We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

2.00/5 (Submit Your Rating)

EXECUTIVE SUMMARY

  • Over twenty - five (25) years of technical and analytical expertise in teh IT industry, with emphasis on system/network administration. Background in supporting various IT infrastructures in teh areas of Cisco network administration, UNIX system administration, software/hardware installation, software/hardware testing, documentation, and customer support. Directly responsible for assuring teh integrity of large, multimillion-dollar TCP/IP systems and client/server based computer networks. Technically and functionally interact with customers and effectively maintain customer relationships.
  • Decipher and logically resolve technical issues while tactfully managing customers in a fast-paced environment. Utilize judgment and decision making to analyze problems and develop logical solutions. Take initiative to learn/apply new software and hardware technology. Acnoledged for professionalism, enthusiasm, versatility and outstanding organizational and leadership skills. Excellent oral and written communication skills.

TECHNICAL SKILLS

Platform/Operating System: Sun Solaris 10, 9, 8, 7; Red Hat Linux 6.2, 7.2, 9.0; Irix 6.5; HP/AIX 11.x; Windows 3.x, 95, 98, NT; IBM PC-LAN/DOS; VAX/VMS; and IBM/MVS.

Hardware/Storage: Sun Servers, Sun Workstations Sun Storage ArrayCisco: Nexus, Cisco Routers, Cisco Switches, Cisco ASA Firewalls, Palo Alto Firewalls, Cisco Wireless, Aruba Wireless KG-175 TACLANE, T3 Storage Array, Plasmon Jukebox, HP, Brocade, Juniper, F5 Big IP, Cisco CUCM, Unity, UCCX.

Application Software: Veritas Volume Manager, and Sun Volume Manager, Veritas Cluster Server, HP Openview, CiscoWorks, NIS+, NFS, and FTP, DNS, Weblogic, Websphere.

Scripting Languages: Bsh, Csh, Ksh, Sed/Awk, Nawk, Python

Database Products: Sybase, Oracle, SQL and Microsoft Access, Visio.

PROFESSIONAL EXPERIENCE

Senior Network Engineer

Confidential

  • Responsible for teh design, implementation and maintenance of teh Tiffany & Co network over a short term project.
  • Successfully configured and implemented DMVPN (Phase 2/3) connectivity to over 1000+ Tiffany & Co sites utilizing Cisco ASR routers.
  • Configured Virtual Routing Forwarding (VRF-Lite) on teh Cisco routers allowing different routes for a group of interfaces.
  • Coordinated and lead teh successful Tiffany & Co IOS upgrade of over 5000+ Cisco Routers and Switches utilizing Cisco Prime.
  • Configured firewall rules for teh successful connectivity of Tiffany & Co clients across both Palo Alto and Cisco ASA firewalls.
  • Developed Standard Operating Procedures (SOP) providing step-by-step details of teh Tiffany & Co network Cisco IOS upgrade.
  • Drafted Tiffany & Co network design guide detailing teh implementation of teh DMVPN network connectivity including HLD/LLD documentation.
  • Responsible for design and implementation of several client sites to include upgrade and equipment refresh projects.

Senior Network Engineer

Confidential

Responsibilities:

  • Responsible for teh design, implementation and maintenance of teh Confidential network which contain over 35,000 network devices.
  • Upgraded CORE network from Cisco 6509’s to Nexus 9500’s.
  • Upgraded Aggregation and access switch environment to Nexus 9300’s and Cisco 4500’s.
  • Successfully configured and installed Cisco 3650 switches.
  • Coordinated and lead teh successful migration of Stern Business School onto teh NYU Global network.
  • Implemented vlan translation/mapping, a service provider data center technology, to successfully migrate teh Stern Business School datacenter to NYU Global network.
  • Migrated teh Stern Business School wireless onto teh NYU Global network wireless.
  • Provided both high - level (HLD) and Low-level (LLD) designs which outlined teh network flow and configuration of both teh Stern current and migrated network
  • Configured VRF’s, VDC’s, peer-links and keep-alive links on teh Nexus 9000 series switch
  • Configured DMVPN (Phase 2/3) to allow secure network traffic to teh remote site.
  • Responsible for teh IOS upgrading of all Cisco equipment to include routers, switches, wireless controllers and ASA firewalls as part of teh equipment refresh project.
  • Configured security contexts on teh Cisco 5500 ASA firewalls within an active/active failover configuration.
  • Utilize Solarwinds network monitoring tool for proactive warning of any issues with network nodes.
  • Provided direction to network administrators in teh configuration and implementation of network migration project.
  • Configure and support MPLS-VPN (CE/PE), VRF, and MPLS ICI peering
  • Configure L3 protocols (IP, BGP, OSPF, EIGRP, IGRP, RIP, ISIS, HSRP), redistribution, summarization, Filtration (using distribute list, route map, prefix list, access list)
  • Daily tasks include resolving change management request tickets.

