We provide IT Staff Augmentation Services!

Network Security Specialist Resume

4.00/5 (Submit Your Rating)

Raleigh, NC

PROFESSIONAL SUMMARY:

  • Network Engineer having 7+ years’ experience in Data Centre Networking and Security, widely in Network Security Products and Firewalls.
  • Firewall installation, Policy implementation, NAT translation and System Software Upgradation of existing Firewalls.
  • Expert Level Cisco ASA, Palo Alto, Check Point and Juniper SRX Firewalls Administrator.
  • Involved in Project planning, Product Migration, Project handovers, perform maintenance and backup for the security products.
  • Wide knowledge on cisco Iron port for URL filtering based on categories and for http & https traffic redirection via cisco IronPort.
  • Monitor industry warnings and messages for all system patches, virus activity, and upgrades to maintain the overall information security integrity of the enterprise. Inform and recommend course of action to information security management.
  • Security Policy setting & configuration as per the security requirement in various segments
  • Palo Alto Network Security Device Administrator: Administration of Palo Alto Network Device, Configuration of New Access Policy, Firewall Rules, QOS Rules, User ID agents, Treat Policy. Monitoring the network traffic via wire shark network analyser tool. Creation new Internet access policy for the global network, Trapshooting the internet filter, firewall, OOS.
  • Worked extensively on firewalls and VPN gateways Checkpoint, Blue Coat Web Gateway, CISCO, Juniper, FortiGate and Shell.
  • Cisco switches and routers, LAN networks, VPN configuration, IPsec, PPTP VPN tunnel configuration for the client.
  • Deploying and support Cisco VOIP (Call Manager, Unity Connections and CUPS) and Cisco IOS voice gateway.
  • Hubs, Bridges, Routers, TCP and/or IP protocols, Addressing, Flow control
  • Analysing and troubleshooting network problems and Application slowness issues.
  • Configuring F5 Load balancer LTMs and GTMs to isolate traffic from the web servers.
  • Providing support and troubleshooting the network Problem for the client.
  • Implemented Positive Enforcement Model with the help of Palo Alto Networks.
  • Innovated with support of Palo Alto for remote and mobile users and for analysing files for malware in a separate (cloud - based) process that does not impact stream processing.
  • Working knowledge with Infoblox appliances such as DNS, DNSSEC, DHCP, IPAM and TFTP
  • Assist customer team with the design and placement of Palo Alto Networks devices.
  • Installation, configuration and maintenance of Palo Alto, Cisco ASA 5500, Juniper SRX Firewalls.
  • Experience in installing, configuring and troubleshooting of Checkpoint Firewall and Juniper SSG series.
  • Deploying and support VOIP services with Cisco call manager express/CUCM.
  • Hands on experience on Power over Ethernet (POE) and Ether Channel.
  • Worked on Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
  • Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.
  • Optimizing and efficient use of policies in Palo Alto-5020 and FortiGate 311B Firewall v5.2.3.
  • Experience in configuring Client-to-Site VPN using IPSEC VPN on SRX series firewalls
  • Migrated Core Internal Network from Core Switch to Palo Alto Firewall and configuring Generating User Activity and Application Reports on PA5020 Firewalls.
  • Managed implementation of Cisco IOS zone-based firewall to perform basic security operations on the network.
  • Experience in adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications.

TECHNICAL SKILLS:

Routers: Cisco 2600, 2800, 3800, 3640, Cisco 3745 Cisco routers, 7000 series, AS5400 series, IOS version 12.x

Switches: Cisco 3500, 5000, 6500 Catalyst Series Switches Cisco switches, Catalyst 2900XL, 3500XL, 4908G-L3 & GESM series, IOS version 12.x Cisco Nexus Switches, 1000, 3000, 5000, 6000, 7000, & 9000 series, NX-OS version 4.x, 5.x, 6.x, 7.x, 8.x

Palo Alto PA3050, PA: 5050, Checkpoint Firewalls Cisco firewalls, FWSM series, OS version 3.x & 4.x, PIX, ASA, & Local Director series, OS version 4.x, 5.x, 6.x, 7.x, 8.x, 9.x

Routing Protocols: RIP v1&v2, BGP, OSPF, EIGRP, HSRP, VRRP, GLBP, FTP, SMTP, SNMP

Switching Protocols: STP, RSTP, PVSTP, VTP, ARP, and VLAN.

