We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

5.00/5 (Submit Your Rating)

Plantation, FL

SUMMARY

  • Cisco and Juniper Certified Network Professional with around 9 years of experience in network system design, Implementation, administration and troubleshooting.
  • Experienced Cisco/Juniper Firewall, Security and Network Administrator as well as a Certified Network Professional, routing and switching.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800, Viprion for the corporate applications and their availability.
  • Knowledge in planning, design, implementing and troubleshooting complex networks and advanced technologies.
  • Identify, design and implement flexible, responsive, and secure technology services.
  • Experience with Firewall Administration, Rule Analysis and Rule Modification, project implementations.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Advanced knowledge in Cisco ASA 5000 series and Juniper SRX installation, configuration and maintenance.
  • Working knowledge of networking devices such as Routers, Switches, Firewalls, VoIP, WAN Optimizers and Wireless Devices (Controllers and Access Points).
  • Expertise in Configuration of Virtual Local Area Networks (VLANS) using Nexus 7Ks, Cisco routers and multi - layer Switches and supporting STP, RSTP, PVST, RPVST along with trouble- shooting of inter-VLAN routing and VLAN trunking using 802.1Q.
  • Deploying Intrusion Detection System (IDS), Intrusion Prevention System (IPS) devices in the network.
  • Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and Policy routing over Cisco Routers, Switches (Nexus 7Ks, Catalyst 6500).
  • Experience with NX-OS on Nexus Switches.
  • Excellent experience in working with Cisco 1800, 2500, 2600, 2620, 2800, 2900, 3600, 3800, 3900, 7200, 7600 and ASR 1000, 9000 series Cisco Routers.
  • Experience working on Juniper series of devices like MX-960, MX-480, MX-104, M10i, M7i, SRX-550, SRX-240, SRX210 and EX, QFX series of switches.
  • Experienced in working with Cisco 2900, 3500, 3700, 4500, 6500 series Cisco Catalyst Switches and Nexus Switches 2200, 5500 and 7000.
  • Worked on Migration projects involving the refresh of devices from Cisco to Juniper in the network infrastructure.
  • Implemented redundancy with HSRP, VRRP, GLBP, and Ether channel technology (LACP, PAgP).
  • Router configuration for L2/L3 LAN and WAN networks and Intra company networks.
  • Implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, Route Maps and route manipulation using Offset-list.
  • Hands on experience in using Network Monitoring and Packet Sniffing tools.
  • Strong interpersonal, organizational communication, customer service & presentation skills.

TECHNICAL SKILLS

Routers: Cisco 1800, 2500, 2600, 3200, 3600, 3700, 3800, 7200, 7600 and ASR 1000. Juniper MX-960,MX-480, MX-104, M10i, M7i

Switches: Cisco Catalyst (2960, 3560, 3750, 4500, 4900, 6500) Nexus (2200, 5500, 7000), EX- 4300, EX-4200, QFX-5100

LAN Technologies: Ethernet, Fast Ethernet, and Gigabit Ethernet, Ten Gigabit Ethernet, SMTP, VLAN, Inter-VLAN Routing, VTP, STP, RSTP, DOT1Q

WAN Technologies: Frame Relay, ISDN, PPP, HDLC

Firewalls: Cisco ASA, Juniper SRX.

OS products/Services: DNS, DHCP, Windows ( XP, 7, 8), UNIX, LINUX, MS Excel, MS Visio, MS power point, Linux Red hat

Protocols/Services: Routing Protocols (RIP v1 & v2, OSPF, EIGRP, BGP), QoS, VRRP, HSRP, TCP/IP, UDP, ESP IPsec, MPLS, PPP, PPTP, IPSEC, IKE, SSL, SSH

Network Management: Infoblox, NetMRI, Wireshark, Solar winds, Nagios, NetScout.

