We provide IT Staff Augmentation Services!

Senior Network Security Engineer Resume

Minneapolis, MN


  • Over 8+ years of experience in IP Network Design, Network Integration, deployment and troubleshooting.
  • Configuring and troubleshooting Layer 3 Interior Gateway Routing protocols such as Link - State routing protocols (OSPF and IS-IS) and Distance Vector routing protocols (RIPv1, RIPv2 and EIGRP). Wide exposure to LAN/WAN setup, installation, configuration and commissioning of network devices.
  • Configuring and troubleshooting Exterior Gateway protocols such as BGPv4 including internal BGP (iBGP) and external BGP (eBGP).
  • Strong hands-on experience on Cisco Catalyst (series 3850, 3560, 4500, 6500), Cisco Nexus (series 2K, 5K, 7K), Cisco Routers (series 7300, 4000, 3800, ASR 9000), Firepower (4100), Load Balancers (Citrix NetScaler, Cisco ACE, F5 BIG-IP LTM/GTM ADC), IDS/IPS (HIDS, NIDS, NIPS, HIPS), Fire eye, Splunk, Palo Alto Networks Firewalls (PA-820, series PA-3K, 5K), Checkpoint IP Appliances (NXG R60, R70, 3100, 5900),Fortinet Firewalls.
  • Hands on Experience on FortiGate firewalls (7040/7030) by implementing security policies and firewall rules.
  • Hands on experience in configuring high end routers like GSR 12000 series, 7500 series and Catalyst Switches like 7600, 6500, 4500 series. Extensive experience in upgrade, backup and password recovery of Cisco IOS.
  • Experience in working with Cisco Nexus Switches like 5000 and 7000 series and Virtual Port-Channel configuration. Implemented VDC, VPC, VRF and OTV on the Nexus 5505 and 7009 switches and 9K series.
  • Expertise in installing, configuring and troubleshooting Juniper Switches (series EX3300, EX4200, EX4600), Juniper Routers (series J, M and T) and Juniper series SRX Firewalls, Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1. Experience deploying ACI in Network-Centric model.
  • Proficient in monitoring and managing networks using SolarWinds Netflow Traffic Analyzer, Network Performance Monitor (NPM), Network Configuration Manager (NCM); Cisco Prime, Arista, Security Device Manager (SDM), Cisco Works; Infoblox, HP OpenView and Wireshark. writing shell scripts.
  • Experience with Cisco IOS, Cisco ACI, F5. Strong understanding in cloud, managing systems and networks in an AWS and Azure environment. Primary support for all Blue Coat Proxy activities on the network security team.
  • Knowledge and configuration of redundant router protocols like HSRP, VRRP and GLBP.
  • Substantial knowledge, including the configuration, of Spanning Tree Protocol (STP), Per VLAN Spanning Tree (PVST), Rapid STP (RSTP) and Rapid per VLAN Spanning Tree (PVST+).
  • Thorough experience in configuring Virtual Local Area Networks (VLAN) with IEEE 802.1Q, VLAN trunking protocol (VTP), shortest path bridging, Multiple VLAN Registration Protocol and VLAN Cross Connect (CC).
  • Experience with F5 LTM, GTM and APM modules for application load balancing. Worked on migration from cisco ACE to F5. Worked on SSL off loading, Virtual servers, Monitoring, Profiles, irules, SNAT.
  • Experience in troubleshooting both connectivity issues and hardware problems on Cisco based networks. Work with TAC on IOS bugs and high level issues.
  • Experience in testing Cisco routers and switches in lab scenarios and deploy on site for production.
  • Good knowledge of IPv4 and IPv6 Addressing, IP Subnetting, Fixed Length and Variable Length Subnet Masking (VLSM), OSI and TCP/IP models. Experience in migration of IPv4 addresses to IPv6 addresses using mechanisms like Tunnel Broker, Transport Relay Translation (TRT), In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3, SONET POS OCX/ GigE circuits.
  • In-Depth Knowledge and experience of various wireless 802.11 standards, controllers, Access Points, Wi-Fi analytics from various vendors (Cisco Meraki, HPE /Aruba, D-Link and Netgear), SD-WAN (MX 65, MX100, MX400).
  • Good understanding of SNMP, IP SLA and Network Monitoring with experience in tools like PRTG.
  • Experience in troubleshooting a variety of problems. Streamlined and improved process to be quicker to market, ensured compliance and optimized operational efficiency. Identified opportunities for continued improvements of process to ensure maximum output in focus to deadlines.
  • Worked on Bluecoat and Zscaler proxies. Implemented and configured Cloud proxies for exceptions, URL categories, SSO Authentication using Azure, PAC fi
  • Implemented traffic filters using standard and extended access-lists, distribute-lists and route maps.
  • Provided support that included resolving day-to-day operational issues with tickets generated by a server.
  • Good understanding of SNMP, IP SLA and Network Monitoring with experience in tools like PRTG.
  • Deployed, Managed, monitored and supported Bluecoat Proxy for content filtering, internet access between sites and VPN client users, forward proxy scenario and reverse proxy scenario for security and worked on adding URLs in Bluecoat Proxy SG's for URL filtering.


