We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

Littleton, CO


  • Network Engineer wif 8 years of experience in testing, troubleshooting, implementing, optimizing and maintaining enterprise data network and service provider systems.
  • Strong hands on experience on Cisco Catalyst (3550, 3750, 6500) series switches, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers, ASA Firewall (5505/5510), Load Balancers using Cisco ACE, F5 LTM/GTM, Security Device Manager (SDM), Cisco Works, HP Open View, Solar Winds, Sniffer, Palo Alto Networks Firewall models (PA - 2k, PA-3K and PA-5K).
  • Experience in Cisco: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay & MPLS), Routing protocol configurations (EIGRP, OSPF, BGP)
  • Proficiency in teh configuration of VLAN setup on various CISCO Routers and Switches.
  • Hands-on configuration and experience in setting up Cisco routers to perform functions at teh Access, Distribution, and Core layers.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP, and MST.
  • Access control server configuration for RADIUS & TACAS+.
  • Working configuration of new VLANs and extension of existing VLANs on/to teh necessary equipment to have connectivity between two different data centers.
  • Implementation, working analysis, troubleshooting and documentation of LAN, WAN& WLAN architecture wif excellent work experience on IP series.
  • Experienced working on network monitoring and analysis tools like SOLAR WINDS, CISCO works and RIVER BED and Wireshark. Extensive experience in configuring and troubleshooting of protocols RIP v1/v2, EIGRP, OSPF, BGP, and MPLS.
  • Well experienced in configuring First Hop redundancy protocols like HSRP, GLBP, and VRRP.
  • Excellent communication skills, enthusiastic, motivated and a team player.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, BGP v4, MPLS, switching (VLANS, VTP Domains, STP, and trunking).
  • Implementation and maintained Sourcefire intrusion detection/ prevention (IDS/IPS) system to protect enterprise network and sensitive corporate data. For Fine-tuning of TCP and UDP enabled IDS/IPS signatures in Firewall
  • Worked on configuring teh Nexus 5K Aggregation Switch and Nexus 2K Fabric Extenders.
  • Implemented VDC, VPC, and OTV on teh Nexus 5K and 7K switches.
  • Quality and detail focused Linux systems engineer wif specialty in design of F5LTM and GTM/Wide IP load balancing solutions in global enterprise networks.
  • Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2500, EX3200, EX4200, EX4500,EX8200series) Juniper Routers(E, J,M and T-series) and Juniper SRX Firewalls
  • In-depth noledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Experience in installing and configuring DNS and DHCP server.
  • Experience in CheckPoint IP Appliances R65, R70, R75, R77 &Cisco ASA Firewalls.
  • Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1
  • Provide L3 support for checkpoint and Palo Alto firewalls.
  • Involved in teh integration of F5 Big-IP load balancers wif CheckPoint firewalls for firewall load balancing and was responsible was troubleshooting and maintenance.
  • Provided administration and support on Bluecoat Proxy for content filtering and internet access between site and VPN client users.
  • Deployment and Management of Bluecoat proxies in teh forward proxy scenario as well as for security in reverse proxy scenario.
  • Performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s.
  • Proficient in using Solar Winds Network Management tools like Network Performance Monitor (NPM), Netflow Traffic Analyzer, Network Configuration Manager (NCM) and Cisco Prime.
  • Provide 24/7 support.


Router platforms: Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 6807 series), Nexus 7K, 5K, 2K & 1K.

Switch platforms: Cisco 2900XL, 2950, 2960, 3560, 3750, 4500 and 6500, Nexus (2K, 5K, 7K and 9K)

Juniper Platforms: SRX, MX, EX Series Routers and Switches

Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall: Juniper Netscreen 6500, 6000, 5400, Juniper SSG, SRX5600, SRX5800, CheckPoint (NGX, R65, R70 and R71), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo Alto Networks (PA-2K, PA-3K and PA-5K).

Network Management/Monitoring: Solar winds, HP NNMi 8xi (Network Node Manager), Net flow and Cisco prime, Ethereal / Wireshark, TCP Dump.

Load Balancers: F-5 BIG-IP LTM 2000, 3900, 5000, 6400, 6800 AND 8900, Bluecoatt SG8100, AV 510.

