We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

Pittsburgh, PA

SUMMARY

  • Network Engineer with around 8 years of experience in testing, troubleshooting, implementing, optimizing and maintaining enterprise data network and service provider systems.
  • Strong hands - on experience on Cisco Catalyst (3550, 3750, 6500) series switches, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers, ASA Firewall (5505/5510), Load Balancers F5 LTM/GTM, Cisco Works, HP Open View, Solar Winds, Sniffer, Palo Alto Networks Firewall models (PA-2k, PA-3K and PA-5K).
  • Expertise in design, configuring, supporting and administrating Data Centers, Cisco routers, switches, Nexus switches, Load balancers (F5) and firewalls.
  • Strong hands on experiences Cisco Routers 4300, 4400, 4500, 2900, 3800, Switches 3850, 4500, 9300, 9400, 9500, 6500, 6800 series.
  • Hands-on experience in installing, configuring and administration of Firewalls including Cisco PIX, Cisco ASA, Checkpoint, Palo Alto and Load Balancers like Big-IP F5 (LTM and GTM).
  • Performed routine monitoring of Checkpoint firewall from the security perspective and troubleshooting the connectivity issues.
  • Knowledge on Juniper SRX220, SRX240 and SRX550, Fortinet 200D series firewalls.
  • Worked on Cisco ACI, Configuration and operations support on various Tenants, Bridge Domains, EPG’s, VTEPS, VNI, VRF. Experience with VXLAN overlay and IS-IS underlay using Nexus 9k spine and Leaf switches.
  • Utilized Cisco Firepower policies to manage applications, Snort rules, and URL blocking.
  • Cisco ASA security appliances including Source Fire, Firepower services and Firesight Management Console.
  • Expertise in installing, configuring and troubleshooting Juniper Routers (MX-480, MX960) and Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200) series.
  • Experience with design and implementation of Virtual Switching System (VSS) for both User segment and server segment using 6509 catalyst switches
  • Proficient in Cisco IOS installation, up-gradation and Configuring, Troubleshooting routing protocols like RIP, EIGRP, OSPF, BGP (E-BGP, I-BGP).
  • Experience with Cisco and Aruba wireless LAN controllers. Configuration of AP groups, profiles, IAP, RF parameters, 802.11a,b,c,g,n,ac protocols, 2.4 and 5GHz. Worked on BYOD policies. Integrated with Cisco ISE for 802.1X Authentication.
  • Knowledge of Cisco Meraki Cloud managed Switches (MS250, MS350, MS410) and SD-WAN (MX 65, MX100, MX400).
  • Worked on F5 LTM, GTM and APM modules, Citrix NetScaler’s for Application Load balancing. Migration from Cisco ACE and GSS to F5 and NetScaler’s. Worked on multiple business-critical applications like Citrix VDI, Exchange, Skype for Business, ADFS for load balancing.
  • Expertise in configuring and troubleshooting complex layer 2 technologies such as VLANs, VTP, Ether Channels, Spanning Tree Protocol STP, RSTP and MST and redundancy protocols like HSRP, VRRP, GLBP.
  • In-depth knowledge and experience working with other protocols like TCP/IP, OSI model, DHCP, DNS, SMTP, IMAP, FTP, WAN, LAN, NAT, PAT, ACL, VLANs, Trunking using 802.1Q, IPv4, IPv6, LDAP, HTTP, HTTPS, UDP, VOIP, QOS.
  • Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
  • Troubleshot documented and installed a variety of equipment Arista switching fabric, Fortinet firewalls.
  • Configuration and maintenance of Fortinet Firewalls and switches.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN, Trunks, VTP Ether channel, STP, RSTP, and MST.
  • Provided administration and support on Bluecoat Proxy and Zscaler Cloud Proxies for content filtering and internet access between site and VPN client users.
  • Advanced knowledge, design, installation, configuration, maintenance and administration of Checkpoint Firewall R55 up to R77, Secure Platform Installation, VPN.

TECHNICAL SKILLS

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP

Router platforms: Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 6807 series), Nexus 7K, 5K, 2K & 1K.

