Network Engineer Resume
Pittsburgh, PA
SUMMARY
- 7+ years of experience in Networking and Security, including hands - on experience in providing network support, installation and analysis for a broad range of LAN/WAN/MAN communication systems.
- Hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Sub netting, VLSM, TCP/IP.
- Worked on Cisco IOS for configuration & troubleshooting of routing protocols: OSPF, EIGRP, RIP, BGP, BGPv4.
- Knowledge in advanced 802.11 wireless technologies.
- Configuring BGPv4, BGP Path Attributes, and Route Reflectors for an ISP transit network.
- Hands on experience in configuring Cisco Catalyst 2960, 3750, 4500, 6500 and Nexus 3000, 5000, 6000, 7000 series switches and Cisco 2600, 2800, 3600, 7600, 7200 series routers.
- Configuring BGP/OSPF routing policies and designs, worked on implementation strategies for the expansion of the MPLS VPN networks.
- Implemented VDC, VPC, VSS, VRF and OTV on the Nexus 5505, 6500 and 7009 switches.
- Experience in monitoring DATA CENTER chassis using UCS 6300 series, 6200 on FI like C-Series, B-Series server Blades.
- Install hardware such as switches, routers, and wireless devices.
- Experienced in SAN, LAN in DATA CENTER and VIRTUALIZATION of SERVERS.
- Level-1 Support for Juniper Networks customers and partners related to Juniper's M/T/MX series products deployed in the largest and most advanced IP networks in the world.
- Hands on experience with F5 & A10 Load balancers on client network.
- Responsible for Check Point, Palo Alto and Cisco ASA firewall administration across global networks.
- Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS) and deploying GRE Tunnel.
- DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
- Hands on experience on Power over Ethernet (POE) and Ether Channel.
- Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST,.STP features: Port Fast, Backbone fast, Uplink fast, BPDU Guard.
- Implementation of HSRP, VRRP, GLBP for Default Gateway Redundancy.
- Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
- Good knowledge and experience in Installation, Configuration and Administration ofWindows Servers 2000/2003, Active Directory, FTP, DNS, DHCP, TFTP, Linux OSunder variousLANandWANenvironments.
- Experience in Network Management Tools and sniffers like SNMP, Wire shark and Cisco works to support 24 x 7 Network Operation Center.
- Knowledge in documentation and updating client’s network documentation using Visio.
TECHNICAL SKILLS
Network Configuration: Advanced switch/router configuration (Cisco IOS access list, Route redistribution/propagation).
Routing Protocols: RIP, IGRP, EIGRP, OSPF, IS-IS, BGP v4, MP-BGP HDLC, PPP
Circuit switched WAN: T1/E1 - T3/E3/OCX (Channelized, Fractional & full).
Packet Switched WAN: ATM, FRAME RELAY, MPLS, ISDN.
Security Technologies: Cisco FWSM/PIX/ASDM, Checkpoint, F5 Load Balancer, Blue coat proxy server
Cisco Routers: Cisco 2500,2600,2800,3600,3800,4400,4300,7200,7600,ASR 1000,9000 series.
Redundancy and management: HSRP, VRRP, GLBP, RPR, NSF/NSR, Wireshark, Solarwinds, SNMP
Physical interfaces: Fast Ethernet, Gigabit Ethernet, Serial, HSSI, Sonet (POS)
Layer 2 technology: VLAN,RTP,STP, RSTP, PVST+, MST, PVLAN, Optimizing STP (Port Fast, Uplink Fast, Backbone Fast, Root Guard, BPDU Guard)
Layer 3 Switching: CEF, MLS, Ether channel (PAGP & LACP, Load Balancing)
Switches: Cisco 1900, 2900, IE2000, 3550, 3750, 3850, 4900, 6500 catalyst switches, Nexus 4K,6K,7K
Operating Systems: Microsoft XP/Vista/7, Windows Servers 2003/2008Windows MS-Office. Microsoft project server 2013
PROFESSIONAL EXPERIENCE
Confidential, Pittsburgh PA
Network EngineerResponsibilities:
- Worked on network remediation project, where upgraded all the switches with latest IOS’s and enabled SSH.
