We provide IT Staff Augmentation Services!

Network Engineer Resume

3.00/5 (Submit Your Rating)

SUMMARY

  • 9+years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and Testing of networking system on both Confidential and Juniper Networks
  • Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system Service Now
  • Experience of routing protocols like EIGRP, OSPF, RIP, and BGP
  • Worked on Confidential 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Confidential 2900, 3500, 4500, 5500, series switches
  • Extensive hands - on experience with complex routed LAN and WAN networks, routers and switches, Experience with F5 Load Balancing.
  • Hands-on configuration and experience in setting up Confidential routers to perform functions at the Access, Distribution, and Core layers
  • Installing and Configuring Confidential switches 2960, 3560, 4500, 6500, 4900, 2900, 3750, Nexus 5000,Nexus 7000, WS-C4948, Juniper EX 3300,3400,9200 QFX series.
  • Hands-on expertise with routers 2600, 2900, 3600, 3900, 7200, 7600, ASR-901, ASR-903,, ASR 5500, ASR-9010 and Juniper ACX, E, M, MX960 series
  • Working Knowledge on Devices like Juniper Ex 3300,3400,9200 SRX240,
  • Installing & troubleshooting of Palo Alto/Checkpoint Firewall,
  • Hands on experience in manage and troubleshooting with SDN technology
  • Experience in the setup of Access-Lists, and RIP, EIGRP, and tunnel installations
  • Proficiency in configuration of VLAN setup over various Confidential Routers and Switches
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Confidential based networks
  • Enhanced level of experience with OSPF, BGP, and TCP/IP..
  • Monitoring the network using Omni monitoring tool.
  • Extensive knowledge of OSI and various network protocols (DNS, DHCP, TCP/IP, FTP, TFTP, UDP, ICMP, IPv4, IPv6, NFS, HTTP, SNMP, IEEE 802.11/WiFi or wireless mesh networking.etc.)
  • Excellent leadership with good written and oral communication.
  • Good knowledge on Confidential RSA. F5 migration of applications to new BIG-IP vCMP infrastructure.
  • Great team player and able to work under pressure 24x7 duty rotation.
  • Strong knowledge in HSRP, VRRP redundancy Protocols.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Confidential works to support 24 x 7 Network Operation Center.
  • Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing Auvik and configuring proxies.
  • Expertise in configuring and troubleshooting of Palo Alto, Checkpoint, Juniper Netscreen & SRX Firewalls and their implementation.
  • Access control server configuration for RADIUS & TACAS+.
  • Sound knowledge in Confidential firewalls, Confidential PIX, ASA 5500 series and Confidential ASA as well as encryption techniques.
  • Hands-on experience using Confidential Virtual Switching System (VSS).
  • Good knowledge on Bluecoat proxy server SG
  • Knowledge of advanced technologies like VOIP, H.323, SIP, QOS, Multicasting, MPLS and MPLS-VPN
  • Experience with 802.11x wireless technology.
  • Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-6400 load balancers
  • Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.
  • Good knowledge of Confidential NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including Confidential NEXUS Fabric Extender (223, 2248)
  • Hands-on Experience with Confidential Nexus 7000, Nexus 5000, and Nexus 2000 platforms.

TECHNICAL SKILLS

Protocols: RIP, RIP V2, EIGRP, OSPF, IS-IS, IGRP, HSRP, VRRP, GLBP, LACP, PAGP, DNS, SMTP, SNMP, FTP, TFTP, LPD/TDP, WLAN, 802.11/802.11e, WEP, POP3 LADP, TNS.

LAN Technologies: Workgroup, Domain, HSRP, DHCP, Static, VLAN, STP, VTP, Ether Channel, Trunks.

WAN Technologies: Leased Line, Frame Relay, ISDN, PPP, HDLC, ATMNetwork Products: Confidential Routers 1700, 1800, 2500, 2600, 2800. Confidential High End Router 3600, 3800, 7200, 12010. Confidential Switches 1900, 2950, 2960. Confidential Campus Switches, juniper EX3400,3300,9200. 3550XL, 4984 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507.

