We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

NY

PROFESSIONAL SUMMARY:

  • Around 8 + years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting, Routing and Testing of networking system on both Cisco and Juniper Networks
  • Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system remedy.
  • Solutions oriented Vo IP Network Engineer with noted accomplishments in implementation and support of complex corporate networks and Vo IP networks.
  • Experience of routing protocols like EIGRP, OSPF, RIP, and BGP
  • Worked on Cisco 7200, 3800, 3600, 2900, 2800, 2600, 1800 series Router and Cisco 2900, 3500, 4500, 5500, 6500, 7000, 9000 series switch
  • Extensive hands - on experience with complex routed LAN and WAN networks, routers and switches
  • Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
  • Extensive experience with Juniper portfolio including JUNOS, EX switching and SRX firewall and Palo Alto networks firewall.
  • Hands on experience in Aruba S2500 switches, Aruba 7200, 3600 series wireless controllers, Aruba IAP 105, Airwave Products and clear pass Servers.
  • In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems
  • Experience in the setup of Access-Lists, and RIP, EIGRP, and tunnel installations
  • Proficiency in configuration of VLAN setup on various Cisco Routers and Switches
  • Experience with working on Palo Alto Next-Generation firewalls security profiles and Cisco ASA VPN.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks
  • Enhanced level of experience with OSPF, BGP, and TCP/IP.
  • Worked with up gradation of Firewalls (Cisco ASA, Juniper SRX, Palo Alto and FortiGate Devices).
  • Well experienced in configuring gateway redundancy protocols like HSRP, GLBP, and VRRP.
  • Worked on Aruba wireless controllers 3600/7210 and Aruba wireless access points 135, 225 and 275.
  • Experience with the implementation of multicast/MPLS/l2vpn
  • Good understanding of Amazon ELB, security groups, NACL, NAT, firewall and Route 53.
  • Experience with working on Palo Alto centralized management GUI PANORAMA.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
  • Experience in physical cabling, IP addressing and Subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Access control server configuration for RADIUS & TACAS+.
  • Expertise with 802.11x wireless technology.
  • Experience with Network Automation using Perl, Python and Bash
  • Have good knowledge and experience on F5 product modules such as AFM, LTM, GTM, Link Controller, ASM, Web Accelerator, Edge gateway and APM.
  • Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows, Linux, Dell & HP platforms in Development, Lab & Production Environments.
  • Extensive knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (2232, 2248)
  • Sound knowledge of virtual firewalls like Check Point VSX, IDS, IPS as well as encryption techniques.
  • Working with Cisco for opening TAC Case and resolving issues to meet project deadlines.
  • Expertise on cisco IOS, Cisco IOS-XR, Cisco CatOS, Cisco NX-OS, JUNOS.
  • Expertise with monitoring tools like Solar Winds & network packet capture tools like Wire-shark
  • Great team player and able to work under pressure 24x7 duty rotation
  • Experience in migration from Cisco infrastructure to Juniper MX routers and Switches such as EX and QFX-3500, QFX-5100.
  • Configured AWS IAM and Security Group in Public and Private Subnets in VPC.
  • Responsible for the installation and configuration of Cisco ASA and Palo Alto Firewalls.
  • Hands on experience of troubleshooting router based SDWAN failover of traffic.
  • In-depth knowledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.

TECHNICAL SKILLS:

Cisco & other vendor Equipment: Nexus 9K, 7K, 5K, 2K & 1K, Cisco routers (7600, 7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4500, 4900, 3750, 3500, 4500, 2900 series). PIX Firewall (506/515/525/535 ), ASA (5505/5510/5580 ), Cisco ICE, Cisco VoIP, Cisco ACE Load Balancers and Checkpoint (IP Series/NGX R65/IPSO)

Routing Protocols: RIP, IGRP, EIGRP, OSPF, IS-IS, BGP, HSRP, VRRP & GLBP

Network Management: Solar Winds, SNMP, Cisco Works, Wireshark, Python, Perl

Infrastructure services: DHCP, DNS, SMTP, FTP, and TFTP

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

Network Security: NAT/PAT, Ingress & Egress Firewall Design, F5, VPN Configuration, Dynamic, Palo Alto firewalls, FortiGate, Aruba ClearPass, Reflexive ACL, and authentication AAA (TACACS+ & RADIUS)