- Installation and configuration of CISCO 3850, CISCO 4400, CISCO 4300.
- Used internal network monitoring tools to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption.
- Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
- Multicasting, Route redistribution, Route Filtering using Distribute list
- IP Allocation for all applications and servers with high availability throughout the company.
- Configured firewalls as per requirement. Worked on Fortinet, CISCO ASA, Fortigate and Paul Alto firewalls.
- Provided help to client on Cisco VoIP products.
- Configure and implement voice gateways (MGCP/SIP), SRST for remote sites, CUCME and CUE distributed design.
- Provided help to client on troubleshooting Routers, Switches and VoIP products.
- Experience with TCP/IP (Ports and Services) and layer 2 switched networks (VLANS, STP, ACLs)
- Configured site to site VPN technologies.
- Ability to manages, Installs, maintains, and troubleshoots wired and wireless networks and infrastructure including: LAN, WAN, MAN switches, access points, wireless controllers, routers, fiber optic & UTP cabling
- Documenting Network status and assigning IP addresses.
- Design and configure of OSPF, BGP on Juniper Routers (MX960, MX480).
- Experience in Network Management Tools and sniffers like SNMP, Wire shark and Cisco works to support 24 x 7 Network Operation Center.
- Revised and Maintained LAN guide and developed VISIO diagrams for the same document. Experience in building network diagrams in VISIO.
Environment: CISCO 4400, CISCO 4300, CISCO 3850, CISCO 3750, Cisco Catalyst Switches, CISCO ASA 5540 Firewall, Check Point, EIGRP, OSPF, BGP, VLAN, Fortinet, Fortigate, Paul Alto firewalls.
Confidential, Dallas TX
Network EngineerResponsibilities:
- Experience with TCP/IP (Ports and Services) and layer 2 switched networks (VLANS, STP, ACLs)
- Installation and configuration of CISCO 3850, CISCO 4400, CISCO 4300.
- Implemented BGP.
- Created access lists for entire network.
- Key member of implementation, support and administration of firewalls per security policy.
- Installed 800+ CISCO IP phones and configured them accordingly.
- Configured SRST for remote site survivability on Cisco 2911 Gateways to insure against WAN outages.
- Modified route patterns to support external mask and setup call center agent 7940 IP phones with auto-answer.
- Managing AAA server like RADIUS and TACACS+ using Cisco ACS v4.2.
- Strong experience in Network security using ASA Firewall, Checkpoint, Palo Alto, Cisco IDS/IPS, AAA, and IPSEC/SSL VPN.
- Worked on design and implementation of Dial-plan for Inbound and Outbound calls in CUCM Clusters on Avaya phones.
- Security infrastructure engineering experience as well as a Microsoft Windows, UNIX, Checkpoint Firewalls, Juniper firewalls, PIX firewalls, Bluecoat Proxies, Juniper Intrusion Prevention devices, and wireless switch Security Management.
- Provisioned and Supported Existing infrastructure of Cisco Voice Adds, Moves, and Changes to Voice Gateways, CTI Agent, Cisco Switch,T1s, and Call Routing.
- Configure and implement voice gateway (SIP), CUCME and CUE distributed design.
- Documented Call Flows for the existing IVR treatment and provided solutions for new call treatment, such as self-service applications.
- Used internal network monitoring tools to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption.
- Performs cluster wide upgrades and security patches.
- Configuring and Maintaining TACACS+ for AAA.
- Configured and managed VLANs, 802.1Q Trunk, RPVST+, Inter-VLAN routing, HSRP and LAN security for Layer-2 and Layer-3 switching domains as per the organization's requirement plan.
- Configured site to site VPN technologies.
- Documenting Network status and assigning IP addresses.
