Senior Network Infrastructure Engineer Resume
Iselin New, JerseY
SKILLS:
RIP v1, RIP v2, EIGRP, OSPF, BGP
VOIP - Avaya IPT, Avaya Call Manager
ISDN, Frame-Relay, T1, T3, E1, Metro Ethernet and Gigabit Technologies - WAN
Ethernet 10Mbit, 100Mbit, 1Gigabit, and 10 Gigabit, 40 Gigabit - LAN
Cisco 2600 Series, 2800 Series, 3600 Series, 4000 Series, 7200 Series, Catalyst 2960, Catalyst 3550, Catalyst 3750E, Catalyst 4948E-F, Catalyst 4500, Catalyst 6500E, Cisco Catalyst 9300 & 9400, Nexus 7010 and 9000, Nexus 5010, and CSS 11503 - Cisco
Cisco Wireless LAN Controller 5508 and 5520. Cisco Access Point
Foundry Fast Iron Work Group, Fast Iron Chassis, and Foundry Big Iron 8000 Chassis - Foundry
Checkpoint IP Firewall, Checkpoint Smart-1 & Smart-25, Cisco ASA 5520, Juniper SRX, Juniper Netscreen, and HP Secure Platform - Network Security Hardware
Cisco IOS, Cisco NX-OS - Network Software
Checkpoint NGX R65 and R75.20, Cisco ASA 5520, Cisco Firepower 2120, Palo Alto PA5000, 3000 Series and Juniper Netscreen OS and Junos - Network Security Software
Cisco Prime Infrastructure, Cisco Prime LAN Infrastructure, Cisco ACS, Cisco Mobility Services Engine, Cisco Identity Services Engine, Solarwinds, and Loglogic - Network and Security Management Software
NIKSUN - Network analyzer Software
Window and Linux
EXPERIENCE:
Confidential, Iselin, New Jersey
Senior Network Infrastructure Engineer
Responsibilities:
- Took a technical and project lead role to build out Boston Office for 400 users by planning, designing and planning for implementation
- Network and security infrastructure with 40 Gigabit Backbone using Redundant Cisco Nexus 9K pair as Core/Distribution layer and Cisco pair of Catalyst 9400 as Access Layer. Wireless Infrastructure with Cisco Wireless LAN Controller 5520 with 23 Cisco Access point 4800 and Remote Access VPN with Cisco Firepower 2120. Provided Network connectivity and VLANs for VOIP, Video infrastructure. Managed Vendor for Layer 1 cabling from User desks to computer IDF room, and patch panels to switching infrastructure.
- Working with Telecom vendors - Confidential and Confidential ordered, and schedule installed Internet and Global WAN MPLS Circuits.
- Took Network project lead role to consolidate Data Centers and Piscataway New Jersey Data Center Closure by migrating Network Infrastructure, Network Control Access, and decommissioned network hardware to save company expenditure.
- Responsible and maintained Confidential Global WAN interconnected offices network infrastructure with Confidential MPLS cloud, thus users and remote users can share resources and network access all within offices.
- Upgraded and maintained Solarwinds server NPM 12.3, NCM 7.7, VNQM 4.4.1, VMAN 8.2.0, SAM 6.6.0, and NTA 4.2.3
- Upgraded Cisco ACS 5.8 - (Cisco Access Control) to Cisco ISE 2.4 (Identity Service Engine) to utilize Cisco Tacacs and Radius for Confidential
- Network and security admin devices access.
- Technical lead in reconfigured and implemented Cisco ASA for Corporate users to access remote access via Cisco AnyConnect software.
- Planned and upgraded Confidential ISP circuit from 100Mbit to 1 Gigabit with BGP failover for Iselin, New Jersey office.
- Proposed and executed hardware refresh 2018 by identified end of life hardware around Medidata global offices then upgraded timely for each locations of Confidential offices.
- Rebuilt Seoul - South Korea office Wireless Network Infrastructure by configuring Cisco LAN Controller 5508 and 12 Cisco Access Point
- Responsible to support and administrate Wireless Network infrastructure for Corporate users to access internal and as well as Guest user by configuring with Cisco LAN controller 5508
- Allow and restrict Palo Alto Firewall policy access by daily Users request
- Planned, Design and administered company Palo Alto PA 5000 and 3000 series Internet Firewall Infrastructure utilizing Panorama to install, to allow, and to deny Global Standard Security policies.
Confidential, New York, NY
Lead Network Infrastructure Architect
Responsibilities:
- Reviewing to propose Perimeter Network Infrastructure to standardize with Cisco ASA solution to provide Site to Site VPN connectivity to connect all 46 office locations to provide VOIP, Data Network, “Any Connect” Remote access and Developer network services.