Switch platforms: Cisco 2900XL, 2950, 2960, 3560, 3750, 4500 and 6500, Nexus (2K, 5K, 7K and 9K)

Juniper Platforms: SRX, MX, EX Series Routers and Switches

Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall: Cisco Firewalls (ASA 5505, 5510), Palo Alto Networks (PA 220, PA820, PA-2K, PA-3K and PA-5K). Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580 ), McAfee Web Gateway, Checkpoint.

Network Management/Monitoring: Solar winds, HP NNMi 8xi (Network Node Manager), NPM, NCM, IPAM, Net flow and Cisco prime, Ethereal / Wireshark.

Simulation Tools: GNS3, Confidential, OPNET IT GURU, OPNET Modeler, Cadence

Load Balancers: F-5 BIG-IP LTM 2000, 3900, 5000, 6400, 6800 AND 8900. F5 i5000 NetScaler (Citrix), Cisco ACE

WAN technologies: ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Security Protocols: IKE, IPsec, SSL, AAA, Access-lists, prefix-lists, SSL-VPN

Networking Protocols: RIP, OSPF, EIGRP, BGP, ISIS, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6, Multicasting

Operating System: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR, IOS-XE, NX-OS

Security Technologies: PAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint

Features & Services: IOS and Features, HSRP, GLBP, VRRP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR’s, HLD and LLD documents, Dell equal logics

PROFESSIONAL EXPERIENCE

Confidential, Pittsburgh, PA

Senior Network Engineer

Responsibilities:

  • Configuring EIGRP, OSPF and BGP on Cisco routers. L3 switches as well as Nexus environment.
  • Implemented the Policy Rules, DMZ and Multiple VDOM's for Multiple Clients of the State on the FortiGate Firewall.
  • Extensive use of Cisco Routers and Switches by using LAN & WAN routing protocol EIGRP, OSPF and BGP to manage network infrastructure worked with any complex routing and switching issues.
  • Experience working with Nexus 7010, 5020, 2148, 2248 devices
  • Planned and migrated from ESX 2.5.1 servers to NSX 3.0 in Pulix's lab environment.
  • Setup separate ESX 3.0 environment to facilitate the migration from NSX 2.5.1
  • Configured and maintained F5 load balancing Big-IP devices for Local Traffic Management (LTM) and WAN Optimization (WOM)
  • Blacklisting and Whitelisting of web URL on Panorama.
  • Knowledge on different kinds of cables used to connect different devices in data centers and within the industry.
  • Work on the IronPort for the log files, routing protocols.
  • Experience with theInstall infbox.
  • Installed and configured Meraki (MX80, MX60) Appliance via Meraki MX400 Cloud. Installed and configured Cisco Meraki (MR66, MR74, MR84) wireless Access points in the warehouses.
  • Worked on the implementation of Cisco Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings.
  • Extensively worked on TCP/IP protocols and transport protocols like TCP and UDP.
  • Implemented Site-to-Site VPNs over the internet utilizing security standards such as 3DES, AES/AES-256 with ASA 5580 Firewalls.
  • Worked on implementation of the basic F5 LTM (Local Traffic Manager)
  • Configuring, Administering and troubleshooting the Checkpoint.
  • Managed a team with several team members to Upgrade ASA's from 8.x to 9.x, Install Firepower and Fire AMP for Endpoints, Sourcefire.
  • Installed and configured Firepower Management Center 6.0 on Confidential and added ASA Sourcefire Agents as well as Firepower NGIPS for monitoring and management.
  • Managed companies Wireless Infrastructure includes to create new SSID, Flex/HREP in WLC.
  • Managed Palo Alto/ASA Firewall for security policies and rule base of security control points, device mapping using network address translation, objects management, other administrative tasks.
  • Worked with LAN protocols (VLAN, VTP, STP, RSTP, MST) & Port Channel Protocols (LACP, PAGP).
  • Installed FortiGate’s 100E, 6000 & 60E, Fortinet, Forti Manager & Forti Analyzer & utilizing F5 Load Balancing with LDS and BIG, IP.LTM & GTM.
  • Created and configured management reports and dashboards using Fortinet and FortiGate manager.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a data center access architecture Expertise in installing, configuring and troubleshooting Juniper EX Switches EX2200, EX2500, EX3200, EX4200, EX4500 series
  • Worked with LAN protocols (VLAN, VTP, STP, RSTP, MST) & Port Channel Protocols (LACP, PAGP).
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a data center access architecture Expertise in installing, configuring and troubleshooting Juniper EX Switches EX2200, EX2500, EX3200, EX4200, EX4500 series
  • Installed and configured CISCO ASA and Checkpoint firewall.
  • ASA/PA firewall Log Maintenance and Policy Maintenance. Troubleshooting complex Checkpoint issues, Site-to-Site VPN related.
  • Implemented the Inter VDOM Routing through the FortiGate Firewalls and the Router.
  • Responsible for enabling BGP peering relationships and debugging BGP routing problems.
  • Experience with LTM F5 component to provide High Availability with providing services across data centers.
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN.
  • Experience with migrating the Partner IPSEC VPN tunnels from one data center to another.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500 with ACL, NAT, Object Groups, Failover, Multi-Contexts.