- Revised and Maintained LAN guide and developed VISIO diagrams for the same document.
- Experience in building network diagrams in VISIO.
- Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
Environment: CISCO 4400, CISCO 4300, CISCO 3850, CISCO 3750, Cisco Catalyst Switches, CISCO ASA 5540 Firewall, Check Point, EIGRP, OSPF, BGP, VLAN
Confidential, Dallas TX
Network EngineerResponsibilities:
- Experience with TCP/IP (Ports and Services) and layer 2 switched networks (VLANS, STP, ACLs)
- Installation and configuration of CISCO 3750 switches, IE3000 and IE2000’s.
- Experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
- Key member of implementation, support and administration of firewalls per security policy.
- Used internal network monitoring tools to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption.
- Configured and managed VLANs, 802.1Q Trunk, RPVST+, Inter-VLAN routing, HSRP and LAN security for Layer-2 and Layer-3 switching domains as per the organization's requirement plan.
- Configured site to site VPN technologies.
- Documenting Network status and assigning IP addresses.
- Revised and Maintained LAN guide and developed VISIO diagrams for the same document.
- Experience in building network diagrams in VISIO.
- Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
Environment: CISCO 3000, CISCO IE2000, CISCO 3750, Cisco Catalyst Switches, CISCO ASA 5540 Firewall, Check Point, EIGRP, OSPF, BGP, VLAN
Confidential
Network Engineer
Responsibilities:
- Responsible for entire LAN and WAN maintenance and troubleshooting of the company network.
- Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements
- Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
- Worked with the data center planning groups, assisting with network capacity and high availability requirements
- Worked on CISCO IPS.
- Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments in data center
- Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 7010 5000 series to provide a Flexible access Solution for a datacenter access architecture
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 and creating OTV.
- Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer
- Involved in project planning, deploying and reviewing based on the requirements within the existing network
- Reviewing all changes to network configuration for technical accuracy and providing solutions to Multi-Protocol Network problems
- Configured and managed VLANs, 802.1Q Trunk, RPVST+, Inter-VLAN routing, HSRP and LAN security for Layer-2 and Layer-3 switching domains as per the organization's requirement plan
- Tested various BGP attributes like local preference, MED, Weight and replicated customer issues in the testing environment lab
- Routing protocol configuration such as OSPF, EIGRP and BGP, Router redundancy configuration (HSRP, VRRP and GLBP)
- Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
- Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
- Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
- Multicasting, Route redistribution, Route Filtering using Distribute list
- IP Allocation for all applications and servers with high availability throughout the company
- Configured ASA 5540 to ensure high-end security on the network with ACLs and Firewall
- WAN Technologies (PPP, Frame Relay, ATM, ISDN, Site to Site VPN)
- Provided application level redundancy and availability by deploying F5 6500 series LTM load balancers
- Involved in designing WAN infrastructure for redundancy in case of link failure
- Responsible for technical evaluation, troubleshooting, overall project management, problem solving and turn-up of the service with the ISP
- Created and designed network layout and documented network system design with detail information using Visio
Environment: Cisco 3750/3550/3500/2960 switches and Cisco 7200/3700/3600/2800/2600/2691 routers, NEXUS 5000,7010, CISCO ASA 5540 Firewall, Check Point, EIGRP, OSPF, BGP, VLAN, Cisco Packet tracer and GNS3 simulators for Network design, KIWI for Network Management
Confidential, Connecticut
Network Engineer
Responsibilities:
- Worked with Cisco Layer 3 switches 3750,4500,6500; Cisco Nexus 5596 and 7010 in multi VLAN environment with the use of inter-VLAN routing, creating OTV, 802.1Q trunk, ether channel.
- Worked on ISR Routers like 2900, 4000 series routers and ASR routers like 1000, 9000 .
- Configuring objects such as Load Balancer pools for local traffic management on F5 Load Balancers.
- Extensively used TCP/IP tool like TELNET for remote login to the routers and SSH for secure login.
