We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

4.00/5 (Submit Your Rating)

Jacksonville, FL

SUMMARY

  • Cisco and Juniper Certified Network Engineer with 8.7 years of experience in network system design, Implementation, administration and troubleshooting.
  • Experienced Cisco/Juniper Firewall, Security and Network Administrator as well as a Certified Network Professional, routing and switching.
  • Excellent experience in working with Cisco 1800, 2500, 2600, 2620, 2800, 2900, 3600, 3800, 3900, 7200, 7600 and ASR 1000, 9000 series Cisco Routers.
  • Experience working on Juniper series of devices like MX - 960, MX-480, MX-104, M10i, M7i, SRX-550, SRX-240, SRX210 and EX, QFX series of switches.
  • Experienced in working with Cisco 2900, 3500, 3700, 4500, 6500 series Cisco Catalyst Switches and Nexus Switches 2200, 5500 and 7000.
  • Experience in configuration and deployment of dynamic routing protocols OSPF, EIGRP & BGP over Cisco Routers.
  • Worked on F5 LTM 4000 series for the corporate applications and their availability.
  • Identify, design and implement flexible, responsive, and secure technology services.
  • Experience with Firewall Administration, Rule Analysis and Rule Modification, project implementations.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Experience with BIG-IP F5 load balancers, version 9.x, 10.x, 11.x, CitixNetscalers and Web Accelerators.
  • Advanced knowledge in Cisco ASA 5000 series, Palo Alto VM-300 series and Juniper SRX installation, configuration and maintenance.
  • Hands on experience in implementation and deploying BIG-IP F5 LTM load balancers for load balancing and network traffic management for business applications.
  • Working knowledge of networking devices such as Routers, Switches, Firewalls, VoIP, WAN Optimizers and Wireless Devices (Controllers and Access Points).
  • Adept at configuring and troubleshooting of VPC on Nexus 7Ks, 5Ks and VDC on NX7Ks.
  • Hardware knowledge of various line cards in Nexus 7Ks and 5Ks.
  • Expertise in Configuration of Virtual Local Area Networks (VLANS) using Nexus 7Ks, Cisco routers and multi-layer Switches and supporting STP, RSTP, PVST, RPVST along with trouble- shooting of inter-VLAN routing and VLAN trunking using 802.1Q.
  • Deploying Intrusion Detection System (IDS), Intrusion Prevention System (IPS) devices in the network.
  • Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and Policy routing over Cisco Routers, Switches (Nexus 7Ks, Catalyst 6500).
  • Experience with NX-OS on Nexus Switches.
  • Implemented redundancy with HSRP, VRRP, GLBP, and Ether channel technology (LACP, PAgP).
  • Router configuration for L2/L3 LAN and WAN networks and Intra company networks.
  • Implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, Route Maps and route manipulation using Offset-list.
  • Experienced on Cisco ISE and advanced technologies like QOS, Multicasting, MPLS and MPLS-VPN and Bluecoat proxy server SG.
  • Strong interpersonal, organizational communication, customer service & presentation skills.

TECHNICAL SKILLS

Routers: Cisco 1800, 2500, 2600, 3200, 3600, 3700, 3800, 7200, 7600 and ASR 1000. Juniper MX-960,MX-480, MX-104, M10i, M7i

Switches: Cisco Catalyst (2960, 3560, 3750, 4500, 4900, 6500)Nexus (2200, 5500, 7000), EX- 4300, EX-4200, QFX-5100

LAN Technologies: Ethernet, Fast Ethernet, and Gigabit Ethernet, Ten Gigabit Ethernet, SMTP, VLAN, Inter-VLAN Routing, VTP, STP, RSTP, DOT1Q

WAN Technologies: Frame Relay, ISDN, PPP, VPN, MPLS

Firewalls: Cisco ASA, Juniper SRX, Palo Alto

OS products/Services: DNS, DHCP, Windows (2000/2003, XP, 7, 8), UNIX, LINUX

Protocols/Services: Routing Protocols (RIP v1 & v2, OSPF, EIGRP, BGP), QoS, VRRP, HSRP, TCP/IP, UDP, ESP IPsec, MPLS, PPP, PPTP, IPSEC, IKE, SSL, SSH

Network Management: Infoblox, Wireshark, Solar winds, Nagios, OPsview.

