We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

Wilmington, DE

SUMMARY

  • 8+ years of professional experience in Network engineering with Cisco Certified Network Engineer and Palo Alto certified network Security Engineer performing Network analysis, design, Implementing, capacity planning with a focus on performance tuning and support of large Enterprise Networks.
  • Experience working on Cisco Catalyst Series 3750, 4500, 6800, 6500, 9300, 9400, 9500; Nexus 2000, 5000, 6000 and 7000 series switches.
  • Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.
  • Experience in layer - 3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2K series, Cisco router models like 7200, 3800, 2800, 2600, 2500, 1800, 4300, 4400, 4500, ASR 1000 series.
  • Working of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP, GLBP for Default Gateway Redundancy
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
  • Responsible for Palo Alto and Cisco ASA firewall administration across global networks.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)
  • In-depth and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Strong experience of TACACS+, RADIUS implementation in Access Control Network.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.
  • Understanding of the OSI reference model, Protocols, Subnetting, switching and other Layer1/Layer 2 technologies.
  • Good experience in SQL Server, Virtualization, SAN, SCCM, IIS and SCOM.
  • Experience on Cisco Wi-Fi, ISE and prime infrastructure.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 6000 and 5000 series to provide a Flexible Access Solution for a datacenter access architecture Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series
  • Expertise in installing, configuring and troubleshooting Juniper Routers (E, J, M and T-series)
  • Experience performing phased migrations of traditional data centers to ACI model.
  • Implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.
  • Experience with different Network Management Tools and Sniffers like Wireshark (ethereal), HP-Open view, RSA envision, and Cisco works to support 24 x 7 Network Operation Center.
  • Experience troubleshooting network protocols: IP, TCP, Spanning Tree, OSPF, BGP, HSRP, ARP, VRRP.
  • Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).
  • Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers.
  • Experience on Fortinet FortiGate Appliances including 3200D, 1500D, 1200D running Latest 5.2 FortiOS.
  • Experience on troubleshooting firewall rules in Checkpoint R77.20 Gaia, Cisco ASA 5540, 5580.
  • Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analyses results and implement and delivering solutions as an individual and as part of a team.
  • Experience with scripting and automation using (Python, Shell, Perl)
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.
  • Knowledge of JUNOS platform and worked with IOS upgrade of Juniper devices.
  • Hands on Experience wireless technology specially Cisco Wireless LAN controller model like 4400, 5508 Access Points 3500, 3700, 3800 Capwap /LapWAP/Standalone as well as Mobility Express.
  • WAN Optimization Hardware Exposure like Riverbed, CasCade, Flow monitor.

TECHNICAL SKILLS

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP

Networking Hardware: Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls, Wireless Cisco and Aruba.

Routing Protocols: OSPF, ISIS, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting

Security Protocols: ACLs, IPsec Tunnels, VPNs, Port-security, SSH, SSL, IKE, AAA, Zone-Based Firewalls, NAT/PAT, DMZ, Content Filtering, IDS/IPS, URL Filtering, SNMP trap

Network Monitoring: Solarwinds, Wireshark, HRping, Whatsupgold, Infoblox

Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR, IOS-XE, NX-OS

Routers: CISCO 4300, 4400, 4500,2600, 2800,3800,7200, Juniper M & T Series, ASR 1000

Load Balancers: F5 Networks (BIG-IP), Netscaler (Citrix)

DNS/DHCP: Infoblox

Switches: CISCO 2960,3750,3850, CAT 9300, CAT9400, CAT 9500,4500,6500,6800 Nexus 7k,5k,2k

Web Filtering: Bluecoat (Bluecoat SG 500) and Websense (V10000 g2)

Simulation Tools: GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence

Firewalls: FortiGate firewall, Checkpoint Nokia Firewall

Wireless controller: Aruba Controller A6000 and Airwave management version is 8.0.7

Monitoring and ADCs: Wireshark, Infoblox, SolarWinds TrueView, F-5 BIG-IP LTM, Sevone

PROFESSIONAL EXPERIENCE

Confidential, Wilmington, DE

Sr. Network Engineer

Responsibilities:

  • F5 LTM appliance with abilities to create VIP, configuration changes, troubleshoot and perform packet captures.
  • Maintain and managing a LAN/WAN network, ensure connectivity between all datacenters including Monitor, troubleshoot and document any network issues.
  • Blue Coat and IronPort proxy Content management, Citrix NetScaler Load Balancing
  • Working with Citrix NetScaler suite of products; load balancing and WAF.
  • Cisco Catalyst switches 6500, 3750 & 3550, routing protocol OSPF, EIGRP, BGP with Access Control lists and maintain Brocade VDX 6740 and ICX 7250 switches. working with Network Monitoring and Troubleshooting tools including SolarWinds, SCOM, SNMP, SevOne, ThousandEyes, and Wireshark.
  • Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.
  • Resolve any network issues by implementing change control and providing support where and when required.
  • Extensive troubleshooting on a case-by-case basis with deep understanding of networking/firewall concepts.
  • Converting ASA version 8.x to 9.x. address security hardware refresh and migration activities using Python and Ansible scripts.
  • Trouble shooting and resolution for Client facing Cloud/Network issues.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5520 for Wireless Network Access Control integration with Cisco ISE.
  • Working in wireless technologies like Lan Controller and Cisco PRIME.
  • Integrated Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x authentication for Wireless users.
  • Troubleshooting WLAN, LAN and WAN issues, and currently implementing Cat 9800 - 40 WLC.
  • Manage network devices with Cisco ISE and Cisco Prime (3.4)
  • Participated in troubleshooting SDN/SD-WAN deployments
  • Provide consultation regarding segmentation, security and policy of the SDN network
  • Configuring & managing around 500+ Network &Security Devices that includes Juniper SRX Firewalls, F5 BigIP Load balancers and Nexus Devices.
  • Troubleshooting wireless dot1x authentication issues, wired guest access NAC issues.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms. which include connectivity issue pertaining in WAN, LAN, VPN tunneling and Security devices.
  • Involve in technical enhancement and deploy new changes using change management and incident management.
  • Working with Cisco Identity Services Engine (ISE) and ACS. Worked on Security groups, tags, AAA profiles on ISE.
  • Managed successful delivery of massive security response portfolio including Splunk, Cisco ISE, Infoblox.
  • Working of Virtual Machines VMWare.
  • Conduct IT controls risk assessment to identify system threats, vulnerabilities and risk, and generate reports.
  • SIEM monitoring and security event analysis for all critical servers and applications utilizing customized Splunk queries, network traffic analysis, and Symantec End Point Manager.
  • Worked extensively on Data Center Palo Alto firewalls and F5 BIG-IP LTM.
  • Deployed and Manage SD-WAN network (Cisco Viptela Solution) for WAN connectivity.
  • Deep understanding of IDS/IPS such as ASZ and internal.
  • Implemented FortiADC (Fortinet) with Cisco ACI and upgraded it to 5.2.0 version.
  • Provided real time intrusion detection host-based monitoring services using Symantec Endpoint.
  • Assisted with the transition from the current Cisco ASA FW platform to the Cisco Firepower FPR 4150 NGFW.
  • Cisco ASA security appliances including Sourcefire, Firepower services and Fire Sight Management Console.
  • Worked on bluecoat proxy to optimize WAN Performance by analyze and scan malwares to protect the infrastructure and URL filtering.
  • ACI Integration with VMware, firewalls & load balancers and application gateways.
  • Working with SIEM using vendor tools.
  • Implement Automation best practices (Python/Ansible)
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
  • Working with Palo Alto/ ASA/Fortinet Firewall Administration, Rule Analysis, Rule Modification.
  • Configured Blue Coat ProxySG Web Application Reverse Proxy for securing and accelerate public web applications.
  • Successful Data Center Migration Planning and Successfully developed Python automation scripts to perform Cisco firewall rule assessments.
  • Assisted in the migration from DMVPN to Cisco Viptela SDWAN, consisting of V-SMART controllers, V-BOND edge routers
  • Implemented firewall policies and routing changes per business project/request Troubleshoot and resolve network issues between business users, clients, partners and customers.
  • Working with Checkpoint and Forti-Gate Firewall policy provisioning experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures.
  • Provision VPN connections on Cisco ASAs and implement MACs Move Add Change per business requirements.
  • Implemented load balancing solutions on F5 local Traffic Managers.
  • Provision DNS services using Infoblox for DNS, DHCP and IP address management IPAM.
  • Collaborate with vendor network architects on network optimization.
  • Implement URL filtering requests in Bluecoat Proxy SG for website blacklist and whitelist purpose.
  • Ensure all network devices (Router, Switch, Firewall, Load Balancer, Proxies) are running healthy which include upgrading to latest version, patch update, certificate upgrade (DMVPN, HTTPS etc) etc.
  • Capable of bringing together expert from across the organization and consolidating into a cohesive end-to-end network solution
  • Tier 3 level in BGP, OSPF, EIGRP, OTV, ISIS, VRRP, ARP, ND, IPv4, IPv6, Multicast, and Spanning Tree.

