We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

5.00/5 (Submit Your Rating)

PROFESSIONAL EXPERIENCE

Sr. Network Engineer

Confidential

Responsibilities:

  • Managed daily operations of a 400+ node, multi - network, multi-vendor client base
  • Provided SLO level support on 24/7 and work on shifts.
  • Worked on firewalls: Cisco ASA 5500, Juniper SRX 550, Juniper ISG, Checkpoint CPAP-SG21409
  • Worked on F5 load balancers BIG-IP 6400 and BIG-IP 8800 and VIPRION 2400
  • Configuring wide IP and wide IP pool on F5 LTM’s >M's to support load balancing between data centers.
  • Product testing and support for access layer switches such as cisco 4510, 4948, 4507, distribution layer switches such as 6513, 6509, 6504 and a routed core.
  • Worked on traffic flows from on premises to AWS, AWS to internet via virtual Palo alto firewalls for services that include PAAS and IAAS
  • Created and configured dashboards in What's up Gold and OPNET/Riverbed tools to assist with identifying network failures or application performance issues on internal network.
  • Managed offshore TechMahindra team and was involved in scoping for the uplink new BGP tunnel project for implementing W@H COVID-19 project with AT&T peer link and CISCO ANY CONNECT day-to-day network performance reporting to the tower.
  • Worked on Proxy services in aws include DNS based domain whitelisting using SNI, URL whitelist and backlist policies.
  • Experience administering Infoblox -DNS, IPAM, DHCP
  • Experience administering network monitoring tools such as SolarWinds NMS, Wireshark Cisco Prime and Net Brain worked on deploying AWS outbound bluecoat proxy server with domain services and content filtering services
  • Develop and administer disaster recovery plans and Successful executed change on Nexus 9k,7k, 5k & 2ks to support redundant platform, vulnerability planning and device EOL roadmaps for upgrades.
  • Prepared documentation for various VLANs and voice sub-networks and worked on Visio for the same.
  • Analyze network topologies, layouts and services, to collect and configure devices and services inside of product suite (NetScout) with monitors/agents
  • Assisting in creating network design standards for hardware and software installations.
  • Developing and maintaining network documentation (Visio diagrams, Excel spreadsheets, Word documents, plan, design and test the application migration from the F5 load balancer
  • Troubleshooting of DNS, DHCP and other IP conflict issues. Used various sniffing tools like Wire-shark.
  • Experience of various wireless 802.11 standards, controllers, Access Points, Wi-Fi analytics from various vendors (Cisco Meraki, CAPWAP, HPE /Aruba, D-Link and Net gear), SD-WAN (MX 65, MX100, MX400)
  • Implemented SD-WAN infrastructure to provide security, carrier-independent WAN connectivity across the enterprise.
  • NetScout nGenious performance for NPM across the network and Gigamon tapping fabric design for span traffic capturing for NetScout tool
  • Handling all Level 1/ 2 escalation Calls/Cases from customers or junior engineers regarding Aruba controllers, Airwave, ClearPass and Instant Aps
  • Troubleshoot connectivity issues through firewalls using command-line utilities and GUI on checkpoint smart console R80, Checkpoint Security Gateways, Cisco Firewalls especially ASA 5500(5540,5580) & amp;
  • Involved in the activity of data-center migration of regular cisco catalyst switches with the new nexus2148, 2224t, 5548, 6018, 7010 using f3/m3 line-cards with 10ge & 40ge interfaces.
  • Coordinated with user community and Change Management team to schedule downtimes

Sr. Network Specialist

Confidential

Responsibilities:

  • Monitoring district servers, website, and related hardware and supporting software (e.g. throughput, switches, patch panels, racks, etc.) for ensuring that resources and technology are available and utilized effectively.
  • Managed over 2000 VMs and 100 hosts via vCenter, Support and maintain VMware vSphere 6.5 environment (300+ servers) using ESXi hosts and EMC VNX5300 SAN, DELL Compellent 19061/19062
  • Planned and Implemented a structured network and data center, representing an uptime environment since 2017
  • Create and modify Python scripts for use in Arista CVP and network automation Replacement, support, and deployment of Arista routing equipment such as the 7010T, 7050SX2, 7050SX3, 7150S, 7280SR2, and 7504N chassis
  • Configured Arista 7010t, Arista 7050SX3 and Cumulus switches with various network protocols like VLAN to separate devices according to their function, all servers one VLAN, employees on separate VLAN, WIFI, Configured Arista 7050 Layer 3 switch created VLANs and made intra and INTERVLAN communication.
  • Migrate from Cisco ASA 5500 series Firewalls to Palo Alto 5030. F5 LTM and GTM installation in primary and redundant data centers.
  • Implemented SD-WAN infrastructure to provide security, carrier-independent WAN connectivity across the enterprise.
  • Network operations on Nexus family, Juniper EX series switches. Worked on Infoblox, Panorama, SolarWinds NPM, NCM and IPAM. Experience with Cisco ACI and ISE.
  • Analyze network infrastructure issues encompassing technologies such as Cisco routers & switches, FortiGate Firewall, Zscaler Proxy server & F-secure Antivirus.
  • Supported the Zscaler proxy project with the configuration of policies, logging, blacklist policies on Zcloud. GRE tunnels, PAC file changes, testing ZAPP.
  • Utilized Forti Manager, FortiClient, and Forti Analyzer to maintain and optimize FortiGate firewalls.
  • Worked with Cisco Layer 3 switches 3750,4500,6500; Cisco Nexus 5596 and 7010 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, ether channel and Implemented VDC, VPC, VSS, VRF and OTV on the Nexus 5505, 6500 and 7009 switches.
  • Involved in the team for designing and Configured Nexus 7000/5000/2000 in Top of Rack & End of Row Architecture for a Scalable Production Network that supports Rack & Blade server architecture in a Multi-Tenancy environment using VPC, VDC & VRF.
  • Experienced in implementing and managing F5 BIG-IP load balancing, including APM, ASM, and custom iRule development.
  • Troubleshooting connectivity issues on the firewall. Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.
  • Managing weekly and monthly backups with Veritas NetBackup 8.1.1 with HP tape library which included swapping tapes in datacenter and health check of drives in dell compellent as well.
  • Performed upgrade on Cisco ISE from version 1.4 to version 2.0. After performing upgrade took advantage of TACACS and onboard new network equipment into ISE instead of the unsupported Cisco ACS server.
  • Installing and updating XenApp farms, developing professional infrastructure, solving technical issues, managing Windows systems, and supervising the Citrix server farm, Printers Management in Citrix, Citrix Patch Management and policies configuration, Strong knowledge in configuring Roaming profiles and Streaming profile configuration
  • Performs other related duties as assigned, Server update and Windows update schedule
  • Built and configured MDM solutions for Android and Apple devices using Azure Admin
  • Monitoring and administering all 30 Regional offices and Central Office network traffic, port mappings, port security, FTP sites and monitor all ports and report to ITS (Mississippi Department of Information Technology Services)

Network & Systems Engineer

Confidential

Responsibilities:

  • Configuration of Cisco Routers, Switches/Stackable switches, firewalls, and Meraki MX devices
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port-channel between core switches and server distribution switches
  • Configuring and maintaining ASR 9K( ), Nexus 7000, 5000, 2000, Cisco 6500 series IOS multilayer switches, Cisco 2960s series switches and Cisco 3560 switches
  • Operated in Administration of L2 technologies like VLANs, VTP, Trunking, RPVST, Inter-VLAN routing, Ether channeling, and Switch Port Security on Access Layer switches.
  • Involved in the modification and removal (wherever necessary) of BGP from the MPLS routers.
  • Performing Cisco Security Solution - Cisco NG-ASA, NG-IPS, Source-fire or Firepower, Cisco IronPort WSA & ESA, Stealth Watch, Cyber Solution
  • Configured all Palo Alto Networks Firewall models (PA-3060 & PA-5250) as well as a centralized management system (Panorama) to manage large scale firewall deployments, which includes Application and URL filtering Threat Prevention and Data Filtering.
  • Built IP-Sec VPN tunnels from Cisco Firepower to SRX-220’s in remote sites using IKE pre-shared keys, AES-128, SHA, and DH5. For ERP Project, Built IP-Sec VPN tunnel’s from FTD2130 to Cisco ASA5520 which is in other Enterprise using AES-256, SHA, and Manage network devices with Cisco ISE and Cisco Prime (3.4)
  • Configures Cisco ISE to perform Profiling and Posture assessment of endpoints
  • Prime responsibility for Cisco Secure ACS v5 (TACACS, Radius) for the administration of 1450 devices. This included a full server-side Authentication, Authorization, and Accounting implementation. We were planning an enterprise-wide NAC replacement for an administration intensive “port-security” strategy. CISCO ISE Change administration, writing and implementing client sponsored or required changes, Cisco ISE configuration/deployment for network device access
  • IPSEC and SSN VPV are configured and maintained on Palo Alto and Checkpoint Firewalls. Zone-based Firewall and security Rules are implemented on Palo Alto Firewalls. Managed multiple Palo Alto Firewalls by integrating with Panorama.
  • Implemented Zone-Based Firewall and Security Rules on the Palo Alto Firewall.
  • Deployed, configured, and managed of 802.1x solutions to include Cisco Identity Services Engine (ISE), ACS (Radius and TACACS+), and Cisco Prime Infrastructure.
  • Configured Remote Access VPN (Any Connect) on FTD2130. Also configured User-based VPN, creating access-control policies directing from the AD server.

