We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

4.00/5 (Submit Your Rating)

Cumberland, RI

PROFESSIONAL SUMMARY:

  • 8 years of experience in Networking, Security, Administration, AWS cloud services and Network support.
  • Extensive work experience on Cisco Routers, Cisco Switches, Load Balancers & Cisco Firewalls
  • Expertise in deployment and configuration of routing protocols such as OSPF, EIGRP and BGP.
  • Configuration and implementation of F5 BIG - IP load balancer.
  • Experience on F5 LTMs & GTMs to improve web application delivery speed and replication through and between distributed global data centers.
  • Worked on F5 LTM series like 1600, 6400 and Viprions for the corporate applications and their availability.
  • Worked on F5 Enterprise Manager 3.1 version to manage multiple F5 LTM devices from single-pane view.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX series security appliance. worked on Panorama firewall management tool which provides centralized monitoring and management of multiple Palo Alto devices from single window.
  • Knowledge on Amazon AWS Virtual private cloud services.
  • Worked on Amazon AWS and Microsoft Azure could network services.
  • Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway with other vendor security appliances devices.
  • Knowledge & Experience on FortiGate Firewall Appliances.
  • Experience configuring and deploying McAfee modules and products like McAfee ePO, McAfee VSE, McAfee HIPS, McAfee Endpoint Encryption, McAfee Network DLP, McAfee DLP Endpoint, McAfee SIEM.
  • Experience in Networking Area especially TCP/IP, Routing, Switching.
  • In depth knowledge with network monitoring and performance tools such as Solar Winds and Wireshark.
  • Worked and Strong Knowledge on Riverbed Wan Accelerator.
  • Strong hands on experience implementing and troubleshooting Switch technologies such as STP, RSTP, MSTP and VTP along with troubleshooting of inter-VLAN routing.
  • Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology.
  • Hands on Experience configuring and testing F5 rules using Browser (IE), HTTP watch.
  • Knowledge in working with F5 Load Balancers and their implementation in various networks.
  • Knowledge of network security protocols such as IPSEC tunnels, GRE tunnels, NAT/ PAT, ACLs and VPN - MP-BGP.
  • Support and Manage VMware 5.0 infrastructure, installation and configuration of vCenter Server.
  • Manage over 2200 VM's in VMware vSphere & OVM infrastructure.
  • Experience in working with Cisco 2500, 2600, 2800, 3600, 3800, 7200 series Routers.
  • Strong hands on experience on configuring Cisco Catalyst 2900,2960, 3560, 3750, 4500, 4900, 6500 series and Nexus 7K, 5K, 2K, 9K switches. working knowledge of routing protocols for voice: VoIP, IPSEC, Multicast, MPLS, DSCP/QoS, Cisco IOS and Wireless security protocols (I.E. 802.1x, EAP, WPA2).
  • Configuration, managing and implementation the Linux/Unix and Sun Solaris Server in Network.
  • Experience in Wireless LAN (IEEE 802.11) and deployment of light weight access point.
  • Migrated and implemented new solution with Cisco ASA firewall series 5505,5510,5540.
  • Experience in configuration of AAA with ACS protocols TACACS+, RADIUS and LDAP.
  • Experience in configuration of Checkpoint 600,1100,4800,12000 appliances.
  • Migration of Palo Alto firewalls from ASA.
  • Experience in configuration of Palo alto firewalls like PA2020, PA3050, PA5050, Experience with devices Palo Alto Network firewalls such as security NAT, Threat prevention URL filtering.
  • Implement duo security two factor authentication for remote access VPN on Cisco ASA.
  • Worked on various blades like IDS/IPS, URL filtering on Cisco ASA, Cisco ACI.
  • Experience with Solar Winds Orion monitoring.
  • Strong knowledge on networking concepts like TCP/IP, Routing and Switching.
  • Hands on experience on Up-gradation of Cisco IOS & Firmware of different Cisco devices & modules.
  • Worked with Cisco ISE to identify threats in the network for rapid containment and remediation.
  • Shared the data with integrated partner solutions to accelerate the capabilities to identify and remediate threats using Cisco ISE, Cisco ACI
  • Experience in installation, configuration and Administration of windows server 2003/2008, Active Directory, Linux, Unix OS under various LAN and WAN environment.
  • Hands on experience in installing and configuring DNS and DHCP server.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.
  • Adapt in preparing Technical Documentation and presentations using Microsoft VISIO/Office.
  • Technologies utilized include HTML, CSS (Styled Components), JavaScript (React, React Native, Redux, Node), Express, MySQL, WordPress, PHP/Laravel and Apollo/GraphQL