IP Services: DHCP, NAT, VLAN, DNS, FTP, TFTP, LAN/WAN

WAN Technologies: ATM, ISDN, PPP, MPLS, ATT, 802.11, 802.11a, 802.11b, APLUS.

Remote access and siteto: site IPsec VPN, IPv6 transition techniques viz. Manual tunneling, GRE tunneling, 6to4 tunneling, NAT64 and ISATAP

Monitoring Tools: OPNET, GNS3 Simulator, Packet Tracer, Wire Shark, Solar Winds, What s Up IP, Nagios and Fluke Networks

Networking: TCP/IP, OSI Model, Socket Programming, LAN/WAN, Switches and Routers, IPV4/IPV6 Addressing & Subnetting, Ethernet, STP, VLAN, Trunking, DNS, DHCP, NAT, ACL, HTTP, ATM, ISDN, PPP, MPLS, ATT, 802.11, 802.11a, 802.11b, APLUS Web Services (REST & SOAP), Windows Servers 8 & 12

Tools: GNS3, Packet Tracer, Solar Winds, What s Up IP, VMware Workstation, Wireshark, Nagios and Fluke Networks

Languages: C, Python

Operating Systems: Windows XP, Vista, Windows 7, UNIX, SPLAT (Secure Platform), Linux

DOCSIS: Cisco, RCA, Com21, GI, 3Com, Samsung, and Toshiba

DLP: Websense, Symantec & McAfee

Cloud Environment: Amazon AWS

PROFESSIONAL EXPERIENCE:

Confidential, Raleigh, NC

Network Security Specialist

Responsibilities:

  • Configuring, Administering and troubleshooting the ASA Firewalls. Cisco Firepower IPS
  • Migrating DIT and all its government agency firewalls, both on-site and Server-Farm setups from old Hardware to New known as Tech-Refresh under the Governor’s office
  • Implemented OPSF and BGP routing in the Server-Farm environment, replacing static Routes with Dynamic Routing protocols
  • Upgrade K-12 campus firewalls from X, upgrade ASA code to 9.9.2-56, ASDM 7.12
  • Setup Cisco AnyConnect VPN in the production environment, test and maintain SSL VPN firewalls
  • Setup TACACS configurations for firewalls for remote management/ Out of Band connections
  • Managing Cisco Catalyst 6509-E, WS-SVC-FWM-1, Nexus 06 (6 Slot), Nexus9000 series, ISR4431 Routers and switches
  • Managing FPR4K-SM-12, 4100 series Firepower appliances, Intrusion Prevention Systems (IPS)
  • Managing Cisco ASA 5585, 5555, 5545 series, upgrade and maintain security policies
  • Responsible for installation, configuration of Palo Alto using Panorama
  • Performing migration from old hardware to new hardware in datacentre environment
  • Provide on call support with network operations teams resolving incidents
  • Deployed Paloalto-7000 series device to the production environment, managed them via Panorama
  • Worked on the migration of ASA firewalls to Palo Alto firewalls, in cloud environments
  • Worked on network monitoring tools such as QRADAR, SPLUNK, HPNA, Net-Auto for troubleshooting and network assessment
  • Trouble shooting Layer 3 issues, also assist layer 2 team with the troubleshooting issues with BGP, OSPF.
  • Creating NATs as per user’s requirement to getting access for different servers like internal firewalls, DMZ firewalls and
  • Internet firewalls and worked on Splunk for troubleshooting.
  • Migrate management, host and transit interfaces of the firewalls to new IP, without affecting data traffic.
  • Migrate NAT rules with counter NATs as per the new IP request
  • Participate daily scrum meetings, maintain project flow to meet deadlines.
  • Migrate and configure Juniper firewalls to Palo Alto using Panorama
  • Create and run the automation script to push configuration into the firewalls
  • Maintain definitions in bluecoat proxies, with Splunk integration.
  • Creating Perform and fulfil service now request for Port service, create policies and migrate rules to new subnet
  • Administration Big IP F5 LTM for all Local Load balancing and use GTM for load balancing across Data Centers.
  • Worked with applications transport protocols SSL, IPSEC, DNS, NTP, SSH, LDAP, RADUS, TACACS+ and AAA on ASA Firewalls.

