We provide IT Staff Augmentation Services!

Sr. Network Security Engineer Resume

Dallas, TX


  • Expertise with rich Computer Networking and Security experience. Solid understanding of Designing, Implementation, Administration, Operational and troubleshooting of enterprise data networks.
  • Strong understanding and experience of Firewalls on various platforms including Palo Alto, Cisco ASA and Checkpoint.
  • Extensive knowledge and experience of TCP/IP protocol suit with practical implementation of switching protocols, routing protocols and LAN/WAN services.
  • In - depth knowledge of configuring and troubleshooting routing protocols namely, RIP, EIGRP, OSPF and BGP on Cisco routers.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, STP and RSTP.
  • Experience in configuring Windows Servers (2008 & 2012) and configuring networking capabilities on them like DHCP, DNS and Access Control Lists (ACLs).
  • Experience in configuring latest VDC and vPC features on Cisco Nexus 7000 NX-OS.
  • Installing configuring and troubleshooting Palo Alto Firewalls.
  • Expertise in Creating Scripting for Configuration Backup, Report backup, Qradar Device Reports and for Metric Generation.
  • Strong knowledge under Imperva web application firewall for monitoring for In-depth analysis of attacks and SIEM tools such as Splunk, HP ArcSight for analysis and log monitoring.
  • Utilize Qualysguard as primary tool to monitor tickets and vulnerabilities.
  • Experience in configuring security policies and next gen features like Application and URL filtering, Threat Prevention, Data Filtering on Palo Alto Firewall.
  • Advanced Knowledge in IPSEC VPN design connection & protocols, IPSEC tunnel configuration, encryption and integrity protocols.
  • Experience in migration from Cisco ASA to Palo Alto using PAN migration tool.
  • Responsible for entire company network infrastructure that includes Cisco Switches, Routers, Firewalls, Access Points, Servers and PBX
  • Strong knowledge of OWASP Top 10 web application vulnerabilities with their prevention techniques.
  • Implementing & troubleshooting Cisco series routers, CAT OS series switches and Nexus 2k,5k,7k series switches
  • Knowledge of HIPAA Privacy/Security Compliance. Identifying compliance gaps, developing security policies and procedures, conducting risk assessments, risk analysis, and supervising ongoing compliance.
  • Monitoring compliance and ensure enforcement with all SOX, PCI DSS, HIPAA/HITECH, COBIT, and NIST requirements as applicable to the organization
  • Expert level knowledge of Cisco network security (IDS, ASA 5500 Firewall), network redundancy (HSRP, GLBP and VRRP)
  • Strong knowledge under Imperva web application firewall for monitoring for In-depth analysis of attacks and SIEM tools such as Splunk, HP ArcSight for analysis and log monitoring.
  • Management and administration of Juniper and ASA Firewalls at various zones including DMZ, Extranet (Various Business Partners) and internal.
  • Experienced with Proxy and Malware-mitigation ( Confidential, Confidential / Confidential / Confidential, Confidential ), threat detection and data leakage protection (Network DLP/Vontu/Symantec, Confidential Security Analytics).
  • Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco 1600, 2600, 2800, 3600, 7300 series Routers.


Routers: Cisco 7609, 2600, 2800, 3800, 3640, Cisco 3745, 7200 Series

Switches: Cisco 3500, 5000, 6500 Catalyst Series Cisco 7000, 2000 Nexus Series

Firewalls: Palo AltoPA-3050, PA-5050, Cisco ASA 5500, Checkpoint

Routing Protocols: BGP, OSPF, EIGRP, VRRP, HSRP, GLBP, and RIP

Switching Protocols: STP, RSTP, PVSTP, VTP, ARP, and VLAN


WAN Technologies: ATM, ISDN, PPP, MPLS, ATT, 802.11, 802.11a, 802.11b, APLUS

VPN Technologies: Remote access and site-to-site IPSec VPN, IPv6 transition techniques viz. Manual tunneling, GRE tunneling, 6to4 tunneling, NAT64 and ISATAP

Monitoring Tools: OPNET, GNS3 Simulator, Spiceworks, PRTG, Packet Tracer, WireShark, SolarWinds, What’s Up IP, Nagios and Fluke Networks

Operating Systems: Windows XP, Vista, Windows 7, UNIX, SPLAT (Secure Platform), Linux

VA: Qualysguard Vulnerability management, NopSec URM.

Security Tools: Nessus, OpenVAS, Nexpose, Splunk, NMAP, Kali Linux, Metasploitable2, IBM QRadar, Blue Coat, RSA Archer.

Cyber Security: Ethical Hacking, Vulnerability Management, Security Architecture & Design, Physical and Environmental Security, SIEM, Penetration Testing, IDS/IPS, SANS: 20 Security Controls, NIST Risk Management Framework, FISMA, COSO, SSAE:16, SOC 1/2/3, ISO/IEC 27001, SOX, GLBA, NIST 800:53, FedRAMP, OWASP top 10, HIPAA, PCI/DSS, MS SDL.