Platforms: Cisco IOS-XR, PAN-OS, Cisco Cat OS, NX-OS, AWS, Cisco IOS (11.x, 12.x), PIX IOS (6.7.x), CAT-OS UNIX, LINUX, Dell, HP, Windows XP, NT, 2000, 2003

Documentation: MS Office, MS Visio and Excel

PROFESSIONAL EXPERIENCE:

Confidential, NY

Sr. Network Security Engineer

Responsibilities:

  • Primary responsibility is development of Confidential wireless connectivity, networking business unit,design and deploy various network security & High Availability productslikeCisco ASA other security products
  • Configured IP RIP, PPP, BGP and OSPF routing.
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4.
  • Configured Global Protect Portal with OKTA Authentication
  • Configured IP access filter policies.
  • Responsible for Nutanix Virtual Hosts to include management with Prism on hyper converged systems
  • Worked with a Team responsible for deploying Cisco VoIP/WLAN/Router/Switch solutions
  • Experience with RF Engineering Planning. Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.
  • Management of all aspects of the corporate virtualization environment including both VM ware ESXi and Nutanix AHV/AOS
  • Communities, Route-Reflector clusters, Route-maps and route policy implementation.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Maintaining various network monitoring tools like Solar winds, Fluke, Splunk.
  • Worked on setting up the Nutanix system for replication/disaster recovery in colo sites and configured the SLA for MPLS.
  • Managed Zscaler cloud proxy to restrict access to harmful content.
  • Worked on subsequent conversion of DSG migration off RSA Hard-token/Soft-token over to OKTA for both Cisco ASA and Juniper/Pulse platforms.
  • Migrated the servers from old UCS system to new Nutanix system and manage the storage.
  • Managing Juniper JUNOS devices in production environments
  • Aruba - This was also a project at our DSG was to install a completely new wireless authentication system as well as migrate to a new controller infrastructure. The project was completed with zero downtime to users. Those Aruba Network platforms range from Aruba Networks Wireless Controllers (WLC), Aruba Networks Airwave (AMP), Aruba Instant Access Points, Aruba Networks ClearPass Policy Manager (CPPM) (Wired/Wireless), /Clear pass Guest (CPG), Aruba Airwave
  • Performed site refreshes on Cisco switching and Aruba wireless infrastructure
  • Hands on experience in Aruba S2500 switches, Aruba 7200, 3600 series wireless controllers.
  • Migrated from Cisco 3650 switches to Aruba 3810 series switches.
  • Deployed 6 Aruba RAP controllers (Remote Access Points) in the DMZ to provide direct secure connection from remote locations to corporate LAN.
  • Worked with team to implement NAC solution on Aruba wireless and LAN.
  • Basic knowledge of Citrix NetScaler.
  • Configure Cisco, Aruba and HP Access Points, WLC, WCS and Airwave.
  • Worked on Fortinets new FortiGate release the 3950B and 3951B to implement unified threat management (UTM).
  • Developed Scripts for work automation and tool framework extension (Python, Perl).
  • The role often involved a “the bucks stop here approach” where once the regional teams had passed a problem or difficulty up the line, we were the final team left to solve the problem
  • This global role helped expand my expertise into other areas such as Cisco UCS, Checkpoint Firewalls, Cisco ASA, and VMware NSX.
  • Migration from Cisco to Palo Alto firewall & Cisco to Checkpoint firewall.
  • Design, Deploy and Administer VoIP networks. Specializing in UCCX scripting, Unity Connection, Unified Communications Manager, H323 and MGCP gateways
  • Manages and configures VPN’s, NATing and Object group based ACL’s on Cisco ASA Firewalls.
  • Migrated SAP based applications from old Cisco ACE load balancers to new VMware NSX edges.
  • Deploying Site to Site VPN’s, Cisco Any Connect VPN Clients and SSL based Citrix Clients is part of my daily activities
  • Experience d with F5 1500 and 4200 series Local Traffic Manager as a reverse proxy for all client external facing websites
  • Provide d capabilities in supporting Boundary Security Devices, Active Directory, and firewalls to provide F5, TMG and Wireless Application Protocol (WAP) services.
  • Worked on Palo Alto PA-5000 and PA-3000 Series hardware handling App-ID, Content-ID and User-ID
  • Through presentations at client sites, enabled them to meet various technical standards related to IPv6 and their technology enhancements.
  • Create F5 monitor such as Address check, Service check, content check and interactive check using F5 GUI.
  • Created AWS Route53 to route traffic between different.
  • Configured AWS IAM and Security Group in Public and Private Subnets in VPC.
  • Design and Implement the changes on Palo Alto firewalls with PANOS 6.0 version. Make sure we have single pass through in equities environment for fast transactions.
  • Experience testing and troubleshooting layer1 circuit, layer 2 devices and WAN connections establishment and protocol debugging
  • Experience in WAN connectivity using Cisco routers by using T1, T3 and frame relay connections and its troubleshooting issues.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/ 5580/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Worked on Okta project and Cyber arc for More authentication and PCI environment.
  • Extensively worked with different senior engineers in troubleshooting SAN/VM ware/ Nutanix related issues.
  • WAN Infrastructure running OSPF & BGP as core routing protocol.
  • Design and implementation of Networks using TCP/IP
  • Knowledge of Client F5 LTM and GTM hardware platforms including engineering design and deployment implementation guidelines .
  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
  • Experience configuring Virtual Device Context in Nexus 7010
  • Worked on commissioning and decommissioning of the MPLS circuits for various field offices.
  • Use and maintain routing protocols EIGRP, OSPF and BGP on the ISR Router models like 2951, 3845, 3945,7206 in the network & also worked on BGP Route Reflectors, Confederations
  • Configured a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.
  • Configured and Managing LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.