Confidential, Universal City, CA

Firewall Administrator

Responsibilities:

  • Configuring, Administering and troubleshooting the Palo Alto, ASA and Juniper firewall.
  • Investigate security incidents, troubleshoot, resolve and recommend actions needed to resolve vulnerability issues.
  • Managing Cisco ASA 5585, 5555, 5545 series, upgrade and maintain security policies
  • Responsible for installation, configuration of Palo Alto using Panorama
  • Performing migration from old network to a new network of millions of users.
  • Provide on call support with network operations teams resolving incidents
  • Deployed Paloalto-7000 series device to the production environment, managed them via Panorama.
  • Worked on the migration of ASA firewalls to Palo Alto firewalls, in cloud environments.
  • Performed code upgrades on the ASA 5585, 5555 series
  • Worked on Splunk to gather generated logs for the firewalls, to maintain application flow on firewalls
  • Trouble shooting Layer 3 issues, also assist layer 2 team with the troubleshooting issues with BGP, OSPF.
  • Creating NATs as per user’s requirement to getting access for different servers like internal firewalls, DMZ firewalls and
  • Internet firewalls and also worked on Splunk for troubleshooting.
  • Migrate management, host and transit interfaces of the firewalls to new IP, without affecting data traffic.
  • Migrate NAT rules with counter NATs as per the new IP request
  • Participate daily scrum meetings, maintain project flow to meet deadlines.
  • Migrate and configure Juniper firewalls to Palo Alto using Panorama
  • Setup Global Protect VPN in the production environment, test and maintain VPN firewalls
  • Create and run the automation script to push configuration into the firewalls
  • Maintain definitions in bluecoat proxies, with Splunk integration.
  • Creating Perform and fulfil service now request for Port service, create policies and migrate rules to new subnet
  • Administration Big IP F5 LTM for all Local Load balancing and use GTM for load balancing across Data Centers.
  • Worked with applications transport protocols SSL, IPSEC, DNS, NTP, SSH, LDAP, RADUS, TACACS+ and AAA on ASA Firewalls.

Confidential, Manhattan, New York

Network Security Engineer

Responsibilities:

  • Monitoring and troubleshooting traffic on PaloAlto-5020 firewall.
  • Creating and modifying rules and objects on PaloAlto-5020 firewall.
  • Reporting on malwares and phishing alerts to the clients.
  • Building configurations for Juniper MX 2010 and MX 2020 routers with features like port security, VLANS, VTP, PVST+.
  • Monitoring on virus alerts from Symantec Endpoint compliance and reporting it to the client.
  • Share the security advisories for the OEM products.
  • Using ArcSight, Splunk, NetWitness, and Remedy, IronPort, Windows server, Fire eye, PCAP, Sourcefire. Sentry.
  • Configuring Troubleshooting Cisco Firewall/ASA and, Checkpoint FW, Bluecoat Proxy SG and Cisco IronPort.
  • Administration of Juniper SSL VPN, Websense Web Security and IronPort.
  • Propagate local changes from Infoblox members to master and vice versa using Infoblox grid
  • Accountable for maintaining and administration of Cisco IronPort.
  • Supported Infoblox appliances grid environment for DNS, DHCP and IP Address Management tools (IPv4), for the State Farm enterprise network.
  • Negotiated Cisco Security ELA and built full implementation plan for CWS, CES, ISE, AMP, and Firepower.
  • Configuring Checkpoint and ASA for NAT (Static PAT/Manual NAT) to enable remote.
  • Experience in working with checkpoint, Palo Alto Next-generation firewall, Cisco ASA and Panorama M-100.
  • Worked on SIEM tool LogRhythm for reporting and data aggregation
  • Involved in Intrusion Detection, DMZ, encryption, IPsec, proxy services, Site to Site VPN tunnels, MPLS/VPN and implementing SSL with Websense
  • Upgraded Meraki security devices as all office locations, made sure Meraki was upgraded, both circuits were functioning through the Meraki and wireless clients were using the Meraki appliances.
  • Services expert responsible for effectively communicating, educating, and positioning Infoblox service programs within the partner community and customer base.
  • Experience with TRITON- Web Security to serve as the configuration and management interface support for Websense software
  • Experience on working with IPsec VPN, IDS/IPS, DLP, Application and URL filtering on checkpoint firewall module
  • Experience on working with IPsec VPN, Security profiles and SSL decryption on Palo Alto firewall
  • Monitored network activity within the Department of Education for intrusion and malware incidents using Sourcefire, Bluecoat, McAfee EPolicy, Symantec end point protection.
  • Worked on integration with SNMP, RADIUS and LogRhythm SIEM syslog server with Palo Alto and checkpoint firewall
  • Experience in working on the Quarterly maintenance windows for failover, reboot of Checkpoint next-generation firewalls and Palo Alto firewalls, as well as other security devices
  • Administer policy settings and upgrades to Forcepoint Triton APX Web, DLP, and Email applications
  • Experience on working on Checkpoint firewall IDS/IPS module for setting up the upgradation of new signature patterns and monthly reporting for auditing purpose.
  • Cisco ISE 1.3 Deployment and Profiling Policies Experience with Websense DLP web security gateway to provide security for outbound content over the web
  • Prepare daily security management brief and advisories utilizing data from Tipping Point, Palo Alto, Websense Forcepoint, Remedy and various security advisory sites.
  • Worked on troubleshoot and packet capture analysis on Palo alto firewall and checkpoint firewall
  • Check for the software compliance i.e. removes the non-compliant application used in organization.
  • Create, modify, and troubleshoot the issues of users on PIM tool which give remote access to the server and network devices.