Confidential, Dallas, TX

Sr. Network Security Engineer


  • Responsible for implementing firewall technologies including general configuration, optimization, security policy, rules creation and modification of mainly Palo Alto Firewalls.
  • Set up and maintained a Sourcefire IDS/IPS system to control network security.
  • Good knowledge of governance, risk, and compliance requirements (NIST, NYDFS, PCI- DSS, HIPAA ).
  • Researched, designed, and replaced aging Cisco ASA firewallarchitecture utilizing the PAN Migration tool with new next generation Palo Alto devices serving as firewalls and URL and application inspection devices.
  • Successfully installed Palo AltoPA-3050, PA-5050 firewalls to secure zones of network.
  • Converted Cisco ASAVPN rules over to the Palo Alto solution.
  • Backup and restore of Palo Alto and Cisco ASA Firewalls policies.
  • Implemented many security policy rules and NAT policy rules on Palo Alto, created Zones, implemented Palo Alto Firewall interface, Palo Alto IDS and VLAN.
  • In Palo Alto used Wildfire, AutoFocus and SSL Inspection.
  • Fortigate firewall design, configuration, and support. Support of SIEM solution monitoring 100 client firewall devices. Developed alerting, logging and reporting to be delivered to clients.
  • Responsible for IBM Qradar SIEM monitoring and configuration aligned to internal PCI and SOX controls.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configured next-gen Palo Alto Firewall features viz. Application and URL filtering, Threat Prevention, Data Filtering
  • Strong Active Directory and Exchange 2010 knowledge. Add users to security groups, create new security groups, verify account access, and enable/disable AD accounts, provision new AD accounts. Create mailboxes and distribution lists, troubleshoot email issues.
  • Creates and maintains authentication records for all flavors of Unix (Linux, AIX, Solaris) and Windows, as well as for databases using Basic and Cyber-Ark Vault authentication records. Scope includes entire Novartis global data centers and work sites usingQualysGuard.
  • installed and configuredQualysGuardserver appliances (both physical servers and virtual cloud based servers), and ran various ad-hoc/custom/standard reports.
  • Integrated Panorama with Palo Alto Firewalls, managing multiple devices simultaneously in datacentre environment.
  • VPN User access management on Palo Alto Firewalls. Used LDAP for identifying user groups
  • Responsible for configuration and troubleshooting of Site to Site as well as Remote Access VPN on Palo Alto Firewall using PA Global Protect gateway and portal.
  • Exposure to wild fire advance malware detection using IPS feature of Palo Alto Firewalls.
  • Implemented IPS, DLP and UTM features on the firewall for added security purposes.
  • Configured syslog on Palo Alto Firewalls and moved the logs to Splunk and reviewed it.
  • Monitor company’s networks for malicious activities and policy violations using the IBM QRadar Security Information & Event Manager (SIEM)
  • Designed, Implemented and configured Web authentication, SSL Decryption and URL categorization rules using Blue Coat Proxies and SSLV appliance.
  • Installed, configured and administered Splunk Enterprise Server and Splunk Forwarder on Redhat Linux and Windows servers.
  • Setup Splunk Forwarders for new application tiers introduced into environment and existing applications.
  • Built dashboards, views, alerts, reports, saved searches using XML, Advanced XML and Search Processing language (SPL) as and when required.
  • Load Balancing using F5 Networks Big IP. Configure the Automatic policy builder using the deployment wizard tool in ASM.
  • Performed Field Extractions and Field Transformations using the Regular Expressions in Splunk.
  • Experience in performing vulnerability assessments in internal and external networks.
  • Configured content Analysis using Confidential CAS appliance and Malware analysis using Blue Coat Malware analysis appliance.
  • Hands-on experience with STIX and TAXII.