Environment: Cisco routers (7600, 3800, 2800) and Cisco switches (6500, 3700, 4900, 2900), Nexus (7K, 5K & 2K), Data Centers, FEX, Routing Protocols (EIGRP, OSPF, BGP), ASA, Palo Alto, Fortinet, F5 load balancing, STP, VLAN, MD5, 3DES, AES, OTV, CitrixVLANS, SNMP, NAT, cisco IO, HSRP, VLAN trunking 802.1Q, F5 Networks Big IP, CISCO ASA and Checkpoint firewall, Palo Alto 3000, 5000 series.

Confidential, Northfield, IL

Senior Network Engineer

Responsibilities:

  • Configured Checkpoint and Cisco ASA firewalls to secure the infrastructure for the Data Center.
  • Configured VDC (Virtual Device Context) for Nexus 7010 Switch.
  • Experience with industry-recognized SIEM solutions such as ArcSight, Splunk, LogRhythm, AlienVault, etc
  • Provided L2 & L3 network support, Building configurations for Juniper EX 3300 and EX 4200 switches with features like port security, VLANs, VTP, and PVST+. Worked on SRX service gateways and MX Platform routers.
  • Worked on Juniper J series j230, M 320 routers and EX 3200 series switch.
  • Was part of the LAN/WAN development (IP address planning, designing, installation, configuration, testing, and maintenance and troubleshooting issues) team.
  • Remote implementation of Palo Alto firewalls PA-500 and PA 200 firewalls
  • Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
  • Experience in Designing and assisting in deploying enterprise Wide Network Security and High Availability Solutions for ASA.
  • Monitors data center devices, equipment's (HVAC, Servers, other devices) local & remote sites
  • Includes installation, testing, upgrading, loading patches, troubleshooting both physical and virtual environments
  • Involved & handled Aruba environment built out of Cisco 7K/5K/2K.
  • Drafted and installed Checkpoint Firewall rules and policies.
  • Configuring, Administering and troubleshooting the Checkpoint.
  • Worked on F5 GTM, configuring Wide IPs and pools to load balance the client traffic between the two data centers
  • Upgrading Palo Alto Firewalls, Cisco Routers, Nexus Switches, F5 Load Balancers and Bluecoat proxy devices
  • Used BluecoatProxySG Appliances to effectively secure Web communications and accelerate the delivery of business applications.
  • SupportBluecoatProxyin an explicit mode for users trying to access the Internet from Corp Network
  • Linux System Administration (RHEL/CentOS/Scientific Linux 6)
  • Knowledge with following Citrix infrastructure components: Web interfaces, PNAServer, NetScaler setup and administration, License Server management, Edgesight. Management and configuration of RSA SecurID Server
  • Some familiarity with Zabbix, AWS, Git, Nginx, Ansible
  • Assisted with the transition from the current Cisco ASA FW platform to the Cisco Firepower FPR 4150 NGFW
  • Planning, Designing and implementing Network and security solutions like Firewalls (Palo Alto, Check Point, ASA), Data Center Switching, Bluecoat Proxy and F5 Load Balancers
  • Implemented the policy rules and DMZ for multiple clients of the state on the FortiGate firewall.
  • SSL offloading on F5 LTM's worked on both the server SSL profiles and client SSL profiles
  • Troubleshooting VIPs and SSL certificates issues that were encountered at the time of deployment or in production
  • Configured the F5 LTM both by the GUI and tmsh scripts
  • Configuring and troubleshooting perimeter security devices such as Checkpoint R77 Gaia, Secure Platform, Palo Alto and ASA Firewalls.
  • Upgraded distribution switches 6509 to Nexus 7010 with Sup1.
  • Configured dynamic routing protocols such as EIGRP, OSPF, BGP and switch management on Cisco 6500, 2800, 2900, 3750, 3900 series.
  • Responsible for enabling BGP peering and customer sessions and debugging BGP routing problems.
  • Configured VRF on tF5 LTM 6900
  • Excellent experience with FTP, TFTP, DHCP configuration and its setup.
  • Monitor and responsible for access control to theDataCenterto prevent unauthorized access.
  • Understanding the JUNOS platform and worked with JUNOS upgrade of Juniper devices.
  • Used load balance applications based on the addition to completing the SANS Top 20 Controls within a Scrum Agile Team.
  • Install, configure and maintain Fortinet Version 4.0. to 6.0.
  • Managed multiple Fortinet Firewalls using Forti-manager.
  • Configured Nexus 7K, 5K, 2K switches in the data center for hosting various servers
  • Hands-on experience with issues related to security like NAT, IP sec, ACLs
  • Used Net scalar for quality of service (QoS), offloading
  • Used Network analysis tools like Packet Sniffer and Wireshark for troubleshooting the network.