- Architect and proposed global remediation on Cisco Perimeter Network and Security Infrastructure
- Managing and supervising Network Engineer staff to resolve day to day network issue, network change and network request, when occurring.
Confidential, Brooklyn, NY
Network Security Engineer (Consultant)
Responsibilities:
- Currently planning and working on for Juniper SRX migration to Palo Alto Firewall by utilizing migration tool
- Planning to implement AlgoSec Firewall Analyzer to optimize all firewall rule policies.
- Administrating Juniper Unified Access Control for all desktops, VOIP phones and printers.
Confidential, New York, NY
Senior Network Infrastructure Engineer
Responsibilities:
- Architected, designed, planned, and organized a ten-gigabit backbone low latency network infrastructure with Cisco Nexus 7010, 5010 and 2148 to provide a new data center solution.
- Built Wireless Network and Security Management Infrastructure utilizing Cisco Prime Infrastructure, Mobility Services Engine, and Cisco Identity Services Engine to manage Cisco Controllers and Cisco Access Points as well as Wireless Security and Guest Wi-Fi users monitoring.
- Planned and implemented dual layer firewall with vendor diversity solution on Internet segment to provide better secure ingress and egress traffic and to mitigate external risk.
- Planned, Designed, and implemented VOIP Network infrastructure for Avaya IP Telephony System - IPT with Avaya Call Manger.
- Planned and implemented a migration from Nokia Checkpoint to Juniper SRX 650 and SRX 240 Firewall.
- Technical lead in designing and implementing Confidential Disaster Recovery site Core Network infrastructure with Layer 2 and Layer 3 technology using a pair of Cisco Catalyst 4507R., and Checkpoint IP 390 Firewall.
- Planned and implemented Global WAN Infrastructure with DMVPN and Multicast among Netherlands, New York, and Hong Kong using Cisco 7206 and Cisco 3845 together with the global team.
- Standardized network hardware and software by converting legacy switches to 6509E and 3750G and 4507R.
- Technical lead in building and implementing two 300Mbit Metro Ethernet circuits between Confidential disaster recovery site and Confidential primary site to provide data storage solution.
- Technical lead in configuring and implementing a pair of Cisco ASA5520s for remote access Web VPN and site to site VPN solutions at primary, and disaster recovery site.
- Technical lead in designing and building Vendor Confidential and Security Infrastructure using a pair of Checkpoint IP 390 and a pair of Cisco Catalyst 3750G Layer 3 switches, providing electronic trading access.
- Technical lead in upgrading Hong Kong branch office Network Infrastructure with Layer 2 and Layer 3 technology using a pair of Cisco Catalyst 4948E-F and 3750Xs.
- Technical lead role in migrating and readdressing all Confidential Internal IP from public IP to private IP as specified in RFC 1918
- Technical lead in planning and implementing Cisco Secure ACS Engine to provide Cisco tacacs access to network devices and installed Avocent Cyclades remote console out of band Management for Confidential Network devices and Firewalls.
- Provide Backup Support and Administration on Blue Coat Proxy such as bypass, exclusion list, intercept and network access-list.
- Responsible for providing level 3 network support to Confidential US and Hong Kong office users.
- Provided completed Confidential network and security infrastructure diagram and documentations which was used for auditing and by other IT groups within the company
Confidential, Nutley, NJ
Network and Security Engineer
Responsibilities:
- Planned and implemented the network and security infrastructure for a Data Center expansion plan that will allow consolidation of multiple data centers across the region using Cisco Catalyst 6509, 6506, 4506 and HP Checkpoint NG within the $1.5M budget
- Remotely planned and implemented Hosted Market Data product network and security infrastructure in St. Louis data center within the $300K budget
- Took a Technical Lead Role to plan, and to implement Core Cell Network and Security Infrastructure Project within the $500K budget.
- Took a network lead role to audit and propose recommendations for the Nutley Network Infrastructure upgrade - CatOS upgrade, and then implemented recommendations with Approx $120K budget to remediate core Nutley legacy network hardware.
- Took a Technical Lead role to design and obtain Global Architect approval, to upgrade and implement management network and security infrastructure with approx $80K budget.
- Took Network Security lead role to plan and to upgrade Nutley all related Security Infrastructure to validate such as the Security Management Network Infrastructure and Legacy Firewall upgrade Project.
- Planned and Implemented Reuters Dealing and Matching over IP Product network and security infrastructure with Cisco Catalyst 4506 and HP-Checkpoint NG.
