Sr. Network Engineer Resume
Irwindale, CA
SUMMARY
- CCNA, CCNP Certified professional with 8 years of experience with networking installations, Configurations testing, troubleshooting, implementing, optimizing, maintaining enterprise data network and service provider systems.
- Worked on Confidential Nexus 9000 family of switches whose hardware is based on Confidential .
- Experience with working on latest Confidential switches like Nexus 2000, 5000, 6000 and 7000 series switches while implementing advanced features like VDC, VPC, OTV and Fabric Path.
- Well versed in Confidential technology, starting from Fabric discovery to end datacentre deployment.
- Designed, configured and integrated 9504 and 9372 switches into data centre environment and Implemented OTV in multicast environment.
- Configured Access policies, static bindings, EPG's, Bridge Domain and VRF.
- Worked on connections handoff using Bridged Interface to an External Route. L3 - EPG configurations, AEP configurations and Expert in GUI of Confidential .
- Trained new employees on how to bring up the Confidential fabric and Basic configurations of Tenants/BDs/EPGs Networking and OOB Management configurations of Leaf/Spine Switches.
- Configured the tenets, VRF's and EPGs in Confidential APIC cluster.
- Hands on experience in configuring Confidential Nexus 2232, 2248, 5548, 6001 and 7018(Sup 2E) and worked on nexus protocols VPC, VRF, VDC and FEX Links.
- Worked on troubleshooting port issues regarding QSFP, CRC errors, Cable replacements in Production environment.
- Provide technical support on Nexus 2000/9000 switches and operating systems (NX-OS) create vPC domain, design single sided vPC, design double sided vPC, design vPC peer-keepalive, vPC peer-link, vPC member ports.
- Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010.
- Deployed the Nexus 9000 Application Virtual switch to support network telemetry applications and 9000 Core with VPC and 3172 TOR.
- Configured Confidential integration with VMware and Worked on integrating existing Layer 2 and Layer-3 networks with Confidential .
- Configure EPG, update APIC, implement access and fabric policies in Confidential environment.
- Worked on Bridge Domains, VXLANs, VTEPS, VNID. Configuration of routing using BGP among multiple Leaf to spine switches. Thorough understanding of Application Profile, Tenants, End Point Group, Inter Subnet Tenant Routing, Routing within Tenants, Router Peering and Redistribution.
- Worked on Migration project from traditional Data Centre Architecture to Spine Leaf.
- Hands on Experience in configuring and troubleshooting Confidential routers, WIFI wireless Controller, Confidential catalyst, Nexus switches, Citrix net scalar, ASA, Palo Alto Next generation and Firepower Threat Défense FTD Next generation Confidential Firewalls.
- Manage and monitor multiple commercial-sourcing agreements such as Master Service agreement (MSA), Statement of work (SOW) and 120+ service level agreements (SLA).
- Installation of Windows 2003 enterprise and standard editions, R2, Windows 2000 standard and advanced server editions.
- Experienced in DHCP, DNS, NIS, SMTP, IMAP, ODBC, FTP, TCP/IP, LAN, WAN, LADP, security management and system troubleshooting skills.
- Proficiently implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, Route Maps and route manipulation using Offset-list.
- Access control server configuration for RADIUS and TACACS+.
- Experience with Network security, Routing and Switching,
- Experienced in python and ansible script to automate to configure the network devices for last two projects infrastructure-as-code, and
- Experienced in Design of network Security using Palo alto and ASA Firewall for Data centre from past 5 years
- Experience in implementing network security using NAT, PAT, ACL, IDS, IPS and ASA firewalls.
- Developed Merge jobs in GitLab for Ansible script to automate and find the delta between Production and Test devices
- Experience with Firewall migrations from Confidential ASA to Confidential Firepower.
- Experience on working with Wireless enterprise ( Confidential & Aruba)
- Configured VPC and Fabric Extender on Nexus Switches.