  • Review Firewall rule conflicts and misconfiguration as well as redundant rules using Tufin.
  • Worked on IBM QRadar SIEM tool for network/log monitoring an troubleshooting.
  • Implementation of Security Firewalls such as Palo Alto and Fortigate alongside Cisco ASA.
  • Configuration and Administration of Security Policies, Security Profiles, User-ID Integration on PA 5020 Firewalls Version 6.0.8
  • Involved in Switching Technology Administration including creating and managing VLANS's, Port security, Trunking, STP, Inter-VLAN routing, LAN security etc. Deploying Layer 2 security in Server Farms by configuring switch for 802.1x port based authentication.
  • Generating User Activity and Application Reports on PA5020 Firewalls.
  • Migrated Core Internal Network from Core Switch to Palo Alto Firewall and configuring Generating User Activity and Application Reports on PA5020 Firewalls.
  • Configuration of Juniper and Palo Alto firewall according to client topology and features such as Application & URL filtering, Security Profiles, VPN, Data filtering and file blocking. Antivirus
  • Configured and worked on Juniper MX240 and MX40 router, and optimized network for application delivery in virtualized network environment.
  • Extensive implementation of firewall rules on Juniper SRX 3600, SRX 650 and SRX 220 on a daily basis, using SPACE as well as CLI when needed.
  • Provide expertise with incident response, security event monitoring, vulnerability management, asset security compliance and data loss prevention utilizing McAfee Nitro (SIEM), McAfee ePO, McAfee DLP.
  • Configuring VLAN, Spanning tree, VSTP, SNMP on Juniper EX series switches
  • Provided proactive threat defense with JUNIPER SRX that stops attacks before they spread through the network.
  • Configured data network to support voice including VoIP VLAN, inter-VLAN routing and QoS tagging.
  • Troubleshooting on Traffic, User Activity and Policies for Palo Alto Firewalls.
  • Optimizing and efficient use of policies in Palo Alto-5020 and Fortigate 311B Firewall v5.2.3.
  • Managing policies and UTM (or IPS) features to make Organization more secure.
  • Analyzing and Mitigation of threats which are affected to Organization.
  • Providing the reports and documenting all the logs for Audit purpose and Management review
  • Working as a Proactive to Analyze and impact Threats or any changes in Network which are exploit to Security System.
  • Managing WLC for AP's with policies Confidential the edge firewall to make Internal Network more secure.
  • Network Optimization and Removal Vulnerabilities of Cisco Routers and Switches.
  • Managing End Point AV solution i.e. Symantec.
  • Managed multiple security devices in order to protect the Enterprise’s network - Vulnerability Scanners, Malware Detection, Intrusion Detection; Host based Firewalls, SIEM, Web Application Firewall
  • Installation, Administration, configuration and troubleshooting of Fortinet and checkpoint Firewalls
  • Involved in the Migration of checkpoint to Fortinet Firewalls.
  • Proficiency in Infoblox to work on DHCP, DNS, & IP Address Management in sizeable enterprise organizations.
  • Worked on network packet Analyzer tools such as, Wireshark, Microsoft Network Monitor, Snort, TCP dump
  • Implementation and configuration Failover for firewall ASA 5510 and 5512.
  • Configuration and troubleshoot Site to Site VPN and SSL VPN for Thin and Thick Clients on IOS based Router and ASA Firewall.
  • Create policies, alerts and configure using SIEM tools (Splunk, IBM QRadar)
  • Hands on experience with packet sniffer, TCP DUMP and Wireshark for packet monitoring.
  • Managed implementation of Cisco IOS zone-based firewall to perform basic security operations on the network.