  • Cisco Routers series 7300, 4000, 3800, 2000, 1900; Juniper T4000, MX10, MX40, ACX2200, ACX5000; OnSIP, Avaya products, cisco IP phones
  • Routed and Routing protocols RIP, EIGRP, IS-IS, OSPF, BGP, IPX; MPLS, IPv4 and IPv6 addressing, subnetting, VLSM, Static routing, ICMP, ARP, HSRP, VRRP, Route Filtering, Multicast, 802.11, Policy Based Routing, Redistribution, Port forwarding, Arista.
  • Cisco Catalyst series 2960, series 3560, 3850, 4500, 6500, 7000, 9000; Nexus series 2K, Netgear switches,5K, 7K; Nortel/Avaya 5510, 5520; Juniper EX3300, EX4600, EX4300, EX3400
  • Ethernet technologies, LAN networks, MAC, VLAN and VTP, STP, PVST+, Multicast,
  • RSTP, Multi-Layer Switching, 802.1Q, EtherChannel, PAgP, LACP, CDP, HDLC, RARP
  • Juniper Net screen 6500, 6000, 5400, Juniper SSG, SRX5600, SRX5800, Checkpoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X, 5585), Netgear Firewall, Fortinet, Palo Alto Networks (PA series 2K, 3K and 5K), WAF, ACI.
  • Standard and Extended ACLs, IPsec, VPN, Port-Security, SSH, SSL, IKE, AAA, Prefix-lists, Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress Firewall Design, Content Filtering, Load Balancing, IDS/IPS, Blue Coat URL Filtering, L2F, IDS, TCP Intercept, Router Security, SNMP trap
  • Wireshark, Infoblox, HP OpenView, Cisco Prime, Security Device Manager (SDM), CiscoWorks; TCP Dump and Sniffer; SolarWinds NetFlow Traffic Analyzer, Network Performance Monitor (NPM), Network Configuration Manager (NCM), SevOne, SiteScope.
  • F5 (BIG-IP) LTM 2000, 3900, 6400, 6800, AV 510, ASM, Citrix NetScaler, APM
  • Frame-Relay, ISDN, ATM, MPLS, PPP, DS1, DS3, OC3, T1 /T3 lines, SONET OC3-OC192, SDH, POS, PDH
  • AWS, Microsoft Azure, Cisco Meraki, C, Python scripting, Shell, Cloud Migration
  • DHCP and DNS server, Shell, Active Directory Management, NTP, NDP, TCP, UDP, FCP, Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP, TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, BitTorrent, SMTP, RADIUS and TACAS+, PBX servers, SDN, SAN
  • Windows 10/7/XP, MAC OS, Windows Server, Nexus OS, Cisco IOS-XR, Linux, UNIX
  • Canopy Wireless Devices, D-Link Point-to-point Wireless, D-Link APs, CISCO 1200 series APs, Aruba wireless and APs, Cisco Meraki, Linksys Wireless/Wi-Fi Routers
  • Visio, Excel, PowerPoint, Word
  • ServiceNow


