We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

2.00 Rating

Basking Ridge, NJ

PROFESSIONAL SUMMARY:

  • Over 8+ years of professional experience in Network engineering, Network security, Designing, Deployment, Implementing, Configuring and Troubleshooting of networking system on both Cisco and Juniper Networks.
  • In - depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP services.
  • Good knowledge ofIP Addressing, Subnetting, VLSM, ARP, OSI and TCP/IP models.
  • Experienced in trouble-shooting both, connectivity issues and hardware problems on Cisco based networks.
  • Strong knowledge on Wireless Standards and Technologies, i.e. Ethernet, WAN, LAN, IEEE 802.11a, b, g, n (Wi-Fi). Cisco Wireless Management system, PCI standards. Very good knowledge on IEEE 802.15.1 (Bluetooth), Mesh networks, etc.
  • Having good experience in layer-3 Routing and layer-2 Switching, And Nexus models like 9K,7K,5K, 2K series.
  • Good Knowledge in Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches
  • Moderate knowledge in configuring and troubleshooting Cisco Wireless networks; LWAPP, WLC, WCS, stand-alone apps, roaming, wireless security basis, IEEE 802.11a/b/g, RF spectrum characteristics.
  • Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco Catalyst 2900, 2960, 3750, 3500, 4500, 5500, 6500 series switches.
  • Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology (LACP, PAgP).
  • Expertise in Configuration of Virtual Local Area Networks (VLANS) using Cisco routers and multi-layer Switches and supporting STP, RSTP, PVST, RPVST along with trouble shooting of inter-VLAN routing and VLAN Trunking using 802.1Q.
  • Proficiently implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, Route Maps and route manipulation using Offset-list.
  • Hands-on Experience with CISCO Nexus 7000, Nexus 5000, and Nexus 2000 platforms.
  • Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches (5548, 7010), including CISCO NEXUS Fabric Extender (223, 2248).
  • Managed inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, NTP.
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • Conduct Load/Stress testing of A10 Network devices to monitor/evaluate network performance for real scenarios.
  • Configured and installed 3Com, Cisco, and Alcatel (Aruba) access points. Configured and managed Cisco & Aruba wireless controllers.
  • Configuration, administration and maintenance of Wireless Access Points (Meraki and Fortinet devices).
  • Design WAN solution using the AutoVPN technology with Cisco Meraki MX security appliances including DC to DC failover and SD-WAN capabilities.
  • Conduct online product demonstrations using the Cisco Meraki Cloud Controller web interface via WebEx, answer technical questions, contribute to proposals, analyze clients' needs, and develop technical solutions
  • Software-Defined Networking (SDN): Hands-on experience and expert knowledge of Cisco Intelligent WAN (IWAN).
  • Working knowledge on configuring access lists. Troubleshooting DNS/DHCP issues within the LAN network.
  • Expertise in IP sub-netting and worked on designing and allocating various classes of IP address to the domain.
  • Good experience of OSI model, TCP/IP networking standards and with protocols like SNMP, IPv6.
  • Hands on experience in deployment of GRE tunneling, SSL, Site-Site IPSEC VPN and DMVPN.
  • Extensive knowledge and troubleshooting experience in different networking protocols including DHCP, DNS, FTP, TFTP, SNMP, Quality of Service (QOS), PAP, CHAP, HTTPS, SSH, Telnet and ICMP.
  • Implemented IPv4 migration to IPv6 (NAT-PT, Tunnelling, etc.)
  • Experience working with ticketing tools such as Remedy and ServiceNow.
