We provide IT Staff Augmentation Services!

Network Engineer Resume

2.00/5 (Submit Your Rating)

PROFESSIONAL SUMMARY:

  • 8.3 years of experience in testing, troubleshooting, implementing, optimizing and maintaining enterprise data network and service provider systems.
  • Strong hands on experience on Cisco Catalyst (3550, 3750, 6500) series switches, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers, ASA Firewall (5505/5510), Load Balancers using Cisco ACE, F5 LTM/GTM, Security Device Manager (SDM), Cisco Works, HP Open View, Solar Winds, Sniffer, Palo Alto Networks Firewall models (PA - 2k, PA-3K and PA-5K).
  • Experience in Cisco: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay & MPLS), Routing protocol configurations (RIP, EIGRP, OSPF, BGP)
  • Experience in configuration of VLAN setup on various CISCO Routers and Switches.
  • Experience in configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
  • Implemented and troubleshoot complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP, and MST.
  • Access control server configuration for RADIUS & TACAS+.
  • Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Implementation, working analysis, troubleshooting and documentation of LAN, WAN& WLAN architecture with excellent work experience on IP series.
  • Experienced working on network monitoring and analysis tools like SOLAR WINDS, CISCO works and RIVER BED and Wireshark. Extensive experience in configuring and troubleshooting of protocols RIP v1/v2, EIGRP, OSPF, BGP, and MPLS.
  • Well experienced in configuring First Hop redundancy protocols like HSRP, GLBP and VRRP.
  • Excellent communication skills, enthusiastic, motivated and a team player.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS, switching (VLANS, VTP Domains, STP, and Trunking).
  • Worked on configuring the Nexus 5K Aggregation Switch and Nexus 2K Fabric Extenders.
  • Implemented VDC, VPC, and OTV on the Nexus 5K and 7K switches.
  • Experience in installing and configuring DNS and DHCP server.
  • Experience in CheckPoint IP Appliances R65, R70, R75, R77 & Cisco ASA Firewalls.
  • Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1
  • Provide L3 support for checkpoint and Palo Alto firewalls.
  • Proficient in using SolarWinds Network Management tools like Network Performance Monitor (NPM), Netflow Traffic Analyzer, Network Configuration Manager (NCM) and Cisco Prime.
  • Provide 24/7 support.

TECHNICAL SKILLS:

Router platforms: Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 6807 series), Nexus 7K, 5K, 2K & 1K.

Switch platforms: Cisco 2900XL, 2950, 2960, 3560, 3750, 4500 and 6500, Nexus (2K, 5K, 7K and 9K)

Juniper Platforms: SRX, MX, EX Series Routers and Switches

Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall: Juniper Netscreen 6500, 6000, 5400, Juniper SSG, SRX5600, SRX5800, CheckPoint (NGX, R65, R70 and R71), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo Alto Networks (PA-2K, PA-3K and PA-5K).

Network Management/Monitoring: Solar winds, HP NNMi 8xi (Network Node Manager), Net flow and Cisco prime, Ethereal / Wireshark, TCPDump. Cisco DCNM, Firemon, Firepower, MS-VISIO

Load Balancers: F-5 BIG-IP LTM 2000, 3900, 5000, 6400, 6800 AND 8900, Bluecoatt SG8100, AV 510.

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port-channel, VLANs, VTP, STP, RSTP, 802.1Q

Security Protocols: IKE, IPsec, SSL, AAA, Access-lists, prefix-lists, SSL-VPN

Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System: Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

PROFESSIONAL EXPERIENCE

Confidential

Network Engineer

Responsibilities:

  • Deployed and maintained security/network devices and data centers for Service provider network.
  • Experience with Installing and troubleshooting Data center migration with 24/7 support.
  • Configured and deployed VDC and VPC between Nexus 7018 and Nexus 5548 switches along with FEX 2248. Have a good understanding of Fabric Path.
  • Deploying and decommissioning the VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.
  • Working on Nationwide Site WAN Transformation from Cisco 2821 Router to Cisco 4321, 4431, 4451 and ASR 1000 routers, including Visio Network Design, NEWO, Configuration changes, Routing Redistribution.
  • Creating Network Design in MS-Visio for new servers, application to be placed into multiple Datacenter.
  • Plan Design and assist in deploying enterprise wide Network Security and High Availability Solutions for ASA and SRX Firewalls
  • Work as a part of the DMZ migration and consolidation for external vendors into a new environment on ASA 5585 devices.
  • Involved in the configuration & troubleshooting routing protocols like MP-BGP, OSPF, EIGRP, RIP, BGP v4, and MPLS
  • Configuring DMVPN tunnels on routers 2800,4300, 4400 and ASR
  • Monitoring traffic on the circuits using NDC Flex Netflow monitor tool and SNMP.
  • Configuring MPLS on all the the WAN circuits.
  • Configuring zone based firewalls for security.
  • Creating route-maps and prefix-lists to advertise the routes over the network.
  • Configuring policy-map and class-map for queuing the traffic and maintain OoS
  • Configured and troubleshoot Autonomous and Cisco Meraki and Access Points
  • Experience in configuring all Palo alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments
  • Support Panorama Centralized Management for Palo alto firewall PA-500, PA-200 and PA3060, to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration
  • Experience working with F5 LTM 3600/6400 and GTM 2200/4200 in data center
  • Configured Virtual Servers, Configure Nodes, and configuring the load balancing Pools and also used to work with configuring load balancing algorithms.
  • Experience configuring session based persistence and I have leant configuring writing i Rules for specific redirection purpose @and also i rules for persistence.
  • Helped team to deploy 100 APs with 15 Switches, Cisco Nexus, Cisco Meraki and 2 Wireless controllers.
  • Experience supporting or testing LANs, VLANs, WLANs, VPNs, NAT devices, &/or DHCP servers.
  • Working on Cisco 6509 and 4507 series switches for LAN requirements that include managing VLANs, Port Security and troubleshooting LAN issues.
  • Implementation of various protocols like OSPF, BGP and STP.
  • Experience in troubleshooting complex data center environments. Performing analysis and diagnosis of highly complex networking problems in the Data Center environment.
  • Expert in configuring Cisco Routers, Catalyst Switches, Nexus Switches.
  • Worked extensively with ASR 9K( ), Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches.
  • Design and implement Wireless Intrusion Prevention Systems (WIPS) to enforce security policies
  • Installing Cisco Wireless Controllers and Wireless Access Points.
  • Install and upgrade Cisco Wireless LAN equipment including but not limited to: 1100, 1200, 1300 and 3500 series Access Points; 4400 and 5500 series Wireless LAN controllers; 6500 & 3750 Core switch routers; 2960, 3560 & 3750 series switches
  • .Monitor and troubleshoot BGP, EIGRP, TI circuits, and cellular backup circuits via ICMP and SNMP ticketing systems.
  • Working on Cisco 6509 and 4507 series switches for LAN requirements that include managing VLANs, Port Security and troubleshooting LAN issues.
  • Implemented Zone-Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Configuration and providing management support for Palo Alto and Checkpoint Firewalls (R75, R76 and R77).
  • Expertise in networking technologies like LAN, MAN, WAN and peripheral devices.
  • Develop Engineering Documentations to record F5 environment and change processes LTM/GTM/iRules.

Confidential, Chicago, IL

Sr. Network Engineer

Responsibilities:

  • Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco 1600, 2600, 2800, 3600, 7300 series Routers and different Firewall Vendors
  • Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.
  • Configured Easy VPN server and SSL VPN to facilitate various employees’ access internal servers and resources with access restrictions
  • Controller base Wi-Fi Networking with Meraki (Cloud Controller).
  • Configured and managed cloud-based wireless network.
  • Assisted development teams on architecting web interfaces and infrastructures that safely and efficiently power the cloud environment.
  • Work with Relay Engineers to provide IT support, for server-based software, firewall request, Citrix access, and software configurations.
  • Responsible for entire company network infrastructure that includes Cisco Switches, Routers, Firewalls, Access Points, Servers and PBX.
  • Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers and Cisco ASR 9K routers
  • Hands on experience in implementation and deploying BIG-IP F5 LTM load balancers for load balancing and network traffic management for business applications.
  • Configured VLAN’s, Private VLAN’s.
  • Subject Matter Expert for juniperRouting, Switching, Security, and VPNSystems.
  • Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as Cisco 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.
  • Designed and Implemented Firewalls, F5Vipriondeployments to Frontend and DMZ customers
  • Measure the application performances across the MPLS cloud through various routing and switching methods.
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Experience in migration of VLANS& Configured VLANs with 802.1q tagging, Ether channels, and Spanning tree for creating Access/distribution and core layer switching.
  • Installed and configured DNS, DHCP. Responsible for creating and configuring FORWARD LOOKUP ZONE AND REVERSE LOOKUP ZONE.
  • Experience working with Nexus 7010, 5020, 2148, 2248 devices.
  • Redistributed required routes from OSPF into BGP. OSPF cloud is present in the US and is connected to all our customers over Sprint’s Frame Relay backbone
  • Managed Plan of Record with PLMs/SE/Sales/Marketing and followed up and monitor product lines of Juniperrouting/switching/security portfolio (MX, PTX, EX, SRX)
  • Configured EBGP load balancing and ensured stability of BGP peering interfaces
  • Implemented site to site VPN in Juniper SRX as per customer Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls through CSM.
  • Managing and configuring 4 juniper & Pulse SSL VPNappliances (SA-4500 & 4000) for TSNA and ATS customers
  • Configuration of Palo Alto Next-Generation Firewall mainly creating security profiles and VSYS according to client topology.
  • Configuration and installation of Palo Alto Networks 5050 application firewalls (NGFW).
  • Expertise in Palo Alto design and installation for Application, URL filtering, Threat Prevention and Data Filtering.
  • Maintained and updated Active Directory for authentication purposes
  • Deployed BIG-IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Netscreen devices for easier management and common configurations.
  • Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series for higher.
  • Extensive use of NSM (Network and Security Manager) and CSM (Cisco Security Manager) for adding or modifying firewall policies for the firewalls in use.
  • Implemented F5 hardware refresh of older 3600 hardware to Viprion.
  • Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.
  • Mapped, Network Diagrams and physical identification in MS Visio.
  • Preformed IOS upgrades on cisco routers and switches
  • Worked with engineering team to resolve tickets and troubleshoot L3/L2 problems efficiently.
  • Configured Cisco 2800, 3800 routers and 3750, 4500, 6500 switches as part of the implementation plan.