Environment: F5 Load Balancer, Cisco ASR 1001/ISR 7206/3845/3945/2951 routers, NEXUS 7010 / 50 / 3850 switches, TACACS, BGP, OSPF, Solar winds, Python, Nutanix, Mobile Iron, Palo Alto, Cisco ASA 5580/5505/5520 , FortiGate, Aruba, Citrics, VMware NSX Edges, Cisco ACE.

Confidential, Cincinnati, OH

Network Security Engineer

Responsibilities:

  • Responsible for maintaining the design and integrity of Confidential internal/external network, including customer-facing environments.
  • Experience with moving data center from one location to another location, from Cisco 6500 based data center to both Cisco 6500 & Nexus based data center
  • Experience with implementing Cisco 6500 VSS at the distribution/core switches.
  • Designed and Deployed QOS on entire LAN and WAN edge devices ( cisco & Juniper) in place of existing non-consistent QOS policy.
  • Upgrades Identity Service Engine (ISE) from 1.2 to 1.4 Patch 3have experience and well versed in Windows servers and office 365 setup and management of email accounts.
  • Also can manage office 365, networks and windows servers
  • Responsible for entire LAN and WAN maintenance and troubleshooting of the company network.
  • Have experience and well versed in Windows servers and office 365 setup and management of email accounts.
  • Also, can manage office 365, networks and windows servers also Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements.
  • Implemented VLAN, LAGs, and Port-channels on Brocade switches.
  • Implemented BNA (Brocade Network Advisor) on the migrated network for monitoring and management of the network devices.
  • Designed, Installed and configured Aruba Wireless network in an HA environment using AGN 125 access points with 802.1X authentication.
  • Maintain high level Run manuals and SOP's on each project implemented including Aruba wireless, Cisco switches, and firewall solution.
  • Created application packages in Citrix for installation on multiple servers.
  • Developed Python and Perl scripts to build up the connection between database which saves the recommendation result automatically in a wanted format.
  • Knowledge of F5 iRules (F5's TCL scripting language) enabling customization of application load balancing solutions through the control and direct manipulation of the application traffic.
  • Experience with F5 configuration CLI including both Big Pipe and Shell (TMSH)
  • Worked on F5 Web Accelerator and Application Security Module (ASM).
  • Firewall policy provisioning on Fortinet FortiGate appliances using Forti Manager.
  • Implementation and support of VoIP networks. for Sparrow Health
  • Have good working experience with the Trouble Tickets on F5 Load Balancers.
  • Managing enterprise BGP setup by configuring and troubleshooting BGP related issues .
  • Scaling of BGP and IGP in the core, dealt with implementation of deployment related to Cisco devices and applying security policies on it.
  • Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues .
  • Configuration of NAT.
  • Involved in the team for designing and Configured Nexus 7000/5000/2000 in Top of Rack & End of Row Architecture for a Scalable Production Network that supports Rack & Blade server architecture in a Multi-Tenancy environment using VPC, VDC & VRF
  • Experience in Configuring, upgrading and verifying the NX-OS operation system
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Experience working with BGP attributes such as Weight, Local-Preference, MED and AS-PATH to influence inbound and out bound traffic
  • Involved in Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter VLAN routing and LAN security.
  • Use and maintain routing protocols EIGRP, OSPF and BGP on the ISR Router models like 2951, 3845, 3945,7206 in the network & also worked on BGP Route Reflectors, Confederations
  • Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.
  • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.