Environment: Palo Alto Firewalls, Check Point Firewalls, JUNIPER routers and switches; Cisco Routers 7600, 7200, 3800, 3700, 2800; Cisco Catalyst switches 6500, 4500, 3500, 2900; Cisco PIX Firewalls 535, 525; Cisco ASA 5550, 5520, LAN, WAN Technologies, VTP, VLAN and 802.1Q trunking; Routing Protocols OSPF, BGP, EIGRP, TCP and/or IP protocols; LOAD BALANCERS: BIG-IP F5, VOIP: SIP; CISCO UNIFIED COMMUNICATIONS, CISCO CALL MANAGER.

Confidential, El Segundo, California

Network Security Engineer

Responsibilities:

  • Device managing - Palo Alto firewalls (5000, 2000, 500 series) with centralized manage server panorama. Checkpoint (R65), ASA 5520, VPN, Bluecoat proxy, ISA server, Certificate authority, Proventia IBM IPS with Site protector, tipping point with SMS, PIX-535, MacAfee vulnerability manager.
  • Involved in Migration of Check point to Palo Alto firewalls.
  • Installed, operated and supported MacAfee EPO, CA-Etrust console, Symantec Endpoint Protection Manager Console, SOPHOS, TrendMicro. Antispam Bright mail, Symantec Mail Security, Cisco IronPort.
  • Migrating Bluecoat proxy with Palo Alto captive portal solution.
  • Replaced different locations Cisco IOS hardware as well as physical firewall hardware structure with Meraki MX firewalls and MS switches solutions.
  • Worked with Websense ACE to safeguard network resources, define rules for custom filters and provide real time security updates
  • Deploy and manage Forcepoint firewalls, CISCO ASA 5500 and Palo Alto
  • Manage Forcepoint SMC (156 firewalls)
  • Up gradation of Proventia IBM IPS firmware and Palo Alto firewalls.
  • Exposure to wild fire advance malware detection using IPS feature of Palo Alto
  • Successfully installed Palo Alto Next-Generation PA-3060, PA-5060 firewalls to protect Data Center with the use of IPS feature.
  • Experience with Websense filtering service for selectively filtering unwanted internet requests traffic
  • Worked on checkpoint firewall SMART Event Intro module for generating monthly IPS reports
  • Experience on working with SIEM tool LogRhythm on adding the newly build windows and Linux log servers and creating policies for different alerts
  • Deployment of Palo Alto 5000 series firewall and checkpoint 12000 series firewall
  • Worked on Python scripting for generation the firewall security policy through web visualization tool in checkpoint firewall
  • Conducts and assists with vulnerability scanning, penetration testing, application security testing, risk assessment and risk consultation with other teams and business units.
  • Building configurations for Juniper MX 2010 and MX 2020 routers with features like port security, VLANS, VTP, PVST+.
  • Configuration of Juniper SRX series firewalls for outbound traffic via blue coat proxy server.
  • Implemented inter-VLAN routing (on Juniper EX 3300 and EX 3400 switches) among the VLANs to allow communication on larger internetworks.
  • Monitor and investigate security incidents and alerts with ArcSight, FireEye, Palo Alto, Sourcefire and McAfee EPO.
  • Modify and implement ACL changes on Client routers and assist the user when there are any issues using Network Authority. Authentication to this is also done through TACACS.
  • Written firewall rules in support of application migration from F5 to A10 load balancer
  • Implemented extended ACLs on Juniper SRX and 3750 to allow communication between the required networks, and to restrict other communications.
  • Implemented various routing protocols such as RIP, EIGRP, and OSPF on Juniper MX routers; also taking care of issues such as discontinuous networks.
  • Analyzing the vulnerability alerts triggered in Arc sight and tune policies in IPS and firewalls.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
  • Build IT security infrastructure including Checkpoint, Juniper and Palo Alto firewalls
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall
  • Configuration and support of Juniper Net screen firewalls and Palo Alto firewalls.
  • Palo Alto design and installation for Application and URL filtering
  • Configured and troubleshot Palo Alto firewall using CLI.
  • Assisting end user operations staff with technical support for Fortinet products
  • Cisco ASA and FWSM, Fortinet FortiGate; F5 AFM, A10 WAF, IDS/IPS systems, and general knowledge of security features and protocols
  • Scanning the servers and hosts using MacAfee found stone manager and analyze the vulnerabilities.
  • VPN creation (Site to site, SSL, RA VPN) and troubleshooting.
  • Managing PKI servers
  • Cyber Security assessment using traffic analysis tools (i.e. Wireshark, TCP Dump, etc.)
  • ISA server manages.
  • Ability to configure and monitor security tools such as security information and event management (SIEM).
  • Migration of PIX to ASA firewalls.
  • Preparing monthly SLA report and availability reports.

Environment: Cisco Routers:2600, 2800, 3600and 7200 series, Cisco Switches: Cat 3560,3750,4500 and 6500 series; Cisco PIX 525,535, ASA 5510, 5520, 5540, 5550, ASDM, Cisco VPN 3000 Series Concentrator and FWSM module Firewalls; Palo Alto, Check Point, WSA Firewalls, Routing protocols RIPv2, EIGRP, OSPF and BGP; TCP and/or IP protocols, Switching Protocols STP, VTP, RSTP and VLAN; Firewall Security Protocols like NAT, PAT, IPsec, GRE, VPN; LAN, WAN technologies like Ethernet, Fast Ethernet, Gig Ethernet and Fiber Optic.

