We provide IT Staff Augmentation Services!

It-senior Network Consultant Resume

Pleasanton, CA

SUMMARY:

  • CCNP certified with professional experience in Network Designing, Security, Deployment, Configuring and Troubleshooting of both Cisco and Juniper Networks.
  • Responsible for Checkpoint, Juniper, Palo alto and Cisco ASA firewalls administration across global networks
  • Provided firewall policy configuration and services with Juniper SRX 240 & 650 series
  • Experience in managing and securing remote access through designing and implementing various VPN technologies including IPSec, SSL, MPLS, Frame relay.
  • Extensive knowledge/experience in implementing, maintaining and troubleshooting LAN/WAN, Network security including Cisco and Juniper devices to perform functions Confidential the Access, Distribution, and Core layers.
  • Worked on Routers & Switches: Cisco 2800, 2900, 3900, ASR 1K, ASR 9K, Cisco 3850, 3560, 3750,3580, 2960, Nexus 7010/Nexus 7018, 5020, 2148, 2248 devices.
  • Hands on experience on Juniper devices which includes EX - 2200, EX-4200, EX-4300, MX-80, MX-480, M Series, SRX210 and SRX240
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, EIGRP, OSPF, BGP and MPLS.
  • Familiar with Cisco firewalls PIX 515, ASA 5500 series.
  • Experience with converting Cisco ASA rules over to the Juniper SRX based solution.
  • Implemented security policies using ACL, Firewall, NAT, PAT, IPSec, VPN, AAA Security TACACS+, and Radius on different series of routers.
  • Experience in Configuration of Cisco Routers and Catalyst Switches.
  • Understanding the JUNOS platform and worked with IOS upgrade of Juniper devices
  • Good knowledge of IPv4 and IPv6 Addressing, Fixed Length and Variable Length Subnet Masking (VLSM), OSI and TCP/IP models.
  • Maintaining and updating inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, NTP.
  • Proficiency in the configuration and troubleshooting of Layer 2 technologies: VLANs, VTP, STP, RSTP and PVST.
  • Experience in Network Management Tools and sniffers like SNMP, Solarwinds, HP-Open view, Wireshark and Cisco works to support troubleshooting issues
  • Experience with CSM, F5 (LTM) Load balancers to provide efficient switching and routing for local and global traffic.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Experience working with Cisco Nexus 2148T Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture.
  • Experience in configuration of VLAN with private VLANS, Voice VLANS, Port security, STP and RSTP (802.1W), standard and extended access lists for managing access based security, creating root views for administrative privileges.
  • Ability to manage all phases of network installation and administration.
  • Excellent customer management/resolution, problem solving and debugging skills with good verbal/written communications and presentation skills.
  • Good team player, excellent communication skills, analytical skills and eagerness to learn new technologies

TECHNICAL SKILLS:

Routers: Cisco 2800,2900,3900, ASR 1K, ASR9K, Juniper M series, MX series, SRX series

Switches: Cisco 3850, 3560, 3750,3580, 2960. Nexus 7K, 5K, 2K, EX-4300, EX-4500, QFX-5100, CMTS such as Arris E 6000, Arris C4, Cisco 10K, Arista 7280,7010

Firewalls: Checkpoint, Cisco Firewall Service Module, Cisco ASA, Juniper Netscreen, Palo Alto, Fortinet.

Load Balancer: F5 Networks (Big-IP)

Routing Protocols: OSPF, EIGRP, BGP, MPLS, Route Filtering, Redistribution, Summarization, Static Routing

Switching Protocols: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast Operations, Layer 3 Switches, Ether channels, Transparent Bridging

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, FDDI, CDDI, Frame Relay

WAN technologies: Channelized links (E1/T1/E3/T3), Fiber Optic Circuits(OC-3, OC-12), Frame Relay

WLAN Technology: 802.11 standards, Lightweight and Autonomous systems

Network Security: NextGen Palo Alto Firewalls VM-300, PA 5000 Series, Juniper vSRX and SRX-5800, 5600, Junos Space, Checkpoint 12600,12200, 4600, Smartdashboard 75.40,77.20 and 77.30, Cisco ACS, AAA, IPSec Site To Site, Pulse Secure, HP Tipping Point IPS, Websense.