Confidential, Minneapolis, Mn

Senior Network Security Engineer


  • Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.).
  • Involved in Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter VLAN routing, LAN security etc.
  • Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, EtherChannel implementation on ASR 9Kredundant pair.
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Installing, configuring Cisco Catalyst switches 9300, 6500, 3750 & 3550 series, Access control lists, ISDN, ATM, load balancing switches and configured IPX/SPX, HDLC, BGP, EIGRP, OSPF and VRRP on various sites.
  • Setup simplified and traditional VPN communities, and Cisco Any connect.
  • Worked on stacking of the devices based on the network requirement with Cisco Catalyst 9300 series depending on the requirement with a stack count of 8, 6, 2, 3.
  • Configuring HSRP between VLANs, Configuring Ether-Channels and Port Channel on Cisco 9300 catalyst switches
  • Experience with Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater visibility and scalability in a data center environment.
  • Worked with Cisco Channel partners to build practices around Cisco ACI, worked on configuring tenant policies, VXLAN, VTEPS, VNI, Bridge Doamins.
  • Experienced and configured firewall administration including Bluecoat, F5, Checkpoint firewall, Citrix Netscalar App.
  • Expertise in the development and implementation of voice and data equipment.
  • Experienced in the design, configuration and maintenance of numerous telecom systems, hardware and software applications.
  • Capable of providing high levels of technical and telecommunications engineering support.
  • Perform troubleshooting of telecommunications or data equipment which includes testing of lines and swapping out defective boards
  • Worked in container based technologies like Docker , Kubernetes and Openshift .
  • Managing the Openshift cluster that includes scaling up and down the AWS app nodes.
  • Design, install, configure, troubleshoot and maintain load balancers including Citrix Netscaler.
  • Configure and Manage site-to-site IPSEC VPN with different partners. Troubleshoot remote access services like Citrix NetScaler, Cisco VPN clients and for the users to access their enterprise network
  • Worked on F5 BIG-IP LTM 8900, Citrix and NetScaler configured profiles, provided and ensured high availability.
  • Responsible for the secure development lifecycle environment form NX-OS to Application Centric Infrastructure (ACI) in Data center, implemented in the lab environment.
  • Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.
  • Migrated Nexus 7Ks & Nexus 5Ks to an ACI Fabric consisting of 9336PQ Spines & 9332PQ Leafs in a Datacenter.
  • Configured MPLS CE (Customer edge router) and complete support for MPLS POP & Relate dissues in MP& CG
  • Experience with setting up MPLS Layer 3 VPN ax in data center and also working with BGP WAN towards customer
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
  • Worked with implementation of FortiGate secured SD-WAN architecture FortiOS 6.0 in creating efficient routing policies.
  • Deployed Viptela SD-WAN, worked with the team in implementing and designing of SD-WAN infrastructure and providing WAN connectivity across the enterprise.
  • Worked on Cisco ISE deployment which was a replacement for the ACS and provided new long term and short-term guest wireless services for the Port Authority.
  • Serve as technical leadership for Cisco Identity Services (ISE) Security Consulting Services projects. Act as a delivery engineer within our strategic Cisco Identity Services Engine (ISE) specialization team.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Responsible for penetration testing, Vulnerability scans, Threat and Risk management using a variety of tools.
  • Develop Vulnerability Assessment Report (VAR) to document findings and recommend remediation measures
  • Conducted vulnerability assessments on Web, Desktop, Server/Network Applications and Internal network vulnerability discovery projects
  • Worked with Tufin secure change-firewall optimization tool to implement rules.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
  • Successfully installed Palo Alto PA-3000/PA-5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls and implemented Zone Based Firewall and Security Rules on the Palo Alto Firewall. Exposure to wild fire feature of Palo Alto.
  • Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.
  • Configured systems log on the Palo Alto firewall and moved the logs to Splunk.
  • Worked with Palo Alto firewalls PA5050 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.
  • Responsible for Palo Alto and Cisco ASA firewall administration across our global networks Maintenance and configuration of Cisco ASR1000 series
  • Installing, configuring, managing and modifying cisco Data Center Network Manager version 10.3 and 10.4.
  • Datacenter experience create new cable run list (L1), document runbook and Solution planning and upgrading, architect VXLAN, ACI and ASA cluster firewall with NAC, ISE
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 9300, Nexus 7010, Nexus 5548 and Nexus 9k as per the requirement of the Organization.
  • Experience with F5 load balancers and Cisco load balancers (CSM, ACE, and GSS).
  • Working on configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Has experience in Bash and Python scripting with focus on DevOps tools, CI/CD and AWS Cloud Architecture and hands-on Engineering.
  • Scripting for automation of processes for Windows Servers. Familiarity with main script languages like Power Shell, PHP, Shell, Perl, Python.
  • Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible, Python scripting
  • Experience using Ansible as an infrastructure management tool.
  • Served as a primary point of contact for infrastructure automation configuration via Ansible , Python, Cloud Formation.
  • Experience with configuration management tool Ansible .
  • Configuring and managing F5 ASM (Application security manager). Developed security policies.
  • Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers
  • Thorough understanding and Experience in F5 concepts which include Virtual servers, Pools, Health monitors, SSL Profiles, Persistence profiles, Load balancing methods, HA pair, irules.
  • Experience with F5 load balancers to provide Land Balancing towards Access layer from core layer and configuring F5 LTM both by GUI and TMSH/CLI and Cisco load balancers (CSM, ACE and GSS).
  • Upgraded load balancers from Radware to F5 BigIP v9 which improved functionality and scalability in the enterprise.
  • Used Cisco ACI Fabric which is based on Cisco Nexus 9000 series switches and Cisco Application Virtual Switch (AVS).
  • Installed and configured latest Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per business requirements.
  • Implementation and Configuration (Profiles, irules) of F5 Big-IP LTM-6400 load balancers
  • Managed the F5 Big IP GTM/LTM appliances to include writing irules, SSL offload and everyday task of creating WIP and VIPs.
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs.
  • Participated and implemented zscaler cloud firewall for all the remote offices in North America, Europe and Asia sites.
  • Trained junior colleagues on the zscaler project and how to configure the tunnels to zscaler portal from the local cisco routers.
  • Configured zscaler tunnels on the dia circuits on all the remote offices and moved all the offices of to backhauling the internet from data center to local dia circuit through zscaler firewall.
  • Hands-on experience in using VMware machines.
  • Experience working with our team on monitoring, maintaining and troubleshooting LAN, WAN, and Wi-Fi network connectivity
  • Configured WIFI APs connected in LAN to reduce cable costing by creating AP, worked on Cisco SP Wi-Fi, troubleshoot in Cisco Aironet3700,1700 and 600 series.
  • Managed and maintained VMWare ESX hosting environment.
  • Installed, maintained, and administered storage area network servers in a VMware environment.
  • Deploying Cisco Aironet 2700, 3700 Series, Cisco Meraki E3nterprise Cloud Access Points and Wireless Bridges/Repeater for LAN Expansions.
  • Performed sizing calculations of VMware environments based on current systems and future growth.
  • Customize Layer 2 and Layer 3 networking between VMware, networking components, and storage for high availability and maximum performance.
  • Experience working in SD-WAN technology. Part of a migrating team from MPLS to SD-WAN.
  • Implementation experience with SD-WAN, SD-LAN.


