We provide IT Staff Augmentation Services!

Network Architect Resume

Norwalk, CT

SUMMARY

  • Over 12 years of professional experience as Network engineer and Architect with Cisco Certified Network Engineer, performing Network analysis, design, Implementing, capacity planning with a focus on performance tuning and support of large Networks. Strong knowledge in Cisco Routing, Switching and Security with Cisco hardware/software (heavy Cisco shop) experience.
  • Experience working on Cisco Catalyst Series3750, 3650, 3850, 4500, 4900, 6500; Nexus 2000, 5000, 6000 and 7000 series switches.
  • Hands - on expertise with routers 2600, 2900, 3600, 3900, 7200, 7600, ISR-4331, ISR-4351, ISR4431, ISR4451, ASR-901, ASR-903, ASR 5500, ASR-9010 and Juniper ACX, E, M, MX960 series
  • Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers, IPS and Firewalls.
  • Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 6K, 5K, 2Kseries, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800, 1900, 2900, 3900, and ISR4K series and Cisco catalyst 6500, 4500, 3750, 3500, 2900, 3650, 3850 series switches
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy
  • Involved in troubleshooting of Infoblox / Vital QIP DNS, DHCP and other IP conflict problems.
  • Infoblox DNS IPAM for Microsoft DNS/DHCP setup and management.
  • Worked on Cisco Nexus 9000 family of switches whose hardware is based on Cisco ACI.
  • Management of Infoblox Grid Manager to manage DNS Forward and Revers Lookup Zones
  • Management of DNS dynamic update authentication
  • Responsible for Juniper and Cisco ASA firewall administration across global networks.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls(SRX240, SRX550)
  • Hands on experience in building Cisco ACI fabric (policy groups, switch profiles, etc.), tenants - VRFs, Endpoint Groups, Contracts
  • In-depth knowledge on Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS.
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series
  • Enterprise Routing experience using protocols RIP v1 & 2, EIGRP, OSPF and BGP
  • Expertise in installing, configuring and troubleshooting Juniper Routers ( E,J,M and T-series)
  • Implementing security policies using Cryptography, ACL, ASDM, IPSec, VPN, and AAA Security on different series of routers.
  • Experience with different Network Management Tools and Sniffers like Wireshark (ethereal), HP-Open view, RSA envision, and Cisco works to support 24 x 7 Network Operation Center.
  • Experience with F5 load balancers and Cisco load balancers (ACE and GSS).
  • Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers
  • Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analyses results and implement and delivering solutions as an individual and as part of a team.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.
  • Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Experience in migrating Check point to the Cisco ASA Devices. Also migrating from Cisco to Palo Alto
  • Configured Palo-Alto 7050 firewalls in vwire mode. Also configured Palo-Alto 3050 firewalls
  • Knowledge of JUNOS platform and worked with JUNOS upgrade of Juniper devices.

TECHNICAL SKILLS

Cisco Platforms: Nexus 7K, 5K, 2K & 1K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800, 1900,2900,3900, ISR4321, ISR4331, ISR4351, ISR4431, ISR4451-x series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 3650, 3850 series), CSR/ASR, IOS-XR, ISR, IOS-XE

Juniper Platforms: SRX, MX, EX Series Routers and Switches

Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi, DMVPN, Viptela SDWAN, SD-WAN

Firewall: ASA Firewall (5505/5510/5500- X series),Checkpoint, Cisco ASA

Network Tools: Solar Winds, SNMP, Cisco Works, Wireshark, Netflow, eHealth

Load Balancers: Cisco CSM, F5 Networks (Big-IP)

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1,DS3,OC3, T1 /T3 & SONET, Ethernet circuits

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, vPC, VLANS, VTP, STP, RSTP, 802.1Q

Network Security: Firewalls, Palo Alto Firewalls, ASA, ACI, IPsec, IPS/IDS, & VPN, Juniper SRX, Juniper VSRX, ACE Module and F5 Load Balancers

Security Protocols: IKE, IPSEC, SSL-VPN

Voice technologies: Cisco Unified Communications Manager (CUCM), Cisco Unity Connection (CUC), Cisco Unified Contact Center Express (UCCX), UCCX Scripting,SIP, PRI, Voice Gateways, Analog VG devices

Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA

Languages: Perl, C, C++,Python, SQL, HTML/DHTML

Operating System: MAC OS X, Linux, Unix, Cisco CATOS, IOS, IOS-XR, NX-OS, JUNOS, MS Windows 2007/08/10.