- Planned and implemented Bridge Channel Product network and security infrastructure using Cisco Catalyst 6509, 4506, CSS11503 and HP Checkpoint NG within the $250K budget
- Planned and Implemented in parallel both Production and Management Hosted Bridge Feed Product Assembly network and security Infrastructure using Cisco Catalyst 4506, 3750, CSS 11503, HP - Checkpoint NG and Cisco Catalyst 4948 respectively.
- Provided complete Nutley data center network and security infrastructure documentation to address current need for more reliable and comprehensive information; documentation has also been of use to other service teams including level 1 operations.
Confidential, New York, NY
Network and Security Engineer
Responsibilities:
- Designed and Implemented Extranet Wide Area Network (WAN) infrastructure using, Frame Relay, Point-to-Point T1 and T3 technologies to allow corporate clients as well as major financial institutions, access to ‘buy-side’ financial market research .
- Designed, implemented and was responsible for daily administration of four Cisco PIX Firewalls for extranet dedicated clients based on business requirements determining clients’ data access, and data transfer via dedicated private networks.
- Optimized and consolidated Wide Area Network (WAN) telecom data circuit-usage to reduce operation expenditure for the company thereby saving the company by as much as $1 million per annum.
- Rebuilt and re-implemented a Disaster Recovery site before and after 9/11 using Layer 2, Layer 3 and Routing Protocol technologies to allow Confidential to continue operations at full capacity in the event of a disaster or extreme emergency.
- Designed and implemented Corporate Local Area Network (LAN) infrastructure using enterprise Cisco and Foundry switch as Layer 2 and 3 technologies to allow Confidential office users access to email, intranet, internet and other market-data applications.
- Responsible for installing, implementing and troubleshooting Wide Area Network (WAN) applications at major client’s site/locations necessary for such client’s access to Confidential network infrastructure.
- Designed and implemented Vendor network and connectivites to allow Multex’s oversea and domestic staff to access market data applications, such as Bloomberg, Reuters, and factSet. .
- Responsible for engineering and daily administration of eight Nokia Checkpoint Firewalls for Multex’s employee users, corporate clients, and vendor Network connectivity, and for creation of firewall policy rules determining data access, data transfer, and authentication via internet and intranet as based on Confidential ’s Network security policies.
- Re-designed a Local Area Network (LAN) using Layer 2 technology and re-implemented a Wide Area Network (WAN) using Frame Relay and Point-to-Point T1 technology for Confidential San Francisco branch users to avail of better network performance from improved network technology.
Confidential, New York, NY
Network Engineer
Responsibilities:
- Designed and built a Local Area Network (LAN) using Nortel hardware Layer 2 technology and a Wide Area Network (WAN) using Nortel hardware T3 technology for a Disaster Recovery Site outside of New York City which would allow 200 traders to resume operations in the event of a disaster or extreme emergency.
- Responsible for daily administration and implementation of Network security using Checkpoint Firewall for trading floor and for connectivity established with outside vendors and for creation of Firewall policy rules allowing SG traders access to specific vendors.
- Installed and built several Wide Area Networks (WAN) using Frame-Relay technology Confidential été Générale locations using Cisco 2503, and Cisco 4000 to allow both domestic and overseas traders global access to applications and transactions within the Confidential été Générale global network.
- Built and implemented an external network (Vendor connectivities) using Cisco Catalyst 5509 (Route Processor and Switch Processor) as Layer 3 technology thereby allowing domestic and overseas traders access to external vendor electronic trading networks.
- Responsible for network related project planning, implementations and upgrades, and maintenance of all network documentation.
- Built Y2K lab using Cabletron Smart Switch 6000 and was responsible for testing and implementing network hardware and software necessary for the transition.
- Took leadership role in Y2K project for Network team ensuring efficient implementation of daily requirements needed to bring the project to fulfillment.
Confidential, New York, NY
Senior Technical Support Engineer
Responsibilities:
- Installation and troubleshooting expertise in Dial-Up Modems, Dial-up ISDN, Enterprise ISDN, Enterprise Frame-Relay, Enterprise T-1, and Confidential for clients.
- Assisted and trained Technical Support Engineers with difficult technical problems
- Responsible for daily monitor and Administrated Checkpoint Security Firewall
- Configured, Installed, and troubleshooted expertise in Cisco 1600, 2500, 3600, 4000, 7000 series routers, Ascend Pipeline 50, 75, 130, Max 4000 routers and other routers.
- Installed, configured, administrated, and troubleshoot the packet filtering, Checkpoint Firewall-1, and TCP/IP local Network environmental workstations for Managed Services.
- Allocated IP Network schemes for various clients.