Security Server Protocols: TACACS+, RADIUS, Cisco ACS

PROFESSIONAL EXPERIENCE

Confidential, Jacksonville, FL

Sr. Network Engineer

Responsibilities:

  • .Established BGP peering between onsite datacenter in Florida and AWS cloud.
  • Worked with Cisco advance services to implement data center Nexus environment for new Upgraded datacenter for the NX-OS in 7004 in core layer, 6880 in aggregation layer and cisco 6800 in access layer.
  • Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
  • Providing Technical Support and solutions for Network Problems and resolve tickets across sites and corporate offices.
  • Writing i-Rules and i-Apps on the F5 load Balancer and Renewing the Certificates.
  • Experience on a mesh 6500 and 5500 series routers and switches to support the core trading system. Involved.
  • Involved in periodic IOS upgrades, troubleshooting network outages and high severity incidents.
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco ASA Firewalls, NAT and Juniper SRX firewall.
  • Implemented the Core switch cut over project from Cisco 6509 to Nexus 7004 devices.
  • Configured VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7k/5k devices
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Experience with HSRP, VRRP, VTP, 802.1Q, Flex Link, VXLAN, RTP, MPLS, NAT, LACP, OSPF, BGP, EIGRP, QOS, ACL’s, spanning tree, storm control, and IP multicast
  • Worked on Riverbed network and application performance monitoring tools.
  • Monitor and maintain Local Area Network and WLAN infrastructure using tools such as solar- winds Orion.
  • Experienced working on network monitoring and analysis tools like SOLAR WINDS, CISCO works, RIVER BED and Wireshark.
  • Implementation of F5 includes configuration/creation of Network Element, Pool, pool members and virtual servers.
  • Configure QOS and NETSCOUT for Monitor Network Traffic.
  • Managing Large Palo Alto Firewall network including 50 remote offices, and three Data Centers using 5000, 500 and 200 series firewalls, Palo Alto Management software Panorama. SD-WAN, MPLS experience. Cisco Meraki switches and Access Points.
  • Defined and deployed monitoring, metrics and logging systems on AWS.
  • Migrated complex, multi-tier applications on AWS.
  • Build and Design of Citrix NetScaler, F5, VMWare NSX, and AVI SDN load balancing platforms
  • Experienced in handling and installing Palo Alto Firewalls and Integrated Palo Alto next-gen firewalls with overlay VMware NSX SDN network.
  • Troubleshooting day to day problems faced while using different trading applications Like ODIN Client & Diet, BOLT, NEAT, MCX, and NCDEX Client application.
  • Building Automation tools for Nexus9K, 3K and Juniper QFX5100 using netconf, pyez, and Ansible module
  • Configured BPDU Guard, port-fast, uplink fast and other spanning tree features
  • Hands on experience working on Ansible Automation environments, supporting containers, Dockers and writing Python Scripts for Pre-ingest, post-ingest, migration tests
  • Managed successful delivery of massive security response portfolio including Splunk, Cisco ISE.
  • Creating or Modifying Firewall rules on Cisco 5555, 5520, Juniper SRX and Palo Alto VM-300 devices.
  • Upgrading the IOS on Network Devices including cisco 6800, 6500 and Palo Alto VM-300 devices
  • Experience in working in panorama, Palo Alto user interface version 8.0.2 and VM-300 series firewalls.
  • Creating templates in panorama to manage the individual devices from it.
  • Configuring HA pair for two Palo VM-300 series AWS instance firewalls and testing the failover activity as well as ENI migration.
  • Performed load balancing and application level redundancy by deploying F5 BIG-IP LTM 3900.
  • Managing data center and network by using solar winds NPM, NTA, NCM and F5 load balancer, Citrix load balancer also working on troubleshooting, implementing and configuring new devices and helping them to build new data center and moving devices from one data center to another by moving all devices.
