We provide IT Staff Augmentation Services!

Sr Network Security Engineer Resume

5.00/5 (Submit Your Rating)

Minneapolis, MN

SUMMARY:

  • Over 8 years of professional experience in Network and security engineering with performing Network analysis, design and Implementation with a focus on security optimization and support of large Networks.
  • Substantial knowledge in Cisco Routing, Switching and Security with Cisco hardware/software experience.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Experience in Supporting and troubleshooting Checkpoint (R77 Gaia, R75, R70, R65, Provider - 1, SPLAT, Smart Center Server, and Crossbeams) Juniper (SRX, JUNOS, ScreenOS, Netscreen SSG, NSM and Space) and Cisco firewall (ASA 5505, 5545, 5585 and ASDM) technologies.
  • Extensive experience on PaloAlto firewalls like PA-500, PA-3k, Pa-5k, PA-7k series firewalls and manage them via Panorama.
  • Having good experience on Tufin, Firemon and Algosec for firewall optimization purpose.
  • Responsible for Check Point, Cisco ASA, Juniper and Palo Alto firewall administration across global networks.
  • Used FireEye tool to run against application servers to generate reports about vulnerabilities for that server.
  • Worked on the migrations from Cisco PIX to Cisco ASA firewalls, Juniper SSG to Juniper SRX firewalls.
  • Configure and Monitor Cisco Sourcefire network IPS for alerts.
  • Developing and presenting professional status reports on applications, compliance status and remediation plans for firewalls.
  • Comprehensive expertise in the implementation of optimization, analysis, troubleshooting and documentation of LAN/WAN networking systems.
  • Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology (LACP, PAgP) etc.
  • Proficiently implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, Route Maps and route manipulation using Offset-list.
  • Created virtual machines on VMware ESXi to host linux servers.
  • Hands on experience in deployment of GRE tunneling, SSL, Site-Site IPSEC VPN and DMVPN.
  • Hands on experience in configuring and supporting a site-to-site and remote access Cisco IPsec, VPN client in addition to providing TACACS+, VPN solutions using ASA/PIX firewalls and RADIUS services.
  • Knowledge of PCI and NIST standards, reviewed procedures and implemented them across the organization according to audit requirements.
  • Experience with different Network Management Tools like Wireshark, SevOne, Statseeker.
  • Knowledge of PostgreSQL databases and operations to read and update database tables.
  • Experience working with Linux based operating systems and CLI utilities like tcpdump and creating/modifying scripts using VI editor.

PROFESSIONAL EXPERIENCE:

Confidential, Minneapolis MN

Sr Network Security Engineer

Key Responsibilities:

  • Configuring networks to ensure their smooth and reliable operation for fulfilling business objectives and processes.
  • Implementation of firewall polices and troubleshooting issues on the Checkpoint R77.30 Gaia, Checkpoint Provider-1, PA-5k series, Panorama, Cisco 5585 and 5545 firewalls.
  • Administration of multi-vendor firewalls across the enterprise that consists of checkpoint, PaloAlto and Cisco ASA firewalls.
  • Troubleshooting all the network related issues and app related issues by doing extensive research and packet capture techniques.
  • Configuring, administering and troubleshooting cisco ASA 550 series firewalls that includes 5505, 5545 and 5585 firewalls.
  • Configuring, administering and troubleshooting of PaloAlto PA 5000 series firewalls and panorama M100 management server.
  • Implementation of user-ID on PaloAlto firewalls by integrating with Microsoft active directory.
  • Have extensive experience on firewall rule remediation using Tufin Secure Track.
  • Configuring and maintaining checkpoint security appliances 12k and implementation of security rules and NAT rules.
  • Involved in a team responsible for implementation of firewall rules, troubleshooting connectivity issues and resolving incidents for over 200 firewalls.
  • Built process remediate legacy firewall rules to fade-out eventually.
  • Worked on remediation of highly permissive and critical rules that are risky.
  • Extensively worked on Tufin securetrack to add/import more than 2000 network devices for monitoring.
  • Worked on automating the firewall request process using Tufin SecureChange.
  • Developed Unified security policy in Tufin securetrack to evaluate risks in the network and to enforce the security policy on new firewall rules.
  • Gathered requirements and worked with Tufin professional services for integration of SecureChange with ServiceNow.
  • Configure workflows in SecureChange and to automate firewall request process.