Environment: Cisco routers (7200, 3800, 2800) and Cisco switches (6500, 3700, 4900, 2900), Nexus (7K, 5K & 2K), Data Centers, LAN/WAN, Routing Protocols (EIGRP, OSPF, BGP), ASA, FortiGate, Palo Alto, F5 load balancing, VRF, VPN, IPSec, Citrix, NetScaler.

Confidential, Boston, MA

Senior Network Engineer

Responsibilities:

  • Installation & Configuring of Cisco 6500, 4500, 2800, 1800 and 1700 series router.
  • Worked Extensively on Cisco Firewalls, Cisco ASA 5500(5510/5540) Series.
  • Implemented inter-VLAN routing (on Nexus and Catalyst switches) among the VLANs to allow.
  • Monitoring servers like domain controllers, exchange servers and connectivity.
  • Managed network connectivity and network SSL Security, between Head offices and Branch office
  • Configuring STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.
  • Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, Frame Relay, NAT, DHCP, TCP/IP).
  • Implemented rules on Juniper SRX 550 at the server farm.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Provided firewall policy configuration and services with ASA 5500 series.
  • Configured Aruba access points troubleshoot connectivity issues with Aruba access points.
  • Configured Checkpoint and Cisco ASA firewalls to secure the infrastructure for the Data Center.
  • Configured VDC (Virtual Device Context) for Nexus 7010 Switch.
  • Provide support to internal users and external clients on various hardware and software issues. Experience with industry-recognized SIEM solutions such as ArcSight, Splunk, LogRhythm, AlienVault, etc
  • Configuring various advanced features (Profiles, monitors, Redundancy, SSL Termination, Persistence, SNATs, HA on ACE appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands-on with ACE LB.
  • Configured Access List (Standard, Extended, and Named) to allow users all over the company to access different applications and blocking others.
  • Monitors data center devices, equipment's (HVAC, Servers, other devices) local & remote sites
  • Used load balancers ACE and load balancing technique with multiple components for efficient performance and to increase reliability through redundancy.
  • Environment: Router series (2800, 3800, 7200) and switch series (3750, 3550, 4509E, 6509E), CSR routers, ASR Routers, Routing Protocols (EIGRP, OSPF, IS-IS, BGP), Switching protocols (VTP, STP), Site to Site VPN, Remote Access VPN.
  • Responsible for developing and deploying Solar Winds which includes WAN/LAN and server monitoring.
  • Reporting, and alerting and Configure Orion alerts.
  • Performed IOS upgrades/Password recover on 2900, 3500 series Cisco Catalyst switches and 1800, 2600, 3600, ASR, Nexus series Cisco routers.
  • Implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, and Ether channel, STP, RSTP and MST.