- Extensive knowledge on configuring and troubleshooting STP, PVST, RSTP, MSTP, VLAN, Inter-VLAN routing, Trunking (802.1q & ISL), Port channels (LACP & PAgP).
- Experienced in working on network monitoring tools like SolarWinds, Nagios, NetFlow, Sniffing tools like Wireshark and tcpdump.
- Created different application policies in the Confidential including Tenants, Application Network Profile (ANP), End Point Group (EPG), Contracts, Filters & Labels.
- Worked in for the NextGen Datacentre Cloud Architecture, using Confidential and Nexus 9K.
- Configured Confidential Policies, Tenants, Bridge Domain, Private Networks, Contracts and Filters.
- Integrated of layer 4 - 7 services (ASA) with Confidential .
- Upgrade IOS and configure routers and switches according to documentation.
- Deployed Confidential Greenfield and Migrated from Legacy network.
- Supporting and Troubleshooting Confidential Micro-segmentation and Worked with Confidential & Kubernetes/Docker integration.
- Provided AWS Hybrid solution to our client.
- Fabric Access Policy include to create switch policies, interface policies, AEPs, Physical and External Domains.
- Expert in performing deep packet analysis to troubleshoot network and application issues using Wireshark.
- Experience with design and implementation of Data centre migration and Confidential .
- Strong understanding of current and future technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, ACL, VPN, Wireless LAN and configuration of VLANs.
- Strong communicator: able to interact effectively and positively with individuals of all technical abilities; An Out-of-the-Box Thinker, believe in Team Work & Team Spirit, Decision Maker, Proactive, Customer Focused & Good Documentation / Presentation Skills.
PROFESSIONAL EXPERIENCE
Confidential, Irwindale, CA
Sr. Network Engineer
Responsibilities:
- A Senior Network engineer responsible for managing the Network operations and support during technology implementation and their day-to-day activities
- Involved in Designing and configuring Distributed Confidential ISE Deployment (12 Nodes).
- Tier 4 Network Engineer, Responsible for Re-architecture and Implementing Confidential Next Generation Firewalls across the Network.
- Participate in IT infrastructure Planning & designing network projects, involved in network designing, Technical proposal write up and documentation for data centre migration.
- Created a wide range of technical documentation (HLD, LLD, Transitions phases, migration test plans, Migration Checklists, Risks and Impact analysis, LAN standards).
- Developed Data centre Migration Runbook (Migration Approach, Pre-Cutover Activities, Cutover day Activities, Post cutover Activities, Communication Plan, Monitoring plan, Rollback plan)
- Implementing and troubleshooting firewall rules in Confidential ASA 5510, 5585
- Responsible for Confidential ASA firewalls configuration and administration across global networks for providing IPS/IDS.
- Experience installing and administering firewall and IDS/IPS systems in enterprise networks including in Data centre
- Implementing security Solutions using Palo Alto Pa-5000/3000, Confidential ASA
- Installed and upgraded antivirus, applied security patches as per policy and monitored network security compliance.
- Provide Health Check support for End Customers with Confidential WSA Appliances.
- Services expert responsible for effectively communicating, educating, and positioning Infoblox service programs within the partner community and customer base.
- Creating automated scripts using Python language, which will parse all trace files and calculate throughput, latency and drop rate
- Create new and support existing automation Python code for internal applications
- Installation, Configuring and maintenance of Confidential Layer 3 switches 2960-X,2960-XR 2960C, 3750, 3850, 4500-X, 4507,4509, 6506, 6509, 4510, Nexus 7K/5K/2K/3K switches, ASR4431, ISR1009, 2600, 2900, VG 224 Routers, ASA 5585 firewall, Citrix NetScaler, Brocade, and Dell devices
- Expertise in the administration, support and operation of the Orion Solar Winds platform including Network Performance Monitoring (NPM), NetScout, Network Configuration Manager, Server & Application Monitor (SAM), NetFlow, Traffic analyser and IP address Manager.
- Implemented Confidential ISE for delivering consistent, highly secure access control across wired and wireless multivendor networks and remote VPN connections.
