We provide IT Staff Augmentation Services!

Network Security Architect Resume

Baltimore, MD

SUMMARY:

  • 10+years of experience as a Network & Security Engineer, including hands - on experience in providing network design, deployment, support, installation and analysis.Experience in providing a wide rangeof Network Infrastructure and Security Solutions for LAN / WAN, Enterprise and Data Center Environments.
  • Strong knowledge of fundamentals such TCP/IP, Routing, Switching, Firewalls, Network Design, Deployment, Monitoring, troubleshooting and High Availability .
  • Strong Experience with Automation working with Ansible Playbooks , Python Scripts, Postman scripts API to automate many tasks on of multivendor Network Devices
  • Experience working with Virtual-Firewall’s on Cloud(AWS, AZURE) and on VM’s.
  • Experience Working in Large Multi-Vendor Environment such as Cisco, Juniper, BIG-IP, Palo Alto Checkpoint, Fortigate, Solarwinds, Splunk etc.
  • Experience Working with Network, monitoring, troubleshooting tools, orchestration suites such as Solarwinds NPM, Sevone, Wireshark, Firemon, Tufin, AlgoSec.
  • Strong Background working with Security tools such as McCafee, Symantec, Nessus, Nmap, Nipper, Splunk, Qradar, Cylance, endpoint Protection suites, Bit-Locker etc.
  • Experience with Cisco ISE, ACS, NAC, Radius, Tacacs for AAA, Network Access-control, Profiling, Posturing
  • Experience and working knowledge on working with Switching and Routing Technologies such as CiscoNexus, Cisco Catalyst 6500’s, 4500’s&VPC, VDC, VRFconfigurations. Experience working with Cisco IOS, IOS-XR, NX-OS, JunOS for configuration & troubleshooting
  • Knowledge in preparing Technical Documentation and presentations using Microsoft VISIO/Office.
  • Excellent technical and project management skills combined with strong communication skills
  • Experience working with Customer Facing roles, Customer management, problem solving, debugging skills and capable of quickly learning, effectively analyzing results, implementing and delivering solutions as an individual and as part of a team.

CORE SKILLS:

Firewalls: Cisco ASA, Firepower, FTD, Palo Alto, Checkpoint, Fortigate, Juniper SRX.

Layer 2&Layer 3: Switching(VLAN, VTP, dot1q, Spanning-tree, PVST, Routing Protocols(Static, Dynamic, EIGRP, OSPF, BGP), Cisco Catalyst, Cisco Nexus, Cisco ACI, Redundancy and High Availability.

Load Balancing: F5 LTM, GTM, Cisco ACE

AccessControl: Cisco ACS, NAC, Cisco ISE

Security tools: Nessus, Splunk, Qradar, Cylance, McAfee, Symantec, Bit-Locker

Monitoring: Solarwinds NPM, Sevone, Nagios

Configuration management: Cisco Prime, FireMon, AlgoSec

Operating Systems: MS Windows, MS Server,Linux

Office Suite: Outlook, Word, Excel, Vizio

Automation & Scripting: Ansible, Python.

PROFESSIONAL EXPERIENCE:

Confidential, Baltimore, MD

Network Security Architect

Responsibilities:

  • Design, Engineer, Deployment and Administration of Firewalls, Network devices in HA for datacenters
  • Expertise with Palo Alto Next-Generation devices
  • Deployment of Palo Alto 5260’s and 7050’s in HA pair out of Box for Multiple Data-centers.
  • Deployment and administration of Panorama firewall management tool to administer Palo Alto Firewalls.
  • Responsible for Migration from Legacy Cisco ASA firewall (Pix, FWSM) to Palo Alto firewall . This includes objects. Object-groups, Security rules, NAT rules. Also move from Layer 4 port based rules to Layer 7 application based rules.
  • Implement the Next generation firewall features such as URL-filtering, AV, AS profiles, Vulnerability Protection,Threat Prevention. Also implement SSL Decryption Policies on Palo Alto’s.
  • Upgrade PAN-OS code from 6.1 to 8.1 in Palo Alto firewalls.
  • Migrate form Cisco ASA/Pix to Cisco Firepower 2100/4100 with ASA logical system and FTD .
  • Engineer,Deploy RemoteAccess VPN for 10,000+ user with redundancy at multiple sites. On Cisco Firepower 4120 and 4150 appliances.
  • Deployment of Cisco Firepower 4150. Firewalls as edge Firewalls. Devices with FTD code for next generation features. Setup Cisco Firepower Management Center(Firesight) to manage Firepower Next generation Features such as IPS, Application Control, Advance malware protection (AMP)
  • Experience with Deployment and administration of Cisco ISE for NAC, AAA. This involves setup of Policy Elements, AV definitions, Profiling of Endpoints. End point compliance-posturing.
  • Strong experience with Automation. Automation of large number of tasks for Multiple Vendors for backups, blocks etc using Ansible Playbooks and Python Scripts.
  • Administer and use orchestration Suite Firemon to manage configurations, Backups, check compliance on firewalls.
  • Working for a Large Environment with 100+ (physical, Virtual) Firewalls spread across multiple Data Centers with Cisco, Palo Alto, Juniper, Fortigate, and Checkpoint vendors.
  • Experience with Splunk Security Infrastructure and Event Management. (SIEM). Using Splunk for search and analysis of logs.
  • Troubleshoot and researched Security incidents, alerts based on Splunk Network Traffic Flow and Log Activity.
  • Provide remote support for the reconfiguration of the Symantec Endpoint Protection Management console and Installation and configuration of IT Analytics.
  • Dedicated security monitoring and analysis of cyber security events (Triage) of tracking phishing URLs, and emails and deep dug investigations.