  • Experience inSolar WindsNetwork Performance Monitor, Network Configuration Manager, Network Traffic Analyzer (Netflow) and IP Address Manager.
  • Proficient in using SolarWinds Network Management tools like Network Performance Monitor (NPM), Netflow Traffic Analyzer, Network Configuration Manager (NCM), Server and Application Monitor (SAM), SolarWinds Web Performance Monitor and SolarWinds Virtualization Manager.
  • Expert in performing deep packet analysis to troubleshoot network and application issues using Wireshark.
  • Experience with design and implementation of Data center migration and ACI.
  • Vast experience with Cisco SDM, NAT/ACLs, AAA, IPS/IDS, Cryptography, VPN and IPsec.
  • Extensively worked on Juniper models EX 2200, EX 4200, EX 4500, MX-480 and M Series.
  • Proficient experience in managing security policies with CSM, integrated with ASA 5500 devices
  • Implementation, Configuration and Support of Checkpoint (NGX R65, R70 and R71), Juniper Firewalls (SRX5400, SRX5600, and SRX5800), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo AltoNetworks Firewall models (PA-2k, PA-3k, and PA-5k)
  • In depth understanding of Using FortiGate firewalls and FortiWeb firewalls for IPS and other virtual web applications. Also expertise working with the DMS software for history tracking.
  • Hands-on experience with Firewall migrations from PIX firewall to Cisco ASA and Juniper SRX firewall and vast experience in policy development on firewalls.
  • Experience working withCisco Nexus 2148 Fabric Extenderand Nexus5000 and 7000 series DC Switches and Virtual Port Channel configuration to provide a Flexible Access Solution for a Data Center Access.
  • Implemented VDC, VPC, VRF and OTV on the Nexus 5505 and 7009 switches.
  • Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 5000 and 2000.
  • Extensive Knowledge in configuring and troubleshooting as well as creating Virtual Servers, Nodes, Pools and iRules on BIG-IP F5 load balancer LTM for load balancing and traffic management in DC environment.
  • Have hands on experience with CISCO unified wireless testing network CISCO WCS, and on CISCO PRIME
  • Implemented wireless software’s TRUVIEW AND WLC GUI
  • Had experience on wireless protocols such as 802.11 a,b,g,n, AC WAVE2,
  • Experience in installing and configuring DNS, DHCP and Bluecoat Proxy servers.
  • Administration of production Windows Servers infrastructure that includes Domain Controllers, IIS Web Servers, FTP/SFTP and Blue Coat Proxy servers.
  • Troubleshoot the network issues onsite and remotely depending on the severity of the issuesWorked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Installing and verifying firewalls configuration and Rules (Checkpoint NG & NGX, Cisco ASA, Cisco Pix, Juniper Netscreen, and ISA).
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Experience with F5 load balancers -VIPRION LTM, GTM series like 6400, 6800, 5000, 2000 for the corporate applications and their availability.
  • Worked with team Managing and configuringArubaWireless controller devices (7210, 7240) and Cisco Access Points
  • Experience configuring and troubleshooting on Citrix NetScalar Load Balancer.
  • Organized and oversaw application upgrades to ACAS and Infoblox.
  • Used DHCP to automatically assign reusable IP addresses to DHCP clients viaInfobloxIPAM Hands-on experience in using network monitoring tool; Solarwinds Orion.
  • Involved in troubleshooting network traffic and its diagnosis using tools like ping, traceroute, Wireshark, TCPdump and Linux operating system servers.
  • Perform maintenance and changes in Palo Alto Web Application Firewalls.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
  • Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