- PCI Compliance auditing with Confidential /Aruba Wireless Security Assessments & also Wireless Site Surveys
- Performed IOS and NXOS Upgrades on Confidential router and switches as per company standards.
- Decommissioned of EOL/EOS devices in Data Centre, which involved working with Partner Companies.
- Setup the DMZ, Internal and External VLANs, Trunking and IP addressing on the leaf switches
- Enabled PIM-SM in the transport network and EIGRP in the control plane for optimal routing of traffic and equal-cost multipathing (ECMP) in the fabric between the leaf and spine switches
- Integrated Tufin products into complex security environments with all Confidential Firewalls, SIEM (IDS/IPS), switches, routers and other security tools
- Palo Alto integration with VMware Virtual Desktop infrastructure.
- Configuration of Palo alto series firewalls and implementation for outbound traffic via blue coat proxy server.
- Configuration of Azure API gateway service.
- Worked with level-2 team on migration project of CMA's from one Provider-1 to other Provider-1.
- Worked on changing global objects and global rules to local objects and local rules for migration project.
Confidential
Network Engineer
Responsibilities:
- Used Confidential Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data centre environment.
- Used Confidential Fabric which is based on Confidential Nexus 9000 Series Switches and the Confidential Application Virtual Switch (AVS)
- Implemented Confidential infrastructure for supporting rapid application change by reducing complexity with a common policy framework that can automate provisioning and resource management.
- Deployed Confidential UCS, Confidential Datacentre switches like N9K, N5K, Confidential FI switch 6200 and Confidential 3850 switches, etc.
- Experience in Confidential Integrating Layer 2, Layer 3, L4-L7 and VMware with Confidential
- Design & Implemented (Application Centric Infrastructure) Confidential Fabric based on Nexus 9500 & 9300 platforms in a lab environment for POC.
- Understanding of Confidential Application Centric Infrastructure) and other SDN technologies
- Developing transition mechanisms to deploy SDN within traditional IP networks
- Working on tickets for International Circuit and Sites related Issues, making contact with International Providers like SITA, OSPF, DCNM (Ver 9,10,11), VX LAN
- Managed Confidential Nexus 5k and 9300/9500 switches for the data centre in Confidential Data Centre Network Manager (DCNM) and timely upgrades of Confidential IOS XR, Nexus OS.
- Experience working with hardware and software in a large, complex storage environment, including configuration of new environments ( Confidential DCNM)
- Designed 10 gigabit networks using Confidential Nexus 7000 series switches,
- Performed OS upgrades &device replacements on several Confidential devices (6500, Nexus 2K, 3K, 5k,6k and 7k and 9k series switches).
- Involved in Designing and configuring Distributed Confidential ISE Deployment (12 Nodes).
- Implemented VxLAN on OpenStack to data centre network
- Worked on redesigning the network drawings to provide detailed information about the logical and physical connectivity of newly built Data Centre with extensive use of Confidential DCNM
- Supported Confidential fabric networks, including python automation.
Environment: In Corporate office architecture with highly reliable & secured network including Confidential Infra, Confidential ASA, Routing Protocols (EIGRP, RIP, OSPF, BGP), 9K, 7K, 3550, 3560, 2924, 1400, 6513, 6504, 6503, 6506, 6500 series Routers & Catalyst switches, Switching protocols (VTP, STP, GLBP), Confidential WSA Citrix NetScaler, Nexus 7K/5k/2K, Multicasting, Bluecoat Proxy, VPN, Data Centre Migration, VMware.
Confidential, Costa Mesa, CA
Network Engineer
Responsibilities:
- Worked to help clean up legacy FW policies and create migration path from current ASA to next gen Palo Alto firewall.
- Responsible for design, Implementation and Maintenance of datacentre on Confidential ISR 4300, Confidential 3560.
- Migrated legacy Catalyst 6509 distribution switches to Nexus 7700 c7718.
- Responsible for configuring, maintenance and troubleshooting of Confidential 3650, 4948.
