Network Engineer Resume
Cranston, RI
SUMMARY:
- Senior Network/Systems Engineer with over 8+ years of experience in design, installation, configuration, administration and troubleshooting of LAN/WAN infrastructure and security using Cisco routers/Switches/ Cisco PIX, Checkpoint Firewall.
- Sharp skills on Windows XP, Windows NT, Novell Netware and Sun Solaris.
- Technically proficient with multiple firewall solutions, network security, and information security practices.
- Hands on experiences on McAfee EPO with deploying and removing agent on client's machine, removing virus and manually updating DAT files.
- Hands on experience with Checkpoint Firewalls. Hands on experience with configuring firewalls and managing issues.
- Experience on Working in handling and installing Palo Alto Firewalls.
- Experienced on Monitoring the Network performance based on company's Service Level Agreement (SLA).
- Experienced on Working on SIEM for detecting malwares and threat analysis on web based url filtering
- Experience in configuring, implementing and troubleshooting F5 load balancer in the enterprise network.
- Worked on F5 Local Traffic managers (LTM), Global traffic manager (GTM) of series 8900, 6400, 6800, 3400, 5100 and 3600.
- Working on configuration of F5 devices such as LTMs, GTMs, EMs, Firepass and ASM.
- Hands on experience in configuring Cisco Catalyst 2960, 3750, 4500, 6500 and Nexus 3000, 5000, 6000, 7000 series switches and Cisco 2600, 2800, 3600 series routers, Load Balancers & Cisco Firewalls.
- Experience with Citrix NetScaler where I configured load balancing, SSL certificate installation, monitoring the network, creating site for web interface.
- Experience configuring Brocade devices for network monitoring and for carrier caching.
- Extensive knowledge of IEEE 802.11 WLAN operations, designs and wireless network deployment
- Extensive knowledge of network protocols (EIGRP, OSPF, BGP, RIP, VLAN, TCP/IP, etc.)
- Configure, administer, and document firewall infrastructure, working with Checkpoint.
- Extensive experience in installation & administration of Windows NT, windows 2000/2008/2008 R2 domain controllers, active directory design & architecture, file/print/database servers.
- Experience securing a large inter network establishing and enforcing policies and monitoring access.
- Implementation and administration of Checkpoint firewalls & network management / - implementation.
- Designed and configuring the wan infrastructure consisting of dedicated internet connectivity, Cisco 810 series 4G routers, Cisco 2600 series router, Cisco 2900xl, Cisco 3500, switches, pix firewalls, VPN 3000 concentrator / installed 512 kb internet connectivity.
- Extensive Knowledge in IPSEC VPN design connection and protocols, IPSEC tunnel configuration, encryption and integrity protocols on Palo Alto firewall as well as cisco ASA and checkpoint
- Thoroughly familiar with Checkpoint models, capabilities, and architectures.
- Extensive knowledge and troubleshooting in data communication protocols and standards including TCP/IP, UDP, IEEE 802.3, Token Ring, Cable Modem, PPPOE, ADSL, Multilayer Switching, DOD standards
- Engineering experience designing and deploying large scale LAN/WAN networks
- Represent the changes at the weekly change review meetings and update network diagrams and all other applicable documents.
- Experienced on all system in the domain have McAfee Antivirus Protection Installed
- Manage and implement network & policy changes, domain changes with 3rd parties, write technotes after resolving complex issues, assist in licensing issues, service delivery.
- Management, investigating and troubleshooting traffic and user access, log management, tune devices to get utmost performance eliminating vulnerabilities and install new security patches.
- Provided assistance to the service organization to ensure that all defined service management activities are completed to required time scales and quality checkpoint firewall.
- Assist with technical design of security architecture / management of compliance issues for managing, coordinating and monitoring the information collection activities.
- Managed and contributed to the design, implementation and administration of multiple corporate networks, overseeing all related project execution, capacity planning and system configuration functions.
- Headed 24x7 support operation for all internet/intranet/extranet connectivity linking 50+ clients. / led major platform migrations, iOS upgrades and firewall updates/changes.