Network/Systems Engineer

Confidential

Responsibilities:

  • Administrated servers: Windows and servers’ virtualization (Hyper V, VMware); 2008, 2012 and Linux servers
  • Remotely assists dispatched technicians and troubleshoots Managed SCI and SOHO network equipment including Meraki switches, WLAN, and Cisco IP-phones issues.
  • Gained knowledge of Designing &Solutioning, maintaining CISCO based Security. Source Fire & Fire Power Specialist, Cisco ASA & NG-ASA Specialist, Cisco IronPort ASR Routers & Switches
  • Managing Cisco Unified Communications Manager (UCM) cluster with 500+ phones utilizing dual-homed SIP trunks
  • Configured Cisco Catalyst Switches 3560-CX, 2960-CX, Cisco Catalyst 4500-X for Core and Distribution purposes.
  • Configured Cisco AP’s using the WLAN controller, Experience managing and configuring Zscaler proxy filtering.
  • Maintained Security policy by monitoring PIX firewalls (515 and 520).
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.
  • Configured the policies, objects and applying NAT & Web filtering on Palo Alto and Checkpoint. Protocol-based policies troubleshooting on Palo Alto and changing the policies according to the requirements and as per traffic flow.
  • IPSEC and SSN VPV are configured and maintained on Palo Alto and Checkpoint Firewalls. Zone-based Firewall and security Rules are implemented on Palo Alto Firewalls. Managed multiple Palo Alto Firewalls by integrating with Panorama.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls and Strong hands on Network Circuit WAN upgrades, MPLS Circuit upgrades.
  • Device Administration/Maintenance: Maintain WAN connectivity devices (firewall appliances and routers); Audit performance of WAN devices to ensure an adequate ratio of resources.
  • Monitored all relevant logs, including server, application, and security logs for anomalies and performance issues.
  • Ability to manage packages, collections, and assignments in the SCCM console.
  • Maintained SCCM client troubleshooting skills on the Windows 7/8/10 platforms.

Network Administrator

Confidential

Responsibilities:

  • Designed and implemented a complex network system that uses both LAN and WAN technologies
  • Microsoft patch deployment creation, troubleshooting, and compliance management
  • Implemented and configured Storage Area Network devices
  • Designed from scratch and led the migration to a new 2008 R2 domain, including migration of all users’ accounts, computer accounts, and Exchange mailboxes.
  • Maintained upgrades and monitored all server and internal infrastructure equipment
  • Maintained network performance on a need basis
  • Configured Security policies including NAT, PAT, VPN's and Access Control Lists on different vendor firewalls like Cisco ASA, Checkpoint, Palo Alto.
  • Worked on Palo Alto APP-ID, User-ID and other security profiles like Anti-virus, Threat Prevention, URL-filtering, and Wildfire, etc.
  • Implemented new security protocols including forcing password standards for company users.
  • Handled authorization of directory services and configuration of authentication
  • Deployment of Palo Alto firewall into the network. Configured and wrote Access-list policies on protocol-based services.
  • Troubleshooting of protocol-based policies on Palo Alto firewalls and changing the policies as per the requirement and as per traffic flow.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
  • Implemented Zone-Based Firewall and Security Rules on the Palo Alto Firewall.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.
  • Troubleshoot and installing of CRS, ISR, GSR, ASR9000
  • Configured and implemented VDC and VPC on Nexus 9K,7K,5K switches in the Datacenter
  • Experience with configuring Nexus 5548 with nexus 2248 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7010.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls
  • Troubleshoot software and hardware issues on the network and on each individual workstation
  • Configured, implemented, and troubleshoot routers and switches with various account settings, permissions, and parameters including security firewalls.
  • Configured multiple domain name services (DNS), email services (Exchange Server), web, and file transfer protocol services (FTP) for various platforms including line leasing through DHCP servers.
  • Utilized SCCM to deploy OSD and packages to clients. (SCCM Admin)