Environment: Cisco 7206/3845/3945/2951 routers, NEXUS 7010,5672UP, 2248/6500/4500/3750/3850 switches TACACS, EIGRP, OSPF, Python, Aruba, FortiGate and Vulnerability Assessment tools like Nessus, VPN’s, and SSL.

Confidential, Fremont, CA

Sr. Network Engineer

Responsibilities:

  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • Experience with migrating from OSPF to BGP WAN Routing protocol
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls
  • Configured, Installed, Maintained and involved in troubleshooting edge routers that has router models like 2951, 3845, 3925.
  • Experience in VMw are NSX and Nexus 1000v hypervisor based networking environments that utilize VXLAN.
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer.
  • Managing all engineering projects for Cisco VoIP initiatives, planning technology roadmaps, and configuring and optimizing all Cisco VoIP.
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
  • Experience in communicating with different customers, IT teams in gathering the details for the project
  • Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs
  • Automated network implementations and tasks and designed monitoring tools using python scripting
  • Redesign of Internet connectivity infrastructure for meeting bandwidth requirements
  • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches
  • Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs
  • Firewall Compliance and Rule remediation for compliance such as SAS 70 Audit.
  • Configured BPDU Guard, port-fast, uplink fast and other spanning tree features
  • Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers
  • Experience in WAN technologies like T1/T3, DS3,STM1 and STM4 circuit types
  • Configured Security policies including NAT, PAT, VPN, Route-maps and Access Control Lists
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall
  • Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network infrastructure and configured the entire network Infrastructure devices including Network Printers and Register
  • Hands-on experience in the network management of circuits using TDM and Frame Relay network, performing configuration and provisioning management, fault management and performance monitoring.

Environment: 6500/3750/3550/3500/2950 switches, Juniper (M320, T640), Cisco 7200/3845/3600/2900 routers, Python, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, VMware NSX, Nexus, Ether Channels.

Confidential, Atlanta, GA

Network Engineer

Responsibilities:

  • Troubleshoot and Worked with Security issues related to Cisco ASA/PIX, Checkpoint, IDS/IPS, and Juniper Net screen firewalls.
  • Worked on Cisco Layer 2 switches (spanning tree, VLAN)
  • Router/ Microsoft VPN Server in order to access certain limited network resources from customer locations
  • Installed and configured four PIX 525 and two ASA 5520 in customer locations. In addition to that, two PIX firewall configured for the Guest access
  • Deployment of Cisco 6500 switches in standalone and VSS modes with SSO and NSF
  • Supporting EIGRP, OSPF and BGP based network by resolving level 1 &2 problems of internal Sites
  • Providing daily network support for Global wide area network consisting of MPLS, VPN and point-to point site.
  • Worked on Design implementation of new data center with products ranging from Cisco, ASA with Firepower, Dell Switches, Cisco Meraki, and VMware NSX.
  • Experience working with Network management software NSM
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls
  • Upgraded load balancers from Radware to F5 BigIPv9 which improved functionality and scalability in the enterprise. Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
  • Supported and executed migration to F5 BIG-IP LTM/GTM ADC Appliances from Citrix NetScaler.
  • Experience in migration of Frame-relay based branches to MPLS based technology using multi-layer stackable switch like 6500 series and 2951, 2800 series routers
  • Created engineering configuration, Security Standards, documenting processes and Network documentation using Microsoft Visio.
  • Currently designing global Cisco SDWAN rollout for enterprise customer.
  • Worked on HP open view map for Network Management System and Ticketing.
  • Worked on a broad range of topics such as routing and switching, dedicated voice access, planning and implementation, large-scale high-visibility outages, change management coordination, proactive monitoring and maintenance, disaster recovery exercises, and core network repairs.
  • Support various Routers like 2600/2900/3600/7200 series routers
  • Tested authentication in OSPF and BGP
  • Write various scripts in Windows Power shell to customize Azure device settings and for automation.
  • Configured and troubleshoot OSPF and EIGRP
  • Work on different connection medium like Fiber and Copper Connectivity
  • WAN Infrastructure running OSPF as a core routing protocol
  • Follow process & procedures for change & configuration management
  • Supported nationwide LAN infrastructure consisting of Cisco 4510 and catalyst 6513
  • Deployed the switches in high availability configuration with HSRP
  • Network Monitoring using tools like Cisco Works 2000
  • Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long term planning, implementation, project management and operations support as required
  • Configuration and troubleshooting link state protocols like OSPF in single area and multiple areas.

Environment: CISCO routers and switches, Access Control Server, VLAN, Trunk Protocols, CISCO ASA, DHCP, DNS, VMware, NSX, Juniper, SDWAN, VOIP, F5 LTM, Azure, Meraki, Spanning tree.

Confidential

Jr. Network Engineer

Responsibilities:

  • Responsible for monitoring and reporting error incidents for remote location servers.
  • Worked as L1 network (NOC) Engineer support and responsible for escalation of Redstone ISP client’s issues
  • Experience in Active Directory, GPOs, DNS, DHCP, File & Print Server, IIS (Web Server), FTP, Terminal Server, RIS, RRAS, NAT, WSUS, Microsoft Clustering, Exchange Mail Server and ISA Server installation, configuration and maintenance
  • Designed and implemented security policies using ACL, firewall.
  • Installed, Configured and Implemented Terminal Server (TS) RemoteApp on IIS 7.0Windows 2008 R2 published applications using TS Web Access, RemoteApp program and TS Gateway
  • Implemented Microsoft Clustering for IIS Web Servers.
  • Configured Cisco ISE for Domain Integration and Active Directory Integration.
  • Installation, configuration and maintenance of Windows Servers 2003 and 2008
  • Responsible for maintaining Active Directory applications
  • Installation and configuration of DNS, DHCP, IIS WEB and FTP servers
  • Responsible for report generation of Daily, weekly to tape, differential and incremental, and Monthly backups of remote database servers.
  • Liaison with ISPs related to circuit problems; raised tickets with Remedy ticketing system and related Remedy to HP Open View system.
  • Involved in the Configuration and Administration of Cisco, Aruba, and Meraki environments.
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Monitored the ticket queue for incoming tickets; updated tickets in accordance to Service Level Agreement requirements and escalated based on severity levels using Remedy
  • Performed troubleshooting of routers, and installed and configured Cisco Multi Layer Switches like 3550.
  • Resolve DNS issues; add Zones and domain addresses to the configuration files and the daemons on the live servers.
  • Installation and support of desktops with Windows 2000 and Windows XP Operating system.
  • Provide Remote support and administration on network for internal and external clients using tools like Microsoft remote desktop connection.
  • Provide day to day support (troubleshooting & installing) for more than 200 users for hardware, network & software's including Microsoft Office applications, Mail clients and network related issues.

Environment: Citrix desktop, Microsoft Windows servers 2003/2008, Active Directory 2003/2008, TCP/IP, WINS, DNS, DHCP, JUNIPER, Meraki, Aruba, Cisco ISE, FTP, LDAP, IMAP.

Hire Now