Confidential, Minneapolis, MN

Sr Network Security Engineer

Key Responsibilities:

  • Configuring and Implementing Security rules as per the business needs in Checkpoint R77 Gaia, Paloalto and Cisco ASA firewalls.
  • Having extensive experience on checkpoint firewalls in configuring rule base, managing global policy.
  • Performed troubleshooting using Checkpoint SmartView Tracker, packet capture techniques like TCPDUMP, FW Monitor and Zdebug drop commands from CLI.
  • Performed code upgrade on the checkpoint firewalls and worked with Checkpoint TAC team for hardware and software related issues.
  • Audit the firewall rule base for shadowed, risky and permissive rules and remediate the findings.
  • Install and configure Tufin orchestration suite and manage the Tufin tool.
  • Deployed Tufin in a distributed architecture with central server and remote collectors.
  • Working on firewall optimization tool Tufin to generate different reports for rules usage, object usage to find out what rules need to be modified.
  • Work with business to get the scope and add the firewalls to SecureTrack to manage them.
  • Management of PaloAlto firewalls from panorama as global administrator for devices located at various sites.
  • Configuration of pre-rules and post-rules on panorama as per business requirement for global rules.
  • Advanced management of firewalls from panorama using device groups and templates.
  • Configuration and Administration of Palo Alto PA-5020 and PA-5050 Firewalls.
  • Configured and implemented various features of PaloAlto including User Identification, Server Profiles, Security profiles, Custom URL category, custom reports.
  • Worked on and upgraded PAN OS on firewalls from 6.0 to 7.0.6, 7.0.9, 7.0.12 and 7.1.10.
  • Consolidated rules on Cisco ASA firewalls using securetrack APG.
  • Solving Problems on a case-by-case basis with deep understanding of networking/firewall concepts particularly in Paloalto firewalls and Cisco ASA firewalls.
  • Reviewing and resolving incoming firewall changes request and troubleshooting queues.
  • Configuring networks to ensure their smooth and reliable operation for fulfilling business objectives and processes.
  • Performing extensive research work on firewall rule base and log reports for every firewall that needs to be audited.
  • Configured and generated PCI compliance reports on Tufin and worked towards remediating the failures.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Palo Alto design and installation which includes Application and URL filtering and Threat Prevention.
  • Managed cisco IDS and IPS modules with Firepower Management Center.
  • Maintain the security standards across the security devices as per the security policies.
  • Perform daily operational tasks on PaloAlto firewalls requested by other teams and business users.
  • Working with the IT Service Management tool ServiceNow for change, incident and problem management.
  • Providing Daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.

Confidential, Austin - TX

Sr Network Security Engineer

Key Responsibilities:

  • Provide 24*7 supports for day to day global operational activities including Change Implementation, Handling Work order access Request, High Priority incident handling/troubleshooting for Security Devices (Firewalls, Proxies, IPS, SSL, VPN Devices etc.)
  • Worked with the different models Cisco ASA, checkpoint and Juniper ScreenOS and JunOS firewall devices on a daily basis
  • Configuring Juniper Net screen and SRX Firewall Policies between secure zones using command line (CLI) and NSM (Network Security Manager)
  • Troubleshooting firewall issues and Performing packet captures on SRX firewalls using trace options and using Snoop in netscreen firewall
  • Configure and Monitor the alerts in symantec Web application firewalls and inform SOC to mitigate the issues.
  • Experience in configuration of Juniper security appliances SRX 220, SRX 240, SRX 550, NS 50, SSG 550M, SSG 520M.
  • Worked with Cisco and Juniper TAC to troubleshoot and resolve network and equipment failures
  • Configure, administer and document firewall infrastructure, working with Cisco ASA 5540, 5585, Check Point R77 Gaia, R75, VSX, Provider- 1 and SPLAT.
  • Prepare, review and configure firewall rule scripts for complex firewall requests and implement them.
  • Responsible for PIX 6.x/7.x/8.x, ASA 7.x/8.x Firewall and Troubleshooting, IOS Security Configurations, IPsec VPN Implementation and Troubleshooting, DMZ Implementation and Troubleshooting.
  • Working knowledge of OSPF, BGP and EIGRP routing protocols, NAT’ing, NAC product sub-netting, also including DNS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP & Multicasting protocols
  • Upgraded the data center network environment with Cisco ASA 5520.
  • Configured ACL’s on Cisco Switches as well as configured routers as terminal servers.
  • Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment
  • Performed IP address planning, designing, installation, configuration, testing, maintenance, and troubleshooting in complete LAN, WAN development.
  • Deployment and MaintenanceLAN/WAN elements and monitoring performance of LAN/WAN.
  • Strong hands on experience on PIX Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Responsible for investigating Data Loss Prevention using Symantec DLP
  • Monitoring alerts in Symantec Antivirus and work with SOC team in mitigating it.
  • Configured of ACL’s in Cisco 5520 ASA firewall for internet Access requests for servers, Protocol Handling, Object Grouping and NAT
  • Responsible for Data Center Migrations and its operations.
  • Experience working in an Agile Scrum environment and with HPSM Change Control System.