Network Administrator

Confidential

Responsibilities:

  • Experience with Supporting Network infrastructure in a data center environment, which involved devices such as routers, switches, and wireless access points.
  • Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wireshark
  • Assisted in backup, restoring and upgrading the Router and switch IOS.
  • Troubleshoot and installed CRS, ISR, GSR, ASR9000 and Nexus devices
  • Worked on Extensively on Palo Alto Firewalls, Cisco Firewalls, Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series.
  • Build, configure, and install ACLs to harden network security on routers, L3 switches, and Nexus equipment.
  • Familiar with Cisco Security SDM, NAT/ACLs, AAA, Layer 2 Security, Layer 3 Security, IPS/IDS, Cryptography, VPN, IPsec.
  • Experience in Cisco ISE, ACS, Prime and Network Compliance Manager. Worked on the security levels with RADIUS, TACACS+.
  • Tuned IPS signatures, AMP file control, DNS policies (black holes), and Threat Intelligence to meet the client's IT Security policy.
  • Tied Firepower to Active Directory to enable username and password in firewall logs, to better track down IT Security incidents
  • Worked on different Cisco & Juniper devices of access, distribution, and core
  • Experienced with Juniper: EX-2200, EX-4300, EX-4500, MX-480 and SRX550 troubleshooting
  • Having hands-on experience with f5 Local and Global Traffic Managers (LTM >M)
  • Supported EIGRP and BGP based network by resolving level 2 &3 problems of internal teams & external customers of all locations

Network Support engineer

Confidential

Responsibilities:

  • Designed, installed, and maintained various WAN technologies and applications connecting remote sites to corporate headquarters.
  • Configured, implemented, and troubleshoot routers and switches with various account settings, permissions, and parameters including security firewalls.
  • Configured and troubleshooting of EIGRP, OSPF, BGP, LACP
  • Configuration of Standard and Extended ACLs for Security
  • Have hands-on experience on Nexus 9k,7k,5k/ACI network in Datacenter.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATING with the firewalls as per the design.
  • Network Security implementation with Cisco IOS Feature Set, NAT, and Simple Network Management Protocol
  • Performed IOS upgrades on Catalyst 3550, 2950, 1900 switches, and 3600, 2600 and 2500 routers
  • Provided support for the global network including T1/T3, ATM connections using HDLC and Frame Relay on 2600, 4000 series Routers
  • Created proactive procedures for problem preventions and resolutions, interfaced with software developers, analyzed issues, and designed solutions.
  • Administered all local and remote server backups with VERITAS Backup Exec.

Jr. Network Administrator

Confidential

Responsibilities:

  • Design and Development of schemas and capacity planning.
  • Configured HSRP between VLANs, Configuring Ether-Channels, and Port-Channel on 6500 catalyst
  • Switches Replaced branch hardware with new 2851 routers and 2960 switches
  • Implemented WLAN Aruba Wireless Access Points and its Controllers at various corporate sites fort
  • 802.11n Infrastructure and its legacy technologies
  • Experience in working with Cisco Nexus 5000 series switches for data center
  • Configured OSPF on CISCO devices with multiple routing processes and redistributed them. Tested and hands-on experience in multi-area OSPF topologies
  • Configured, managed and troubleshoot networks using routing protocols like RIP, EIGRP and OSPF (Single Area and Multi Area)
  • Assisted with troubleshooting all network issues with routers and switches when necessary and consulted with on Call tech as needed for client

We'd love your feedback!