TECHNICAL SKILLS:
PROTOCOLS: OSI, TCP/IP, DHCP, UDP, RIP v1, RIP v2, IGRP, EIGRP, TACACS+, RADIUS, OSPF, BGP, SSH, TFTP, FTP, SMTP, NTP, LDAP, Active Directory, Kerberos, L2F, SLA, L2TP, PPP, Frame Relay, ATM, Sonnet, Fast/Gig Ethernet, HSRP, Token Ring, ISDN, AAA, DES, 3DES, AES, and MD5, VPN (IPsec and SSL),VRRP, HSRP, DNS (BIND, DJBDNS, Infoblox), CARP, SNMP.
NETWORK MONITORING TOOLS: HP openview, Cisco Works, McAfee EPO, Netscout, Ethereal, tcpdump, netcat, Sniffer, SIEM, Snort&Snortsnarf, MRTG.
OPERATING SYSTEMS: Windows NT/200/2003, windows 7, Juniper SEAX, Netsctt, Junos, UNIX, SPLAT (Secure Platform), Linux, RedHat, Debian, Cisco IOS
FIREWALLS: Checkpoint NGX (R65-R75), Cisco PIX 515E,Cisco PIX 535 Firewall, Cisco ASA 5510,Cisco ASA 5520,Cisco ASA 5540,Cisco ASA 5550, Cisco ASA, Cisco FWSM, Check Point NGX R52, R54, R61, R62, R65, R 75,Nokia IP690, Nokia IP530, Checkpoint provider 1, Checkpoint Firewall 1, SPLA, Palo Alto 5000series, PA 3000 series, VM-300
ROUTERS: Cisco 810 series 4G router, Cisco 2811, Cisco 2921, Cisco 6509-E (Multi-layer Switch), Cisco7200, Cisco3800, Cisco 3640, and Cisco 3745.
SWITCHES: Cisco Multi-layer Switch 6500, Catalyst 4500, Catalyst3750, Catalyst2900 and Catalyst 3500XL.
VOIP: SIP H.323, MGCP, TDM, SS7, Avaya Voice gateways.
LAN/WAN TECHNOLOGIES: T1, DS3, OC3, SONNET, MPLS, DSU/CSU
NETWORK EQUIPMENT: CISCO 2950,3500,4500,6500 series Switches, CISCO 800, 1600, 2500, 2600,3700,3800,7200 series Routers, Cisco wireless access points.
HARDWARE PLATFORM: Cisco Routers, Ethernet Switches, F5 LTM, GTM
PROFESSIONAL EXPERIENCE:
Confidential, CRANSTON, RI
Network Engineer
Responsibilities:
- Designed and Configuring the Cisco 819 series 4G routers for 1000+ branches and ATMs.
- Deploy Configuration and activate 4G routers for branches in multiple states.
- Configuring the WAN infrastructure consisting of dedicated MPLS connectivity of 50 MB to upgrade back offices.
- Configure and troubleshoot Remote access and site to site-in Checkpoint & Palo alto firewall
- Proficient in design, implementation, management and troubleshooting of Check Point firewalls, Cisco PIX, NetScreen Firewalls, Check Point Provider-1 / VSX, Nokia VPN, Palo Alto IDS, Foundry / F5 Load Balancers, and Blue Coat PacketShaper systems
- Worked on SIEM tools like solar winds, Symantec end to end point security for malware detection and threat analysis.
- Worked with F5 Load balancing, IDS/IPS, Bluecoat proxy servers and Administrating.
- Knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
- Experience with Load Balancers for administrating and monitoring global & local traffic using F5 BIG IP LTM & GTM
- Configured F5 load balancer and also Citrix NetScaler to monitor the network, load balancing and also GLBP, creating a site for web interface for the internal clients.
- Configured Cisco ASA Firewall.
- Supported Infoblox appliances grid environment for DNS, DHCP and IP Address Management tools (IPv4), for the State Farm enterprise network.
- Perform network security, administration, analysis, and problem resolution for networks, including NT 4.0, Windows 2000, UNIX (Solaris & BSD), CISCO, TCP/IP, and Checkpoint firewalls
- Configured Cisco 7600, 7200 series routers for MPLS VPN connectivity and VRF tables on Edge routers for customer usage of the MPLS network.