Environment: Switches, Routers, Checkpoint, Load Balancing(F-5), Nexus, Firepower, support of Cloud, MAN, WAN, MPLS, Fortinet, Juniper, TCP/IP, BGP, OSPF, EIGRP, Python Script, Blue-Coat Proxy, Infoblox.

Confidential, Jersey City, NJ

Sr. Network Engineer

Responsibilities:

  • Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Performed virtualization and deployed various VMs using VMware ESXI 6.5
  • Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
  • Monitoring the network traffic with the help of Qradar and Cisco IPS event viewer.
  • Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.
  • Monitoring the traffic through CISCO Catalyst Switches for Detection of Intrusion using IDSM2 and its Prevention IPS.
  • Managing and implementation of PORs (port open requests) based on the requirements of various departments and business lines.
  • Update customer networks by configuring routers, switches, and incorporate the SDWAN into the network design.
  • Worked on issues with IPS/IDS servers, Zscaler and Bluecoat Proxies.
  • Update customer networks by configuring routers, switches, and incorporate the SDWAN into the network design.
  • Configured and deployed Cloud Lifecycle Management (CLM) DNS solution to automate IP address assignment and DNS record updating for new servers created in the CLM environment
  • Ability to build and analyze ISE rules to comply with network security policies
  • Implementing and troubleshooting (on-call) IPsec VPNs for various business lines and making sure everything is in place.
  • Implemented Cisco ISE 2.0 for Wireless 802.1x Authentication and Authorization with Flex connect.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Working with Cisco ISE, ACS, Prime and Network Compliance Manager. Worked on the security levels with RADIUS, TACACS+.
  • Worked with a successful Cisco Partner to migrate Palo Alto 5050 firewalls to Cisco Fire POWER 9300 firewalls with throughput up to 1.2Tbps crushing the current slow Palo Alto 5050s.
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per the requirement of the company.
  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration.
  • Configuring & managing around 500+ Network & Security Devices that includes, Palo Alto Firewall, Cisco ASA, Fortinet and Juniper (NetScreen) Firewalls, F5 BigIP Load balancers and 3DNS, Blue Coat Proxies and Plug Proxies.
  • LAN technologies (GigabitEthernet, PoE, link aggregation, CDP, ARP, VLAN’s & trunking)
  • Configure all Checkpoint, Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.
  • Cisco ASA security appliances including Sourcefire, Firepower services and Fire Sight Management Console.
  • Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).
  • Implement the firewall rules using Panoroma/Fortimanager.
  • 24x7 on-call escalation support as part of the security operations team.
  • Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short- and long-term planning, implementation, project management and operations support as required.
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs.
  • Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
  • Implementing IPsec and GRE tunnels in VPN technology.
  • Supporting project test teams in analyzing the bandwidth utilization.
  • Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
  • Designed, configured, implemented site-site VPN between cisco ASA 5500 firewall and Palo Alto Firewall.
  • Configuration and Administration of Cisco and Juniper Routers and Switches
  • Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Configuration, Assigning DHCP profiles
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices configure 2k, 3k, 7k series Routers
  • Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
  • Experience with configuring FCOE using Cisco nexus 5548
  • Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer
  • Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network
  • Configuring and managing F5 ASM (Application security manager). Developed security policies.
  • Configure and troubleshoot Juniper EX series switches.
  • Migrated to Juniper EX series switches from Cisco 3500 series and 6500 series switches
  • Experience with moving data center from one location to another location, from 6500 based data centers to Nexus based data center.
  • Network security including NAT/PAT, ACL, and ASA/SRX Firewalls.
  • Well Experienced in configuring protocols HSRP, GLBP, PPP, PAP, CHAP, and SNMP.
  • Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers.
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy it also includes the configuration of port channel between core switches and server distribution switches
  • Install, manage and monitored Palo Alto Firewalls in Panorama.
  • Implement changes on switches, routers, load balancers (F5 and CSS), wireless devices per engineer’s instructions and troubleshooting any related issues
  • Experience in installing and configuring DNS, DHCP servers.
  • Replace branch hardware with new 3900 routers and 2960 switches.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IP Sec/GRE to Get VPN.
  • Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.
  • Worked on Cisco ISE deployment which was a replacement for the ACS and provided new long term and short-term guest wireless services for the Port Authority.
  • Troubleshoot Fortinet Firewall, issues, edited policies and created rules.
  • Fortinet Firewall administration configuration of FortiGate 3000, 3815 series as per network diagram.
  • Performing network monitoring, analysis using various tools like Wireshark, & SolarWinds, Dynatrace, Extrahop tool helped for tracking root cause problems.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trucking, deployed port security when possible for user ports.
  • Used Extrahop for the detection of any abnormalities in the network, tracking file access in databases and storage for data security, and locate bottlenecks over the network
  • Involved in configuring Juniper SSG-140 and Cisco ASA firewall.
  • Strong hands on experience on, ASA Firewalls, Palo Alto Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
  • Implemented Zone Based Firewalls and Security Rules on the Palo Alto Firewall. Exposure to wildfire feature of Palo Alto. Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Worked with the Python 2 & 3 version
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, prevention where needed.