Security Server Protocols: TACACS+, RADIUS, Cisco ACS

PROFESSIONAL EXPERIENCE

Confidential, Plantation, FL

Sr. Network Security Engineer

Responsibilities:

  • Installation, Configuration and maintenance of Juniper devices like SRX, EX-4300 and QFX series of switches.
  • Migration of IPMI devices from existing network to new network across the enterprise in-order to remediate the vulnerability as per Information security standards.
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control (NAC) integration with Cisco ISE.
  • Worked on IPS signatures on the Cisco Firepower management center to reduce false positives by disabling.
  • Designed and implemented a secure instant messaging system in Python providing interface state changes on the devices to support team
  • Developed automation scripts to test storage appliances in Python.
  • Worked on F5 BIG-IP Application Security Manager (ASM) web application firewall ( WAF), deployed in more data centers enterprise WAF with advanced firewall capabilities.
  • Worked with Host Master for shared web hosting and managed Web Application firewall ( WAF), DNS and DHCP management using Infoblox and Analyzed networks using Wireshark.
  • Create new network across the enterprise in-order to implement micro-segmentation for manufacturing lab machines using zones and firewall policies.
  • Configure and make changes in DMZ to allow access or whitelist devices for Information security recommended hosts.
  • Monitored performance and analyzed network irregularities using tool such as Solarwinds.
  • Implemented Network monitoring tools like MRTG, PRTG, and Solarwinds.
  • Integrated Palo Alto next-gen firewalls with overlay VMware NSX SDN network
  • Migrated SAP based applications from old Cisco ACE load balancers to new VMware NSX edges.
  • Create firewall filters in Juniper SRX series.
  • Redistribute BGP routes into ISIS using import/export policies to route GCP, AWS, and remote site connectivity
  • Designed and implemented Azure networks and AWS VPC and connected directly to on-prem datacenter.
  • Monitor AWS infrastructure for Clients and when needed upgrade and administer resources to virtual machines when needed
  • Configures and troubleshoots Cisco Nexus 7K and 9K features, such as VPC, OTV, and VXLAN.
  • Deploying and troubleshooting internetworking such as eBGP/iBGP, OSPF, EIGRP, VPC, OTV, Cisco Fabric Extender (FEX), STP, VLAN, MPLS - VPN, DMVPN.
  • Created new network and implemented micro-segmentation by using zones and security policies.
  • Support global protect VPN connectivity for employees.
  • Updated Fortinet firewall configurations, programmed switch ports and cameras, and maintained asset information.
  • Troubleshoot connectivity issues for users on daily basis on Palo Alto.
  • Worked on cleanup of several legacy rules of ASA and created a migration path to Palo Altos, configured for Global protect VPN, User ID, Wildfire set up, SSL decryption, license and policy management on Palo Alto appliances.
  • Configured and involved in Citrix NetScaler responder policy configuration and Citrix NetScaler Access gateway configurations