TECHNICAL SKILLS:

Routers: Cisco 1900, 2600, 2800, 2900, 3600, 3800, 3900, 7200, 7600 Juniper M7i, J230, M320

Switches: Cisco Catalyst 3550, 3750, 4500, 4900, 6500 Nexus 2248, 5548, 7010, 9000, 7000, 5000 and 2000 Dell S4810, S60, S55

Firewalls & Load Balancers: Cisco ASA 5540 series, Checkpoint, Palo alto PA2020, PA3050, PA5050, IPSEC and SSL VPN, IPS/IDS, IOS Firewall features, DMZ set up, F-5 LTM.

Routing: OSPF, EIGRP, BGP, RIP, PBR, Route Filtering, Redistribution, Summarization, Static routing

Switching: VLANs, Dot1Q, VTP, STP, RSTP, VLAN Maps, HSRP, GLBP, CEF, DCEF, Port Security

LAN/WAN Technologies: Ethernet, Frame relay, MPLS, HDLC, PPP, T1, T3, OC Standard, DSL, ISDN

Protocols: IP, TCP, UDP, ICMP, NAT, DHCP, SNMP, IPSEC, SSL, HTTP, SSH, HTML, CSS, JavaScript

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Network Monitoring and Management Tools: solar winds, Wire Shark, SNMP, Elastic Search, Logstash and Kibana and WhatsUp Gold

Operating Systems: Windows Server 2008 R2/ 2003, Windows XP Professional, Red hat Linux, UnixSun Solaris 9/8

PROFESSIONAL EXPERIENCE:

Confidential, Cumberland, RI

Sr. Network Engineer

Responsibilities:

  • Experience with Cisco ASR’s, Catalyst 6500 series switches, 2800 series, 3800 series. 2900 series, and 3900 series routers.
  • Worked on Nexus 5k upgrades from 7.1(4) N1(1) to 7.3(5)N1(1), Troubleshoot and fix issues with Cisco Prime, Nexus 9k, 7k, 5k.
  • Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Configuration, Assigning DHCP profiles.
  • Working on port migration from catalyst 6500 to ASR 9K router.
  • Experience with LAN/WAN setup, installation, configuration and troubleshooting
  • Experience routing protocols (EIGRP, OSPF, RIP, and BGP, MPLS)
  • Experience in Layer 2/Layer 3 protocols (VLANS, STP, VTP, MPLS and Trunking)
  • Extensive experience with Cisco IOS, Windows client/server operating systems, Linux, Firewalls Networking technologies
  • Configuration and deployment of Cisco Prime Infrastructure
  • Provided In and out IP ranges, sub netting for the environment
  • Experience in IPAM tools
  • Execute OSI model, TCP/IP, UDP, IP addressing and Sub netting
  • Execute the setup of HSRP, ACL, and tunnel installations
  • Extensive knowledge in different networking protocols like FTP, VOIP, Quality of Service (QOS),
  • DNS, DHCP.
  • Additional responsibilities included configuration of Cisco switches to support Wireless Access Point deployment.
  • Design and deploy Cisco Unified Wireless Solution with approximately 600 Access Points in various locations across US using 5508 and 4404 Wireless LAN Controllers on 6509E switches.
  • Experience in Basic and advanced F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers.
  • Experience in physical cabling, IP addressing, configuration and support of TCP/IP.