  • Configure BGP and EIGRP and static routes for internet and SD Wan edge routers and MPLS cloud. Proficient with Layer 2/3 VPN's, and MPLS forwarding process.
  • Supported the design, development and implementation of the Riverbed Steelhead and Interceptor architecture for WAN optimization.
  • Troubleshooting F5 Load balancers, Cisco Nexus switches, Riverbed WAN Optimizers, Cisco ASR1000 series
  • Migrated existing on-premises applications to AWS
  • Worked on providing management connectivity, HA configuration, setting up RSA for MFA, license and updates management, VSYS support, L3, aggregate Ethernet and sub interfaces configuration, configuration of ECMP- OSPF on both Nexus and Palo Alto, moved SVI (server VLAN) interfaces from Brocade core to Palo Alto.
  • Creating Network objects, dynamic address groups, FQDN and assigning it to rules based on the information in tickets
  • Creating custom URL profile based on the expressions and assigning it to rule to perform URL filtering.
  • Configuring network interfaces, static routes, and NAT rules in panorama and thereafter pushing to individual Palo Alto devices.
  • Network monitoring and data acquisition with TCP Dump, Netscout and Wireshark.
  • Worked with Automation script with Python module like Chef & Ansible.
  • Performing the software upgrade from version 7 to 8.0.2 on panorama and VM-300 series Palo Alto firewalls.
  • Configuration included VLANs & VTP, STP port features, Gateway redundancy using HSRP, enterprise security using Cisco Port Security and Dot1X framework.
  • Expert knowledge of Cisco ACI, NxOS and IOS, other SDN products Tiered Domains, QoS, data center network design, cloud infrastructure design and management, OSPF, BGP, VLAN Trunking
  • Maintenance of NTP, Aruba Clearpass, NetBrain and terminal servers.
  • Involved in several projects setting up builds using Jenkins, Ansible, Puppet and Chef.
  • Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Like, 4500-X in VSS mode and 3850 switches for distribution and POE-user switches
  • Troubleshooting the Network failure issues and thereby making the changes to Network Infrastructure.
  • Worked on maintenance and upgraded Cisco wireless WLC, LWAPP Aps
  • Experience in Designs and implements Cisco Firepower and Palo Alto firewalls
  • Tracking and documenting the server information connected to Cisco Catalyst, Nexus Switches, Cisco ACE load- balancers and BIG IP F5LTM.
  • Experienced in Configuring and troubleshooting multivendor devices like Cisco ASA 5585, 5550, 5540, Juniper SRX series for Branch/Datacenter Setup
  • Supported the design, development and implementation of the Riverbed Steelhead and Interceptor architecture for WAN optimization.
  • Involved in Implementation and Configuration (Profiles, I Rules) of F5 Big-IP C-4400 load balancers.
  • Integrated with exiting BGP environment to redistribute routes seamlessly from Viptela into traditional MPLS WAN. Creating Firewall rules on Cisco 5555, 5520, Fortinet and Palo Alto VM-300 devices.
  • AWS Environment Architecture and Solutions Expert.
  • Worked on Splunk SIEM to gather generated logs for the firewalls, to maintain application flow on firewalls
  • Proficient with F5 LTM and Cisco CSM load balancer in-between the servers inside the server farm and DMZ.
  • Working in collaboration with other company products such as AWS, AZURE, Cisco ASA, Sonicwall, Palo Alto with Meraki to provide more stable, compatible and efficient network outlines to meet customer needs.
  • Troubleshoot issues with Wireless Access points (Cisco 3502) and configure SSID’s on 5520 Wireless LAN Controllers.
  • Configuring Node, pool, VIP, SSL client, server profile in F5 LTM 4000 series Bigip and thereby adding firewall rule to bring the end servers live
  • Aruba Clear Pass Policy Manager configuration and installation for VMWare appliance and hardware appliance
  • Troubleshooting when the servers are down, checking logs the identify the error and thereby taking necessary steps.
  • Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long-term planning, implementation, project management and operations support as required.