- Multi-vendor switch evaluation such as Force 10, Juniper, Brocade.
- Responsible for installation, troubleshooting of firewalls (Cisco firewalls, Checkpoint firewalls and Juniper firewalls,) and related software, and LAN/WAN protocols.
- Work with application, Linux, storage and VMware team to provide support in VLANs, IP management and Port-channel configuration on Nexus and Catalyst switches.
- Manage data center consists of Nexus 7010, 5500 series and 2240/2100 FEXs.
- Configured and installed SDLC connected to mainframe via SNA/SAA Server
- Installation of Cisco ASA 5500 series firewalls, Cisco 3500, 4500, 6500 series switches.
- Facilitated backup of servers, routers, switches, and firewall configurations in core network
- Installation and administration of Checkpoint R 75.40 Firewall.
- Supporting Mcafee Endpoint Security team in Mcafee EPO and antivirus components and troubleshooting operational issues
- Responsible for all outside vendor contracts and vendor maintenance. Managed all vendor SLA agreements.
- Created Network diagram for Cisco/ brocade switches.
- Configured two clustered Check Point firewall appliances for remote access VPNs using two factor authentication.
- Installation, Configuration and Troubleshooting of Checkpoint, Juniper and Cisco ASA firewalls
- Working with Checkpoint firewalls version R76 & R77.20.
- Administration and configuration of Check Point (R75.40) firewall polices, day-to-day network security support for external clients.
- Built IPsec site to site VPN tunnel between 2 vendors using firewall.
- Site to site VPN implementation on ASA Firewalls
- OSPF configuration
- Implementing and configuring F5 LTM's for VIP's and Virtual servers as per application and business requirements.
- Worked on Infoblox for creating the DNS entries, A records and CNAMEs.
- Configure Cisco IPsec VPN clients to have enterprise VPN connectivity and also troubleshoot issues with Cisco VPN client connectivity issues.
- Configure LAN/WAN routers or related equipment.
- VPC Peer configuration& troubleshooting of already installed Nexus Switches.
- Configuring & managing Network & Security Devices that includes Cisco Routers & Switches, Nexus Switches, Juniper and Palo Alto Firewalls, F5 BigIP Load balancers, Blue Coat Proxies and Riverbed WAN Optimizers
- Administering multiple Firewall, in a managed distributed environment and knowledge on SIEM tools like Qradar.
- Worked on all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.
- Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
- Firewall Log monitoring using RSA Envision and Q RADAR.
- Manage devices through NCM, EMC NCM and Zenoss monitoring tool.
- Directed the migration of core infrastructure from Windows 2000 to Windows 2003 Server, which include migrations to Exchange 2003.
- Evaluate LAN/WAN performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
- Configure IPSEC VPN tunnels between Checkpoint and other non-Checkpoint endpoint devices using IKE pre-shared keys, 3DES and MD5.
- Ensure that all system in the domain have McAfee Antivirus Protection Installed.
- ASA software upgrade on Failover setup.
- Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
- Configured Cisco 7600, 7200 series routers for MPLS VPN connectivity and VRF tables on Edge routers for customer usage of the MPLS network.
- Provided VPN services to site-to-site and, Remote access VPNs using IPsec and GRE tunneling mechanisms.
- Worked on SIEM tools like Symantec end to end point for threat analysis and malware detection.
- Implemented Positive Enforcement Model with the help of Palo Alto Networks.
- Administer Checkpoint firewalls with cluster gateways including pushing policies and processing user requests to allow access through the firewall using Smart Dashboard and identify unused rules and schedule change to mark it for permanent deletion at later point of time.
- Configuration and implementation of Check Point Firewalls, IDS/IPS, Bluecoat Proxy, CISCO ASA.
- Checkpoint Firewall Log review and analysis and troubleshoot connectivity issues.
- Working with Cisco Catalyst/Nexus/UCS/MDS, and F5’s including ASM’s
- Configuring HA on checkpoint security gateways using cluster XL and VRRP.