Security & VPN: PIX 500 Firewall, ASA 5505 Firewall, AIP SSM, CSC SSM, FWSM, Fortigate, Fortinet, Confidential CSM, ACL- Access Control List, IPS/IDS, NAT, PAT, Confidential ACS, Check point (3200, 5800, 15400 and 15600) sonicwall, RSA SecureID, SRX,SSG series firewalls, Confidential ISE

Authentication: RADIUS, TACACS+, Digital certificates

Monitoring Tools: Wireshark, Nmap, Nessus, OpManager, PRTG Packet Sniffer Servers Domain servers, DNS servers, WINS servers, Mail servers, Proxy Servers, Print Servers, Application servers, FTP servers, Avocent Console server.

Operating Systems: Windows NT 4.0 (Desktop/Server), Windows 2000/2003/2008 server, Windows XP/7, LINUX, Solaris, Red Hat, Active Directory, UNIX,junos.

Languages: C, Perl and Python

Storage (SAN & NAS): EMC, HP, NetApp VNX, VMAX, XTREMIO, 3Par and EVA

Switching: VLANs, PVLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels, Transparent Bridging, CEF, DECF, Port Security, VSS Confidential 2960, 3560, 4500, 6500, 4900, 2900, 3750, Nexus 5000,Nexus 7000, WS-C4948, Juniper EX, QFX and Alcatel 7705 SAR

PROFESSIONAL EXPERIENCE

Confidential, Lincolnshire IL

Network Engineer

Responsibilities:

  • Worked in global network environments with WAN and LAN technologies such as Routing (OSPF, EIGRP and BGP), Switches (VLANS, Ether Channels, spanning tree, Trunking, HSRP,VRRP) Firewalls (NAT,PAT,RULES,ACL, Proxy, VPN SSL) and MPLS Networks.
  • Implement and support new and existing VPN services for customers and business partners.
  • Implementation on complex network, including Confidential NEXUS 7K, 5K, 2K, Juniper EX 3300,3400 QFX 5100, SRX and 9200, Confidential ASR and ISR routers.
  • Worked on the code upgrades of the Juniper EX 3300,3400 QFX 5100, SRX and 9200 and Confidential switches and routers
  • Manage LAN AND WAN and Confidential 2960 AND 3550 Manage Switch VLAN and Solving User Technical issue
  • F5 build-out of the base F5 BIG-IP infrastructure, including the BIG-IP 10200v platforms and vCMP guest instances.
  • Replaced Unmanaged to manage more than 25 Confidential 2960 switches and Confidential 3550 switches and create VLAN and trunk ports.
  • Responsible for Active Directory Server and Solving User Network and desktop and printer related Issue.
  • Follow up with IT Vendor and sort out if any service down issue.
  • Performed configuration of Confidential routers in each Spoke locations with centralized Hub.
  • Handled subsidiary offices for implementation of MPLS project from designing infrastructure to troubleshooting managed services.
  • Troubleshoot network devices, which includes Juniper/ Confidential routers, switches.
  • Performed configuration and troubleshooting on OSPF, BGP, EIGRP, redistribution, HSRP, VRRP, GLBP, STP, RSTP and MPLS related issues.
  • Upgrade code on all juniper/ Confidential devices as per company needs.
  • Confidential switches VLAN planning, creation, deployment, trucking, port assignments. Switch Stack/server dual home configuration.
  • Worked on the NOC team to troubleshoot Incidents for the clients for the issues relating to the network.
  • Hands on for data center issues like replacing the power supplies, supervisor modules, SFP’s on the network devices.
  • Configured and performed troubleshooting on Juniper EX series switches and Juniper MX routers.
  • Migrating applications from Confidential ACE/CSM to F5LTM, and GSS configurations to F5 GTM wide-ip's.
  • Configured and troubleshooting the F5 LTM and APM and providing level 2 support for the customers.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports.
  • Performed a wide range of network administration duties including installations, debugging, maintenance, upgrades, and support for various network devices.
  • Network security best practices with hands on experience configuring Firewall Rules
  • Creating rules on checkpoint firewalls and pushing the policies in the designated change window.
  • Monitor the ticket queue in the Service Now (SNOW) for incoming tickets, update tickets in accordance to Service Level Agreement (SLAs) requirements and, escalate based on severity levels. .
  • Implemented security policies by creating groups objects and specific policies as per the users.
  • Upgraded IOS images on juniper and Confidential switches and routers.
  • Experience on working with Palo Alto Network Firewall (7040,5060,3060) with security, networking and management of Security Policies, URL filtering, Anti-virus, Log Management etc
  • Experience with working on Palo Alto using centralized management GUI PANORAMA for logging sessions, creating reports and managing different firewall devices.
  • Work closely with the senior network engineers on assigned projects
  • Migrated FW rules from Checkpoint to the Safe Zone in palo Alto Panorama to enable BGP at cutover during the migration.
  • Configuring Policies and interfaces on Palo Alto Firewall.
  • Working on the firewall rule optimization tool called Firemon to generate reports for usage reports.
  • Implementation on complex network, including Confidential NEXUS 7K, 5K, 2K, Juniper EX 3300,3400 QFX 5100, SRX and 9200, Confidential ASR and ISR routers.
  • Worked on the code upgrades of the Juniper EX 3300,3400 QFX 5100, SRX and 9200 and Confidential switches and routers
  • Conducted periodic reviews of Checkpoint firewall policies rule base for rules consolidation and cleanup in coordination with stakeholders.
  • Performed weekly backups and storage of Checkpoint management servers and firewall configurations. As a member of firewall security group, responsible for performing daily performance status report on all security devices.
  • Used troubleshooting applications and tools such as Checkpoint SmartView Tracker, SmartView monitor, Wireshark, TCPdump, Traceroute, Netscout and command line utilities to identify, report and provide resolution to all kinds of firewall and VPN related connectivity issues.
  • Troubleshooting access issues by taking tcpdump’s and fwmonitor captures on the device
  • Experience on working with Palo Alto Network firewall (7040,5050,3060) with security, networking and management features such as User ID, App ID based firewalling, Security Policies, URL filtering, Anti-virus, Log Management.
  • Experience with working on Palo Alto using centralized management GUI PANORAMA for logging sessions, creating reports and managing different firewall devices
  • Building the Outside zone, Firewall, inside zone and implementing the NAT and Real IP’s.
  • Installing and Configuring Palo Alto PA-500 series firewalls using Panorama
  • Created Build-Outs of New Safe Zone in Palo Alto Panorama VLANS, VIP, IP, VRF, BGP
  • Created VSYS(firewall) Builds into Palo Alto Panorama Database Zone, Access Zone.
  • Created and resolved Palo Alto and Checkpoint Firewall Rules, Routing, Pushed Policy
  • Created and resolved Checkpoint, Palo Alto Customer Orders, Request Orders
  • Resolve/Record incidents in ticketing tools-Service Now
  • Implemented Zone Based Firewalling and security rules on the Palo Alto Firewal
  • Designed security policies on Palo Alto network firewall for controlling what traffic needs to be allowed or blocked based on customer requirements
  • Change/Problem/Request Management Ticketing using Service Now.
  • Participate in Peer Reviews
  • Communicates project status to clients. Measures and assesses client satisfaction.
  • Participates with various teams regarding security projects, change tickets, and trouble tickets in Checkpoint and Palo Alto Panorama. Created security policies and security rules.
  • Responsible for the Panorama firewall management tool to administer Palo Alto firewalls.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Environment:

  • Routing and Switching, Switches WAPs APCUPS' and PDU's MFP's
  • Windows platform servers1000v, Confidential 6500, 3750, 3550, Juniper EX Switches,PKI, Juniper MX routers, Arista,VLANS, SNMP, NAT, Infoblox, HSRP, VLAN trunking 802.1Q, F5 Networks Big IP, Confidential ASA, Juniper netscreen,DELL Sonic wall, Palo Alto and Checkpoint firewall, EMC VNX, VMAX, Confidential /Juniper routers and switches, OSPF, BGP, MPLS, EIGRP routing protocol, CSM, FMC, WAN Optimization, java, NEXUS 2K,5K,7K and AWS