Environment: Cisco routers Series 7200/7600/3800 , ASR 7000/9000; Cisco Catalyst switches 6500/5000/3500/2950 and Nexus 7K; Juno OS, Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP; VPN, MPLS, HSRP, GLBP, Big-IP F5 LTM Load Balancer, ACE 4400, Ansible, Python scripting, Wireshark, PowerShell, Cisco Works, MS Visio, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy.

Confidential, Austin TX

Network Engineer

Responsibilities:

  • Implementing, configuring, and troubleshooting various routing protocols like RIP, EIGRP, OSPF and BGP.
  • Performed Troubleshooting and monitored routing protocols such as OSPF, EIGRP and BGP.
  • Involved in customer escalations and troubleshooting issues related to connectivity, STP, VLAN, Trunking, VTP, Layer 2/3 switching, Ether channels, Inter-VLAN routing, log messages, high CPU utilization and parameters that can degrade the performance of the network.
  • Familiar with Networking tools like CISCO IOS, Wireshark, Ping, Traceroute, Speed Test.
  • Designing and deploying solutions for frozen requirements using Cisco Routers and Switches for the network infrastructure to meet the requirements.
  • Gained hands-on experience with VLSM, STP, VTP, VLAN Trunking
  • Configured Cisco IOS Feature Set, NAT and samples Network management protocol (SNMP) for Network security implementation.
  • Having strong Knowledge with Cisco 1921/k9, 3750, 1800 series routers & 2950, 2960 series switches, Nexus 2k, 5k, 7k.
  • Configuring STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.
  • Configured VLANs on multiple catalyst switches performed troubleshooting on TCP/IP network problems, Administered Frame-Relay and networks.
  • Performed IOS upgrades/Password recover on 2900, 3500 series Cisco Catalyst switches and 1800, 2600, 3600 series Cisco routers using TFTP.
  • Implemented VTP and Trucking protocols (802.1q and ISL) on 3560, 3750 and 4500 series Cisco Catalyst switches.
  • Implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, and Ether channel, STP, RSTP and MST.
  • Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
  • Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, Frame Relay, NAT, DHCP, TCP/IP).
  • Configured Access List (Standard, Extended, and Named) to allow users all over the company to access different applications and blocking others.

Environment: Cisco routers (1900, 3800, 2800) and Cisco switches (6500, 3700, 4900, 2900), Data Centers, LAN/WAN, Routing Protocols (EIGRP, OSPF, BGP), (STP, RSTP, HSRP).

Confidential

Junior Network Engineer

Responsibilities:

  • Monitored the performance of the network devices. Performed Troubleshooting and observed directing conventions such as OSPF, EIGRP & BGP.
  • Installation and configuration of the Network of Cisco Router and Switches for EIGRP and VLANs etc.
  • Worked on the Cisco switches 2950, 3560 and the Cisco routers 2500, 2600, 2800.
  • Initially involved in installations, technical support, troubleshooting and maintenance of network equipment.
  • Good knowledge in Configuring Access Control List(ACL).
  • Configured VLANs on different impetus switches performed investigating on TCP/IP system issues, Administered Frame-Relay and systems.
  • Configured IPv4 VPNs using IPSec VPNs.
  • Worked on WAN and LAN infrastructure. Worked on Cabling in IDF/MDF and in Data centers with Copper and Fiber.
  • Managed system backup and restoration protocols. The escalating issue to higher network teams.

Hire Now