  • Configured Citrix NetScaler Load Balancer to provide local and DR site Load Balancing.
  • Deployed Palo Alto 5060 within Data Centres. Worked with Palo Alto firewalls using Panorama performing changes to monitor/block/allow the traffic on the firewall.
  • Created security policies, address objects and AD groups to restrict access as per requirements.
  • Extensive experience working with Panorama and manage Palo alto firewall through Panorama
  • Performed software version upgrades for Panorama and Palo Alto devices.
  • Create new SSID across the enterprise as per requirements.
  • Extensive experience working with Aruba 7000 series controllers.
  • Assisted in planning and design of VeloCloud SD- WAN Deployment.
  • Participated in planning and implementation of Confidential and SD- WAN solutions in direct support of targeted objectives.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, VxLAN, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
  • Deployed VXLAN on the Nexus 9000 to map the physical VLANs to the Virtual Overlay VLANs.
  • Worked on Next Gen Firewall features like Application and URL filtering, SSL Forward Proxy, SSL Decryption, Web-filter, SD- WAN in Fortigate firewalls.
  • Worked on Next Gen Firewall features like Application and URL filtering, SSL Forward Proxy, SSL Decryption, Web-filter, SD-WAN in Fortigate firewalls.
  • Managed and performed countless hours troubleshooting for Fortigate Firewalls.
  • Configuring & managing Security Devices that includes Juniper (NetScreen) Firewalls, F5 BigIP Load balancers, Blue Coat Proxies and Plug Proxies.
  • Worked on network based F5 Load balancers with software module Access Policy Manager (APM) & Checkpoint Load Sharing on checkpoint clusters.
  • Worked with network based F5 Load balancers with software module GTM and experience with network based F5 Load balancers with software module Access Policy Manager (APM) & Cisco Load Sharing on Cisco clusters.
  • Integrate services appliances to Cisco ACI deployments to include Application Delivery Controllers and Firewalls.
  • Dealing with Cisco Application Centric Infrastructure ( ACI) by integration hardware and software products as per network layout
  • Responsible for installation and maintaining Cisco ASA firewalls, Riverbed WAN accelerators, Blue Coat proxies, and Linux/Bind DNS servers.
  • Provisioned Aruba access points across the enterprise network as per requirements.
  • Configured Aruba RAP devices to aid remote connectivity to enterprise network for remote users.
  • Designed and implemented Cisco/ Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings
  • Deployed SDN networks such as Cisco Meraki SDN solution using MX and MS routers and switches technologies.
  • Deployed Juniper Virtual Chassis, Virtual Chassis Fabric and Qfabric data center LAN deployments.
  • Provided extensive Hardware/Software support for entire EX series/QFX/QFabric series of switching platforms.
  • Configured access points to broadcast specific SSID excluding other SSID's using AP specific option.
  • Whitelisted user devices for specific hidden SSID.