Confidential, Lake Forest, IL

Sr Network Engineer

Responsibilities:

  • Security infrastructure engineering experience as well as a Microsoft Windows, Juniper firewalls, Palo Alto firewalls, Juniper Intrusion Prevention devices, and wireless switch security management.
  • Administering and evaluating firewall access control requests to ensure that these requests are compliant with client's security standards and policies.
  • Configuration and support of Juniper NetScreen firewalls and Palo Alto firewalls.
  • Successfully installed Palo Alto PA-3060 firewall then configured and troubleshot using CLI and worked with Panorama management tool to manage all Palo Alto firewall and network from central location.
  • Implemented Zone-Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Administer Palo Alto Firewalls to allow and deny specific traffic and to monitor user usage for malicious activity and future QoS.
  • Configuring rules and Maintaining Palo Alto Firewalls& Analysis of firewall logs.
  • Maintaining Checkpoint security policies including NAT, VPN, and Secure Remote access, Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Configuring Juniper NetScreen Firewall Policies between secure zones using Network Security Manager (NSM).
  • Configuration and troubleshooting F5 LTM, GTM series like 6600, 6800 for different applications and monitoring the availability.
  • Deployment of data center LAN using Nexus 7k, 5k, 2k switches.
  • I was involved in migration projects, which involves replacing legacy devices to new Nexus devices and introduced VPCs in the new architecture.
  • Worked on Nexus platform 7k series, 5K series (5548, 5020 and 5010), 2248 and successfully implemented VSS on the Cisco catalyst switches.
  • Used FireEye to detect attacks through common attack vectors such as emails and webs.
  • Gained experience on working with migration to Check Point and Palo Alto next-generation firewalls.
  • Managed successful delivery of massive security response portfolio including Splunk and Cisco ISE.
  • Implemented and administered Websense Web Security Gateway for web content filtering and DLP.
  • Improved network and system security through setup and ongoing maintenance of Riverbed IPS and FireEye.
  • Firewall deployment, rules migrations, firewall administration and converting existing rule-based onto new Checkpoint and Palo Alto Next-Generation Firewall platforms.
  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification, and administration.

Environment: Juniper SRX5400, SRX5600, and SRX5800 and Palo Alto PA-3060 & 5050 Firewalls, Bluecoat Proxies, Juniper IPD, Juniper NSM, Panorama, F5 LTM, GTM 6600, 6800, Nexus (2K, 5K, 7K and 9K),Splunk, Cisco ISE, Websense, Solar Winds NPM.

Confidential, Fort Worth TX

Network Engineer

Responsibilities:

  • Day-to-Day work involves scheduling firewall policy provisioning and working with users to identify connectivity related issues and troubleshoot using both Smart Utilities and CLI.
  • Managing and administering Juniper SRX and Checkpoint Firewalls at various zones including DMZ, Extranet (Various Business Partners) and ASZ and internal.
  • Worked with site-to-site large scale network deployment and troubleshooting issues with all the site involved.
  • Implementing Security Solutions in Juniper SRX and NetScreen SSG firewalls by using NSM.
  • Juniper Firewall Policy management using NSM and Screen OS CLI.
  • Daily technical hands-on experience in the configuration, troubleshooting of Juniper SRX firewalls as well as experience working directly with the customer in a service/support environment.
  • Troubleshooting Firewall Connectivity related issues using Smart view tracker on Checkpoint, NSM Log viewer for Juniper Firewalls.
  • Install, configure, manage and troubleshoot Cisco SourceFire IPS appliances and defense Center.
  • Creating and provisioning Juniper SRX firewall policies.
  • Worked with JUNOS OS on Juniper Routers and Switches.
  • Experience on ASA firewall upgrades to 9.x.
  • WebsenseWeb Security Gateway Installation, Upgrade & Configuration 8.4
  • Configured Panorama web-based management for multiple firewalls.
  • Worked on configuration, maintenance and administration of Palo Alto PA3000 Firewalls and migrating customers from Cisco ASA to Palo Alto in HA network.
  • Configuring rules and Maintaining Palo Alto Firewalls& Analysis of firewall logs using various tools.
  • Understand the flow of traffic through the Check Point Security gateway cluster and troubleshoot connectivity issues using advanced troubleshooting from Command Line Utilities.
  • Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and providedL3support for routers/switches/firewalls.
  • Creating object, groups, updating access-lists on Check Point Firewall, apply static, hide NAT using smart dashboard
  • Implementing FW rules using Firemon- Policy Planner.
  • Responsible for Checkpoint firewall management and operations across our global networks.
  • Implementing and managing Checkpoint Provider 1.0 Scalable security management for multi-domain environments
  • Configuring and deploying Cisco ASA 5505; Cisco 594/294; I500 web sense manager at customer locations with minimum downtime possible.
  • Active/Standby and Active/Active HA configuration on Cisco ASA Firewalls.
  • Configuring rules and maintaining Palo Alto firewalls and analysis of firewall logs using various tools.
  • Work with Software Distribution teams to develop and execute Custom Prop for Endpoint systems
  • Manage and monitor security rules and policies for Endpoint Protection
  • Understand different types of NAT on Cisco ASA firewalls and apply them.
  • Configuration, operation and troubleshooting of BGP, OSPF, EIGRP, RIP, VPN routing protocol in Cisco Routers &L3Switches.
  • Configured MPLSL3and L2 VPNs for customers.
  • FWSM configurations in single/multiple context with routed and transparent modes.

Environment: Juniper routers and switches, Cisco routers 7200; Cisco Catalyst switches 6500, 4500, 2950; Big-IP F5 Load Balancer, Cisco Works; MS Visio, Checkpoint, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy, Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP, STP, VTP, VLAN, VPN, MPLS, HSRP, GLBP.

Confidential

Network Engineer

Responsibilities:

  • Configuring/Troubleshoot issues with the following types of routers Cisco (7200, 6500, 4500, 1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, and DHCP, as well as assisting with customer LAN /WAN
  • Configured and troubleshoot Juniper Ex 4500 and series switches and Juniper ACX series routers.
  • Involved in the deployment of Content Delivery Networks (CDN).
  • Experience with SQL for extracting the data from SQL database, related to network issues.
  • Experience working with Network-attached storage (NAS) to provide Local Area Network (LAN) nodes with file-based shared storage through a standard Ethernet connection.
  • Configuring HSRP between VLANs, Configuring Ether-Channels and Port Channel on Cisco6500 catalyst switches.
  • Cisco Secure Access Control Server (ACS) for Windows to authenticate users that connects to a VPN 3000 Concentrator.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to GET VPN.
  • Assisted in MPLS migrations, implemented a backup for the existing WAN connection using site-to-site IPsec VPN tunnels.
  • Worked onthemigration of existing PIX firewall to ASA firewall and with converting PIX rules over to the Cisco ASA solution.
  • Worked extensively on Cisco ASA 10/5540) Series.
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2B network connectivity.
  • Experienced in securing configurations of SSL/VPN connections, troubleshooting Cisco ASAfirewalls and related network security measures.
  • Configuring static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation.
  • Experience working with Active Directory (as a centralized system) to automate network security management and user data.
  • Worked with Aruba Access point as a Public Wi-Fi and successfully implemented Wireless Access Point (WAP).
  • Experienced in working with Session Initiation Protocol (SIP) trunking for voice over IP (VoIP) to facilitate the connection of a Private Branch Exchange (PBX) to the Internet.

Environment: Cisco Catalyst 2960/3750/4500/6500 Series Switches, Linux, Cisco 2800/2900/3000 Series ISR's and Cisco 3640/ 0/3845/3600/2800 routers, SQL, Cisco ASA 5500, Juniper Ex switches, Active Directory, Juniper ACX series routers, Windows Server 2003/2008, ACL, SIP, RIP, OSPF, MPLS, BGP, EIGRP, Wi-Fi, LAN, MacAfee, WAN, WAP, IDS, IPS, Aruba WLAN, VPN, HSRP.

We'd love your feedback!