Infrastructure services: DHCP, DNS, SMTP, FTP, TFTP, POP3

Network Management: SNMP, CiscoWorks, WhatsUp Gold, HP OpenView

Communication Protocols: TCP/IP, IPv6, ARP, VLAN (802.1q, ATM), PPP, HTTP, SSH, Frame Relay, MPLS, 802.11, Wi-Fi, Wimax, Bluetooth

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Monitoring: Wireshark, Solarwinds, Xenoss, HPNA (Network Automation)

Language: C, Python

EXPERIENCE:

Confidential, Pleasanton, CA

IT-Senior Network Consultant

Responsibilities:

  • The position will provide engineering, design, and implementation solutions for multiple network architectures. The position will have a background in Network Security, Switching and Routing.
  • Configuring BGP load balancing and ensuring the stability of BGP peering interfaces.
  • Dealing with creating VIP (virtual server), pools, nodes and applying iRules like cookie persistence, redirection of the URL for a virtual server.
  • Communicates across client communities and is viewed as adding value. Must have experience with client interaction and working to develop solutions and recommendation from an alternative.
  • Experience working Juniper Confidential -Series, M-Series, MX-Series, J-Series Routers
  • Hands on experience in Upgrading IOS, troubleshooting network outages.
  • Understand Change Management procedure and familiar with related best practices.
  • Develops and maintains relationships with project stakeholders including team members, peers, managers, customers, vendors, and other affected departments to support effort across multiple business units.
  • Provide expert technical support to investigate and resolve the complex issue on Network products for Ecommerce Services Network support, Operation, and Infrastructure
  • Involved in End-to-End development, design, and requirement Analysis.
  • Responsible for implementing, engineering, & level 3/4 support of existing network technologies / services & integration of new network technologies / services.
  • Worked on troubleshooting customer related issues related to router Configuration, Layer 1/Layer 2 issues.
  • Worked on Migration of Juniper SRX firewalls for isolation of network segments and VPN's.
  • Built a DNS automation web application to add/delete host record, CNAME record, DNS zones and subzones to Infoblox DNS server. Used Python flask framework and Ansible NIOS modules to make changes into Infoblox database. Successfully containerized the application and deployed on Azure cloud.
  • Built and multi-vendor Old Navy data center Ansible automation as a part of effort towards building zero touch device provisioning including pre-config checks and post-config checks. This included onboarding and configuring Juniper SRX routers, Nexus 7K switches, F5 load balancers, Infloblox cluster.
  • Built F5 automation tool using ansible to perform daily operational activities like configuring and modifying VIPs, pools, pool members, iRules on F5 devices. Set up Jenkins pipeline to pick up changes from Github and apply on the devices during the specified change window.
  • Set up SNMP based monitoring on all network devices (Juniper, Cisco, Meraki, PAN, F5, Infoblox, Riverbed) using NetSpyGlass tool. Also built event-based alerts to create incident tickets in ServiceNow. Also integrated ServiceNow with PagerDuty to notify the team about the incident via email and text messages.
  • Configured all devices in the environment to send device logs to Splunk event logger. Built alerts in Splunk wherever SNMP based monitoring wasn’ Confidential feasible and integrated alerts with Pager Duty.
  • Deployed and own Cisco Prime infrastructure for Confidential network wide legacy wireless access point monitoring

Confidential, Boston, MA

Network Engineer

Responsibilities:

  • Configuring and troubleshooting routers and switches Such as Juniper SRX and MX
  • Configured BGP load balancing and ensured stability of BGP peering interfaces.
  • Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes and route filtering using Route-maps.
  • Configured Virtual-link between discontinuous backbone areas in the network and also established authentication between all OSPF routers using MD5 authentication.
  • Experience working Juniper Confidential -Series, M-Series, MX-Series, J-Series Routers
  • Hands on experience in Upgrading IOS, troubleshooting network outages.
  • Involved in effective communication with vendors, peers and clients in resolution of problems.
  • Working knowledge of juniper SRX240, SRX220 and SRX550 series Firewalls
  • Design and configuration of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Administering checkpoint firewall - manipulating policies, troubleshooting, Firewall change requests
  • Involved in End-to-End development, design,and requirement Analysis.
  • Installation and Configuration of Cisco Catalyst switch 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control list implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of the port channel between core switches and server distribution switches.
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls.
  • Enabled STP attack mitigation (BPDU Guard, Root Guard) using MD5 authentication for VTP
  • Manage Cisco Routers and troubleshoot Layer 1, Layer 2,and Layer 3 technologies for customer escalations.
  • Load balancing to manager network traffic
  • Monitoring network performance using Logic Monitor tool, Load Balancing experience (Citrix Netscaler)
  • Experience in Juniper: Mx960 and Mx480 Nexus: 7000, 6000, 5000 and 2000 Series

Confidential, WA

Network Security Engineer

Responsibilities:

  • Managed Firewalls with Checkpoint, Cisco ASA and reviewed information security requirements, assessed security risks, and defined security requirements.
  • Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NAT'ing, NAC product sub-netting, also including DNS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP & Multicasting protocols.
  • Analyzing and Managing networking requirements of different environments (VLANs, trunking, multicast, VRFs, OSPF & BGP routing, in a Cisco based environment)
  • Worked on lab testing and prod testing to drive the development of Overlay and underlay SDN.
  • Understanding of SDN/NFV ecosystem SDN controller with Real-time engagement, support diagnostics, billing and business automation for SDN.
  • Experience working with Nexus 2000, 4000, 7000 series
  • Setting up Cisco Meraki MX84 and MS 225 in the Lab for testing the new pilot project with the Cisco Meraki
  • MS225 switches and also testing the Dongle to allow access to wireless broadband.
  • Enterprise Routing experience using protocols RIP v1 & 2, EIGRP, OSPF.
  • Implementing security policies using Cryptography, ACL, SDM, PIX Firewall, IPsec, VPN, and AAA security on different series of routers.
  • Experience with different Network Management Tools and Sniffers like Wireshark (ethereal), HP-Open view, RSA envision, Netflow to support 24x7 Network Operation Centre.
  • Worked on PA-5020, PA-3020 series Palo Alto firewalls and Panorama.
  • Installed, Administered, Upgraded, and Deployed the Blue coat proxy servers, content filtering, and policy including the BCAAA (Blue coat Authentication Agent) Servers.
  • Proficient in Checkpoint, Palo Alto, F5, Cisco, Juniper, Lucent, Fortinet and Blue coat technologies.

Confidential, Elk Grove, CA

Network Engineer

Responsibilities:

  • Achieved recognition as a relationship BCM coordinator with excellent individual and teamwork skills. Experience in providing direction to both Business Units and Technical Support (VOIP, VPN, Windows, LAN and WAN Network) Teams
  • Design and configuring of OSPF, BGP on Juniper Routers, SRX Firewalls, BPDU Guard, port-fast, uplink fast and other spanning tree features.
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, NOKIA Firewalls, Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall.
  • Upgrades and backups of Cisco router configuration files to a TFTP server
  • Configuration and set up of Juniper SRX firewalls for policy mgmt. and VPN's. and OSPF
  • User authentication and resource allocation using Cisco ACS server using Radius and TACAS+ protocols for administrative control.
  • Responsible for CheckPoint Firewall policy and Cisco ASA firewall administration across global networks
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS
  • Juniper Contrail SDN Cloud Computing Open Networking Openflow/ODL
  • Experience with configuring VIP, Pools on F5 LTM and working with I-rule management on LTM
  • Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Involved in Big-IP F5 load balancing for internet traffic across web servers using I-rules
  • Experience with Unicenter NSM in monitoring IP Telephony environments to provide increase uptime and expedite any detected issues that might impact the clients’ environment.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Supported Nortel PBX/ BCM/ Norstar Platforms such
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
  • Created security policy according to user’s requirement in cisco ASA-5580, Juniper-SRX-5800 ISG-1000 firewall using CLI & GUI
  • Designed and Implemented Cisco PIX525 and ASA5550 firewall interfaces with FTP, DNS, HTTP servers on DMZ with different security levels.
  • Configuration of Fabric path and connectivity between Nexus 5K and Nexus 7k, and load balancing using F5 LTM

Confidential, Texas

Network Engineer

Responsibilities:

  • Performed Baseline Configuration Module (BCM), Domain Control Module (DCM) and Core Services Installation Module (CSIM) upgrades to COMPOSE v3.0.1 on ISNS Servers, and troubleshooting juniper switches EX2200, EX2500, EX3200 and EX4200 series.
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols OSPF.
  • Juniper Contrail SDN solution provisioning in test labs, experience in Juniper Networks Junos, ScreenOS, IVE (Pulse), NSM, and Junos Space
  • Configuring ACL to allow only authorized users to access the servers, troubleshooting various WAN technologies like MPLS, T1, T3, DS3 and ISDN, Frame relay, DDR, NAT, DHCP, TCP/IP
  • Convert Branch WAN links from TDM circuits to MPLS and encryption from IPSec/GRE to Get VPN.
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience
  • Troubleshoot TCP/IP problems; troubleshoot connectivity issues in multi-protocol Ethernet, Environment.

Confidential, Texas

Intern Network Engineer

Responsibilities:

  • Responsible for designing and implementation of network and Security infrastructure.
  • Reviewing, analyzing, approving and executing all changes in the network. All Configurations of Cisco Routers and Switches. Participated in a rotating 24x7 support schedule for the Network Operation Center.
  • Designed, validated and implemented LAN, WLAN & WAN solution to client’s needs.
  • Focused on working with Cisco Channel partners to build practices around Cisco ACI
  • Cisco’s Application Centric Infrastructure (ACI) implementation (Nexus 9K, APIC).
  • Use and maintain routing protocols OSPF and BGP on the Routers in the network & also worked on BGP Route Reflectors, Confederations.
  • Configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000. Configuring VDC & VPC in Nexus 9k, 7k, 5k and 2k.
  • Experience working with BGP attributes such as Weight, Local-Preference, MED and AS-PATH to influence inbound and out bound traffic.

Hire Now