Confidential, Alpharetta, GA

Sr. Network Engineer

Responsibilities:

  • Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IPV4 and IPV6 Networking.
  • Add Trunks, Spanning Tree protocol, Port-Security, VLAN-MAPs and DOT1X for Switches and Wireless.
  • Troubleshoot issues with Wireless Access points (Cisco 3502) and configure SSID’s on 5520 Wireless LAN Controllers.
  • Responsible for Juniper SRX firewall management and operations across our corporate networks.
  • Responsible for Working with JTAC/CISCO TAC for resolving escalated issues and bug fixes.
  • Worked on a project to migrate vendor DMZ's from a disaggregated cisco environment to a unified SRX 550 firewall cluster leveraging UHG's services.
  • Worked on Integration of VSAT with (FTDMA) technology for Internet via Trading. Internet;
  • Monitored network traffic and developed capacity-planning initiatives, making necessary recommendations, additional resources or hardware
  • Configured with F5 Load balancers in Failover for Load balancing and SSL handling
  • Installation, configuration, and management of WAN optimizer, Riverbed Steelhead.
  • Providing support for F5 Load Balancers version 10.2, ASM and APM
  • Handling changes related to operations using Prime, Solarwinds, Bluecat, NetBrain
  • Implemented MX-960 router and configured virtual chassis in the core to enable interchassis redundancy.
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems during the conversion of existing point-to-point circuits to MPLS.
  • Strong hands on experience on PIX Firewalls, ASA (5540/5550) Firewalls.
  • Implemented Security Policies using ACL, IPSEC, SSL, VPN, IPS/IDS. Network monitoring and debugging tools: SevOne, NetScout, and Wireshark.
  • Implemented Dual homed connections between multiple UHG sites to connect to primary and redundant datacenters in Alpharetta/ Santa Ana.
  • Worked on Riverbed Steelhead-5050, Steelhead-7050 optimizer and Interceptor-9350 appliances
  • Design Aruba WLAN for remote airfield access utilizing solar-powered access points.
  • Network with SD-WAN Standardized wireless site survey strategy for global office build outs.
  • Worked with a group of contractors to train them on generating wireless heat maps with Aruba Visual RF.
  • Provided design and Contrail SD-WAN networking support using Cisco ACI, Cisco wireless controllers, Open-Stack, Juniper Contrail and Big Switch Networks LABs using Apple Configurator
  • Experienced in deploying applications through IBM Urban Code Deploy and Ansible.
  • Extensive experience with Juniper portfolio including JUNOS, EX switching and SRX firewall and Palo Alto networks firewall.
  • Worked on F5 LTM series like 1600, 6400 and Viprions for the corporate applications and their availability.
  • Configuring HA pair for two Palo VM-300 series AWS instance firewalls and testing the failover activity as well as ENI migration.
  • Used security groups, network ACL’s, internet gateways and route tables to ensure a secure zone for organization in AWS public cloud.
  • New exposure and critical hands-on experience with cloud based and SD-WAN platforms - Viptela and Cisco Meraki.
  • Deep technical experience with architecture, design and hands-on diverse technology platforms including different Cloud Platforms (AWS/Azure), Virtualization, Database Technology
  • Automating the hard tasks in the Environment as well as network tasks (configuration, deployment) using Ansible tool and Python.
  • Dealt with implementation of deployment related to Cisco ASA 5585 devices, Juniper SRX 550 devices to apply security policies on it.
  • Creating ACLs as per user's requirement to getting access for different servers like internal firewalls, DMZ firewalls and Internet firewalls and also worked on Splunk for troubleshooting.
  • Meraki implementation Security/SD-WAN MX, Switches and Access Points for 2200+ offices.