Confidential, Tustin, CA

Network Security Engineer

Responsibilities:

  • Extensive experience in a data center, working for multiple projects like Transformation and Operation.
  • Designed Network for various government agencies like Sherriff, Health Care Agency and Social Services Agency.
  • Involved in deployment of Cisco ISE and Firepower as well as, created/modified necessary profiles that allowed authorized devices on the network.
  • Configured Cisco devices with various protocols like VRF (Virtual Routing and Forwarding), OSPF and BGP as per the design and the number of users in a site.
  • Dealt with implementation of deployment related to Cisco devices like ASR 1002x, Cisco 3850 - 48 p switch and ISR 2950, VG 310 etc.
  • In depth knowledge with port-channel and used it as an integral part while making designs in order to provide redundancy for end users at emergency situations.
  • Co-ordinated with Level-3 communications for site transformation and Level- 3 ADVA box installation.
  • Troubleshoot issues related to VLAN, VLAN Trunking, VRRP failovers, related issues.
  • Involved in design and configuring Overlay Transport Virtualization ( OTV) on Cisco NX-OS devices like Nexus 7000.
  • Worked on multi-vendor load balancers including F5 Big IP LTM, Cisco ACE and VMware NSX between multiple centers.
  • Installed Solarwinds Network Performance Monitor with emphasis on traffic analysis, application and virtualization management.
  • Involvement in configuring solarwind tools for regular activities as well for proactive monitoring of specific routers to record behavioral statistics.
  • Integration of VMware NSX with VMware's suite of products (i.e. vRealize Automation, vRealize Operations)
  • Deployed, configured and implemented Imperva SecureSphere WAF and DAM, WebInspect, Appscan, OWASP for Web-based application vulnerability analysis and code review process.
  • Responsible for building site to site IPSEC, DMVPN tunnels, tunnels failover and WAF
  • Responsible for installation, troubleshooting of firewalls(Cisco firewalls and checkpoint firewalls)
  • Performed IOS upgrades for cisco routers and switches remotely by using TACACS.
  • Have worked on various tickets for network issues with operation’s team and provided ON call support for Priority -1 and priority 2 tickets.
  • Implemented Firewall Security in compliance with PCI on Cisco ASA,FWSM, Palo Alto and Fortigate
  • Develop designs, Proof of Concept and implementations for FortiGate and FortiAuthenticator.
  • Configuration and troubleshooting on Routers of IPSec VPNs, MPLS VPNs using Static Route for new customer site deployment.
  • Responsible for installation, troubleshooting of Checkpoint firewall and LAN/WAN protocols Implementing firewall rules and configuring Palo Alto, fortinet Network Firewall. created different application policies in the ACI including Tenants, Application Network Profile (ANP), End Point Group (EPG), Contracts, Subjects and Filters
  • Handling day-to-day analysis for maintaining SLA; monitoring resolution closures and case aging to ensure timely resolution.
  • Created Application filters and URL categories in secure web gateway for the F5 APM feature as proxy solution.
  • Worked on implementation of the basic F5 ASM, F5 Fire pass and VE, F5 APM.
  • Monitor and configure Alta Vista, Check Point, Cisco firewalls and IDS, and F5 Load Balancers.
  • Created and managed Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trunking using PAgP for layer 2 forwarding. Utilize VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays. Modify spanning-tree parameters for manual root bridge assignment. Implement ether-channels between each switch using PAgP for negotiation. Modify ether-channel load balancing method.
  • Hands on experience implementing HSRP, NTP, SNMP, NAT Access control, QOS, Route-maps, Multicast etc.
  • Managed and Managed and monitored results of team to ensure internal and external SLA's are met
  • Hands on experience working with tools like ServiceNow, SevOne and TACACS.
  • Expert experience in contributing to the development and performance of a migration plan from traditional data center network designs to Cisco ACI
  • Implementation of Network Security using Private VLANs, RACLs, VACLs and Firewall Cisco ASA 55xx. Securing traffic using IPSec over GRE, Cisco site-to-site VPN, Radius and Tacacs+ servers.
  • Troubleshooted issues related to Vlan, Port-channel and port-activation for government agencies.
  • Developed a plan to make sure all the transformed sites have devices with latest IOS and co-ordinated with operation’s team to implement it.
  • Responsible to evaluate, test, configure, propose and implement network, firewall and security solutions with Palo Alto networks.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall
  • Worked securing, maintaining, configuring Cisco Aironet & Meraki Access points, Sonicwall access points
  • Upgraded and updated Cisco IOS and SD- WAN device OS.
  • Worked with voice team for transformation of sites and provided Network cut-over from Confidential Data Center.
  • Implemented changes on a weekly basis at various sites related to vlan, port-channel and VRF to achieve target on a monthly basis to meet customer needs.