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Security Protocols: IKE, IPsec, SSL, AAA, Access-lists, prefix-lists, SSL-VPN

Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System: Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix


Confidential, Littleton, CO

Sr. Network Engineer


  • Deployed and maintained security/network devices and data centers for Service provider network.
  • Involved in teh configuration & troubleshooting routing protocols like MP-BGP, OSPF, LDP, EIGRP, BGP v4, and MPLS.
  • Hands on experience on F5 BIGIP LTM
  • F5 Loadbalancer Design, Implementation and management
  • Experience wif Installing and troubleshooting Data center migration wif 24/7 support.
  • Expert in configuring Cisco Routers, Catalyst Switches, Nexus Switches.
  • Upgraded Cisco 6500, 3750, 2960s, Nexus 5000, Nexus 2000 and Nexus 7000 switch software.
  • Worked extensively wif ASR 9K(9010 9922), Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches.
  • Creating object, groups, updating access-lists on Check Point Firewall, apply static, hide NAT using smart dashboard.
  • Orchestrated a LDAP remediation critsit for a major international manufacturer conglomerate dat had an expiring SSL certificates for a critical legacy non-compliant application and leveraged F5SSL Offloading until their critical apps and encryption methods were updated.
  • Monitor performance of network appliances and WAN utilizing using network analyzer like Wireshark.
  • Experience wif teh connectivity of Cisco Networking Equipment wif F5 Load Balancer.
  • Implemented Zone-Based Firewalling and Security Rules on teh Palo Alto Firewall.
  • Administered Checkpoint Firewalls of R65 and R70 clusters.
  • F5 GTM Advisory role for GTMupgrade for a major Security Monitoring Services provider.
  • Configuration and providing management support for Palo Alto and Checkpoint Firewalls (R75, R76 and R77).
  • Configuration, Troubleshooting, and Maintenance of Palo Alto Firewalls (36+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Managed, Created, Troubleshoot Issues on CheckpointSPLAT Version.
  • Successfully configured and maintained Site to Site IPSEC and SSL VPN's on Palo Alto firewalls.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
  • Helped installed F5 VIPRION load balancers for one of our new data centers.
  • Configured Cisco ISE for Wireless and Wired 802.1x Autantication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
  • Implementing and Managing VPN Networks of teh Customer through CheckpointR75 firewalls.
  • Monitor and troubleshoot BGP, EIGRP, TI circuits, and cellular backup circuits via ICMP and SNMP ticketing systems.
  • Working on Cisco 6509 and 4507 series switches for LAN requirements dat include managing VLANs, Port Security and troubleshooting LAN issues.
  • Implementation of various protocols like OSPF, BGP and STP.
  • Blacklisting and Whitelisting of web URL on Blue Coat Proxy servers.
  • Provided administration and support on Bluecoat Proxy for content filtering and internet access between site and VPN client users.
  • Worked on design, configuring and managing of Blue Coat Proxy Servers.
  • Deploying Cisco ASA and Bluecoat ProxySG (Web Security Appliance) S170 for URL Filtering Policies.
  • Worked on Blue Coat Proxy SG to safeguard web applications (Blacklisting and Whitelisting of web URL) in extremely untrusted environments such as guest Wi-Fi zones.
  • Managed CheckpointFirewalls using Multi Smart Domain Manager, Juniper wif Network Security Manager, Cisco wif Cisco ASDM, Palo Alto wif Panorama.
  • Adding agents (IDS/IPS) at Host and Network level to Sentinel.
  • Working on Enterprise AV Solutions, IDS\IPS, Firewalls, and SIEM (IBM QRadar\HP ArcSight) tools.
  • Expertise in networking technologies like LAN, MAN, WAN and peripheral devices.
  • Develop Engineering Documentations to record F5 environment and change processes LTM/iRules.

Environment: Juniper routers and switches, Cisco routers 7200; Cisco Catalyst switches 6500, 4500, 2950; Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP; STP, VTP, VLAN; VPN, MPLS, HSRP, GLBP, Big-IP F5 Load Balancer, Cisco Works; MS Visio, Checkpoint, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy.