- Upgrading checkpoint security gateways in cluster with minimal downtime.
- Installed and configured network monitoring system on centos to monitor wide range of workstations and server in us.
- Worked on SIEM tools like solar winds and kiwi tools for ip address update as well as creating nodes, editing and configuring the new catalyst switches.
- Consistently resolving critical business effective network operations issues within SLA time frames.
- Monitor the ticket queue for incoming tickets, update tickets in accordance to Service Level Agreement (SLAs) requirements and, escalate based on severity levels using NetCool.
- Worked on Operation team member to troubleshoot daily basis incident tickets and solve them.
- Supports weekly basis 24x7 On Call incident support.
- Optimized and configured performance of the WAN network consisting of Cisco Nexus 5000 series Switches by configuring VLANs.
- Configure and monitor McAfee Network Security Manager/Intrushield
- Guaranteed the security and protection of customer networks from various attempts to breach or compromise networks with firewalls, CiscoWorks, intrusion prevention systems (network- and host-based), and Gateway Antivirus systems.
- Preparation of all Branches Link up time/down time report to maintain SLA with Customer.
- Rendered assistance to security officer in isolating security threats.
- Upgrade F5 GTMs hardware series.
- Image upgrade on F5 devices LTM/GTM from 10.x to 11.5.3
- SSL offloading on F5 LTMs.
- Responsible for the day to day operations of a large production F5 LTM/GTM load balancing environment.
Confidential, NH
Network Engineer
Responsibilities:
- Designed and Configuring the WAN infrastructure consisting of dedicated Internet connectivity 1.54 MB to NY office, Cisco 2600 series router, Cisco 2900xl, Cisco 3500, Switches, PIX firewalls, VPN 3000 Concentrator
- Worked on security tools and software such as CISCO WSA, Qualys, Splunk, Solar winds, Source fire, SIEM
- Using Cisco switches Catalyst 3750, router 2600, Riverbed, Load balancing, VOIP, Gateway 3900, IP phone 7940, CUCM, and Wi-Fi Catalyst 6500 Series (WISM) Wireless Services Module and Cisco Nexus 7000, 5500
- Experience with convert Cisco ASA VPN rules over to the Palo Alto solution. Migration with both Cisco ASA and Palo Alto VPN experience
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
- McAfee EPO - Project team member for implementation of New McAfee EPO console, repositories, and reporting
- Installation of Cisco ASA 5500 series firewalls, Cisco 3500, 4500, 6500 series switches.
- Installation and administration of Checkpoint R 75.40 Firewall.
- Also I have hands on ASA Firewall.
- Configured LACP port channels on Nexus 5000/7000 and Cisco 6509 switches
- Vender selection for different services from RFP to SLA level.
- VLAN and Port channel configurations on Cisco 4500 and 6500 series switches
- OSPF configuration
- Worked on SIEM tool for IPS/IDS and for detecting the malwares and threat analysis .
- Created multiple policies and pushed them in to Checkpoint Firewall (Gateways) and the Checkpoint Management Server with SPLAT operating system.
- Configuration and troubleshooting of Site to Site as well as Remote Access VPN on Cisco ASA and CheckPoint firewalls.
- Manage and configure Juniper SSG, Palo Alto, Barracuda series firewalls/Web Filter and Blue Coat Enterprise Proxy appliances.
- Troubleshooting packet flow through firewall using command line utilities such as TCP DUMP.
- Researched, designed, and replaced aging Cisco ASA firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection
- Provided proactive threat defense with ASA that stops attacks before they spread through the network.
- Experience with deploying Fabric Path using Nexus 7000 Devices
- Worked on network analyzing tools such as SIEM, Solar winds and Source fire.
- Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
- SSL VPN configuration on F5 Firepass 4300
- ASA software upgrade on Failover setup.
- PIX to ASA Migration.
- Installed and configured network monitoring system on centos to monitor wide range of workstations and server in us.
- Implementation and administration of check point firewalls & network management.
- Fault management and rectification across the Infrastructure to agreed SLA/KPI's.
