firewall migration from 8.1 to 9.X on 5520, 5515, 5540 and 5545
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA Security appliance
  • Provisioning and Obsolete Windows and Linux servers by setting up and managing DNS and DHCP servers that assign and manage IP addresses from specified address pools using Infoblox.
  • Configured Protocol Handling, Object Grouping and NAT on ASA Firewalls.
  • ASA certificate installation and failover configuration.
  • Knowledge of IAVA scans and analyze results utilizing Tenable Security Center
  • Responsible for initial installation, configuration and troubleshooting of the Cyberoam and Sophos XG Firewall.
  • Identifying points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations.
  • Built and dash boarded Check Point UTMs - Firewall, Anti-Virus, Anti-Bot, IDS/IPS, Advanced Routing (OSPF), Identity Awareness, and Application Control.
  • Involve in deployment of new F5 LTM for Datacenter.
  • Implementation and troubleshooting F5 Load balancers.
  • Implementation, configuration & troubleshooting the issues related to Virtual Servers, pools, nodes & certificates on F5 Load Balancer.
  • Create MOP for change request
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
  • Implement changes on switches, routers, load balancers (F5 and CSS), wireless devices per engineers instructions and troubleshooting any related issues
  • Supported Infoblox appliances grid environment for DNS, DHCP and IP Address Management tools (IPv4), for the Kaiser Enterprise network.
  • Installed Arista core and distribution solution to replace current Cisco environment
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Experience with Network Automation using Python
  • Help customers build scalable, resilient, and high-performance applications and services on AWS
  • Troubleshoot traffic passing managed firewalls via logs and packet captures
  • Configured Firewall logging, DMZs and related security policies and monitoring.
  • Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewall 5505, 5515, 5520, 5540, 5545, 5585.
  • Interacted with the customers and on call support to troubleshoot the issues
  • Worked on network analyzing tools like TCP dump, Wireshark
  • Involved in Installing and Configuring a Cisco secure ACS server for AAA authentication (RADIUS/TACACS+).
  • Responsible for IDS/IPS
  • Performed various configurations using the CISCO SDM like configuring VPN, Security Audits, Firewalls, VLANS.
  • Basic configuration in InfoBlox
  • Experience with various switches (Cisco, HP, Blade and Arista) that are deployed in both Ultra low latency and Data center environment.
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Configuring rules and Maintaining Palo Alto Firewalls
  • Updating Palo Alto firewalls
  • Migrating the policy from Cisco ASA firewall into Palo Alto
  • Responsible for excellent customer management/resolution, problem solving and debugging skills with good verbal/written communications and presentation skills.
  • Responsible for ArcSight Logger on a daily basis

Confidential, Middletown, NJ

Sr. Network Security Engineer

Responsibilities:

  • Interacted with the customers and on call support to troubleshoot the issues
  • Worked on network analyzing tools like TCP dump, Wireshark
  • Involved in Implementation, administration: Design / Configuration changes, Defining events/signatures policies and its actions, Logging and Log analysis.
  • Responsible for maintaining and updating VPN Gateways for ensuring force of latest Security policy to deny all input requests from all non-compliant devices.
  • Responsible for IDS/IPS
  • Interpret and quantify vulnerability and exploit data to provide current threat posture based deployed assets and device configurations
  • Extensive implementation of firewall rules on checkpoint R77 GAIA on daily basis using SmartDashboard.
  • Automated network implementations and tasks and designed monitoring tools using python scripting
  • Experience with configuring FCOE using cisco nexus 5548
  • Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K,9k
  • Experience in working with Nexus 7010, 5548, 5020, 2148, 2248 devices.
  • Apply Cisco ISE configuration to switches
  • Worked on WAN connectivity between CISCO routers using T1, T3, Frame relay and troubleshooting connectivity issues.
  • Advanced proficiency with Cisco Wireless ( APs, Controllers, ISE, Prime)
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Experience with deployment of Palo Alto firewalls for different NAT, video conferencing traffic
  • Performing administrative tasks with Palo Alto Networks (Panorama) including Security, NAT policy
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5585 Security appliance
  • Everyday performance with the Cisco Iron ports - WSA S170 ( Web Security Appliance )Version: 8.0.6-119, ESA C370 (Email Security Appliance ) Version: 8.5.6-074, and M670 - Content Security Management Appliance Version: 8.3.6-028
  • Implementation and Configuration ( Profiles, I Rules) of F5 Big-IP LTM-6400 load balancers
  • Upgraded load balancers from Radware to F5 BigIP v9 which improved functionality and scalability in the enterprise.
  • Designed redundant architecture using Arista switches for a DR data center.
  • Installation and configuration of CISCO VPN concentrators 3000 for VPN tunnel and implementation of SDM for IPSec VPN.
  • Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
  • Experience working with Cisco Nexus2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture

Confidential, NYC, NY

Network Security Engineer

Responsibilities:

  • Involved in I rule management like loading rules, writing Irule syntax using TCL language
  • Responsible for Cisco ASA firewall administration across our global networks
  • Exposure with deployment of Palo Alto firewalls for different NAT, Skype traffic
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Coordinated precise scheduling for all migration events including all equipment and resources for the data center migration on an extremely accelerated schedule with for a high profile client.
  • Responsible for adding Policies to the SRX 3600
  • Involved in configuring and troubleshooting Juniper Firewalls including UTM features like anti-virus, deep inspection (IDP), URL filtering and screening.
  • Configuring Virtual Chassis for Juniper switches EX-4200,Firewalls SRX-210
  • Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series).
  • Responsible for NAT traffic flow in the Juniper SRX 3600 and support Juniper Space
  • Worked on ACE load balancers. Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification
  • Extensively worked on creating security Policies and implementation plans for an improved Security solution.

Confidential

Network Engineer

Responsibilities:

  • Implemented and Maintained Routing Protocols EIGRP and OSPF in the Network.
  • Data center migration was involved in Access, Distribution and Core layers
  • Experience with design and implementation of Data center migration
  • Spearheaded meetings & discussions with team members regarding network optimization and regarding BGP issues.
  • Was responsible for designing and implementation of customer’s network infrastructure.
  • Designed, Implemented and configured HSRP on different location of office on the switched Network and Managed the Entire multilayer switched network.
  • Experience with Checkpoint Firewall policy provisioning.
  • Familiarity with F5 Big IP LTM and Cisco ACE 4710 Load balancers.
  • Designed perimeter security policy; Implemented Firewall ACL’s; Allowed access to specified services; Enabled IDS/IPS signatures in Firewall & fine-tuned TCP & UDP.
  • Involved in Installing and Configuring a Cisco secure ACS server for AAA authentication (RADIUS/TACACS+).
  • Configured Cisco 7204 routers which were also connected to Cisco ASA Firewall (5505) security appliances providing perimeter based firewall security.
  • Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewall 5505.
  • Configured Protocol Handling, Object Grouping and NAT on ASA Firewalls (5505).

Confidential

Network Engineer

Responsibilities:

  • Coordinated with higher-level support and external vendors for resolution.
  • Installed and configured Netflow Analyzer and Radius server
  • Monitored Network Management System and responded to events, alarms and trouble tickets.
  • Coordinated and managed events and trouble tickets related to network failures and thus followed by technical support which included problem determination, customer notification and updates with regard to escalation(s).
  • Migrated from Frame-Relay/ATM network to MPLS-based VPN for customer’s WAN infrastructure.
  • Configured Nortel LAN 5530 and Nortel Chassis 8606/8610 Switches.
  • Troubleshooting latency and throughput issues on MLPS and Dedicated Internet Access circuits.
  • Involved in installation of 3845 series Routers Confidential branch office edge and 7604 series router Confidential the Zonal office
  • Troubleshoot TCP/IP problems; troubleshoot connectivity issues in multi-protocol Ethernet, Environment.
  • Involved in migration from Frame-Relay/ATM network to MPLS-based VPN for customer’s WAN infrastructure.
  • Troubleshoot latency and throughput issues on MPLS and Dedicated Internet Access circuits.

We'd love your feedback!