Confidential, Austin, TX

Sr. Network Engineer

Responsibilities:

  • Experience with configuring Confidential 6500 Virtual switching system in Distribution layer of the Data center network
  • Configured BGP with ISP providers and implemented EIGRP/OSPF as IGP for internal campus routing
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices
  • Worked closely with Service providers for maintaining circuits based on MPLS technology
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer
  • Configured and performed troubleshooting on Juniper EX series switches and Juniper MX routers
  • Configured IPsec tunnels with Palo Alto to enable secure transport and cloud based/site-site VPN to both Azure and AWS
  • Configuration and troubleshooting F5 LTM and providing level 2 and level 3 support for the customers.
  • Allocation and designing appropriate virtual IP for F5 ADC through IPAM InfloBox.
  • Used Confidential ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
  • Used Confidential ACI Fabric which is based on Confidential Nexus 9000 Series Switches and the Confidential Application Virtual Switch (AVS)
  • Implemented Confidential ACI infrastructure for supporting rapid application change by reducing complexity with a common policy framework that can automate provisioning and resource management.
  • Extensive knowledge of OSI and various network protocols (DNS, DHCP, TCP/IP, FTP, TFTP, UDP, ICMP, IPv4, IPv6, NFS, HTTP, SNMP, IEEE 802.11/WiFi or wireless mesh networking.etc.)
  • Migrated Juniper EX series switches to Confidential 3500 series and 6500 series switches
  • Experience with moving data center from one location to another location, from 6500 based data centers to Nexus based data center
  • Worked with F5 Load balancing,Auvik IDS/IPS, Bluecoat proxy servers and Administrating.
  • conversion of PIX rules over to the Confidential ASA solution
  • Setup and configuration of business and corporate secure network edge routers and switches. Juniper and Junos OS proficient Switches WAPs APCUPS' and PDU's MFP's
  • Designing, Installation and configuration of MPLS circuits, VPN and SSL VPN connections on checkpoint Firewalls, Juniper & NetScreenVPN Boxes.
  • Support of enterprise level multi-instance Sonicwall firewalls worldwide consisting of Confidential, Junos and Checkpoint firewalls and routers. Responsibilities for security policy design, switching, routing,
  • NAT and problem determination.
  • Configure Juniper QFX 5100 switches for managed colocation customers.
  • On-site Juniper support engineer for on a Juniper MX migration to QFX 10 k implementation.
  • Configured and troubleshoot Enterprise Routers, Confidential ASR 9K, Confidential 2900 and 2800 series Routers. Hands on experience with Confidential call Manager Express, Confidential Voice over IP.
  • Designed and Implemented policies and zones on Palo Alto 7050,5050 and 5020 Internet firewalls for incoming and outgoing traffic
  • Migration of applications from Confidential ACE to F5 LTM.
  • Maintenance and analysis of the F5 network for any possible up-gradation.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports
  • Designing F5 solutions/support for migration work of applications and websites from Confidential CSS Load Balancers to the F5 BigIP Load Balancers
  • Installed and Configured the F5 BIG-IP LTM, configure virtual servers and associate them with pools for internal web servers
  • Implemented automatic email notification of the monthly statements for the customers using Java Mail
  • Implementing and troubleshooting firewall rules in Checkpoint R77.20 Gaia, Confidential ASA 5540, 5580 Implementing and troubleshooting firewall rules in Juniper SRX 5400, 550, 5600 Checkpoint R77.20 Gaia and VSX as per the business requirements
  • Worked on Juniper SRX Versions 300, 3400, 3600, 220 implementing new and additional rules on the existing firewalls for a server refresh project
  • Performed a wide range of network administration duties including installations, debugging, maintenance, upgrades, and support for various network devices
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels and Spanning tree for creating Access/distribution and core layer switching architecture
  • Worked extensively with Nexus 7000, 5000, 2000, Confidential 6500 series multilayer switches, Confidential 2960s series switches and Confidential 3560/3750s switches and configFured routing protocols like OSPF, EIGRP and BGP