- Implementation and maintenance of Backupexec 8.0 on departmental server,diagnose and solve frame relay and routers connectivity problems.
- Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.
- Installation and Administration of Anti-Virus Server, McAfee server virus.
- Exemplified proficiency in providing outstanding technical support to internal staff as well as aided in designing LAN/WAN-based solutions along with Windows 2000/XP/Windows 7 and Outlook (2000/2003/XP/2007/2010) with LANDesk Management, Bomgar and TeamViewer
- Guaranteed the security and protection of customer networks from various attempts to breach or compromise networks with firewalls, CiscoWorks, intrusion prevention systems (network- and host-based), and Gateway Antivirus systems.
- WAN technologies - MPLS, VPLS, IP SLA, frame relay, ATM, PPP, HDLC. Must have experience in installing and troubleshooting carrier WAN circuits
- Experience on Endpoint security SME with McAfee Endpoint, IPS and Anti-virus
- Rendered assistance to security officer in isolating security threats
- Initiated efforts related to system administration on core infrastructure as well as troubleshoot and repair all hardware- and software-related problems through use of LANDesk and management, Remote Desktop, Kaseya, Bomgar, and TeamViewer.
- Facilitated backup of servers, routers, switches, and firewall configurations in core network
- Developed and maintained VPN tunnels with Cisco PIX and ASA firewalls spanning 50+ sites
- Directed the migration of core infrastructure from Windows 2000 to Windows 2003 Server, which include migrations to Exchange 2003.
Confidential, El Dorado Hills, CA
Network Security Engineer
Responsibilities:
- Planned, installed, monitored and was the single point of contact for all intrusion detection for client systems. Monitored and maintained client firewall, intrusion detection systems and VPN systems including (Checkpoint FW-1/VPN-1/Cisco PIX/SecureVPN /SecureIDS).
- Perform Checkpoint and PIX firewall/IDS design, integration and implementation for Cyber Trap client networks
- Successfully installed Palo Alto PA-3060 firewalls to protects Data Center
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
- Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
- Monitor the ticket queue for incoming tickets, update tickets in accordance to Service Level Agreement (SLAs) requirements and, escalate based on severity levels using AxiosAssyst.
- Implemented and troubleshooting the Virtual firewalls (Contexts) solutions in ASA
- Troubleshooting the VPN tunnels by analyzing the debug logs and packet captures
- Configuring failover for redundancy purposes for the security devices. Implemented the stateful& serial failover for PIX/ASA firewalls, Checkpoint Clustering and load balancing features.
- Planning, designing and implementing a secure ODC Network setup for upcoming projects.
- Responsible for implementing Data Center Security best practice, audit and compliance (PCI/SOX/DOD) requirements.
- Automation of security operations and optimizing the usage of infrastructure.
- Responsible for managing Network & Security Engineering implementation that architect, design, builds, manages and supports Network and Security Infrastructure and Data Centers.
- Configured redundant interfaces, dhcp server, dhcp relay, ntp settings, and sub interfaces on firewalls.
- Implemented the redundancy for ACS servers by replicating the database between primary & secondary servers.
- Maintain the periodical software update on security devices depends upon the bugs fixed with the new software releases.
- Testing the new features/Product in the lab and preparing the reports.
- Maintain the security standards across the security devices as per the security policies. IDS/IPS Signature updates and CSM Management
Confidential, NYC, NY
Checkpoint Security Engineer
Responsibilities:
- Firewall Policy Implementation on Checkpoint R62 and R65 using Provider 1.
- Migrated Nokia IP 300 to Checkpoint NGX R65 SPLAT
- Site to site VPN implementation on Checkpoint Firewall R62 with 3DES encryption over IPsec.
- Log analysis
- Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
- Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
- Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
- Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
- Responsible for setting up the infrastructure environment with majority of Cisco & Palo Alto appliances apart from various other equipment.
- Implemented Positive Enforcement Model with the help of Palo Alto Networks.
- Worked with Palo Alto Panorama management tool to manage all Palo Alto firewall and network from central location.
- Firewall log monitoring using Cisco MARS.