  • Troubleshoot issues related to VLAN, VLAN Trunking, VRRP failovers, related issues.
  • Involved in Planning for upgrade of IOS/JUNOS on devices and performing the upgrade to the TAC recommended code.
  • Provide Load Balancer expertise on F5 BigIP LTM and GTM devices like 7050 and 2200 and Troubleshoot application slowness.
  • Experience on deploying applications using Ansible on all servers through SSH.
  • Responsible for writing and executing Test Plan, Desk level procedures and Test Case for smooth network operations.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.
  • Established BGP peering between onsite datacenter in California and AWS cloud.
  • Implemented virtualization infrastructure involving blade chassis, VMware ESXi, and fiber channel SAN technologies.
  • Experience in configuring Virtual Device Context in Nexus 7010.
  • Implementation and configuration of F5 Big-IP LTM 6400 load balancers.
  • Supported Integration of Riverbed Steelhead-7050 and Interceptor-9350 optimizer appliances into Nexus platforms in Data Centers.
  • Operations and management of company LAN, WAN, and wireless networks, including routers, switches, Access Points, Firewalls and another network i.e. Riverbed, Bluecoat, F5 LTM/GTM.
  • Configured Juniper MX80s, EX4300s, and SRX240s to implement as a part of the branch office.
  • Managing enterprise BGP setup by configuring and troubleshooting BGP related issues.
  • Monitoring Network infrastructure using SNMP tools HP NNM, Solar- winds and OpNet.
  • Responsible to add new BGP peers for remote branch offices and business partners.
  • Implemented virtualization infrastructure involving blade chassis, VMware ESXi, and fiber channel SAN technologies.
  • Experienced with Juniper: EX-2200, EX-4300, EX-4500, MX-480 and M Series, SRX210 and SRX240 troubleshooting.
  • Configured VPN tunnels to multiple vendors with end devices terminating at vendor end being a Cisco/Juniper firewall.
  • Perform Configuration changes on BIG IP (F5) Load balancers and monitored the Packet Flow in the load balancers.
  • Involved in Configuring and implementing of Composite Network models consists of Cisco 7600, 7200, 3800 series and ASR 9k and Cisco 2950, 3500, 5000, 6500 Series switches.
  • Used troubleshooting applications and tools such as Checkpoint Smart View Tracker, Smart View monitor, Wireshark, Tcpdump, Trace route, Solarwinds, NetScout and command line utilities to identify, report and provide resolution to all kinds of firewall and VPN related connectivity issues.
  • Used Riverbed appliance for Bandwidth optimization and application acceleration.
  • Cisco ACI fabric networks, including python automation.
  • Worked on Great exposure to SDN and Network virtualization technologies like Cisco ACI.
  • Experience on gathering required configurations of all servers and maintain the playbooks updated using Ansible.
  • Worked on data center segmentation project to create segmentation between the user and server traffic by deploying Palo Alto firewalls (5250s) in the datacenter including cabling to the Nexus 7K VDCs and HA .
  • Configured networks using routing protocols such as OSPF, BGP and manipulated routing updates using route map, distribute list and administrative distance for on-demand Infrastructure.
  • Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (Dot1q and ISL) and Ether channel.
  • Administration of ASA and Juniper SRX firewalls in the DMZ and FWSM in the Server Farm to provide security and controlled/restricted access.
  • Experience in designing cloud based networks on top of AZURE, AWS, and Alibaba frameworks
  • Responsible for monitoring alerts through tools like Solar winds Orion, Opsview in the Production environment as a part of first response for the service desk.
  • Implemented changes in projects in accordance with the change management process and responsible for MOPS, Post-Implementation handoff documents and Visio drawings.