Confidential, Bedford, MA

Senior Network Security Engineer / Firewall Engineer


  • Configured L2 and L3 security features on devices
  • Experience with design and implementation of Virtual Switching System (VSS) on 9400 Switches
  • Manage a very large DNS environment using Lucent QIP and manual management of DNS for DMZ/External servers broad Hands on Experience in Inter-VLAN routing, redistribution, access-lists, and dynamic NAT.
  • Configured HSRP and VLAN trunking 802.1Q, VLAN routing on catalyst 9300 switches.
  • Implemented Cisco Meraki Enterprise Wireless solutions for corporate infrastructures.
  • Deployed Cisco Meraki Enterprise Cloud for Corporate HQ, Co-Locations and 500+ branches with distinct SSIDs
  • Implemented Cisco Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings.
  • Performed upgrade process for Cisco ISE software from version 1.0.4 to 1.1 ADE-OS, patch management and data backup management.
  • Hands on experience installing and configuring Cisco ISE 1.3 and later upgrading to 1.4.
  • Configured Solar Winds Orion NPM and used it to monitor traffic on a network.
  • Using Solar Winds to generate reports on WAN utilization.
  • Performing daily monitoring and maintenance of Solar winds Orion software.
  • Install, configure and monitors Solar Winds Orion NPM\NCM and Quality of Experience (QOE).
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience
  • Experience CSM, F5 (LTM) Load balancers to provide efficient switching and routing for local and global traffic.
  • Implemented many numbers of security policy rules and NAT policy rules on Palo Alto, created Zones, Implemented Palo Alto Firewall interface, Palo Alto IDS, and VLAN.
  • Worked on the implementation of VXLAN and MLAG pairing of the switches.
  • , was involved in configuring & maintaining F5 DNS (Global traffic Manager)
  • Controller and BigIP -LTM (local traffic manager) for wide area load balancing and global redirection using various load balancing techniques.
  • Involved in network integration and support of load balancers across F5 platforms which includes updating to latest version of Operating system with latest hot fixes along with set up of enterprise manager for monitoring all the devices.
  • Deploying, Scaling and troubleshooting many Datacenters across all of AWS network fabrics.
  • AWS data backup (snapshot, AMI creation) techniques, along with data-at-rest security within AWS.
  • Deploying the code to AWS instances and spin new instance depending on the requirement
  • Designed and implemented remote dial-up solution for clients
  • Installed and configured workstations for IP based LAN’s
  • Worked on Palo-alto Next-Gen PA-5000 Firewalls implementing and managing NAT, IPsec, site-to-site and remote VPNs, advanced inspection, anti-spoofing and AAA policies
  • Implemented Meeting place server 7.0 and integrated with CUCM 8.0 through SIP Trunks.
  • Configured VoIP devices and IP phones such as 7940, 7942, 7960, 7961, 7971G-Ge, 7975G.
  • Implemented VoIP solutions using SIP & H.323 for Cisco routers 2851 and practiced sound knowledge of Avaya VoIP products and BroadSoft phone switches.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x
  • Upgraded the Firmware and Software on WLC 5508 and all Access Points within the building.
  • Manage deployment and testing of code updates for wireless systems, such as WCS, WiSM, and WLC.
  • Configured and managed with Cisco wireless access points 205 series supporting 802.11 ac
  • Configuring Virtual Device Context in Nexus 7010 and Worked on Network support, implementation related internal projects for establishing connectivity between the various field offices and data centers
  • Coordinated with a team to upgrade network by changing primary routing protocol to OSPF from EIGRP and Participated in the modification of BGP from multiple MPLS powered routers
  • Contributed to implementation and configuration of F5 BIG-IP LTM-6400 load balancers, redistribution into OSPF on the core ASA firewall, Working with Checkpoint Support for resolving escalated issues.
  • Extensive Knowledge in configuring and troubleshooting Secure Web Gateway
  • Expert in configuring, implementing and troubleshooting A10 load balancer in the enterprise network
  • Worked on implementation of the basic F5 ASM, F5 LTM and F5 APM.
  • Test and implement cisco ACI based network infrastructure as open stack underlay network
  • Installed and configured DHCP Client/Server
  • Update customer networks by configuring routers, switches, and incorporate the SDWAN into the network design.
  • Managed the network engineering team for the modification of the global wide area network to support Office 365 and Skype for Business using SDWAN
  • Deployed and configure Cisco Meraki SDWAN at 30 sites globally
  • Configured Bluecoat as a forward proxy for all Web URL Filtering.
  • Worked with F5 Load balancing, IDS/IPS, Bluecoat proxy servers annd Administrating.

ENVIRONMENT: L2 AND L3, VSS, DNS, VPN, CSM, PALO ALTO, VXLAN, MLAG, AWS, VDC, VPC, OTV, MPLS, NEXUS 7K, F5 BGP-IP, Checkpoint Firewall, SPLUNK, Wireshark, FireEye. Bluecoat Proxy, SD-WAN, F5 load balancing, DHCP.