Confidential, Austin, TX

Sr. Network Engineer

Responsibilities:

  • Experience in working with Nexus 7010, 5548, 5020, 2148, 2248 devices.
  • Worked on assigning Static Ips’s using Ipam and Infoblox.
  • Worked on switchport configuration and provided switchport assignments to the Datacenter technicians.
  • Tier-2 operational support for the enterprise OSS Network Monitoring Services team. Supported three programs with their day to day operations inside a portfolio of COTS tools and in-house applications.
  • Created a script to that read a CSV and executed service creation within CA Spectrum
  • Created a tool for my team where you enter in a UUID and it finds that asset in BMC Remedy, and relates all the required assets for that service.
  • Created several Splunk dashboards to display network abnormalities and areas of optimization within the NOC
  • Built a Splunk dashboard that displays the status of licenses of Cisco ISR devices. This is utilized to check which routers have certain licenses applied to them or not. This saved the company thous and of dollars not having to buy a Cisco product to track licensing.
  • Responsible for automated management and configuration of VMWare vSphere by using PowerCLI.
  • Patching and upgrading the ESXi hosts, remediating the VMWare tools to match the ESXi host version.
  • Configuring VMware vSphere Cluster features like High Availability (HA), Distributed Resource Scheduling (DRS).
  • Installed and Tested VMware Site Recovery Manager (SRM 4.x/5.x) for the disaster recovery and managed recovery plans.
  • Worked on creating new firewall rules and modifying the existing rules on Palo alto firewalls.
  • Worked on creating new VIP’s to users on A10 load balancers and generated csr’s.
  • Worked on vulnerability tickets on A10 load balancers.
  • Worked on decommissioning Palo firewall rules and ports that ar e no longer used.
  • Used Service Now and Jira for change management process
  • Managed Configuration, Logging and Reporting of Palo Alto firewall through the Panorama.
  • Palo Alto Firewall specialist with good experience with specialization in network administration and network security
  • Decommissioned the Palo alto firewall rules and the switches and the interfaces that are no longer needed in the infrastructure.
  • Configuring PAN Firewalls and policies for the security of the internal resources
  • Handled Software version upgrade on Palo Alto Firewalls.
  • Performed Extensive and numerous administration tasks Through GUI and CLI on the A10 AX3000 Platform.
  • Document solutions and help documents as needed for future DLP Analysis team. * Creation of DLP policy, Data at rest scanning
  • Network security including email spoofing issues, spyware/malware/ransomware scanning and cleaning.
  • Provide design and support for Palo Alto FWs, and Aruba wireless controller\AP solutions
  • Coordinate with network operations center (NOC) for change notifications, alerts and escalation of security incidents.
  • Scheduled day to day firewall related changes and seek CAB approval if required for production impacting changes.
  • Used Microsoft Visio for technical documentation.

Environment: Cisco routers, switches, ASA Firewalls, Palo alto Firewalls, OSPF, EIGRP, BGP routing protocols, VLANs, F5 load balancers, checkpoint, wireless access points, IP, TCP, UDP, ICMP, NAT, DHCP, SNMP, IPSEC, SSL, HTTP, SSH protocols.

Confidential, Cherry Hills, NJ

Sr. Network Engineer

Responsibilities:

  • Responsible for Configuring Cisco and Dell Routers and Switches.
  • Installing and configuring F5 Load balancers and firewalls with LAN/WAN configuration. worked on F5 LTMs & GTMs to improve web application delivery speed and replication through and between distributed global data centers.
  • Worked on F5 LTM series like 1600, 6400 and VIPRIONS for the corporate applications and their availability.
  • Used F5 GTM for external DNS resolutions configured all listeners and created all zone files, A record and CNames.
  • Worked on F5 Enterprise Manager 3.1 version to manage multiple F5 LTM devices from single-pane view.
  • Use various network discovery tools (Riverbed Steel Cental, SolarWinds) info to map servers and their dependencies.
  • Analyzing and resolving complex network operations, and performing security scans on all devices connected to the FBI network.
  • Configuration of Meraki & Viptela Cloud-managed VPN/SDN Routers
  • Oversaw / Managed Deployment of Viptela V1000 router to 2500+ branches
  • Responsible for maintaining various Riverbed Suite Tools, What's up Gold, SolarWinds,
  • Knowledge on network discovery tools as Riverbed also
  • Worked on F5 VIPRIONS 2400 model with dual blades also had licensed this chassis with vCMP which can run multiple instances and versions of BIG-IP.
  • Configuring, deploying &upgrading the Cisco, Nexus5672 Series Switch fabric links, Worked on Cat9000 also.
  • Configuration& troubleshooting of Cisco and Dell switches, routers and Firewall.
  • Deployed & Implemented rules and created various zones in Palo alto firewalls like PA2020, PA5020, PA5050.
  • Support and Manage VMware 5.0 infrastructure, installation and configuration of vCenter Server.
  • Manage over 2200 VM's in VMware vSphere & OVM infrastructure.
  • Experience on Panorama firewall management tool which provides centralized monitoring and management of multiple Palo Alto devices from single window .
  • Configuration and Installation of Cisco firewalls ASA (5510,5520 and 5540).
  • Migrating Cisco ASA Firewalls to Palo alto firewall.
  • VOIP systems testing on IP-PBX.
  • Responsible for call signaling, media flow and quality of service (QoS) of a VOIP network as per SIP standards.
  • Installation of WLAN outdoor base stations operating in 2.4GHz and 5.8Ghz
  • Optimizing and monitoring the performance of a wireless, LAN and WAN segments.
  • Provide Infrastructure Engineering and LAN/WAN support for customers located at various physical sites
  • Maintain and troubleshoot LAN and WLAN networks • Administration of users and network resources, Office 365,
  • Member of a team of professionals in intense skills refresh, responsible for design review, implementation, service requests, escalation support and analysis of enterprise LAN/WAN environments for datacenters, WAN links, and branch offices.
  • Specific Technologies handled include but not limited to Cisco ISRs/Meraki MX, Cisco Catalyst/Nexus Switches Cisco ASAs, Juniper EXs, Cisco Wireless LAN Controller, Cisco Access Points, Nagios, Solar Winds, Cacti, Wireshark, VMware, Cisco Unified Communications Manager & Cisco Unity.
  • Report and analyze Change Management activities across the VOIP network
  • Conflict identification, exception approvals, freeze administration and emergency requests for all changes hitting the VOIP network.
  • Knowledge & Experience on FortiGate Firewall Appliances.
  • Implemented Duo Security two-factor authentication as a service to access data centers via VPN.
  • Using solar winds Orion platform to monitor networking and systems management products.
  • Worked with IDS/IPS to identify threats in the network for rapid containment and remediation.
  • Shared the data with integrated partner solutions to accelerate the capabilities to identify and remediate threats using Cisco ISE.
  • Ability to analyze, configure and troubleshoot networks.
  • Establishing VPN tunnels using IPSec encryption standards and configured and implemented site-to-site VPN , Remote VPN.
  • Configured VMs in availability sets using Azure portal to provide resiliency for IaaS based solution and scale sets using Azure Resource Manager to manage network traffic.
  • Deployed Azure IaaS virtual machines (VMs) and Cloud services (PaaS role instances) into secure VNets and subnets.
  • Associated routes with VNets via the route table per relationship constraints.
  • Migrating the servers using Azure Site recovery.
  • Prepared capacity and architecture plan to create the Azure Cloud environment to host migrated IaaS VMs and PaaS role instances.
  • Defining Metrics and creating the alerts in Azure Log-Analytics, and adding all servers into the monitoring.
  • Setting up policies in Azure to meet compliance as per the organization standards.
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Implemented the numerous firewalls rules on the Palo alto with both Hide Nat and Static NAT.
  • DNS administration like adding/modifying/deleting IP and DNS assignments using log messages.
  • Providing Technical Support and solutions for Network Problems.
  • Upgrading IOS, troubleshooting network outages.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Technologies utilized include HTML, CSS (Styled Components), JavaScript (React, React Native, Redux, Node), Express, MySQL, WordPress, PHP/Laravel and Apollo/GraphQL

Environment: Cisco routers, switches, ASA Firewalls, Palo alto Firewalls, OSPF, EIGRP, BGP routing protocols, VLANs, F5 load balancers, checkpoint, wireless access points, IP, TCP, UDP, ICMP, NAT, DHCP, SNMP, IPSEC, SSL, HTTP, SSH protocols.