Confidential, Windsor, CT

Network Security Engineer

Key Responsibilities:

  • Experience with Firewall Administration, Rule Analysis and Rule Modification using Checkpoint R71, Juniper SRX, SSG and Cisco ASA firewalls.
  • Extensive implementation of firewall rules on Juniper SRX 3600, SRX 650 and SRX 220 on a daily basis, using NSM as well as CLI when needed.
  • Installed and configured Palo alto Pa-2000 series box and troubleshoot for network issues.
  • Worked on the migration of Juniper SSG to SRX series firewalls.
  • Implemented firewall rules as per the user requirements in the SRX and SSG firewalls via CLI and NSM.
  • Configuring and troubleshooting routing issues in Juniper M and MX series Routers.
  • Configuring and troubleshooting any L2 level issues, VLAN and port issues in Juniper Switches
  • Troubleshoot traffic passing managed firewalls via logs and TCPDUMP, fw monitor packet captures
  • Created standard access lists to allow SNMP, NTP and logging servers.
  • Negotiate VPN tunnels using IPsec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
  • Configuring IPSEC VPN on SRX series firewalls
  • Troubleshoot traffic passing managed firewalls via Splunk.
  • Daily technical hands on experience in the configuration, troubleshooting of Juniper SRX firewalls as well as experience working directly with customer in a service/support environment.
  • Analyzing the traffic which was captured using trace options, snoop, tcp dump, fw monitor and Wireshark.
  • Provide best practice security consulting for multiple compliance initiatives, with a focus on highly resilient solutions. Creating technical implementation plans, project plans, and worked closely with internal and external customers to supply solutions that fulfill their needs.
  • Regularly performed firewall audits around Checkpoint Firewall-1 solutions for customers.
  • Designing and Implementing firewall rules and modifying existing rules in Palo Alto.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
  • Used Bluecoat Proxy SG for URL and content filtering purpose.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Co-ordinated with the Data Network and Security team and came up with possible solutions.
  • Work on Physical site Inventory verification, gather information of various Cisco Network devices and Security Devices to develop Run book and Spec Book.
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Configured IPSEC VPN tunnels between Checkpoint and other non-Checkpoint endpoint devices using IKE pre-shared keys, 3DES and MD5
  • Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view) and experience with developing complex network design documentation and presentations using VISIO
  • Experience with configuring Virtual Server and Configuring Load balancing methods in F5 LTM

Confidential

Network Support Engineer

Responsibilities:

  • Experience in Cisco 7200, 7600 routers, Cisco 2800 3700 series switches: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay and ATM).
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.
  • Configured the Cisco router as IP Firewall and for NATing.
  • Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access.
  • Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.
  • Configuring routers and send it to Technical Consultants for new site activations and gives online support at the time of activation.
  • Installed and configured PIX 520, 525, 535 series firewalls, configured standard and extended access-lists and policy- based filters
  • Work with Help Desk for circuit troubleshooting to give Support to the Tech persons at the site.
  • Responsible for implementing QoS prioritizing voice traffic over a data.
  • Implemented SNMP on Cisco routes to allow for network management.
  • Troubleshoot TCP/IP problems, troubleshoot connectivity issues.

Confidential

Network Engineer

Responsibilities:

  • Performed IOS upgrades on Catalyst 1900, 2900, 3500 series switches and 2500, 2600, 3600 series routers.
  • Responsible for maintenance and utilization of VLANs, Spanning-tree, HSRP, VTP of the switched multi-layer backbone with catalyst switches.
  • Implemented and configured routing protocols like EIGRP, OSPF and BGP.
  • Connected switches using trunk links and Ether Channel
  • Used Network Monitoring tool to manage, monitor and troubleshoot the network.
  • Configured Cisco IOS Feature Set, NAT and Simple Network Management Protocol (SNMP) for Network Security implementation.
  • Implemented redundant Load balancing technique with Internet applications for switches and routers.
  • Support Network Technicians as they require training & support for problem resolution including performing diagnostics, & configuring network devices

We'd love your feedback!