Confidential, Austin, TX

Senior Network Engineer


  • Recommended Security considerations for the Intranet data center, integrating security, providing solution design details and configuration details Developed Automated reports from shell script as per Client requirement.
  • Manage a very large DNS environment using Lucent QIP and manual management of DNS for DMZ/External servers broad Hands on Experience in Inter-VLAN routing, redistribution, access-lists and dynamic NAT
  • Defining the application security class in the associate that to the local traffic pool in ASM, APM.
  • Experience deploying ACI in Network-Centric model, Data center Architecture; SDN/ACI.
  • Installation, configuration and OS upgrade of Sun Solaris 8, 9, 10 and Red hat Linux.
  • We used Unix/Linux shell environment. Typically, in Unix we create "bash" shell scripts, but I can also create shell scripts using python, and it's simple. We have named shell scripts with the .sh extension and run as any bash shell script.
  • Developed a python script, which will parse all trace files and calculate throughput, latency and drop rate
  • Experience in Openstack Liberty environments in volume management using network and port management using Neutron and image management using Glance.
  • Implemented, analyzed and recommended appropriate system for the out of band management monitoring. utilizing Solarwinds for primary and disaster recovery site.
  • Monitored and responded to network anomalies utilizing Solarwinds/Orion's software and recommended appropriate network solutions for issues.
  • Hands on experience in deployment of projects for network monitoring software like Solarwinds and Whatsapp Gold.
  • Maintained, and expanded current Solarwinds deployment
  • Worked with the Network planning team on IP allocation scheme for the routers, switches, workstations, phones, APs and various other devices in the c us environment. Used Infoblox, Net MRI, Solarwind IP monitor and various tools.
  • Upgraded IOS, and Junos images on Cisco and Juniper Devices. Build Clusters on SRX240, EX4200, 4500 Juniper series and Cisco 3750 switches.
  • Experience with working on firewalls like CISCO ASA 5500 series (5510,5540), JUNIPER SRX series and also PALO ALTO (pa-3060, pa-5060), etc.,
  • Experience with working on Juniper switches like ex2200, ex2500
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Implemented Juniper firewall & switches, Developed and implemented core network consolidation plan. Included redundant configuration of Juniper EX8200.
  • Configured RIP, OSPF and Static routing on Juniper M and MX series Routers.
  • Designed and Implemented Overlay Network Management Network to manage all our production devices with syslog, Solarwinds NPM.
  • Configured VLAN, Spanning tree, VSTP, SNMP on Juniper EX series switches.
  • Designed and implemented remote dial up solution for clients. Blue Coat Admin Experience.
  • Increasing business speed, agility, and efficiency by taking charge of core network and security using Infoblox.
  • Created many security policies depends on the requirement using Deployment wizard in ASM.
  • Worked on implementing 802.1X through cisco ACS and ISE. Migrated policies from ACS to ISE. Implemented end point security for wired and wireless users using certificate based and MAC bases authentication.
  • Worked with Juniper SRX550 and Palo-alto Next-Gen PA-5000 Firewalls implementing and managing NAT, IPsec, site-to-site and remote VPNs, advanced inspection, anti-spoofing and AAA policies.
  • Implemented VoIP solutions using SIP & H.323 for Cisco routers 2851 and practiced sound knowledge of Avaya VoIP products. Design and Architecture of F5 LTM, GTM, APM, ASM and application delivery network.
  • Securing the applications from threats by offloading the SSL in ASM.
  • Designed and implemented Aruba wireless infrastructure to ensure full connectivity and continuous service.
  • Configured and managed with Aruba/cisco wireless access points 205 series supporting 802.11 ac.
  • Set Aruba Access to link distribution switch system and then to WLAN controller. Configured AP groups, Authentication roles, SSID, 802.1X, RF parameters, 2.4 and 5 GHZ bands, provision Aps etc.
  • Worked hand-in-hand with different vendors for company products, solutions and performance.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls, CISCO PIX 506, and PIX 515.
  • Configuring Virtual Device Context in Nexus 7010 and Worked on Network support, implementation related internal projects for establishing connectivity between the various field offices and data centers.
  • Coordinated with a team to upgrade network by changing primary routing protocol to OSPF from EIGRP and Participated in the modification of BGP from multiple MPLS powered routers
  • Implementation Route redundancy protocols like HSRP, VRRP, GLBP.
  • Efficient in cabling as per co-location contracts with loop-back testing, including all DS1, DS3, T1, T3, CAT 6 and CAT 5 connections as per defined cabling procedures.