TECHNICAL SKILLS:

Routers: Cisco 7600, 7200, 3800, 3600, 2900, 2800, 2600, ASR 1K, ASR9K, Juniper MX 480, MX 960.

Routing Protocols: OSPF, EIGRP, BGP, RIP v1/v2, MPLS PBR, Route Filtering, Redistribution, Summarization, and Static Routing

Switches: Nexus 2K/5K/7K/9K, Cisco Catalyst 6500, 4500, 3850,3560, 3750, 2960, Juniper JunOS

Switching Protocols: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels, Transparent Bridging

Multicast Protocols: IGMP, IGMP version 2 and 3, CGMP, PIM-Sparse and Dense Mode. DHCP, FTP, TFTP

LAN technologies: Ethernet, Fast & Gigabit Ethernet, VLANS, VTP, STP, RSTP, 802.1W, Cisco Prime

WAN technologies: Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN and ATM, IWAN, SD-WAN

Load Balancer: F5 Networks (Big-IP) LTM 8900 and 6400

Network security: Cisco ASA 5585,5550,5540, ACL, IPSEC, F5 Load Balancer, Checkpoint, Palo Alto, IPSec VPN, GRE VPN

Network Management: SolarWinds, Proteus, Xilinx 9.21, HP Open-view, Wireshark, Spirent, SNMP,CA spectrum.