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, PPP, VPN, Checkpoint, Cisco ASA, AWS, TCL, Riverbed, Firepower, Clustered SQL server 2014/2012/2008 R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003

Confidential, Montvale, NJ

Network Operations Engineer

Responsibilities:

  • Working in high availability Nexus Environment and provide Level 3 Network Support.
  • Configuring, upgrading and verifying the NX-OS operation system.
  • Converting PIX rules over to the Cisco ASA solution.
  • Basic and advance F5 load balancer and Cisco ACE configurations, general troubleshooting of the F5 load balancers .
  • Worked on SD-WAN solution. Configured policies, encryption methods for WAN traffic. Worked on L1/l2 issues with customer and Nokia professional services
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience
  • Providing Level 3 support to customers, resolving issues by attending to conference calls.
  • Providing Level 3 Engineering and Support to other internal network engineers and contractors.
  • Designing and installing new branch network systems. Resolving network issues, running test scripts and preparing network documentation.
  • Participate in the post-mortem investigation of catastrophic events associated with security tool’s faults or outages and prepare incident reports documenting the findings.
  • Implemented server load balancing using FortiGate firewalls using methods such as SSL/TLS offloading, SSL/TLS content inspection and monitored the servers using health check.
  • Implement LAN protocols like STP, RSTP, VTP, VLAN and WAN protocols like Frame relay, PPP, port channels protocols like LACP, PAGP. f inspection policies related to SSL/TLS-secured traffic to prevent.
  • Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Converting CatOS to Cisco IOS Config Conversion on distribution layer switches
  • Configured various Router interfaces like ATM interface, T3 & Channelized T1 interfaces
  • Configuring and troubleshooting CISCO catalyst 6509, 7609, 7613 with Supervisor cards, Cisco 3640, Cisco GSR 12416,21418(with PRP and RPR processors)
  • Excellent Troubleshooting Skills and Customer Centric approach.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.
  • Configuring HSRP between the 3845 router pairs of Gateway redundancy for the client desktops.
  • Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Understanding of Python, Shell or Perl in order to push software and network interaction
  • Configuring Virtual Device Context in Nexus 7010.
  • Configuring multiple route reflectors within a cluster.
  • Working on HP open view map for Network Management System and Ticketing
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2Bnetwork connectivity.
  • To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Design and implement Catalyst/ASA Firewall Service Module for various LAN’s. responsible for managing Cisco routers, switches, HP switches, F5 load-balancers using SNMP MIBs for fault detection and for fault isolation.
  • Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity.
  • Integrate Microsoft active directory (LDAP) into checkpoint for identity awareness and user authentication.
  • Configure and manage LDAP User management with Checkpoint Smart Directory. Implemented the policy rules and DMZ for multiple clients of the state on the Checkpoint firewall.
  • Worked with several network engineers for the understanding of Juniper SRX firewalls along with the changeover to Palo Alto. Palo Alto Firewall Management-Panorama.
  • Experienced in handling and installing Palo Alto Firewalls
  • Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.
  • Experience working with ASR 9000 series switches with IOS-XR
  • Involved in configuring Juniper SSG-140 and Check point firewall.
  • Provided Layer-3 redundancy by implementing HSRP and GLBP for High availability
  • Implementation and Configuration (Profiles, iRules) of F5 Big-IP LTM-6400 load balancers
  • Implemented Access lists and policy mapping on Juniper router installed in each branch across all the states.
  • Worked on configuration commissioning and upgradation of the MPLS circuits for various branch offices. Disabling all unused ports and putting them in unused VLAN.
  • Implemented, analyzed and recommended appropriate system for the out of band management monitoring. Utilizing SolarWinds for primary and disaster recovery site.
  • Monitored and responded to network anomalies utilizing SolarWinds/Orion's software and recommended appropriate network solutions for issues.

