We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

Pittsburgh, PA

SUMMARY

  • 8.11 years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and testing of networking system on both Cisco and Juniper devices.
  • Deep technical experience with architecture, design and hands - on diverse technology platforms including different Cloud Platforms (AWS/Azure), Virtualization, Database Technology.
  • Experience with the escalation problems for Routing, Switching and WAN connectivity issues using different ticketing systems.
  • Strong knowledge in HSRP, VRRP redundancy Protocols.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wire shark and Cisco works to support 24 x 7 Network Operation Center.
  • Experience working on routing protocols like EIGRP, OSPF, and BGP
  • Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches.
  • Excellent hands-on experience on Cisco ASR9000, Carrier Routing System(CRS 1/3), CRS-X, Nexus 7000, Nexus 6500, 4500 3560, 4500, 3800, 2800 and 2900 series Switches & routers
  • Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248)

TECHNICAL SKILLS

Routing Technology: RIP, RIPV2, IGRP, EIGRP, OSPF, BGP, TCP/IP, Static and Dynamic Routing.

Network Products: CISCO Routers 1700, 1800, 2500, 2600, 2800. CISCO High End Routers 3600, 3800, 7200, 12010, 12404. CISCO Switches 1900, 2950, 2950, 2960G. CISCO Campus Switches 3550XL, 4948 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507 , Nexus 5000 series

Antivirus & Endpoint protection: Cisco CSA, Symantec Enterprise Edition, MacAfee Enterprise Edition.

Security & VPN: PIX 500 Firewall, ASA 5505 Firewall, AIP SSM, CSC SSM, FWSM, Fortigate, Cisco CSM, ACL-Access Control List, IPS/IDS, NAT, PAT, Cisco ACS, Juniper Net Screen firewall, Palo Alto Firewalls, Windows Patch Management (WSUS).

LAN Technology: Workgroup, Domain, HSRP, DNS, DHCP, Static, VLAN, STP, VTP, Ether Channel, Trunks.

WAN Infrastructure: Leased Line, ISDN/Dial-Up, Frame Relay circuits, Metro Ethernet.

WAN Technologies: HDLC, PPP, ATM, SONET, MPLS, VPN, IPSec-VPN.

PROFESSIONAL EXPERIENCE

Confidential, Pittsburgh, PA

Sr. Network Security Engineer

Responsibilities:

  • Upgrading code on Palo alto firewalls PA 5050 Version 9.0 to meet company security policy
  • Involved in configuring Palo Alto PA 7020 firewall from the scratch
  • Utilized application groups, SSL decryption, IPS, antivirus, anti-spyware, URL filtering, NAT, VPN, and the Reporting features of Palo Alto.
  • Configured and maintained IPSEC and SSL VPNs on Palo Alto Firewalls. Configuration and administration of Palo Alto Networks Firewall to manage large scale Firewall deployments
  • Installed and configured Palo alto images in AWS cloud
  • Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series
  • Work on Juniper series of Routers, Switches such as MX-960, MX104, MX240, EX4200, EX4300, EX4550, EX8208,
  • Managed and troubleshoot Aruba access points wireless devices on Aruba VPN.
  • Installed configured, upgrade and maintained VMware systems, sub-systems and hardware.
  • Maintain, upgrade and implement improvements to VMware ESXi infra including performance tuning, capacity planning and policies creations.
  • Additional tasks include assisting with the day to day operations and management of other network devices such as Cisco ISE, Infoblox and Panorama
  • Advanced skills of designing, coding, and troubleshooting iRules Executed the F5 Viprion to deal with high traffic volume for L7 traffic on 2250 blade while Thunder 6630 using Viprion chassis
  • Maintaining standards-based network designs for multiple sites and backbone infrastructure.
  • Participated in troubleshooting SDN/SD-WAN deployments
  • Helped team in Deployment CISCO ACI Greenfield and Migrated from Legacy network.
  • Configured VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 9k/7k devices
  • Worked with Cisco advance services to implement data center Nexus environment for new Upgraded datacenter for the NX-OS in 7004 in core layer, 6880 in aggregation layer and cisco 6800 in access layer.
  • Configured BGP peering rules for MX240 aggregate routers and MX960 core routers
  • Operated and maintained (O&M) the Aruba ClearPass Policy Server and the Aruba AirWave Wireless Intrusion Detection System
  • Built Automation tools for Nexus 9K and Ansible module
  • Worked on Aruba WLAN infrastructure in large scale global deployments
  • Designing and Deploying dynamically scalable, Highly available, fault tolerant and reliable applications on AWS
  • Perform testing by executing scripts in Python and Ansible playbooks to enable automation.
  • Implemented Contracts, Multi-tenants between Endpoint groups using SDWAN in ACI.