Senior Network Engineer

Confidential

Responsibilities:

  • Responsible for teh design, implementation and maintenance of teh Maryland Affordable Healthcare Act network.
  • Documented design via Microsoft Visio which depicted network flow and overview.
  • Installed and configured Cisco 5500 wireless controller and Cisco Aironet 3600 Access Points (AP) providing wireless network connectivity.
  • Configured HSRP failover capability on Cisco ASR 1000 series router implementing high availability.
  • Configured multi-homing on teh Cisco ASR 1000 series routers to allow for uninterrupted internet connectivity in teh event of an ISP failure.
  • Configured Cisco 6500 Core Switches with HSRP failover capability resulting in minimal to no downtime in teh event of equipment failure.
  • Configured Site-to-Site VPN tunnels to allow network and wireless connectivity to teh remote users.
  • Responsible for teh upgrading of all Cisco equipment to include routers, switches, wireless controllers and ASA firewalls.
  • Assisted in teh re-design of teh current network infrastructure to teh Nexus series switches for Core, Distribution and Access layer.
  • Configured MP-BGP on Cisco Router enabling teh routing of both IPv4/IPv6 traffic.
  • Configured VLAN’s to easily administer and separating departmental network traffic.
  • Configured DHCP to allow for address assignment for network equipment and associated devices.
  • Configured Cisco 5500 ASA firewalls within an active/active failover configuration.
  • Configured Palo Alto PA-5020 firewalls for Panos-HA Active/Active cluster.
  • Configured clientless SSL VPN on teh Cisco ASA 5500 firewall implementing rules, profiles and group policies.
  • Upgraded CORE network from Cisco 6509’s to Nexus 7000’s, Cisco 4500’s to Nexus 5000/2000.

Lead Network Engineer

Confidential

Responsibilities:

  • Responsible for teh design, implementation and maintenance of an integrated legal research and business support company network.
  • Configure Call manager and Cisco Unity enabling voip access to 1000+ users company wide.
  • Configured voice gateway routers to allow VOIP communications.
  • Configured Session Initiation Protocol (SIP) to allow for both voice and video.
  • Configured QoS policies to ensure voice traffic was priority.
  • Installed and configured Cisco 7940 and 7960 VOIP phones utilizing teh Cisco Call Manager utility.
  • Installed and configured Cisco 2500/5500/7500 wireless controller and Cisco Aironet 1040,1140,3600 Access Points (AP) providing wireless network connectivity.
  • Configured and installed Aruba 3000/6000 wireless controller and Aruba 100/130 series Access Points.
  • Configured Cisco routers with HSRP failover capability to accommodate redundancy limiting teh amount of downtime within teh datacenter.
  • Implemented teh Cisco Nexus switches within teh infrastructure running parallel to replace teh current enterprise environment.
  • Configured Cisco 6500 Core Switches with HSRP failover capability resulting in minimal to no downtime in teh event of equipment failure.
  • Configured multi-link point-to-point (MLPPP) circuits to provide larger bandwidth for remote site customers.
  • Configured newly acquired remote sites routers with BGP allowing connectivity for customers to teh network.
  • Configured VPN tunnels routing EIGRP routes to allow network and wireless connectivity to teh CORE HUB.
  • Upgraded teh Cisco Wireless IOS on teh Wireless Service Module (WiSM2) located on teh Cisco 6509 CORE Switch.
  • Configured and installed Nexus 7000/5000/2000 series switches as Core, Distribution and Access layer switches.
  • Configured MPLS on Cisco Router enabling teh routing of voice traffic from remote offices back to teh central office.
  • Configured VLAN’s to easily administer and separate network traffic for teh various internal departments of teh company.
  • Configured DHCP to allow for address assignment for network equipment and associated devices.
  • Created subnets to allow for both present and future network expansion and addressing for both IPv4 and IPv6 network devices.
  • Installed and configured Cisco 5500 ASA firewalls within an active/active failover configuration resulting in minimal to no interruption in teh event of failure.
  • Configured clientless SSL VPN on teh Cisco ASA 5500 firewall implementing rules to allow/deny specific access.
  • Installed and configured RSA 250 appliance providing two-factor autantication along with teh Cisco ASA 5500 firewall.
  • Configured smart-tunneling on teh Cisco ASA 5500 to allow clientless SSL VPN (WebVPN) based client’s access to TCP based applications.
  • Configured routing protocols EIGRP, OSPF and BGP routing on Cisco 1800, 2600, 3800 & 7200 series routers.
  • Configured route maps and ACL’s to allow for screening and re-distribution of network traffic.
  • Configured Site-to-Site and Remote Access VPN’s allowing for encrypted highly secure remote connectivity for both voice and data traffic.
  • Configured Network Access Translation (NAT) rules on teh Cisco ASA 5500 appliance in routed mode for egress traffic.
  • Configured etherchannels on Cisco 6500 series switch with LACP allowing teh formulation of a single logical channel.
  • Installed and configured Cisco Secure ACS (TACACS+) server for network device autantication by users.
  • Installed SSL VPN licenses on teh Cisco 5500 ASA redundant pair enabling numerous SSL VPN clients to access teh network.
  • Installed RSA soft/hard token licenses on teh RSA 250 appliance enabling two-factor autantication for numerous users.
  • Installed and configured virtual load balancers for both web and proxy servers in DR mode to address and eliminate ARP issues.
  • Upgraded teh software images of all Cisco network devices to include routers, switches and ASA firewalls.
  • Prepared and maintained SOP’s and technical documentation and network diagrams.
  • Adhered to weekly and monthly maintenance schedules to service network devices and associated equipment.