Confidential, Dallas, TX

Sr. Network Engineer

Responsibilities:

  • Responsible for the conversion of the existing environment from an EIGRP to OSPF setup to facilitate the migration of Core from Cisco to Juniper.
  • Dealt with implementation of deployment related to Cisco ASA 5585 devices, Juniper SRX 550 devices to apply security policies on it.
  • Played important role in development of Python Enabled Test Framework.
  • Use the data from Cisco ISE to trace out security violations in events of ransomware attacks.
  • Designed and implemented a POC of Cisco ISE vs Aruba ClearPass NAC solution for the corporate network wired.
  • Installation, Migration, Upgrade and Integration of NetScout nGenius Monitoring Tool Solution
  • Implemented NetScout Service Delivery Manager and Analytics for alarming and alerting for business critical applications.
  • Packets capture using bluecoat proxy and analysis the packets and communicating them with vendor for further investigation.
  • Troubleshoot issues related to VLAN, VLAN Trunking, VRRP failovers, related issues.
  • Involved in Planning for upgrade of IOS/JUNOS on devices and performing the upgrade to the TAC recommended code.
  • Worked on multi-vendor load balancers including F5 Big IP LTM, Cisco ACE and VMware NSX between multiple centers.
  • Working knowledge in VOIP environments and installing security, SAN and VM Ware as well as IVR and CVP
  • Tracked NetScout orders, replacement and installation of Infinistreams that have been deployed at field offices.
  • Working with other CITI network teams to resolve all the issues which involve firewalls and proxies.
  • Responsible for installation, troubleshooting of firewalls(Cisco firewalls and checkpoint firewalls)
  • Configured network access servers and routers for AAA Security (RADIUS/ TACACS+)
  • Developed deployment solutions for network technologies including Optical VoIP VPN SAN switching and routing.
  • Provided application level redundancy and availability by deploying F5 load balancers LTM.
  • Configuring and implementing F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic.
  • Experience with Aruba wireless LAN controllers, Airwave, Clearpass and Amigo Products Access points and/or Cisco Wireless LAN Controllers
  • Worked on Bridge Domains, VXLANs, VTEPS, VNID. configuration of routing using BGP among multiple Leaf to spine switches.
  • Deployed a data center based on Cisco VXLAN.
  • Delivering high quality technical collateral for the Aruba WLAN product line for customer, partner and SEs.
  • Responsible for Juniper SRX firewall management and operations across our corporate networks.
  • Configured DHCP scope in Infoblox.
  • Cisco UCS 5000 Chassis implementation with B200 M2 blades
  • Installation and administration of VMware ESX, ESXi Servers using vCenter Server
  • Managed successful delivery of massive security response portfolio including Splunk, Cisco WSA, Cisco IPS, Sourcefire FirePower and AMP, Cisco ESA, FireEye, Passive DNS collection, DNS-RPZ, Cisco ISE, Lancope
  • Provide Load Balancer expertise on F5 BigIP LTM and GTM devices like 7050 and 2200 and Troubleshoot application slowness.
  • Experience with information security control frameworks( NERC CIP V3, PCI, NIST 800-53, COBIT).
  • Expert Understanding to develop the complex Use Cases, Universal device support Modules on the QRadar SIEM
  • Configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000. Configuring VDC & VPC in Nexus 9k, 7k, 5k and 2k
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.
  • Installed the Cisco Prime Data Center Network Manager (DCNM) tool to allow centralized management of all Cisco Nexus 9k switches and Cisco UCS C-Series servers
  • Configured SourceFire sensors for deployment in critical/high volume network segments
  • Performed customer network assessments and made recommendations on SourceFire sensor placement and configuration.
  • Analyzed and tested Bandwidth testing for Cisco, Motorola for network protocols using Wireshark tool.
  • Expert testing and troubleshooting skills for IP/MPLS networks
  • Provided Tier 3 support on SourceFire IPS/NGFW sensor placement and deployments
  • Configured Juniper MX80s, EX4300s, and SRX240s to implement as a part of the branch.
  • Has a good experience working with the Trouble Tickets on F5 Load balancers.
  • Managing enterprise BGP setup by configuring and troubleshooting BGP related issues.
  • Responsible to add new BGP peers for remote branch offices and business partners.
  • Experienced with Juniper: EX-2200, EX-4300, EX-4500, MX-480 and M Series, SRX210 and SRX240 troubleshooting.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Configured VPN tunnels to multiple vendors with end devices terminating at vendor end being a Cisco/Juniper firewall.
  • Perform Configuration changes on BIG IP (F5) Load balancers and monitored the Packet Flow in the load balancers.
  • Deployment of enterprise firewalls (Palo Alto Networks, Cisco ASA, Check Point) in production environments.
  • Responsible for installation, troubleshooting of Checkpoint firewall and LAN/WAN protocols Implementing firewall rules and configuring Palo Alto, fortinet Network Firewall.
  • Configuration of BGP on both Nexus and Palo Alto, moved SVI (server VLAN) interfaces from ASA core to Palo Alto.
  • Worked with team of 4 engineers to design, implement, manage, and maintain 85+ Cisco ASA and PaloAlto firewalls across the enterprise network.
  • Administration of ASA and Juniper SRX firewalls in the DMZ and FWSM in the Server Farm to provide security and controlled/restricted access.
  • Responsible for monitoring alerts through tools like Solar winds Orion, xenoss, scrutinizer in the Production environment as a part of first response for the service desk.

Confidential, NY

Sr. Network Engineer

Responsibilities:

  • Configuration of site-to-site VPN connections (IPsec/GREtunnels, DMVPN) to support diverse network connections to extranet clients.
  • Lift and shift of an existing on-premises application to AWS
  • Selecting the appropriate AWS service based on data, compute, database, or security requirements
  • Worked as a member of the NOC groups to troubleshoot issues related to IP phones, Connectivity and application slowness.
  • Provided Tier III troubleshooting support, in ACD, Call Recording, CTI, SIP Trunk.
  • Monitor, analyze, and troubleshoot Aruba APs, wireless controllers and s3500 switches using the Airwave management systems.
  • Experienced in configuring, implementing and troubleshooting F5 BIG-IP LTM ADC in contract enterprise networks.
  • Estimating AWS costs and identifying cost control mechanisms
  • Enabled and assisted internal business units to build and maintain PCI certified systems and infrastructures
  • Maintained, configured, and sustained the Cisco VoIP network.
  • Worked on Design implementation of new data center with products ranging from cisco, ASA with Firepower, Dell Switches, Cisco Meraki, Vmware NSX.
  • Create packet captures and snort rules to test SourceFire sensor operation and verification of traffic
  • Configured and administrated Gigamon GigaVUE-MP for traffic monitoring and redirect.
  • Troubleshoot issues with Wireless Access points (Cisco 3502) and configure SSID’s on 4506 Wireless LAN Controllers.
  • Designed security policies on Palo Alto network firewall for controlling what traffic needs to be allowed or blocked based on customer requirements.
  • Tracked all NetScout orders, worked with system integrator, and data center management and implementation teams ensure all equipment received.
  • Pioneered the configuration and deployment of Cisco FireSight and FirePower IDS devices for two diverse networks.
  • Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and Policy routing over Cisco Routers, Switches (Nexus 7Ks, Catalyst 6500).
  • Configured VMware HA, VMware DRS in acquiring higher efficiency for VMware Infrastructure
  • Develop a correlated picture of what is occurring right now in an enterprise through integration of information from a variety of devices with QRadar SIEM tool, then normalizing and correlating the information to develop modules that provides real-time (or near real-time) reporting in SOC
  • Experience with Cisco UCS server blades with VMware ESX deployments on Cisco UCS
  • Installed enterprise-class Cisco, Juniper, and PaloAlto routers, switches, and firewalls
  • Configured and maintained OSPF protocol which include deployment of new locations in the existing infrastructure created Stub/areas and configured summarization for effective routing
  • Configured OSPF on ASR1002/9001 Cisco routers at various back offices across US.
  • Configured ACLs in Juniper SRX 3400 firewall for Internet Access requests for servers, Protocol Handling, Object Grouping and NAT.

Confidential, Dublin, OH

Network Engineer

Responsibilities:

  • Configured Routing protocols such as OSPF, EIGRP, static routing and policy based routing on various branch and datacenter devices.
  • Team member of Configuration of Cisco 7206 router with VPN and Configuration of 6509, 4506 Catalyst devices.
  • Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls and MPLS switching for stable VPNs.
  • Worked on Deployment of Palo Alto firewall into the network.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Configuration and troubleshooting link state protocols like OSPF in single area and multiple areas.
  • Involved in the Redesign of Internet connectivity infrastructure for meeting bandwidth requirements across manufacturing plants in Ann Arbor and Montgomery Plants.
  • Utilize server-based applications to define the traffic on NetScout Probes
  • Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches to implement in the manufacturing plant in Ann Arbor.
  • Authored proposal for NetScout training and received management approval to purchase training for NOC Network Engineering, Security and Systems Engineering.
  • Responsible Implementing NAT solutions on WAN applications with Cisco ASA based solution.
  • Involved in periodic IOS upgrades, troubleshooting network outages and high severity incidents.
  • Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long-term planning, implementation, project management and operations support as required.
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco ASA Firewalls, NAT and Juniper SRX firewall.
  • Deploy and support network load balancers, such as F5 LTM/GTM, Cisco ACE, etc.

Confidential, Phoenix, AZ

Network Engineer

Responsibilities:

  • Installed and configured routers, Cisco 2800, 3845 routers and cisco catalyst switches.
  • Engaged in office moves, helped in identifying network requirements of new building, installed new networking hardware, and coordinated with vendors for cabling/wiring
  • Trouble-shooting end-user reported problems, thoroughly and accurately documenting problem in trouble management tool.
  • Configuring DNS /NIC card issues and wall jack issues while troubleshooting IP addressing problems.
  • Responsible for creating, modifying, removing VLAN configuring as per the need.
  • Tracking overall network traffic and capacity issues that are impacting throughput, bandwidth, and quality
  • Pinpointing physical network conditions that are contributing to call quality issues
  • Applied effectively various routing protocols including EIGRP and OSPF Implemented Redistribution of Routing protocols.
  • Solving web related problem including HTTP, HTTPS, DNS, SMTP.
  • Involved in migration from EIGRP to OSPF and documented change management procedure for migrating from EIGRP to OSPF network.
  • Configured ACLs to prevent access to internal network from unauthorized users on ASA firewalls.
  • Troubleshoot intra-net and internet connectivity issues using PING and Traceroute.
  • Configured HSRP, Ether Channel in the LAN environment and NAT.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support.

We'd love your feedback!