- Implemented VMware ESX server to provide multiple virtual hardware platforms while keeping hardware costs and energy consumption low.
- Worked extensively on Cisco Firewalls, Cisco PIX &ASA 5500(5525/5585), Palo Alto 500 Series.
- Experience with Firewall Administration, Rule Analysis, Rule Modification.
- Experience with administering, troubleshooting and configuring / implementation (Cisco and Checkpoint) firewalls.
- Configured PVSTP+ for loop prevention and VTP for Inter-VLAN Routing.
- Set up VSS cluster, ether channel, VLAN trunking, VTP and inter-VLAN routing on 6506.
- Configure VDC and VPC and OTV on Nexus 7010 and Nexus 5596.
- Configures and managed Nexus 2248 and 2400 series of wireless controller.
- Implemented port aggregation & link negotiation using LACP and PAGP.
- Configured site to site VPN technologies using IPSEC.
- Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location of office on the switched Network.
- Worked with Routing Protocols of OSPF, and BGP.
- Worked on F5 BIG-IP LTM 6900, configured profiles, and provided and ensured high availability
- Worked on F5and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance and F5 TMOS architecture.
- Nexus platforms - 6004, N3048. N3064, 5596, 3132
- Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance, troubleshooting etc.)
- Worked for change management procedure and implementation of configuration changes during non-production window
Environment: Cisco Routers: 7600,7200,3800,3700,2800,2500. Cisco Catalyst Switches 6500,4500,3500,3750,3850.Nexus Switches:2240, 2248,5596,7010.Palo Alto 200.Cisco ASA 5500,Cisco PIX 535,525. Juniper routers M series. Routing protocols: OSPF, BGP. Switching: VTP, VLAN,PVSTP+ and 802.1Q trunking. Sniffer tools: Ethereal and sniffer pro, F5,BIG-IP;Wire shark, MS Visio.
Confidential
Network Engineer
Responsibilities:
- Configured CIDRIP RIP, PPP, BGP and OSPF routing.
- Involved in the configuration & troubleshooting of routing protocols: BGP, MP-BGP, OSPF, LDP, EIGRP, BGP v4. Configured IP access filter policies.
- Identify, design and implement flexible, responsive, and secure technology services
- Experience with Firewall Administration, Rule Analysis, Rule Modification
- Troubleshoot traffic passing managed firewalls via logs and packet captures
- Configured and resolved various OSPF issues in an OSPF multi area environment.
- Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team. The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.
- Worked with telecom vendors in regards to network fault isolation.
- Worked on cisco security management.
- Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
- Installed different software on the systems. Install and managing network devices including Hubs, Switches.
- Layer 2 switching technology architecture, implementation and operations including L2 and L3 switching and related functionality. This includes the use of VLANS, STP, VTP and their functions as they relate to networking infrastructure requirements including internal and external treatment, configuration and security.
- Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
- Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope
- Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
- Estimated Project costs and created documentation for project funding approvals.
- Planned resources and presented project status to higher management.
- Deployed 7613 as PE and CE router and Configured and troubleshoot the Edge Routers.
- Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
- Ability to analyze, configure and troubleshoot networks
Environment: Cisco 3550/3500/2950 switches, Cisco 3845/3600/2800 routers, Net Flow, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, SUP720, Ether Channels, Fluke and Sniffer.
Confidential
Network Engineer
Responsibilities:
- Reviewing all changes to network configuration for technical accuracy and providing solutions to Multi-Protocol Network problems
- Troubleshot main fiber-optic line disconnecting problems, solved network equipment errors and problems and provided equipment replacement solutions without affecting services, addressed data center problems and designed backup plans.
- Configured CISCO 2800, 2900 routers.
- Installed communication rack for field testing.
- Installed and maintained various network services and related equipment and devices.
- Oversaw software security procedures and restored protocols.
- Ensured that backup systems were properly maintained and prepared.
- Supported network and computing infrastructures.
- Responded to reports of network problems