- Configuration and Maintenance of ASA 5550, ASA 5510, PIX 535, PIX 515E, FWSM Firewalls and Cisco IPS 4240 using Cisco Security Manager (CSM).
- Implemented Firewall in multiple context mode.
- Implemented clustered firewall.
- Expertise in VPN configuration, routing, NAT, access-list, security contexts, and failover in ASA firewalls.
- Administration of Cisco Secure Access Control Server 3.3.
- TACACS+ Configuration
- On call support for NOC.
- Administration Cisco 6500, 2600 series switches.
- Administration of Cisco 3700 series Routers.
- PCI Firewall auditing and documentation.
- Network diagram preparation using Visio 2003.
- Firewall Backup.
Confidential, South Deerfield, MA
Network Administrator/Support
Responsibilities:
- Designed and Configuring the WAN infrastructure, consisting of multiple T1 and T3 lines, Cisco routers, Cisco switches, Load balancers, Dell and Sun servers.
- Redesign of Internet connectivity infrastructure for meeting bandwidth requirements. This involved negotiating with ISPs, switching from T1 to Flexible T3 lines and configuring/replacing existing Cisco 1605 series routers with Cisco 3640 routers.
- Optimized performance of the WAN network consisting of Cisco 4500/5500 switches by configuring VLANs.
- Experienced with Cisco catalyst switches 5xxx,4xxx, 29xx,19xx and RSM and Cisco Routers 7500,7200,4000,3600,2600,2500
- Implementation of Checkpoint Firewall 4.1 to protect and authenticate local-net and DMZ. Defined policies, NAT and anti-spoofing for internal, external networks as well as Internet gateways.
- Configured and worked on Inbound and outbound Load balancer using product called Link Proof, WSD by Radware Inc.
- Fully configured the Linkproof with Smart NAT* for Optimal content routing that ensures the fastest inbound and outbound content delivery
- Designed and Configured Web Server Farms, to increased performance through intelligent traffic, Bandwidth management and enhanced application security using WSD.
- Configured Web Trends for Real-time web traffic analysis and e-commerce Analysis
- Enabled remote users to access corporate LAN with VPN connectivity.
- Implemented Fiber channel disk arrays with Dell PowerVault 650F.
- Evaluating and creating a plan to deploy Windows 2000 Advanced server in a separate domain (Active Directory Services), to be integrated into existing environment once the production environment is ready to migrate to Windows 2000 ADS model. Installed and configure BackOffice 4.5 on this server.
- Monitoring and managing network resources using HP Openview by implementing policies and creating custom events.
- Worked with various ISP providers, InterNIC, providing online WAN tech support.
- Systems Management of complete MS Exchange 5.5 Infrastructure.
- Created and deployed desktop images using Symantec Ghost 5.1c.
- Documentation of all the work done using Visio, Excel and MS word.
Confidential
Help Desk Representative/Support
Responsibilities:
- Configuration and maintenance of Checkpoint NGX R61.
- Firewall policy rules implementation on Cisco ASA 5510 and 5520 firewalls.
- Site to Site and Remote access VPN implementation.
- NAT and PAT configuration
- Cisco access-list (ACL) and route-map skills with a high level of understanding of IP Routing in a large global enterprise network.
- Installation and administration of IDS - SNORT
- Implementing and Troubleshooting of Cisco ACS Software with Ver 3.3,4.0,4.1
- Firewall Log reviewing using RSA Envision.
- Experience in working with routing protocols such as RIP2/OSPF.
- Troubleshooting & Recovery of IOS using TFTP for the Networking & Security device.
- Installing, Configuring and Troubleshooting Cisco Routers (1700, 1800, 2500, 2600, 3200, 3600, 3700, 3800, and 7200).
- Installed and Configured Cisco (2950, 3750, 4500, 5000, 6500 Series switches).
- Implementing and Troubleshooting of VLAN.
- Implementing & Administration of Zoning Architecture project (Imp of various zone like Server, Intra & Internet Zone).
- Performance Monitoring for Networking Devices using MRTG
- Installation of Cisco wireless access points.
- Network Establishment & IP Allocation for the Business.