PROFESSIONAL EXPERIENCE

Confidential, Norwalk, CT

Network Architect

Responsibilities:

  • Solutions for WAN/ LAN & VPN Connectivity
  • Design of Cisco Catalyst switches 4500, 6500, 3650 & 3850 series, Cisco routers ISR 1900, 2900, 3900 and ISR4K routers including 4321, 4331, 4351, 4431 and routing protocol OSPF, EIGRP, BGP with Access Control lists implemented on as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches using peering interconnections.
  • Lead and manages multiple network project with team of on-shore and off-shore network engineers.
  • Coached and Mentored junior team members.
  • Global network WAN utilization reporting using solarwinds, capacity management and L4 WAN / LAN / WIFI Support escalations.
  • Design experience in the network management of circuits using TDM and Frame Relay network, fault management and performance monitoring
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • Maintenance of tools and utilities to install, monitor, and troubleshoot a network. Reporting layer- 2 network behavior, which can help network administrators monitor them with Aruba switches.
  • Design new branch network systems. Resolving network issues, running test scripts and preparing network documentation.
  • Working with Cisco Nexus 2248 Fabric Extender and Nexus 5500 series
  • Design of ISR, GSR, ASR9000 and Nexus 7010 and 7009 devices
  • Experience in communicating with different customers, IT teams in gathering the details for the project
  • Working knowledge and hands on experience on Cisco GSR, Catalyst 6500, 7600/7200 series enterprise routers/switches
  • Worked in for the NextGen Datacenter Cloud Architecture, using Cisco ACI and Nexus 9K.
  • Technology support given for Cisco ACI, NSX, Open Source solutions, AWS/Azure VPC, Arista &VxLAN.
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
  • Deployed QoS on LAN/WAN. Strong knowledge of various routing protocols including RIPV2, EIGRP, OSPF and BGP4
  • Performed OSPF, BGP, DNS, DHCP, Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K, 1K series redundant pair
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, WIFI, Cisco PIX / ASA Firewall, Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall, Palo Alto firewalls
  • Supported centralized DNS & DHCP Administration using Infoblox
  • Lead project of DDI management solution migration from Infoblox to VitalQIP
  • Part of a team responsible for the support and design of an Enterprise Cisco Telephony Infrastructure.
  • Support complex CISCO UCAAS / UCCX infrastructure as backup resource.
  • Hands on Experience with coding for Cisco IOS-XR with devices using Unix commands for DMVPNs.
  • Create and test Cisco router and switching operations using OSPF routing protocol, Palo Alto firewalls, Cisco ASA Firewalls, and MPLS switching for stable VPNs.
  • Working knowledge of Cisco ACI, NXOS and IOS, QoS, data center network design, cloud infrastructure design and management, OSPF, BGP, VLAN Trunking
  • HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches
  • Experience in WAN technologies like T1/T3, DS3, TDM, MPLS, Cloud ethernet, private connectivity to cloud
  • Experience in Security policies including NAT, PAT, VPN, Route-maps and Access Control Lists
  • Worked with Cisco CSMARS, Catalyst 6500 Series/ 7600 Series ASA Service Module and Intrusion detection system IDSM-2 meta event generator to prevent attacks like denial of service (DoS) in CDN.
  • F5 GTM solutions, which includes WideIP, Pool Load Balancing Methods, probers and monitors.
  • Support design and planning of Company Telco grade high-end Routers & Switches (Cisco ASR 9K, c7609,7200, ISR3900,2900, 1900 and 4K series Router / Cisco Nexus 7/6/5/2k, Catalyst Cisco 6500, 4500, 3750, 2950, 3650 *3850 series Switches, ASA 5585-X & Juniper MX/M/E series
  • Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by using VLANs.
  • Design VDCs in 7018 switches, maintained VRFs in those separate VDCs. Operated in OTV to extend L2 VLANs amongst data centers over IP on Nexus 7018 switches
  • Palo Alto Firewalls for web filtering and application control catalyst 6500, 4500, 3550 switches with various VLAN. 1 Gig, 10 Gig, 40 Gig ethernet
  • Scripting for automation of processes for Windows Servers. Familiarity with main script languages like Power Shell, PHP, Shell, Perl, Python.
  • Migrated legacy F5 LTM and GTM appliance to newer version appliances
  • Experience with migrating from OSPF to BGP WAN routing and peering protocols
  • Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256
  • Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data environment
  • In-depth knowledge in designing, implementing, configuring with best practices on NextGen IDS/IPS Firewalls such as Palo Alto, Cisco Firepower (Sourcefire).
  • Serve as the customer’s go-to resource for all matters related to the Palo Alto next-generation firewall.
  • Additional tasks include assisting with the day to day operations and management of other network devices such as Cisco ISE, Infoblox, Palo Alto firewalls and Panorama.
  • Migrated Palo Alto Next-Generation Firewall series PA-500, PA-3060, PA-5060, PA-7050, PA-7080 from Cisco PIX and ASA and Source of knowledge for SD-WAN and routing trends and technologies
  • Providing design and architecture flaws and also remediation design to the management team
  • Providing optimization solutions to the management team and team mates.
  • Designing, architecting and providing solution for both new projects and network optimization.
  • Designing and implementing PBR for better link utilization and load sharing.
  • Designing and implementing remote sites that connect to the main office via MPLS, and secure gateway over internet
  • Providing network solutions to optimize both the data center and enterprise network
  • Managing and monitoring multiple datacenters, remote sites and enterprise LAN and wireless networks using CA Netflow and Solarwind tools.
  • Designed architecture solutions for the various project for the LAN/WAN/VoIP, DMVPN, SDWAN, Viptela SD-WAN infrastructure including Data Center, HQ and remote branches.
  • Developed and enforced standards and operating procedures to ensure quality and productivity with the Network portfolio.
  • Lead design activities for network topologies.
  • Identify and correct network non-compliance issues.
  • Lead product life cycle management activities across the Network portfolio
  • Recommended new networking technologies to improve performance, reliability and availability.
  • Work closely with other Network Engineers to plan and complete assigned tasks within deadlines.
  • Provided technical expertise across the organization relating to Networks, including support to Operations teams in the on-going maintenance and surveillance of related networks and applications.
  • Presentation of Roadmap updates or Service Reviews to key Stakeholders
  • Managed up to date overall Visio drawing and share with all internal team.
  • Conducted research and proof of concept (PoC) for network infrastructure before deploying to production.
  • Prepared and maintained the network inventory for any upcoming device upgrade from the vendor, to facilitate new requirements, technologies and growth.