Confidential, Charlotte, NC

Security Engineer

Responsibilities:

  • Expertise with Design, Engineer, Deployment and administration of Firewalls, Security devices
  • Deployment of Palo Alto 5060’s , 3020, and Panorama to administration
  • Administration of Palo Alto Firewall and Panorama firewall management tool to administer Palo Alto 5050, & 5250 device groups .
  • Deployment of Palo Alto Firewall VM’S in on Servers Deployment of Plao Alto Firewall’s on AWS cloud.
  • Configure and troubleshoot IPSEC VPN form Site to Sitewith Cisco, Palo Alto, and Checkpoint Devices as peer.
  • Configuring and troubleshoot Global protect SSL VPN for Work from Home Users on Palo Alto
  • Configuring SecurityPolicies, NAT polices forAccess control, inter zone connectivity, External Accesson Palo Alto Firewall.
  • Experience with Palo Alto Global protect cloud service
  • Responsible for Migration from Legacy Cisco ASA firewall (Pix, FWSM) to Palo Alto firewall . This includes objects. Object-groups, Security rules, NAT rules.
  • Experience with Automation. Automation of large number network appliance of tasks for Multiple Vendorsusing Ansible
  • Experience with Deployment of Firewalls on AWS
  • Experiencewith AWS, VPC, NAT’s, Networking on Cloud, Troubleshoot issues leveraging VPC flow log s and researched Security incidents, alerts based on QRadar Network Flow and Log Activity.
  • Analyze and review data from SIEM - Qradar for suspicious activity and trigger alerts to the concerned teams and applying rules and Building Blocks to SIEM
  • Dedicated security monitoring and analysis of cyber security events (Triage) of tracking phishing URLs, and emails and deep dug investigations.
  • Integration of different devices/applications/databases/ operating systems with Qradar SIEM
  • Administered Cylance Antivirus and Cylance Endpoint Protection across the entire network to include removal of viruses, update of definitions, pushing upgrades, managing accounts and configuring policy settings.
  • This includes developing customized signatures, enterprise content filtering, or firewall ACL change recommendations.
  • Administered Malware Byte s across the entire network to include removal of viruses, update of definitions, pushing upgrades, managing accounts and configuring policy settings
  • Monitor and analyze data feeds of events and logs from firewalls, routers, and other network devices or host systems for security violations and identify vulnerabilities.
  • Responsible for performing periodic Vulnerability assessment (VA) as per the security policy and standards.
  • Actively used NMAP for port scanning and made sure only appropriate ports are in use.
  • Actively researched on any security gaps that are beyond the ability of detection by any security scanner.

Confidential, Richardson, TX

Network Security Engineer

Responsibilities:

  • Analyze and review data from SIEM - QRadar for suspicious activity and trigger alerts to the concerned teams.
  • Analysis of multiple log sources including firewalls, routers, switches, web servers and multiple networking devices.
  • Responsible for assisting with deployment of network infrastructure configurations across multiple product and technologies.
  • Acted as the primary responder for managed security incidents pertaining to client firewalls and all network infrastructure components.
  • Investigating logs and payloads for server crashes/core dumps, DDoS attacks, SQL/XSS, SPAM, etc.
  • Installing and configuring Qualys in premises and on cloud environment.
  • Responsible for performing vulnerability assessment on critical systems using Qualys.
  • Configured and scheduled Qualys Scanner in QRadar to perform scan on regular intervals.
  • Collaborate with team members in tuning SIEM applications to establish a baseline for network activity and rule out false positive events.
  • Coordinate with SMEs to resolve any security incidents and correlate threat assessment data as needed.
  • Support in the detection, understanding and resolving information security incidents affecting information systems & the business.
  • Research and recommend corrective actions to ensure information dissemination regarding targeted or potentially targeted attacks.
  • Investigate, document and recommend appropriate corrective action plans relating to IT security .
  • Provide root cause analysis and remediation techniques for management regarding security incidents and governance documents
  • Worked extensively in Configuring, Monitoring and Troubleshooting Checkpoint security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Administration of Service Requests, Incident Tickets, troubleshooting of CheckPoint 15000, 23000 series firewall.
  • Implementation, configuration of Policies and troubleshooting of Checkpoint FirewallviaGAIA
  • Adding security rules and pushing the security policy on Checkpoint Using Smart Update, User Management and Authentication in Checkpoint Firewall.
  • Maintained sensors including scripting, updating IDS/IPS vendor signatures, fine-tuning, and troubleshooting and resolving of networking problems. Kept track and reported on status, i.e. up/down, current network connectivity, troubleshooting process. Maintained currency of system architecture diagrams (both logical and physical) to include, but not be limited to, hardware, software, ports, switches, IP addresses, installations, and upgrades.
  • Engineer the Migration of Outdated Cisco ACE 20, 30 load balancers to F5 BigIP LTM to improve availability, functionalityand scalability in the enterprise.
  • Configuration and Deployment of new Big IP F5 LTM and GTM load balancers across Multiple Data Centers
  • Day to Day activities Include Incident Resolution and Service Request for Creating new WIP and VIP’s on the F5 LTM/GTM. Virtual Edition and the F5 BigIP VIPRION 4800, 4480 Hardware.
  • Configure Server Pool, Pool Members, and Server nodes for a VIP.
  • Configure SNAT and NAT for accessing the content from Internet.
  • Configure Different types of Monitors to Check the health of Servers
  • Configure advanced features on VIP’Ssuch as Profile for Cookie persistence, SSL termination.
  • Software Upgrade projects across F5 Upgrade of Big-IP from 11.6 to 13.0
  • Troubleshoot issues related to Application slowness by Analyzing nodes, Health monitors, and Server pools.
  • Management of F5 LTMs & GTMs Load Balancers. This Includes Incident Resolution Tickets, Service Request Tickets, Certificate renewals.
  • Configuration and troubleshooting of Issues related to VIP’s , Server pool’s, Redundancy, Persistence, SSL offloading to improve application performance.
  • Performing troubleshootingon slow network Performance/connectivity issues, routing issues that involves OSPF, BGP and identifying the Root Cause Analysis of the issues
  • Perform Layer 2 switching and Layer 3 routing within a Data Center Environment, between Core, Distribution & Access Layers
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and downstream devices.
  • Infoblox to provide DNS, DHCP, IPAM, administration services.
  • Implemented DHCP, DNS, IPAM configuration on the servers to allocate, resolute the IP addresses on Infoblox.
  • Infoblox Management of replication between Grid Master and member appliances
  • Exercise with Cisco Source Fire IPS and IDS devices withFiresight Management Center.
  • Active Directory, DHCP, and DNS Management. Creating user accounts, file shares and permissions.
  • Use tools such as CA Suite, Spectrum, Wireshark, NetBrain etc.

Confidential, El Segundo, CA

NetworkSecurity Engineer

Responsibilities:

  • Primary responsibility is to design, Test and deploy various Network Infrastructure and Network Security Products in High Availability Configuration from Vendors such Cisco, Juniper, HP Procurve and Palo Alto.
  • Experience with Splunk Security Infrastructure and Event Management. (SIEM). Using Splunk for search and analysis of logs
  • Provide remote support for the reconfiguration of the Symantec Endpoint Protection Management console and Installation and configuration of IT Analytics.
  • Create host integrity policies to block and remediate endpoints , before allowing onto network
  • Responsible for configuring Virtual Labs to create and test policies, updated client heartbeat response to SEPM, decrease resolution time, reconfigured definitions updates and deployment using branch offices local systems as Group Update Providers(GUPs)
  • Utilize Network Traffic Packet analyzers to investigate and solve security threats.
  • Assist in creating personalized security policies to proficiently secure their infrastructure using Symantec Endpoint Protection Manager
  • Updated all policies to increase functionality of 12.1.6 services and upgrading of client to 12.1.6
  • Assist with creating location awareness policies, and deployment of SEP client via SCCM
  • Security configuration and remediation of endpoints , anti-virus ( Symantec EndpointProtection ), and encryption(BitLocker)
  • Provide hardware technical support via remote or desk side for endpoints (desktops, laptop, and servers), (troubleshooting, and maintenance).
  • Provide software technical support (Install, assist with application features/train, troubleshoot).
  • Resolve issue with Users, Computers, or Groups in Active Directory, add/delete, create accounts, and assess security rights
  • Configure VDC on Nexus 7k. Virtual Port Channel (VPC) between 5K and 2K.Configured VRF, VRF-Lite.
  • Configuring Nexus 2K (FEX) which acts as a remote line card (module) for the Nexus 5k for the Nexus 5000 to connect servers and storage devices.
  • Worked on Configuration of VLAN, VRF, VX-LAN, VPC, on Nexus devices.
  • Performing troubleshootingon slow network connectivity issues, routing issues that involves OSPF, BGP and identifying the Root Cause Analysis of the issues.
  • Deploying and decommissioning of Cisco Routers, Cisco switches and their respective software upgrades.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Hands on Experience working on NextGen Firewalls such as Cisco ASA with Firepower (5555X) and Palo Alto (5050).
  • Cisco Firepower management tool to manage Cisco ASA with firepower, Firepower appliances
  • Refining IPS Policy and Creating Rules as per the Security Standard on Cisco Sourcefire IPS.
  • Perform firewall administration adding, updating and troubleshooting as per requirement rules/policies on Palo Alto 5050 & Cisco ASA 5555, 5585.
  • Configure Security Profiles on Palo Alto / ASA for URL filtering, Anti-Virus, Anti-Spyware, Vulnerability Protection, Threat Prevention, File Blocking.
  • Responsible for investigating and troubleshooting incidents related to Cyber Security or Network Security
  • ConfigureClientless/AnyConnect SSL VPN on Cisco ASA for Work from Home Users
  • Cisco ASA as VPN concentrators for WFH users.
  • Configuration and Troubleshooting of IPSECVPN tunnel On Palo Alto/ Cisco ASA and Cisco ASA as peer.
  • Handle Incident tickets & Service Requests related to Cisco ASA & Palo Alto firewall, & VPN along with the connectivity issues and provide prompt support when any issue pops up.
  • Analyze of firewall logs , Provide administrational and Monitoring Support, Dynamic Updates for Palo Alto 5050 Firewall & Cisco ASA 5555, 5585.
  • Responsible for Migration from Legacy Cisco ASA firewall to Palo Alto firewall .
  • Work with Level 2 / Level 3 Engineering on software bugs and solutions involving software upgrades and feature enhancements.

Confidential

Network Engineer

Responsibilities:

  • Provide Subject Matter Expertise in network switches, routers, firewall, and security technologies within TASC
  • Experience with design and implementation of Data center migration. Involving in Access, Distribution and Core layers.
  • Experience working with Cisco Nexus 7000 as Core Switches, and Nexus 5500, 2148, 2248 seriesatDistribution and access level.
  • Strong Experience in Load balancing solutions by implementing F5 LTM in Various Environments.
  • Day to Day Management, troubleshootingF5 LTMs & GTMsfor the Web Applications/ corporate applications, their Speed & availability.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Administration of Service Requests, Incident Tickets, troubleshooting of Checkpoint / Juniper SRX/ Cisco ASA Firewalls.
  • Hands on Experience working on NextGen Firewalls such as Cisco ASA (5585X), Firepower 9300, Cisco Firepower management Center tool to manage Cisco ASA with firepower appliance
  • Experience with Cisco Identity Services Engine (ISE)
  • Worked On UNIX, Linux, and Windows Platforms and involved in capacity planning of Network Maintenance.
  • Hands-on experience on VMware, VSphere, virtualization
  • Strong Experience in working with F5 Load Balancers and their Implementation in various Networks.
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Knowledgeable in understanding of the ITIL framework.
  • Handle Incident tickets & Service Requests related to Cisco ASA firewall, & VPN along with the connectivity issues and provide prompt support when any issue pops up.
  • Mitigated and eliminated the potential risk, defects, trends and vulnerabilities from rapid scale of the environment and ensured network agility without compromising quality
  • Worked on Standardizing nonstandard configurations and reduced hardware and software variability.

Confidential

Network Operations Engineer

Responsibilities:

  • The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Cisco ASA 5510, 5540 Firewall Administration, Rule Analysis, Rule Modification
  • Troubleshoot by Analyzing traffic passing managed firewalls via logs and packet captures.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc)
  • AAA implementation using Cisco Secure ACS (TACACS+, RADIUS)Identify, design and implement Flexible, responsive, and secure technology services
  • Strong knowledge on networking concepts like TCP/IP, Routing and Switching
  • Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.
  • Verify network status using basic utilities (including: ping, trace route, telnet, SSH, ARP, ipconfig)
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

Hire Now