Confidential, St. Louis, MO

Sr Network Engineer

Responsibilities:

  • Responsible for Configuring Cisco and Juniper Routers and Switches.
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Installing and configuring F5 Load balancers and firewalls with LAN/WAN configuration.
  • Worked on F5 LTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs, Cisco ACI.
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, BGP v4. Configured IP access filter policies.
  • Configuring, deploying &upgrading the Cisco, Nexus 5K,7K,9K Series Switch fabric links and Cat 9K.
  • Configuring OSPF and Static routing on Juniper M and MX series Routers.
  • Configuration& troubleshooting of Juniper switches, routers and Firewall.
  • Deployed & Implemented rules and created various zones in Palo alto firewalls like PA2020, PA2050.
  • Maintain, and troubleshoot Cisco IOS SIP gateways and TDM trunks, plus VoIP UC servers, infrastructure, and applications.
  • Responsible for configuration and troubleshooting user opened cases ranging from single phone issues to issues affecting single or multiple sites at once.
  • Worked with Cisco ISE to identify threats in the network for rapid containment and remediation.
  • Shared the data with integrated partner solutions to accelerate the capabilities to identify and remediate threats using Cisco ISE.
  • Ability to analyze, configure and troubleshoot networks.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Establishing VPN tunnels using IPsec encryption standards and configured and implemented site-to-site VPN, Remote VPN
  • Worked on troubleshooting and resolving issues escalated by the NOC and internal systems, including developing, implementing and deploying emergency hot fixes within a global network
  • Configuration and Installation of Cisco firewalls Pix and ASA (PIX 510, 515E, 525 and ASA 5520, 5540).
  • Migrating PIX Firewalls to ASA Firewalls
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
  • Implementing MPLS VPN for the Branch locations
  • Configured and deployed QOS and defined class of service (COS) WRED and WFQ for bandwidth management.
  • Handled deployment and management Checkpoint GAIA, R75, R71, R65 and Cisco ASA 5500 series
  • Implemented the numerous firewalls rules on the Checkpoint with both Hide Nat and Static NAT.
  • Configured the Checkpoint Anti-Spoofing on the right interfaces to enable the traffic.
  • DNS administration like adding/modifying/deleting IP and DNS assignments using log messages.
  • Providing Technical Support and solutions for Network Problems.
  • Upgrading IOS, troubleshooting network outages.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.

Environment: Cisco routers, switches, ASA Firewalls, OSPF, EIGRP, BGP routing protocols, VLANs, F5 load balancers, checkpoint, Palo alto, wireless access points, IP, TCP, UDP, ICMP, NAT, DHCP, SNMP, IPSEC, SSL, HTTP, SSH protocols.

Confidential, Charlotte, NC

Sr. Network Engineer

Responsibilities:

  • Configuring, deploying & upgrading the NX-OS operation system in the data center
  • Replacing the 3750X switch with a stack of 4507 switches and creating Vlans for Production and Wireless whose traffic was segregated by access-lists to restrict traffic flow between them.
  • Experience working with using EIGRP/OSPF as internal Company routing protocol and Using BGP as a WAN protocol towards Service Provider
  • Worked on F5 LTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Experience with configuring Virtual Server and Configuring Load balancing methods in F5 LTM
  • Implementing & troubleshooting of Juniper switches, routers and Firewall.
  • Involved in configuring Juniper SSG-140, Cisco PIX and ASA firewall.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture
  • Experience configuring Virtual Device Context in Nexus 7010
  • Configured 6500 to support a lot more functions with special feature blades, like firewall, content load balancing, Flex WAN
  • Configured, monitored and troubleshoot Cisco's ASA 5500/PIX 515 security appliances,
  • Migrating PIX Firewalls to ASA Firewalls
  • Defined and rolled out rules firewall policies.
  • Involved in iRules management like loading rules, writing iRules syntax using TCL language
  • Support customer with the configuration and maintenance of PIX and ASA firewall systems definition, problem solving, design advice, troubleshooting, updating, maintenance, etc.
  • Identify, design and implement flexible, responsive, and secure technology services
  • Troubleshooting the issue using Wireshark if an individual is not able to connect to the installed Aironet Access points.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification

Environment: Cisco routers, switches, ASA Firewalls, OSPF, EIGRP, BGP protocols, VLANS, wire shark, IP, TCP, UDP, NAT, DHCP, HTTP, SSH.

Confidential

Network Engineer

Responsibilities:

  • Worked on Cisco Layer 2 switches (spanning tree, VLAN).
  • WAN Infrastructure running OSPF & BGP as core routing protocol.
  • Support various Routers like 2600/3600/7200 series routers.
  • Tested authentication in OSPF and BGP.
  • Configured and troubleshoot OSPF and EIGRP.
  • Troubleshooting IOS related bugs based on history and appropriate release notes.
  • Work on different connection medium like Fiber and Copper Connectivity.
  • In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
  • Planning and configuring the routing protocols such as OSPF, RIP, and Static Routing on the routers.
  • Performed and technically documented various test results on the lab tests conducted.
  • Planning and configuring the entire IP addressing plan for the clients' network.
  • Assist the certification team and perform configuration of LAN\WAN technologies such as Ethernet, Fast Ethernet, and Gigabit Ethernet.
  • Supported networks, which are comprised of 200+ Cisco devices.
  • In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
  • WAN Infrastructure running OSPF as a core routing protocol.
  • Follow process & procedures for change & configuration management.
  • Supported nationwide LAN infrastructure consisting of Cisco 4510 and catalyst 6513.
  • Deployed the switches in high availability configuration with HSRP.
  • Configured UDLD, port-fast, uplink fast and other spanning tree features.
  • Support various Series of Cisco Routers like 7200/7600 series.
  • Support Complex 0 Series Switches.
  • Worked on Cisco Routers Models# and ISR model;
  • Network Monitoring using tools like Cisco Works 2000.
  • Created Lab demonstrations for new technology deployments with loaner equipment from various vendors and presented the findings to upper management.
  • Troubleshoot network problems using Packet Analysis tools like Ethereal.

Environment: Cisco routers, switches, ASA Firewalls, OSPF, EIGRP routing protocols, VLANS, IP, TCP protocols.

Confidential

Network Engineer

Responsibilities:

  • Responsible for the configuration, implementation and operation of Cisco 3745 routers, Cisco 6509 and 3560 L2/L3 switches
  • Removed Cisco 3600 and 2600 series routers and Cisco 2900 series switches from the current infrastructure and replaced them with the Cisco 6509 or 3560 L2/L3 switches.
  • Configured RSTP, MST and used VTP with 802.1q trunk encapsulation. Provided port binding and port security wherever required. Provided router redundancy through HSRP.
  • Configured ether channels using PAgP and LACP.
  • Designed ACLs, VLANs, troubleshooting IP addressing issues and taking back up of the configurations on switches and routers.
  • Provided testing for network connectivity before and after install/upgrade
  • Switching related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet and Gigabit Ethernet channel between switches.
  • Experience in Cisco switches and routers: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay and ATM).
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external
  • Escalation procedures and customer notifications.
  • Configured Cisco Routers for OSPF, IGRP, RIPv2, EIGRP, Static and default route.
  • Worked on HSRP and GLBP for first hop redundancy and load balancing.
  • Prepare, update, and maintain technical and logistical network documentation.

Environment: Cisco routers, switches, ASA Firewalls, OSPF, EIGRP routing protocols, VLANS, IP, TCP protocols.

We'd love your feedback!