Confidential, Brea CA

Sr. Network Security Engineer

Responsibilities:

  • Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.)
  • Responsible to evaluate, test, configure, propose and implement network, firewall and security solutions with Palo Alto networks.
  • Deployed VXLAN on the Nexus 9000 to map the physical VLANs to the Virtual Overlay VLANs. Deep technical troubleshooting on customer SD WAN Edge connect device, Firewall Cisco ASA, Palo Alto.
  • Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter Vlan routing, LAN security etc.
  • Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN, Dark Fiber
  • Managed Services delivery with proof of conepts (poc), installation, configuration, troubleshooting O&M of Cisco (ASR9K, C7609, 7200, 6509, ACE) series network gear, Juniper (M, MX Series Router, EX Series Switch & SRX & Netscreen Series Firewall), Huawei (NE40E, S9300, ATN, E1000U) Series Router, Switch & Firewall, and F5 LB of (Airtel, Orange & Tigo) Customer for End-to-End IP Network Infrastructure
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Successfully integrate and validate OpenStack Liberty with Cisco ACI platform ML2 plugin as the next generation network infrastructure for Cisco Cloud.
  • Improve scalability and ease of deployments of the OpenStack underlay network by migrating from Standalone Nexus to Cisco ACI platform.
  • Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.
  • Worked on cleanup of several legacy rules of ASA and created a migration path to Palo Altos, configured for Global protect VPN, User ID, Wildfire set up, SSL decryption, license and policy management on Palo Alto appliances.
  • Monitoring the network traffic with the help of Qradar and Cisco IPS event viewer.
  • Managing and implementation of PORs (port open requests) based on the requirements of various departments and business lines.
  • Implementing and troubleshooting (on-call) IPSec VPNs for various business lines and making sure everything is in place.
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per the requirement of the Organization.
  • Worked as a part of data center deployment where we converted from Cisco 6500 to Nexus.
  • Experience configuring VPC(Virtual Port Channel), VDC(Virtual Device Context) in Nexus 7010/7018
  • Experience with configuring FCOE using Cisco nexus 5548
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration.
  • Configuring & managing around 500+ Network &Security Devices that includes Juniper SRX Firewalls, F5 BigIP Load balancers and Nexus Devices.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Migrated VoIP Infrastructure from CUCM/CUC 7.x to CUCM 9.x, 10.x, 11.x.
  • Managed and supported UCCX (Cisco Unified Contact Center Express)
  • Day to day UCCX responsibilities included adding / removing users, assigning privileges, modifying scripts, adding wave files, adding licenses, setting phones up to enable call recording. And troubleshooting
  • Responsible for Cisco ASA firewall administration across the network.
  • Palo Alto/ASA Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Upgraded the existing Panorama to V8.0.6. Integrating the new firewalls to Panorama and responsible for working on change tickets for existing 3250 Palo Firewalls in the environment
  • Setup simplified and traditional VPN communities, and Cisco Any connect
  • Support customer with the configuration and maintenance of ASA firewall systems
  • Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).
  • 24x7 on-call escalation support as part of the security operations team.
  • Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs.
  • Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
  • Implementing IPSec and GRE tunnels in VPN technology.
  • Supporting project test teams in analyzing the bandwidth utilization.
  • Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
  • Designed, configured, implemented site-site VPN on Cisco ASA 5500 firewall.