Confidential, Houston, TX

Network Engineer

Responsibilities:

  • Adept at configuring and troubleshooting of VPC on Nexus 7Ks, 5Ks and VSS on Cat 6509, 4500-X.
  • Expertise in Configuration of Virtual Local Area Networks (VLANS) using Nexus 7Ks, Cisco routers and multi-layer Switches and supporting STP, RSTP, PVST, RPVST along with trouble- shooting of inter-VLAN routing and VLAN trunking using 802.1Q.
  • Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and Policy routing over Cisco Routers, Switches (Nexus 7Ks, Catalyst 6500).
  • Resolved various trouble tickets related to routing (BGP, EIGRP, Static Routes, prefix-list, route-map, distribute-list, route-redistribution), switching (VLAN, port security, trunking, STP, VPC, HSRP, FEX).
  • Designed, planned and performed failover testing with various extranet clients successfully.
  • Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location of office on the switched network.
  • Experienced working on network monitoring and analysis tools like, SOLAR WINDS, CISCO works and SDWAN by Riverbed steelhead, L3VPN over network, multi-tenant segment routing, Cisco ASA firewall 9.x, OSPFv3, EIGRP classic and name-mode (wide metrics), VxLAN, SDWAN, VRF and VRF-lite, VMWare NSX VDC.
  • Installing new equipment SD-WAN with configurations, Analyzed and resolved issues relating to the networks.
  • Upgraded the existing Panorama to V8.0.6. Integrating the new firewalls to Panorama and responsible for working on change tickets for existing 3250 Palo Firewalls in the environment.
  • Played responsible role for implementing, engineering, and level two support of existing network technologies/ services and integration of new network technologies/services.
  • Worked on 3560, 3750, 3850, 4510, 4500-X, 6509 series Cisco Catalyst switches, and 2248, 5020, 5548 and 7010 Cisco Nexus switches in multi VLAN environment for the implementation of inter-VLAN routing, 802.1Q trunking, and Ether Channel.
  • Collected requirements from the client and selecting appropriate AWS service with required capacity and to design and deploy applications based on given requirements
  • Designed Continues Delivery platform using Jenkins, Bit Bucket, Artifactory and Ansible tower.
  • Performed network administration tasks such as creation and management of VLANS, Port security, Trunking, RPVST+, Inter-VLAN routing, and LAN security.
  • Configuration of site-to-site VPN connections (IPsec/GREtunnels, DMVPN) to support diverse network connections to extranet clients.
  • Experienced with event-driven and scheduled AWS Lambda functions to trigger various AWS resources
  • Migrating physical networks to VMware virtual server infrastructure.
  • Worked as a member of the NOC groups to troubleshoot issues related to IP phones, Connectivity and application slowness.
  • Expert knowledge of Cisco ACI, NxOS and IOS, other SDN products Tiered Domains, QoS, data center network design, cloud infrastructure design and management, OSPF, BGP, VLAN Trunking
  • Troubleshoot issues with Wireless Access points (Cisco 3502) and configure SSID’s on 4506 Wireless LAN Controllers.
  • Involved in the Redesign of Internet connectivity infrastructure for meeting bandwidth requirements across manufacturing plants in Ann Arbor and Montgomery Plants.
  • Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches to implement in the manufacturing plant in Ann Arbor.
  • Worked on F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
  • Worked on Splunk and IBM Qradar SIEM tool to monitor the traffic and analyze the traffic.
  • Hands-on experience in using network monitoring tool Solarwinds Orion.
  • Extensive working knowledge of routing protocols including SD-WAN, MPLS, BGP, QOS and Cisco ASA/VPN Tunnel as backup connectivity solution between remote locations.
  • Repaired broken workstations, notebooks & servers. Handled warranty issues & RMA requests.
  • Automated the cloud deployments using Ansible and Terraform Templates
  • Decommission of server's due to network vulnerability and creating install, blackout plan for default configurations on Load Balancers and switches.
  • Proficient working with windows active directory environment and backup tools like solar winds.
  • Wrote Ansible playbooks to manage Web applications and also used Ansible Tower.
  • Installed Palo Alto PA-3060 firewalls to protect Data Center.
  • Install SD-WAN solutions to include ISP MPLS cloud. WAN routing includes eBGP with ASA L2L VPN tunnels to the hub.
  • Managed inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, NTP.
  • Performed maintenance and troubleshooting of connectivity problems using PING, and Trace route.
  • Used DHCP for automatic assign reusable IP addresses to DHCP clients via Infoblox IPAM.
  • Configured and maintained OSPF protocol which include deployment of new locations in the existing infrastructure created Stub/areas and configured summarization for effective routing
  • Maintained Palo Alto firewalls Creating zones, adding rules and maintained the policies on PA 220 series,3020,5220
  • Configured OSPF on ASR1002/9001 Cisco routers at various back offices across US.
  • Configured ACLs in Juniper SRX 3400 firewall for Internet Access requests for servers, Protocol Handling, Object Grouping and NAT.
  • Experienced in F5 BigIP GTM/LTM appliances including writing iRules, SSL offload and everyday task of creating WIP and VIPs
  • Proficient in AWS services like VPC, EC2, S3, ELB, Auto Scaling Groups(ASG), EBS, RDS, IAM, Cloud Formation, Route 53, Cloud Watch, Cloud Front, Cloud Trail
  • Experience setting up SRX 240 HA Pairs on the branch firewalls for redundancy.
  • Configured SPAN and RSPAN for network monitoring.
  • Worked on network-based IT systems such as racking, stacking, cabling and module replacement.
  • Gained experience in troubleshooting Cisco IP phone.
  • Configured and installed Wireless Access Points at different company’s location and managed them through Wireless LAN Controller (Cisco).

Confidential

Network Engineer

Responsibilities:

  • Installed and configured routers, Cisco 2800, 3845 routers and cisco catalyst switches.
  • Engaged in office moves, helped in identifying network requirements of new building, installed new networking hardware, and coordinated with vendors for cabling/wiring
  • Trouble-shooting end-user reported problems, thoroughly and accurately documenting problem in trouble management tool.
  • Configuring DNS /NIC card issues and wall jack issues while troubleshooting IP addressing problems.
  • Responsible for creating, modifying, removing VLAN configuring as per the need.
  • Tracking overall network traffic and capacity issues that are impacting throughput, bandwidth, and quality
  • Pinpointing physical network conditions that are contributing to call quality issues
  • Hands on experience with Big IP/F5 load balancer, Cisco ACE load balancer.
  • Applied effectively various routing protocols including EIGRP and OSPF Implemented Redistribution of Routing protocols.
  • Solving web related problem including HTTP, HTTPS, DNS, SMTP.
  • Involved in migration from EIGRP to OSPF and documented change management procedure for migrating from EIGRP to OSPF network.
  • Configuring rules and Maintaining Palo Alto & Analysis of firewall logs using various tools.
  • Configured ACLs to prevent access to internal network from unauthorized users on ASA firewalls.
  • Troubleshoot intra-net and internet connectivity issues using PING and Traceroute.
  • Configured HSRP, Ether Channel in the LAN environment and NAT.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support.

We'd love your feedback!