Confidential

Network Administrator

Responsibilities:

  • Responsible to Install, Configure, Manage & Monitor Network and Security Infrastructure.
  • Managed the network architecture consisting of Cisco 3750 stackable and 2960 switches in Core, distribution and access layers.
  • Configuring Checkpoint and ASA for NAT (Static PAT/Manual NAT) to enable remote.
  • Experience in working with checkpoint, Palo Alto Next-generation firewall, Cisco ASA and Panorama M-100.
  • Worked on SIEM tool LogRhythm for reporting and data aggregation
  • Experience on working with IPsec VPN, IDS/IPS, DLP, Application and URL filtering on checkpoint firewall module
  • Experience on working with IPsec VPN, Security profiles and SSL decryption on Palo Alto firewall
  • Expertise in Installation, configuration, maintenance and troubleshooting of Windows Servers, Hyper-V Virtual Machines and Microsoft Azure instances.
  • Conducted periodic reviews of Checkpoint firewall policies rule base for rules consolidation and clean-up in coordination with stakeholders using Firemon tool.
  • Maintained & monitored Cisco 2500 and 2600 series router.
  • Configured port level security on Switches.
  • Implemented routing protocols like RIP, EIGRP and OSPF.
  • Worked on Juniper J series j230, M 320 routers and EX 3200 series switch.
  • Building configurations for Juniper EX 3300 and EX 4200 switches with features like port security, VLANS, VTP, and PVST+.
  • Implemented Router Redundancy Protocols GLBP and HSRP.
  • Implemented VLAN’s on layer 2 and layer 3 Switches.
  • Implemented an efficient IP addressing scheme for organizations using VLSM and CIDR.
  • Responsible for carrying out Network and IOS image upgrade.
  • Well versed with Cisco's IOS operating systems, backup and retrieval of IOS and routing configuration.
  • Installation of Palo Alto (Application and URL filtering, Threat Prevention, Data Filtering)
  • Successfully installed Palo Alto PA-3060 firewalls to protects Data Center
  • Implemented Positive Enforcement Model with the help of Palo Alto Networks
  • Exposure to wild fire feature of Palo Alto
  • Implementing vulnerability management Protocols in BCP (Business Continuity Process).
  • Worked with Symantec Data loss prevention, DLP, monitoring and managing
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
  • Build IT security infrastructure including Checkpoint, Juniper and Palo Alto firewalls
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall
  • Maintained, configured, and installed Cisco and Juniper routers and switches: 7500/catalyst 6500/RV320/2960/catalyst, 6880/ /12410, 12816, 1204 series, Nexus 7k and 5k, WLC, and ASA 5540.
  • Configured Intrusion Detection, DMZ, encryption, IPsec, proxy services, Site to Site VPN tunnels, MPLS/VPN, SSL/VPN.
  • Worked on DNS server for maintaining database servers and IP addressing.
  • Good in representing network layouts and designs with Microsoft VISIO.
  • Ensuring the quality of implementation is as per the client and industry standard.
  • Adhering to the client schedules and milestones.
  • Responsible for the up-to-date Network health (wired and wireless) including Security, Performance and Reliability.
  • Full responsibility for the implementation of LAN/WAN and support of IP routing.
  • Performed key role in trouble-shooting hardware, software and network problems to maximize the network performance.
  • Responsible for designing and implementation of VLAN, Spanning Tree Implementation and support using PVST, R-PVST, Trunking and port channels creation.
  • Worked on configuration of Virtual standard and distributed switches in ESXi host which helps in reduction of infrastructural cost.
  • Also worked as an Instructor Confidential NIIT for teaching OSI, IP addressing and implication of routing protocols.
  • Worked on network-based IT systems such as Racking, Stacking and Cabling.

Environment: Cisco Catalyst 3750,3550,4509,6509, 6500, Cisco routers 3650, 4500 and 6500, 7200, Cisco PIX (525, 535), TCP and/or IP protocols, ASA (5505, 5510), Palo Alto, Check Point, WSA Firewall, Routing Protocols (EIGRP, OSPF, BGP), Switching protocols (VTP, STP), Site to Site VPN,LAN,WAN Technologies, Remote Access VPN, Cisco VPN 3000 Concentrator.

We'd love your feedback!