Environment: Cisco switches - 2948/3560/4500/3560/3750/3550/3500/2960 6500 and Cisco routers - 1200/ 3640/ 7200/ 3845 / 3600 /2800 , Cisco Nexus 7K/5K, Cisco ASA 500, Cisco ISE, F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, SRP, TCL, SQL Server 2005 Integration services packages.

Confidential

Network Engineer

Responsibilities:

  • Assisted in troubleshooting LAN connectivity and hardware issues in the network of 100 hosts.
  • Studied and analyzed client requirements to provide solutions for network design, configuration, administration, and security.
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
  • Created a backup and recovery policy for software application and verified peripherals are working properly.
  • Monitor performance of network and servers to identify potential problems and bottleneck.
  • Performed RIP & OSPF routing protocol administration.
  • Interacted with support services to reduce the downtime on leased lines.
  • Troubleshoot problems on a day to day basis & provide solutions that would fix the problems within their Network.
  • Maintenance and Troubleshooting of connectivity problems using Ping, Trace route.
  • Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issue Other responsibilities included documentation and support other teams
  • Configured OSPF over frame relay networks for NBMA and point to multipoint strategies
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 & 6000 series.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope.
  • Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and trouble shooting.
  • Responsible for implementing QOS parameter on switching configuration.
  • Involved in Design and Implementation of complex networks related to extranet clients.
  • Troubleshooting the Network Routing protocols (BGP, EIGRP and RIP) during the Migrations and new client connections.
  • Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.
  • Worked towards the key areas of the project to meet SLA’s and to ensure business continuity. Involved in meetings with engineering teams to prepare the configurations according to the requirement.
  • Creating change tickets according to the scheduled network changes and implementing the changes.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 & 6000 series.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost-effective network solutions to accommodate customer requirements and project scope.
  • Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and trouble shooting.
  • Worked with Load balancing device like F5 Big-IP local traffic manager (LTM) 1600
  • Responsible for implementing QOS parameter on switching configuration.
  • Involved in Design and Implementation of complex networks related to extranet clients.
  • Working of 802.11 a/b/g/n Ethernet standard for wireless Technology.
  • Worked with other team members in testing of the network architecture.
  • Troubleshooting the Network Routing protocols (BGP, EIGRP and OSPF) during the Migrations and new client connections.
  • Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.
  • Worked towards the key areas of the project to meet SLA’s and to ensure business continuity. Involved in meetings with engineering teams to prepare the configurations according to the requirement.
  • Creating change tickets according to the scheduled network changes and implementing the changes.

Environment: Catalyst 6500/3750/3550/3500/2950 switches, Nexus 7K, 5K switches, Cisco 7200/3600/ 2800/2900 series routers, TACACS, EIGRP, RIP, OSPF, BGP, VPN, Cisco Prime, ISE, EtherChannel, vPC, Juniper QFabric, Juniper EX series switches, Cisco UCS, F5 load balancers, Palo Alto and Cisco ASA firewalls, Outlook/Office 365

Hire Now