Environment: VSS, DNS, NAT, Cisco ASA, VPN, Checkpoint, Cisco Firewalls, C programming, Cisco PIX, F5 (LTM),ASM,APM, Load balancers, RIP, OSPF, Juniper, Shell, VSTP, SNMP, Infoblox, VLANs, Port Security, VDC, VPC, OTV, Nexus 5k, 7k, Netgear switches, Juniper SRX550, Palo-alto, Netgear Firewall, IPsec, Wireshark, SolarWinds, VoIP, Aruba, 802.11, WLAN, EIGRP, BGP, DHCP, Blue coat, HSRP,VRRP,GLBP, VTP, ACL,WAN, DS1, DS3, T1, T3, CAT 6 and CAT 5 connections, Aruba.

Confidential, Folsom NJ

Network Engineer


  • Configuring and troubleshooting multi-customer network environment.
  • Involved in network monitoring, alarm notification, and acknowledgment.
  • Implementing new/changing existing data networks for various projects as per the requirement.
  • Troubleshooting complex networks layer 1, 2to layer 3 (routing with MPLS, BGP, EIGRP, OSPF protocols) technical issues.
  • Performing troubleshooting for IOS related bugs by analyzing history and related notes.
  • Carrying out the documentation for tracking network issue symptoms and large-scale technical escalations.
  • Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-around technical support.
  • Worked with scripting Automation for JavaScript, Linux/Unix toolbox, Python, Perl, Bash, ESX, VMware Virtual Switch with Design/Implementation
  • Monitor the traffic of the network via NTA and IPAM
  • Provided Technical Support to customers and partners on Palo Alto security appliances
  • Commissioning and Decommissioning of the MPLS circuits for various field offices.
  • Preparing feasibility report for various upgrades and installations.
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-VLAN routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc.)
  • Identify, design and implement flexible, responsive, and secure technology services
  • Created scripts to monitor CPU/Memory on various low-end routers in the network.
  • Installed and maintained local printer as well as network printers.
  • Handled installation of Windows NT Server and Windows NT Workstations.

Environment: MPLS, BGP, EIGRP, OSPF, NTA, IPAM, VLAN, Port Security, Trunking, LAN, RADIUS, TACACS+, LAN, WAN, MPLS, Solar Winds.

Confidential, Austin, TX

Network Engineer


  • Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access.
  • Experience in Cisco 7200, 7600 routers, Cisco 2800 3700 series switches: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay and ATM).
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.
  • Configured the Cisco router as IP Firewall and for NATting.
  • Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.
  • Installed and configured PIX 520, 525, 535 series firewalls, configured standard and extended access-lists and policy- based filters.
  • Configured ASA 5510 appliance and VPN.
  • Responsible for implementing Qos prioritizing voice traffic over a data.
  • Implemented SNMP on Cisco routes to allow for network management. Completed the installation and configuration of T1, T3 & OC3 circuits.
  • Troubleshoot TCP/IP problems, troubleshoot connectivity issues


Network Admin


  • Worked with the Help Desk for circuit troubleshooting to give Support to the Tech persons at the site.
  • Configuring routers and sending it to Technical Consultants for new site activations and giving online support at the time of activation.
  • Hands on experience with installation of fiber optic, segregating and isolating the work area.
  • Testing the jumpers and safety of the fiber optic cables in the datacenter environment.
  • Configured switches with port security and 802.1 xs for enhancing customer’s security.
  • Monitored network for optimum traffic distribution and load balancing using Solar winds.
  • Validate existing infrastructure and recommend new network designs.
  • Handled Tech Support as it relates to LAN & WAN systems.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Worked, managed and maintained LAN networks, VLANs and database, Port Security on Nortel 5510, 5520; Cisco Catalyst 3850, 4500 and 6500 switches and implemented VDC, VPC, and OTV on Nexus 5k and 7k switches, Reviewing & creating the FW rules and monitoring logs as per the security standards in Palo Alto FW.
  • Providing support to networks containing more than 2000 Cisco devices.

Environment: LAN, WAN, VDC, VPC, OTV, Nexus 5k and 7k, port security, Palo alto, F5 and solar winds.

Hire Now