Operating systems: Windows XP/ 7/ 8, Windows Server 2003/ 2008, Mac OS X and Linux

Language skills: C, C++, Python, Bash, SQL, Perl scripting.

Various Features & Services: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP, FTP

Applications: MS (Office, Word, Outlook, Excel, PowerPoint, Visio), VMware, Adobe Photoshop and Illustrator

Wi-FI testing software tools and Protocols: Cisco prime, Cisco WCS, Truview, WLC GUI, 802.11a,b,g,n, 802.11AC wave2

PROFESSIONAL EXPERIENCE:

Confidential, Basking ridge, NJ

Sr. Network Engineer

Responsibilities:

  • Involved in configuring and implementing of composite Network models consists of Cisco ASR 1K, 7600, 7200, 3800 series routers and Cisco 2950, 3500, 5000, 6500 Series switches.
  • Designing and implementing LAN/WAN solutions across locations
  • Data centers consolidation, design, management and supporting network activities.
  • Managing the LAN/WAN devices across locations for day-to-day operations.
  • Networks using routing protocols such as RIP, OSPF, BGP, EIGRP and manipulated routing updates using route-map, distribute list and administrative distance.
  • Maintain and manage hundreds Nexus 9K /7k/2k and hundreds of routers CRS, ASR9K/1K, Juno MX960, EX4500/3200 and load balances, F5
  • Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter-VLAN routing, LAN security etc. Deploying Layer 2 security in Server Farms by configuring switch for 802.1x port based authentication
  • Configured OSPF redistribution and authentication with type 3 LSA filtering to prevent LSA flooding.
  • CiscoAPIC-EM (IWAN) deployment using CSR1000v Switch and VMware.
  • Utilized McAfee SIEM, McAfee Antivirus Fore scout and Zscaler.
  • Configured OSPF over frame relay networks for NBMA and point to multipoint strategies.
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Troubleshooting and installing of CRS, ISR, GSR, ASR9000 and Nexus 9K devices.
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path.
  • Deployed Intelligent WAN (IWAN) in both Hybrid and Dual-ISP branches to provide an increase in bandwidth capacity, security and reliability.
  • Managing location specific Cisco ASA Firewalls and data center internet gateway firewalls.
  • Firewall policy administration and support on PIX Firewalls as well as Cisco ASA Firewalls.
  • Installed and configured Cisco Nexus 9K, 7K, 5K, 2K, ASRs, 6500s, 4510s, 3800s, 2900s
  • Responsible for setting up the infrastructure environment with majority of Cisco & Palo Alto appliances.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall and
  • Worked on Multi-vendor platform with Check Point, Fortinet and Cisco firewalls requesting net flow for security compliance, coding, and pushing firewall rules after approval and troubleshoot incidents.
  • Have hands on experience with CISCO unified wireless testing network CISCO WCS, and on CISCO PRIME
  • Have experience on wireless software’s TRUVIEW AND WLC GUI
  • Complex routing,multicast routing, QoS, Internet breakout at the hub and spoke sites, and interoperability betweenIWANsites and legacy non-IWANsites during migration toIWAN.
  • Software-Defined Networking (SDN): Hands-on experience and expert knowledge of Cisco Intelligent WAN (IWAN).
  • Design WAN solution using the AutoVPN technology with Cisco Meraki MX security appliances including DC to DC failover and hands on experience on SD-WAN capabilities.
  • Handling new application load balancing requirements through F5 LTM devices.
  • Experience with configuring Virtual Server and configuring load balancing methods in F5 12.0 LTM.
  • Configured NAT and SNAT in F5 12.0 LTM. Managed virtual servers in F5 12.0 LTM.
  • Maintain BIG IP F5 configuration for modules LTM, ASM, APM and future GTM.
  • Upgrading and deployment of Nexus 7k, 5k and 2k
  • Configured VPC, FEX and VDC’s on Nexus 5K, 7K, 9K.
  • Created ACIEPGs (End Point Groups) contract policies, VRFs and bridge domains for tenants
  • Experience with Cisco ASR’s, Catalyst 6500 series switches, 2800 series, and 3800 series. 2900 series and 3900 series routers.
  • Decommissioned VLANs on core ASR 9K,Nexus 9K, 7K, 5K and its downstream devices.
  • Coordinating with service providers like AT&T, Verizon etc. for all network outages /restoration/new implementations.
  • Assist and troubleshoot Cisco Meraki solutions remotely including 802.11a/b/g/n/ac Wireless networks
  • Supported a nation-wide WAN solution using the AutoVPN technology with Cisco Meraki MX security appliances including DC to DC failover and SD-WAN capabilities
  • Implementation of Site to Site VPN s with direct vendors and customers.
  • Implemented Data Centers and large remote sites globally on Nexus(7k, 6k, 5k, 2k).
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments.
  • Implementing and maintaining network monitoring system (Cisco works, HP Open view and Wireshark) and experience with developing network design documentation using VISIO.
  • Designed and deployed a Cisco Identity Services Engine (ISE) solution (wired, wireless, and VPN users) for a commercial client with converged access switches and Cisco ASA firewalls.
  • Installed and configure Cisco Identity Service Engine (ISE) 2.0 and implement 802.1x and wireless guest sponsor portal.
  • Worked with team Managing and configuringArubaWireless controller devices (7210, 7240) and Cisco Access Points.
  • Experience in performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s.
  • Implement Infoblox DNS appliance and run scripts as needed.
  • Organized and oversaw application upgrades to ACAS andInfoblox.
  • Used DHCP to automatically assign reusable IP addresses to DHCP clients viaInfobloxIPAM.
  • Worked on Windows layered products including MS Exchange, DNS and Active Directory.
  • Used Infoblox for documentation and tools updates.
  • Configuration and maintain DNS, DHCP and Domain Controllers.
  • Advanced knowledge, design, installation, configuration, maintenance and administration of Junos, Juniper SRX Firewall, Juniper EX and Juniper MX devices.
  • Attending weekly CAB meetings and ensuring all changes were going through the change process.
  • Capacity planning and providing recommendations for infra upgrades
  • Infrastructure upgrades and new Infra deployments.
  • Managing IT Security & Disaster recovery Management

Environment: Cisco 6506/4948/4510switches, Cisco3660/3845/7609Routers, Cisco ASA, Palo Alto, F5 Load Balancers, OSPF, BGP, MPLS, HSRP, Juniper MX 960, Nexus 2K, 5K, 7K.

Confidential, Plano, TX

SR. Network Security Engineer

Responsibilities:

  • Security infrastructure engineering experience as well as a Microsoft Windows, UNIX, Juniper firewalls, Palo Alto firewalls, Bluecoat Proxies, Juniper Intrusion Prevention devices, and wireless switch security management.
  • Installed SolarWinds Network Performance Monitor with emphasis on traffic analysis, application and virtualization management.
  • Added, Removed and Updated custom properties within SolarWinds Orion in line with applicable Configuration Management processes & procedures.
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • Management of SolarWinds Orion Suite - Network Performance Monitor, Network Configuration Manager.
  • Experience on dealing with Cisco Application Centric Infrastructure (ACI) by integration hardware and software products as per network layout
  • Incorporate Cisco Nexus 9000 NXOS to ACI fabric to work in concert with existing Nexus 7000s and ASRs for Multi-Protocol Label Switching (MPLS).
  • Testing JUNOS images onJuniperMX& T series router platforms covering various protocols and technologies like OSPF, BGP, LDP, MPLS, Layer3 VPNs, and VPLS.
  • ConfiguredJuniperMX480s, EX8200s, EX4500s, EX4200s, and SRX5800s from scratch to match design.
  • Upgrade testbed Hardware to add and support new RLIs. Created 2 new test beds which has maximum coverage ofMXseries router.
  • Very good understanding of fiber-optic technology including cables, connectors, patch panels, and optical transport technologies such as DWDM and SONET
  • Configuring, upgrading and managingJuniperdevices like M&T series routers, EX,MXand SRX.
  • Understanding ofJuniperEX/MX/SRX series architectures and JUNOS platform including hands on configuration.
  • Configured and implemented an enterprise SD-WAN for smooth traffic management and security purpose.
  • Design, install and configuration. Involved in large-scale wireless integrations into existing networks. Technologies included Cisco Wireless, Meraki,
  • Aruba, Air Magnet, and multi-vendor RADIUS solutions.
  • Provide second/third level technical support for ACI (Application Centric Infrastructure) technologies.
  • Migrated the entire testing environment to Virtual MX supported testing.
  • Configuration of Cisco unified computing system (UCS) and using UCS manager perform operation such as device discovery, inventory, configuration, diagnostics, monitoring, fault detection, auditing, and statistics collection.
  • Administering and evaluating firewall access control requests to ensure that these requests are compliant with client's security standards and policies.
  • Configuration and support of Juniper NetScreen firewalls and Palo Alto firewalls.
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access, Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Configuring Juniper NetScreen Firewall Policies between secure zones using Network Security Manager (NSM).
  • Configuration and troubleshooting F5 LTM, GTM series like 6600, 6800 for different applications and monitoring the availability.
  • Used FireEye to detect attacks through common attack vectors such as emails and webs.
  • Gained experience on working with migration to Check Point and Palo Alto next generation firewalls
  • Experience on Checkpoint Firewalls NG, NGX R65, R70, R75, R77, NSX (VMware Network).
  • Integrated VMware virtual machines to the test lab environment.
  • Experience in creating multiple policies and pushing them in to Checkpoint Firewall (Gateways) and hands on experience in managing the Checkpoint Management Server.
  • Managed successful delivery of massive security response portfolio including Splunk and Cisco ISE.
  • Worked on Blue Coat proxy SG (900, 810 and SG9000 series) and Proxy AV (510,810 and 1400series) in Datacenter environment with hands on experience on inspection, data loss prevention, content caching and bandwidth management using Blue Coat proxy.
  • Designed, Configured and maintained Blue Coat reporter 10. Also, configured policies on the Blue Coat VPM, local database and PAC files to filter the traffic flow by creating custom rules, URL categories and routing policies.
  • Implemented and administered Websense Web Security Gateway for web content filtering and DLP.
  • Improved network and system security through setup and ongoing maintenance of Riverbed IPS and FireEye.
  • Firewall deployment, rules migrations, firewall administration and converting existing rule based onto new Checkpoint and Palo Alto Next-Generation Firewall platforms.
  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration.

Environment: Juniper EX-2200, EX-4200, EX-4500,MX-480, M Series, Juniper SRX5400, SRX5600 and SRX5800, Bluecoat Proxies, Juniper IPD, checkpoint, Juniper NSM, Panorama, F5 LTM, GTM 6600, 6800, Splunk, Cisco ISE, Cisco ACI, Websense, SolarWinds NPM.