Environment:

  • Routing and Switching, Switches WAPs APCUPS' and PDU's MFP's
  • Windows platform servers, Confidential /Juniper routers and switches, OSPF, BGP, MPLS, EIGRP routing protocol, CSM, FMC, WAN Optimization, java, NEXUS 2K,5K,7K, 1000v, Confidential 6500, 3750, 3550, Juniper EX Switches,PKI, Juniper MX routers, Arista,VLANS, SNMP, NAT, Infoblox, HSRP, VLAN trunking 802.1Q, F5 Networks Big IP, Confidential ASA, Juniper netscreen,DELL Sonic wall, Palo Alto and Checkpoint firewall, EMC VNX, VMAX and AWS.

Confidential, Fort Worth, TX

Sr. Network/Firewall Engineer

Responsibilities:

  • Responsible for designing network infrastructure and implementing RIP, EIGRP, OSPF, BGP routing protocols on various networking devices and performed troubleshooting on Remote infrastructure management of campuses in different locations
  • Configuring & managing Network & Security Devices that includes Confidential Routers & Switches, Nexus Switches, Switches WAPs APCUPS' and PDU's MFP's
  • Juniper and Palo Alto Firewalls, F5 BigIP Load balancers, Blue Coat Proxies and Riverbed WAN Optimizers
  • Worked closely with Service providers for maintaining circuits based on MPLS technology
  • Built site-to-site IPSEC VPNs over Frame-relay & MPLS circuits on various models of Confidential routers to facilitate adding new business partners to new and existing infrastructures
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies
  • Performed Troubleshooting and escalation management of day-to-day issues for campuses. Deployed network devices based on new designs in Datacenter infrastructure
  • Designed and Implemented policies and zones on Palo Alto 7050 Chasis Internet firewall for incoming and outgoing traffic
  • Involved in Configuration of Access lists (ACL) on ASA and Sonicwall firewall for the proper network routing for the B2B network connectivity and added exposure to ASA fire power
  • Installing and configuration and troubleshooting of various Confidential switches like 2900 series, 2950 series, 3550 series, Nexus 5000 and Nexus 7000 series and juniper EX series.
  • Configuring, troubleshooting and managing Networks of over 1000 devices by monitoring health of routers, switches and load balancers and working with team to fix any configuration or hardware issue.
  • Responsible for all Juniper SRX Sonicwall firewalls consisting of SRX 3560, 1400, 550. Using CLI and/or Junos Space Security Director for management. Install, upgrade, troubleshoot, design, etc.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Configured and tested the routing protocols like BGP, EIGRP, OSPF, RIP and switching protocol like STP, VLAN trunking 802.1Q for sourcefire and target device of migration.
  • Actively worked on Switching tasks that includes VTP, ISL/ 802.1q, IPSec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
  • Experience in installing and configuring DNS, DHCP servers
  • Maintained Infoblox for IP assignments and reservations for both private and public ranges
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption
  • Expert in configuring Confidential Routers, Catalyst Switches, Nexus Switches.
  • Upgrade Confidential 6500, 3750, 2960s, Nexus 5000, Nexus 2000, Nexus 7000 switch IOS software
  • Worked extensively with Nexus 7000, 5000, 2000, Confidential 6500 series multilayer switches, Confidential 2960s series switches and Confidential 3560/3750s switches
  • Strong Knowledge in working with F5 Load Balancers and their Implementation in various Networks.
  • Identify, design and implement flexible, responsive, and secure technology services
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture
  • Monitored latency, bandwidth utilization, and the general condition of the WAN; reported on problems to the peer teams on a real-time basis
  • Provided configuration, management, and monitoring of 500+ Juniper NetScreen firewalls (5XT/5GT NS series, SSG series and ISG series), Junos firewalls (SRX series) and Juniper IDP's (IDP-8200).
  • Designing, Configuring and Implementation of Rules on Palo Alto Firewall.
  • Worked on WAN optimization techniques
  • Performed periodic checks on implemented enterprise policies and user rights from the ISE logs to ensure security compliances
  • Involved in troubleshooting LAN connectivity, hardware issues in the network, IP addressing issues, created a backup and recovery policy for software application, verified the working of peripherals and Updating IOS images using TFTP
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing

Environment:

  • Routing and Switching,, Confidential routers and switches, OSPF, BGP, MPLS, EIGRP routing protocol, WAN Optimization, NEXUS 2K,5K,7K, Routing Protocols (EIGRP, RIP, OSPF, BGP), Juniper SRX, Juniper EX, SRX3750, 3550, 3560, 2924, 1400, 6509-V-E, 6513, 6504, 6503, 6506, 6500 series switches, Switching protocols (VTP, STP, GLBP 1000v, Confidential 6500, 3750, 3550, Arista, VLANS, SNMP, NAT, Source fire, Infoblox, HSRP, VLAN trunking 802.1Q, F5 Networks Big IP, Confidential ASA, DELL Sonic wall, Palo Alto and Checkpoint firewall,

Confidential, Atlanta, GA

Sr. Network/Firewall Engineer

Responsibilities:

  • Experience with configuring Confidential 6500 VSS in Distribution layer of the Data center network
  • Configuration and Administration of Confidential and Juniper Routers and Switches
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer
  • Hands on Experience testing I Rules using Browser (IE), HTTP watch for f5 load balancers.
  • Configure and troubleshoot Juniper EX series switches and routers
  • Migrated Juniper EX series switches to Confidential 3500 series and 6500 series switches
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
  • Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data environment
  • Network security including NAT/PAT, ACL, and ASA Firewalls.
  • Worked extensively on Confidential ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Confidential ASA solution.
  • Good knowledge with the technologies VPN, WLAN and Multicast.
  • switches, WAPs, APC UPS' and PDU's, MFP's
  • Installation and Configuration of Confidential Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
  • Working with Juniper and Confidential routers for access-list filters
  • Experience with communicating with different with different customers, IT teams in gathering the details for the project
  • Installed dual DS-3 SAN replication WAN with Riverbed Interceptors and 6050 Steelhead appliances to optimize the traffic
  • Configuring rules and Maintaining Palo Alto Sonicwall Firewalls & Analysis of firewall logs using various tools
  • Extensive implementation of firewall rules on Juniper SRX 3600, SRX 650 and SRX 220 on a daily basis, using SPACE as well as CLI when needed.
  • Good Experience in performing wireless site surveys using Air magnet software. Working on Confidential 4400, 5500 series wireless controllers, Confidential 1130, 1140, 1200 3702, 3602 and 2600 Series Access point.
  • Switching tasks include VTP, ISL/ 802.1q, IPSec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
  • Experience in installing and configuring DNS, DHCP servers.
  • Replace branch hardware with new 3900 routers and 2960 switches.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPSec/GRE to GetVPN.
  • Deployed and maintained IS-IS on Confidential and Juniper routers.
  • Working with websense content gateways for URL filtering, Websense Triton web security gateways, data security and email security on v7.6.x
  • Working on firewalls Confidential ASA 5510, 5508, Juniper SRX 220 & SRX 110, Checkpoint 5100 & 5200
  • Configuring and managing IDS & IPS group policies.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports
  • DesigningF5 solutions/support for migration work of applications and websites from Confidential CSS Load Balancers to the F5 BigIP Load Balancers.
  • Installed and Configured the F5 BIG-IP LTM, configure virtual servers and associate them with pools for internal web servers.
  • Involved in configuring Juniper SSG-140 and Check point firewall
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.

Environment:

  • Routing and Switching, Confidential 2500, 2600, 3000, 6500, 7500, 7200, Site to Site VPN’s,, OSPF, BGP, MPLS,EIGRP routing protocol, WAN Optimization, NEXUS 2K,5K,7K, 1000v, Juniper SRX, SNMP, NAT, TCP/IP and Checkpoint ESX/GSX Sonicwall firewall, ASA, Palo Alto, F5 ADC/SLB and EMC SAN - VNX, VMAX.

We'd love your feedback!