Environment: Cisco 2948/3560/4500/3560/ 3750/3550/3500/2960 6500 switches and Cisco 3640/12000/7200/ 3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Checkpoint, windows server 2003/2008, Unix: F5 BIGIP LTM,RIP,OSPF,BGP,EIGRP,LAN,WAN,VPN,HSRP

Confidential, East Windsor NJ

Palo Alto Firewalls Engineer

Responsibilities:

  • Configuring rules and maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Deployed CISCO ACI Greenfield and Migrated from Legacy network.
  • Strong hands on and exposure to Checkpoint, Cisco ASA & Palo Alto on a regular basis
  • Maintaining and Monitoring Network using Tools like SolarWinds and Panorama
  • Working in high availability Nexus Environment and provide Level 3 Network Support.
  • Configuring, upgrading and verifying the NX-OS.
  • Basic and advanced F5 load balancer configurations, general troubleshooting of the F5 load balancers.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configure IPSEC and SSL VPN with Palo-alto, Cisco ASA, Fortinet, Checkpoint and Router.
  • Worked on Source Fire and Palo Alto IPS/IDS Systems, Splunk log monitoring tool, Qualys vulnerability assessment tool.
  • Experience with Cisco ACI (Application Centric Integration) technology implementation
  • Working as a Network SME for the NextGen Datacenter Cloud Architecture, using Cisco ACI
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope.
  • Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits.
  • Providing Level 3 support to customers, resolving issues by attending to conference calls.
  • Providing Level 3 Engineering and Support to other internal network engineers and contractors.
  • Designing and installing new branch network systems. Resolving network issues, running test scripts and preparing network documentation.
  • Work on Change Management for migration from Cisco ASA to Palo Alto.
  • Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Configured various Router interfaces like ATM interface, T3 & Channelized T1 interfaces
  • Configuring and troubleshooting CISCO catalyst 6509, 7609, 7613 with Supervisor cards, Cisco 3640, Cisco GSR 12416,21418(with PRP and RPR processors)
  • Manage Palo alto, Checkpoint, Cisco ASA and Fortinet policy and network
  • Migrated from Cisco ASA to Palo Alto.
  • Excellent Troubleshooting Skills and Customer Centric approach.
  • Working with BGP, OSPF protocols in MPLS Cloud.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.
  • Configuring HSRP between the 3845 router pairs of Gateway redundancy for the client desktops.
  • Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Configuring BGP, MPLS in Cisco IOS XR.
  • Configuring & managing around 500+ Network &Security Devices that includes Cisco Routers & Switches, Nexus Switches, Juniper and Palo Alto Firewalls, F5 Big IP Load balancers, Blue Coat Proxies and Riverbed WAN Optimizers.
  • Upgraded Panorama version 7.0 to 8.0 on Palo Alto Firewalls.
  • Configuring Virtual Device Context in Nexus 7010.
  • Configuring multiple route reflectors within a cluster.
  • Working on HP open view map for Network Management System and Ticketing
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2Bnetwork connectivity.
  • To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.