Confidential, The Woodlands, TX

Network Security Engineer


  • Performed System Security checking against emerging OS and subsystem technology automated tools.
  • Extensive implementation of dynamic routing and switching protocols on Cisco routers and switches.
  • Configured Virtual Device Context (VDC) on Cisco Nexus 7000 series switch to logically segment into 4 different virtual switches for easy administration and management.
  • Deployed AWS and Azure public cloud infrastructure.
  • Monitored and reported anyvulnerabilitiesto compliance created by a systems failure to manage upkeep of cyber security policies
  • UtilizeQualysguardas primary tool to monitor and report Policy Compliance, based on NIST, ISO2007 and CIS Benchmarks.
  • Configured F5 GTM solutions, which includes Wide IP, Pool Load Balancing Methods, probers and monitors. Created complex rules utilizing TCL scripting to perform load balancing decisions.
  • Responsible for configuring, administering and troubleshooting the Checkpoint, Palo Alto and ASA firewall.
  • Configured blocking of IP’s on Checkpoint which are suspicious to network.
  • Created multiple policies and pushed them in to Checkpoint Firewall (Gateways) and the Checkpoint Management Server with SPLAT operating system.
  • Configured IPSEC VPN tunnels between Checkpoint and other non-Checkpoint endpoint devices.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.
  • Assessing the vulnerabilities proactively, identifying the potential threats, discovering anomalies within data and handling threat management using Qualysguard VM tool
  • Configured NAT policies viz. Static NAT, Dynamic NAT and Dynamic PAT in Cisco ASA Firewall.
  • Configuration and troubleshooting of Cisco Security Manager (CSM), integrated with ASAdevices.
  • Implementation of Site-to-Site VPNs and DMVPN over the internet using IKE Phase 1 and IKE Phase 2 based on traffic with ASA 5500 series Firewalls.
  • Configured rules and maintained Palo Alto Firewalls & analyzed of firewall logs using various tools.
  • Implemented & administered of Zoning Architecture project (Implementation of various zones like Server, Intra & Internet Zone)
  • Configured SSL Decryption and URL blocking on Palo Alto Firewall.
  • Actively monitors security event logs and reports on computer viruses and malware using Fire eye
  • Coordinated with network operations center for change notifications, alerts & escalation of security incidents.
  • Experience in Cisco Routing, Switching and Security with strong Cisco hardware/software.
  • Proficient withnetworkhardware and technologies including routers, switches, firewalls, Ethernet, Fast Ethernet, Gigabit Ethernet.
  • Design and Deployment ofF5andAPMfor Load Balancing, Application Delivery and High Availability.
  • Configured Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
  • Configured Cisco Catalyst 2960, 3750, 4500, 6500 and Nexus 3000, 5000, 6000, 7000 series switches.
  • Supervised installation and configuration of Cisco 3550 Layer3 Switch.
  • Upgraded IOS on existing Cisco router from 11.x to 12.1.
  • Load Balancing Cisco ACE 4700 series, F5 LTM
  • Implemented, configured BGP WAN routing, converting local OSPF routes to BGP.
  • Experienced in configuring protocols HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, CHAP, and SNMP.
  • Configure Multicasting Protocols like IGMP and CGMP.
  • Configured VLANs by segregating different departments in the organization and setup inter-VLAN routing.
  • Worked on FTP, HTTP, DNS, servers in window windows server-client environment with resource allocation to desired virtual LANs of network.


Network Engineer


  • Configured user authentication rules/policies to permit or deny user traffics on role-based access.
  • Monitored network using network management and support tools like SolarWinds, Netscout, Cisco Works, SNMP Management and Wireshark.
  • Monitored bandwidth and network activity by analysing information provided by MRTG to ensure both efficient and effective network operation.
  • Performed advanced troubleshooting using Packet Tracer and TCP dump on firewalls.
  • Reviewed firewall rule conflicts, unused rules and misconfigurations and clean up.
  • Assisted in firewall policy administration and support on Checkpoint as well as Cisco ASA Firewalls.
  • Implemented traffic filters using Standard and Extended access-lists, Distribute-Lists and Route Maps.
  • Working knowledge of leveraging F5 Load Balancer devices for web acceleration and caching,
  • Document network problems and changes working in diverse management environments.
  • Assisted in setting up of LAN and Wi-Fi Access points around the organization
  • Installed Windows Server (2008 & 2012) and configured networking capabilities on them like DHCP, DNS and Access Control Lists (ACLs).
  • Acquired skills to configure maintain and troubleshoot network services.
  • Hands-on experience in configuring routing protocols viz. RIP, EIGRP and OSPF on Cisco 2700 series routers.
  • Configuration & Management of VLANs, 802.1q trunks, VTP, Security policies on Cisco 3200 series switches.
  • Full Command on Cisco IOS Commands and Administration of Cisco IOS 11.x and 12.1 versions
  • Designed VLAN's and set up both L2 and L3 logical to have it communicate to the Enterprisenetwork.
  • Utilized packet sniffing tools like Wireshark, TCP Dump and Capsa to monitor and troubleshoot access issues.
  • Implemented and configured SecuRemote VPN Server for high speed remote access.
  • Setting up of company’s broadband services for implementing high speed connectivity.
  • Utilized Firewall log from Palo Alto Firewall to manage and troubleshoot network security issues.
  • Assisted in upgradation of older 100mbps hubs to HP managed switches in the company
  • Daily assessment of and preparation of report based on network functionality and handled issues.
  • Encouraged network redundancy for backup of network devices in case of disaster recovery.
  • Active participation in handling client issues and maintaining quality of service provided.
  • Spearheaded meetings & discussions with team members regardingnetworkoptimization and performance issues.

Hire Now