- Installed new software releases, system upgrades. Evaluated and installed patches resolved software related problems. Performed system backups and recovery.
- Duties included monitoring network performance using various network tools to ensure the availability, integrity and confidentiality of application and equipment.
- Planned migration of servers from traditional Nexus environment to Application Centric Infrastructure ( Confidential ).
- Worked on migration of HP Blade chassis to Confidential .
- In the spine, joined the Multi-Pod fabric and all the policies configured on the APIC controller are pushed to that device.
- Upgraded HP Procurve switches to Confidential 3650's which support ISE.
- Created Interface profile and Interface policy groups on Confidential .
- Configured Access policies, static bindings, EPG's, Bridge Domain and VRF.
- Worked on remote site switch replacement project where I replaced HP Switch to Confidential 3650 along with Access points.
- Audited all the VLAN's and found servers to migrate them to Confidential .
- Migration of core routers from legacy to Nexus 9508.
- Design Next generation data centres with Nexus, Confidential, OpenStack, DCI, EPGs/bridge domains, OTV, and VXLAN.
- Configured VPC and Fabric Extender on Nexus Switches.
- Worked on Nexus platform 7010, 5K series and FEX (2248, and 2232) and deployed VPC, VDC and OTV, Fabric Path and successfully implemented VSS on the Confidential catalyst switches (6500, 6509,6800).
- Providing Layer-3 redundancy by implementing HSRP in the network.
Confidential, Oroville, CA
Network Security Engineer
Responsibilities:
- Responsible for installation, troubleshooting of firewalls ( Confidential firewalls) and related software, and LAN/WAN protocols.
- Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
- Installed and configured Confidential IronPort ESA and WSA appliances. Installed and administered ACS servers (3.x, 4.x. 5.x) to provide AAA services for VPN, wireless, device administration. Plan and Migrate ACS from 4.0 to 5.x appliance.
- Create new and support existing Python code for internal applications
- Install network backbone, wireless controllers and wireless access points ( Confidential, Aruba, Ruckus)
- Building configurations for Confidential routers with features like port security, VLANS, VTP, PVST+.
- Maintained Aruba Network, in two different data centres, for over 1500 remote home users (VPN)
- Selected as the one person hired from the contractor to maintain the wireless network
- Reengineered the LAN to provide more reliable services and to reduce the latency, analysed the NT domain in the Austin office to determine all the problems
- Drive the project for implementing WAN solutions at the DaVita Global solutions headquarters giving highest redundancy and increased efficiency with 2 ISP links and 2 MPLS circuits saving $20,000 per year cost baseline.
- Installed and provisioned close to 2000 AP's and RAP's.
- Upgraded HP Procurve switches to Confidential 3650's which support ISE.
- Configured Guest Access using ISE. Created security Profiles based on the company's requirement
- Worked extensively in Configuring, Monitoring and Troubleshooting Checkpoint, Confidential ’s ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/Natting with the firewalls as per the design.
- Access Control Server configuration for RADIUS & TACACS+.
- Utilizing Aruba's built in analytical, management and security features to troubleshoot wireless issues.
- Worked on Palo Alto PA-3000 Series to manage network traffic flows using dedicated processing and memory for networking, security, threat prevention and management
- Created subnets (on these switches) from the given Class B and Class C addresses to support the VLANs.
- Responsible for developing and deploying Solar Winds which includes WAN/LAN and server monitoring, reporting, and alerting and Configure Orion alerts.
- Installed and upgraded antivirus, applied security patches as per policy and monitored network security compliance.
- Used the Wireshark and other traffic analysers to troubleshoot network issues.
Environment: Series T1 Controllers, DS3 Lines (T3 Lines), Palo Alto (PA-4000/PA-2000) Fiber and Ethernet cabling, Confidential ESA, Nexus 7010, 5020, McAfee Web Gateway, Security Analytics, Citrix NetScaler. Confidential 4500, 6500 VSS, Nexus vDC, vPC