Confidential, San Francisco, CA

Network Engineer

Responsibilities:

  • Configured IP, RIP, PPP, BGP and OSPF routing.
  • Configured IP access filter policies, Cisco CLI, Ciscoworks, Network Security, and Network Analysis Tools.
  • Experience with Checkpoint Firewall policy provisioning.
  • Identify, design and implement flexible, responsive, and secure technology services.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures.
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Worked with telecom vendors in regard to network fault isolation.
  • Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
  • Installed different software on the systems and managed network devices including Hubs, Switches.
  • Layer 2 switching technology architecture, implementation and operations including L2 and L3 switching and related functionality. This includes the use of VLANS, STP, VTP and their functions as they relate to networking infrastructure requirements including internal and external treatment, configuration and security.
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Estimated Project costs and created documentation for project funding approvals.
  • Worked with team Managing and configuringArubaWireless controller devices (7210, 7240) and Cisco Access Points
  • Managed various teams involved in site surveys, cabling specifications, Network equipment installation and configuration.
  • Planned resources and presented project status to higher management.
  • Deployed 7613 as PE and CE router and configured and trouble shooted the Edge Routers.
  • Excellent troubleshooting knowledge on T1, T3, OC-3 and OC-12.
  • Created and delivered internal trainings for BGP.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Ability to analyze, configure and troubleshoot networks.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Supporting EIGRP and BGP based PwC network by resolving level 2 &3 problems of internal teams & external customers of all locations.
  • Perform maintenance and changes in Palo Alto Web Application Firewalls.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.

Environment:NetFlow,TACACS,EIGRP,RIP,OSPF,BGP,VPN,MPLS,CSM,SUP720,EtherChannels,Cisco7200/3845/3600/2800 routers, Fluke and Sniffer, Cisco 6509/ 3750/3550/3500/2950 switches, Checkpoint firewalls(SPLAT).

Confidential

JR. Network Engineer

Responsibilities:

  • Implementing new/changing existing data networks for various projects as per the requirement.
  • Troubleshooting complex networks layer 1, 2to layer 3 (routing with MPLS, BGP, EIGRP, OSPF protocols) technical issues.
  • Providing support to networks containing more than 2000 Cisco devices.
  • Performing troubleshooting for cisco IOS related bugs by analyzing past history and related notes.
  • Installing and Upgrading Antivirus software’s like AVAST, NORTON, MCAFEE, Fore scout etc.
  • Carrying out documentation for tracking network issue symptoms and large scale technical escalations.
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-VLAN routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc.)
  • Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-round technical support.
  • Commissioning and Decommissioning of the MPLS circuits for various field offices.
  • Preparing feasibility report for various upgrades and installations
  • Identify, design and implement flexible, responsive, and secure technology services
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configured switches with port security and 802.1 xs for enhancing customer’s security.
  • Monitored network for optimum traffic distribution and load balancing using Solar winds.
  • Validate existing infrastructure and recommend new network designs.
  • Created scripts to monitor CPU/Memory on various low-end routers in the network.
  • Installed and maintained local printer as well as network printers.
  • Handled installation of Windows NT Server and Windows NT Workstations.
  • Handled Tech Support as it relates to LAN & WAN systems
  • Configuring and troubleshooting multi-customer network environment.
  • Involved in network monitoring, alarm notification and acknowledgement.
  • Subnetting networks. Troubleshooting DHCP and DNS Servers.

Confidential

Jr. Network Support Engineer

Responsibilities:

  • Provided technical assistance in upgrading IOS on Cisco Routers and Switches.
  • Configured Access Control Lists to allow only authorized users to access certain applications and block others.
  • Involved in switching related tasks implementing VLANs.
  • Assisting senior engineers in troubleshooting TCP/IP issues and connectivity issues in multi-protocol environment.
  • Installing, repairing and upgrading desktop computers, which include software installation and imaging, and final configuration and testing. Perform planning, testing, and evaluate new devices and troubleshooting.
  • Provided support to user's software, hardware & wireless issues and escalate to second level.
  • Prepared the Technical specifications in operation manuals.
  • Involved in installing and configuring DNS, DHCP and other services on Windows Server 2003.

We'd love your feedback!