Confidential, Philadelphia, PA

Network Security Engineer

Responsibilities:

  • Worked on Palo Alto PA-5050 design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
  • Involved in deploying SDWAN with cisco infrastructure
  • Experience working with Nexus 9k, 7k, 5k, 2k devices.
  • Testing and prod support of Cisco ACI Data center in network centric mode and EM for customers with multitenancy using Clustered APIC controllers M1 C220 M3/M4.
  • Worked in for the NextGen Datacenter Cloud Architecture, using Cisco ACI and Nexus 9K.
  • Advanced skills of designing, coding, and troubleshooting iRules Executed the F5 Viprion to deal with high traffic volume for L7 traffic on 2250 blade while Thunder 6630 using Viprion chassis
  • Participated in troubleshooting SDN/SD-WAN deployments
  • Deployed CISCO ACI Greenfield and Migrated from Legacy network.
  • Developed ACI (Cisco Application Centric Infrastructure) based Cisco Validated Designs for Enterprises and Service Providers to transform Traditional 3 Layer Architecture to ACI based (Spine, Leaf and APIC) Architecture
  • Regular upgrade and maintenance of Infrastructure including Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, F5 BIG IP and Palo Alto Firewalls.
  • Created different application policies in the ACI including Tenants, Application Network Profile (ANP), End Point Group (EPG), Contracts, Subjects, and Filters & Labels.
  • Extensively worked with configuration of Network and Security devices such as Cisco routers and switches (Cisco 7K/3K/Nexus 9K/7K/5K),, Load Balancers, DNS and IP Manager (Infoblox)
  • Configured rules and maintained Palo Alto Firewalls & analysis of firewall logs using various tools
  • Involved in the Migration of policy from Cisco ASA firewall into Juniper SRX’s
  • Provided administration and support on Bluecoat Proxy for content filtering and internet access to headquarters, remote site offices and VPN client user
  • Responsible Implementing NAT solution's on WAN applications with Cisco ASA based solution.
  • Designing and Deploying dynamically scalable, Highly available, fault tolerant and reliable applications on AWS
  • Migrated complex, multi-tier applications on AWS.
  • Defined and deployed monitoring, metrics and logging systems on Aws. Migrated existing on-premises applications to AWS
  • Monitored infrastructure with Nagios like Firewalls, Servers, Services, Network devices, applications, web portals etc. Resolution of tickets fresh & pending
  • Selecting appropriate AWS service to design and deploy an application based on given requirements.
  • Automated network implementations and tasks and designed monitoring tools using python scripting.
  • Dealt with creating VIP(virtual servers), pools, nodes and applying I Rules for the virtual servers like cookie persistency, redirection of the URL
  • Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240.
  • Experience Supporting EIGRP, OSPF and BGP based network by resolving level 2 & 3 problems of internal teams & external customers of all locations
  • Experience with configuring BGP, OSPF in Juniper MX series routers for branch/back office locations.
  • Experience in configuring all Palo alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments
  • Diagnose and trouble shoot wireless issues related to Cisco Meraki
  • Responsible for providing ongoing support to application centric infrastructure (ACI) solution.
  • Assist with configuration and implementation of ACI and APIC
  • Helped team to deploy 100 APs with 15 Switches, Cisco Nexus, Cisco Meraki and 2 Wireless controllers.

Hire Now