Confidential, Las Vegas, NV

Sr Network Engineer


  • Security infrastructure engineering experience as well as a Microsoft Windows, UNIX, Juniper firewalls, Palo Alto firewalls, Bluecoat Proxies, Juniper Intrusion Prevention devices, and wireless switch security management.
  • Global Traffic Management: Designed and implemented F5 GTMtechnologies providing continuous systems availability for critical Marriott applications support located at diverse data-centers in support of teh (IACA) project.
  • Drafting and Installation of CheckpointFirewalls rules and policies.
  • Adding Rules and Monitoring Checkpoint Firewalltraffic through Smart Dashboard and Smart View Tracker applications.
  • F5 LTM Advisory role for an upgrade for a Dallas area financial institution.
  • Administering and evaluating firewall access control requests to ensure dat these requests are compliant wif client's security standards and policies.
  • Update & Follow Up CheckpointIPS Signature Packages occasionally.
  • Configuration and support of Juniper NetScreen firewalls and Palo Alto firewalls.
  • Successfully installed Palo Alto PA-3060 firewall tan configured and troubleshot using CLI and worked wif Panorama management tool to manage all Palo Alto firewall and network from central location.
  • Implemented Zone-Based Firewalling and Security Rules on teh Palo Alto Firewall.
  • Administer Palo Alto Firewalls to allow and deny specific traffic and to monitor user usage for malicious activity and future QoS.
  • Consultant for Security (implementation, administration) on Checkpoint Firewall, Network Management.
  • Configuring rules and Maintaining Palo Alto Firewalls& Analysis of firewall logs.
  • Maintaining Checkpoint security policies including NAT, VPN, and Secure Remote access, Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Configuring Juniper NetScreen Firewall Policies between secure zones using Network Security Manager (NSM).
  • implemented an F5-ASM solution for a major online retailer who never had a web application firewall in their environment and required a Web Application Firewall to meet PCI compliance
  • Configuration of Palo Alto Next-Generation Firewall mainly creating security profiles and VSYS according to client topology.
  • Configuration and installation of Palo Alto Networks 5050 application firewalls (NGFW).
  • Expertise in Palo Alto design and installation for Application, URL filtering, Threat Prevention and Data Filtering.
  • Configuring Checkpoint Firewallin IPSO, Secure Platform and GAIA platforms.
  • Maintained and updated Active Directory for autantication purposes.
  • Configuration and troubleshooting F5 LTM, GTM series like 6600, 6800 for different applications and monitoring teh availability.
  • Deployment of data center LAN using Nexus 7k, 5k, 2k switches.
  • I was involved in migration projects, which involves replacing legacy devices to new Nexus devices and introduced VPCs in teh new architecture.
  • Worked on Nexus platform 7k series, 5K series (5548, 5020 and 5010), 2248 and successfully implemented VSS on teh Cisco catalyst switches.
  • Used FireEye to detect attacks through common attack vectors such as emails and webs.
  • Gained experience on working wif migration to Check Point and Palo Alto next-generation firewalls.
  • Managed successful delivery of massive security response portfolio including Splunk and Cisco ISE.
  • Implemented and administered Websense Web Security Gateway for web content filtering and DLP.
  • Improved network and system security through setup and ongoing maintenance of Riverbed IPS and FireEye.
  • Firewall deployment, rules migrations, firewall administration and converting existing rule-based onto new Checkpoint and Palo Alto Next-Generation Firewall platforms.
  • Worked primarily as a part of teh security team and daily tasks included firewall rule analysis, rule modification, and administration.

Environment: Juniper SRX5400, SRX5600, and SRX5800 and Palo Alto PA-3060 & 5050 Firewalls, Bluecoat Proxies, Juniper IPD, Juniper NSM, Panorama, F5 LTM, GTM 6600, 6800, Nexus (2K, 5K, 7K and 9K), Splunk, Cisco ISE, Websense, Solar Winds NPM.