Environment: Over 100,000 users globally, Cisco 2948/3560/4500/3560/3750/3550/3500/2960/6500 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco Nexus 7K/5K/2K, Cisco ASA5510,Checkpoint, windows server 2003/2008: F5 BIGIP, LTM, OSPF, EIGRP, RIP, BGP, VLAN, VPN, Checkpoint, Juniper SRX

Confidential

Sr. Network Engineer

Responsibilities:

  • Assisted in troubleshooting LAN connectivity and hardware issues in the network of 500 hosts.
  • Studied and analyzed client requirements to provide solutions for network design, configuration, administration, and security.
  • Involved in troubleshooting IP addressing issues and Updating IOS images using TFTP.
  • Staged, planned and deployed Palo Alto NGF 5250s, 3020s, 3060s within Data Centres. Worked with Palo Alto firewalls using Panorama performing changes to monitor/block/allow the traffic on the firewall.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 router with HSRP.
  • Created a backup and recovery policy for software application and verified peripherals are working properly.
  • Monitor performance of network and servers to identify potential problems and bottleneck.
  • Performed RIP & OSPF routing protocol administration.
  • Interacted with support services to reduce the downtime on leased lines.
  • Troubleshoot problems on a day to day basis & provide solutions that would fix the problems within their Network.
  • Experience with Cisco ACI (Application Centric Integration) technology implementation.
  • Working as a Network SME for the NextGen Datacenter Cloud Architecture, using Cisco ACI
  • Deployed CISCO ACI Greenfield and Migrated from Legacy network.
  • Created different application policies in the ACI including Tenants, Application Network Profile (ANP) and End Point Group (EPG).
  • Awareness on Cloud Computing, Software Defined Networking (SDN), Cisco ACI, VMware NSX
  • Migration from Cisco to Palo Alto firewall & Cisco to Checkpoint firewall.
  • Maintenance and Troubleshooting of connectivity problems using Ping, Trace route.
  • Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issue Other responsibilities included documentation and support other teams
  • Configured OSPF over frame relay networks for NBMA and point to multipoint strategies
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 & 6000 series.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Integrate multiple vendor IPSEC site to site VPNs, including Palo Alto Networks, Cisco ASA, and Juniper SRX firewalls.
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope.
  • Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and trouble shooting.
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Responsible for implementing QOS parameter on switching configuration.
  • Involved in Design and Implementation of complex networks related to extranet clients.
  • Troubleshooting the Network Routing protocols (BGP, EIGRP and OSPF) during the Migrations and new client connections.
  • Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.
  • Worked towards the key areas of the project to meet SLA’s and to ensure business continuity. Involved in meetings with engineering teams to prepare the configurations according to the requirement.
  • Creating change tickets according to the scheduled network changes and implementing the changes.

Environment: Network with over 17,000 users, Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco ASA5510, Checkpoint,F5 Load Balancer Cisco Nexus7K/5K,Checkpoint,Cisco ASA

Confidential, Stamford, CT

Network Engineer

Responsibilities:

  • Configuring and troubleshooting multi-customer network environment.
  • Involved in network monitoring, alarm notification and acknowledgement.
  • Implementing new/changing existing data networks for various projects as per the requirement.
  • Troubleshooting complex networks layer 1, 2to layer 3 (routing with MPLS, BGP, EIGRP, OSPF protocols) technical issues.
  • Worked with Palo Alto firewalls PA3020, PA5020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.
  • Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, BlueCoat Proxy and Riverbed Steelhead appliances
  • Providing support to networks containing more than 2000 Cisco devices.
  • Performing troubleshooting for IOS related bugs by analyzing past history and related notes.
  • Carrying out documentation for tracking network issue symptoms and large scale technical escalations.
  • Commissioning and Decommissioning of the MPLS circuits for various field offices.
  • Preparing feasibility report for various upgrades and installations.
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc.)
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configured switches with port security and 802.1 xs for enhancing customer’s security.
  • Monitored network for optimum traffic distribution and load balancing using Solar winds.
  • Validate existing infrastructure and recommend new network designs.
  • Handled Tech Support as it relates to LAN & WAN systems

Hire Now