Confidential, Dallas TX

Sr Network Engineer


  • Day-to-Day work involves scheduling firewall policy provisioning and working wif users to identify connectivity related issues and troubleshoot using both Smart Utilities and CLI.
  • Managing and administering Juniper SRX and Checkpoint Firewalls at various zones including DMZ, Extranet (Various Business Partners) and ASZ and internal.
  • Troubleshooting Checkpointissues, Site-to- Site VPN related.
  • Implementing Security Solutions in Juniper SRX and NetScreen SSG firewalls by using NSM.
  • Juniper Firewall Policy management using NSM and Screen OS CLI.
  • Daily technical hands-on experience in teh configuration, troubleshooting of Juniper SRX firewalls as well as experience working directly wif teh customer in a service/support environment.
  • Troubleshooting Firewall Connectivity related issues using Smart view tracker on Checkpoint, NSM Log viewer for Juniper Firewalls.
  • Install, configure, manage and troubleshoot Cisco SourceFire IPS appliances and defense Center.
  • Creating and provisioning Juniper SRX firewall policies.
  • Worked wif JUNOS OS on Juniper Routers and Switches.
  • Experience on ASA firewall upgrades to 9.x.
  • WebsenseWeb Security Gateway Installation, Upgrade & Configuration 8.4
  • Configured Panorama web-based management for multiple firewalls.
  • Worked on configuration, maintenance and administration of Palo Alto PA3000 Firewalls and migrating customers from Cisco ASA to Palo Alto in HA network.
  • Configuring rules and Maintaining Palo Alto Firewalls& Analysis of firewall logs using various tools.
  • Understand teh flow of traffic through teh Check Point Security gateway cluster and troubleshoot connectivity issues using advanced troubleshooting from Command Line Utilities.
  • Install and configure Bluecoat Proxy SG in teh network for web traffic management and policy configuration.
  • Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and providedL3support for routers/switches/firewalls.
  • Configuring and deploying Cisco ASA 5505; Cisco 594/294; I500 web sense manager at customer locations wif minimum downtime possible.
  • Active/Standby and Active/Active HA configuration on Cisco ASA Firewalls.
  • Configuring rules and maintaining Palo Alto firewalls and analysis of firewall logs using various tools.
  • Work wif Software Distribution teams to develop and execute Custom Prop for Endpoint systems
  • Manage and monitor security rules and policies for Endpoint Protection
  • Understand different types of NAT on Cisco ASA firewalls and apply them.
  • Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.
  • Support Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Support teh One to Oneproxymigration project from legacy, end of life and proxiestoBlueCoatProxySG units.
  • Configuration, operation and troubleshooting of BGP, OSPF, EIGRP, RIP, VPN routing protocol in Cisco Routers &L3Switches.
  • Configured MPLSL3and L2 VPNs for customers.
  • FWSM configurations in single/multiple context wif routed and transparent modes.

Environment: Juniper routers and switches, Cisco routers 7200; Cisco Catalyst switches 6500, 4500, 2950; Big-IP F5 Load Balancer, Cisco Works; MS Visio, Checkpoint, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy, Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP, STP, VTP, VLAN, VPN, MPLS, HSRP, GLBP.


Network Engineer


  • Configuring/Troubleshoot issues wif teh following types of routers Cisco (7200, 6500, 4500, 1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, and DHCP, as well as assisting wif customer LAN /WAN
  • Configured and troubleshoot Juniper Ex 4500 and series switches and Juniper ACX series routers.
  • Involved in teh deployment of Content Delivery Networks (CDN).
  • Experience wif SQL for extracting teh data from SQL database, related to network issues.
  • Experience working wif Network-attached storage (NAS) to provide Local Area Network (LAN) nodes wif file-based shared storage through a standard Ethernet connection.
  • Configuring HSRP between VLANs, Configuring Ether-Channels and Port Channel on Cisco6500 catalyst switches.
  • Cisco Secure Access Control Server (ACS) for Windows to autanticate users dat connects to a VPN 3000 Concentrator.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to GET VPN.
  • Assisted in MPLS migrations, implemented a backup for teh existing WAN connection using site-to-site IPsec VPN tunnels.
  • Worked on teh migration of existing PIX firewall to ASA firewall and wif converting PIX rules over to teh Cisco ASA solution.
  • Worked extensively on Cisco ASA 5500 (5510/5540) Series.
  • Involved in Configuration of Access lists (ACL) on ASA firewall for teh proper network routing for teh B2B network connectivity.
  • Experienced in securing configurations of SSL/VPN connections, troubleshooting Cisco ASA firewalls and related network security measures.
  • Configuring static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation.
  • Experience working wif Active Directory (as a centralized system) to automate network security management and user data.
  • Worked wif Aruba Access point as a Public Wi-Fi and successfully implemented Wireless Access Point (WAP).
  • Experienced in working wif Session Initiation Protocol (SIP) trunking for voice over IP (VoIP) to facilitate teh connection of a Private Branch Exchange (PBX) to teh Internet.

Environment: Cisco Catalyst 2960/3750/4500/6500 Series Switches, Linux, Cisco 2800/2900/3000 Series ISR's and Cisco 3640/12000 /7200/3845/3600/2800 routers, SQL, Cisco ASA 5500, Juniper Ex switches, Active Directory, Juniper ACX series routers, Windows Server 2003/2008, ACL, SIP, RIP, OSPF, MPLS, BGP, EIGRP, Wi-Fi, LAN, MacAfee, WAN, WAP, IDS, IPS, Aruba WLAN, VPN, HSRP.

Hire Now