Lead Systems Engineer

Confidential

Responsibilities:

  • Lead engineer responsible for teh installation, configuration, administration and design of a CISCO/SUN/Windows TCP/IP based networked environment.
  • Responsible for teh design, implementation and testing of a satellite prototype network incorporating failover scenarios, redundancy, IPv4/IPv6 dual-stack and intrusion detection (IDS).
  • Configured MPLS on Cisco 3600 series routers to simulate ISP provider within a test lab prototype network environment.
  • Designed and tested IPv6 to IPv4 conversion via MPLS ISP cloud within a test lab environmentprior to implementation.
  • Configured MPLS on current routers configuration and inserted new routing configuration for implementation into teh MPLS cloud routing scheme.
  • Configured both GRE and IPSEC tunnels as a failover within teh IPv6 to IPv4 conversion test lab environment.
  • Configured Cisco routers with HSRP failover capability to accommodate redundancy limiting teh amount of downtime within teh datacenter.
  • Configured Cisco Service Control Engine (SCE) to provide network deep packet inspection (DPI).
  • Created system design and network architecture diagrams providing Layer 2 & Layer 3 view of teh network.
  • Configured IPv6 routing within BGP incorporating address-family to effectively route both IPv6 and IPv4 networks.
  • Configured Fortinet Firewall parameters setting up BGP, Virtual Domains, Protocols and Policieseffectively providing network security and intrusion detection.
  • Configured Juniper SSG series firewall adding polices, intrusion detection, High Availability(HA) and VPN configurations.
  • Configured ServerIronXL Firewall Load Balancer (FWLB) with failover.
  • Configured F5 Big IP load balancer redundancy implementing active/passive mode for device failover, configuring controllers for both public and private ip addressing, employing SNAT for internal addressing security.
  • Attended weekly meetings with government customer to provide project briefings.
  • Implemented IPv6 addressing scheme throughout network test environment utilizing RA for dynamic address assignments.
  • Configured routing protocols EIGRP, OSPF and BGP routing on Cisco 1800, 2600, 3800 & 7200 series routers.
  • Configured and installed Cisco 6506 with Transport Lan Service (TLS), provided by Verizon, to upgrade teh current frame-relay infrastructure.
  • Configured and installed Cisco 3845 router for frame-relay routing with two PVC sub-interfaces for redundancy
  • Implemented and managed QoS providing packet priority by defining traffic through class and policy maps.
  • Configured Alcatel 6000 series and Extreme 450E switches as Core and Access layer switches within an enterprise configured network.
  • Ensured Information Assurance Vulnerability Alerts (IAVA’s) were adhered to by implementing teh essential patches for IAVA compliance.
  • Hired as teh Subject Matter Expert (SME) to engineer teh successful transfer of over 300+ applications from teh current SCIF to a newly constructed datacenter for teh Dept of Homeland Security.
  • Configured teh Cisco ASA 5510 for VPN/firewall enhancing network security via autantication and acess-lists/rules.
  • Configured Juniper Netscreen adding and administering policies for autantication and IDS prevention.
  • Configured F5 Big IP for web server load balancing providing uninterrupted load balancing and failover capabilities.
  • Configured and administer network routing protocols BGP, EIGRP, OSPF, TLS over a multicast traffic TCP/IP network.
  • Configured and installed teh Cisco WRT54G wireless-G broadband router to allow controlled wireless access to internal employees.
  • Configured and installed Cisco phones on teh network via Cisco PoE switches administered via Cisco Call Manager.
  • Configured and installed Bluecoat packeteer wan optimization and web filtering tool to provide efficient bandwidth performance and prevent malware threats.
  • Provided a detailed stenciled diagram of teh current network displaying rack and associated equipment per rack.
  • Configured and administered teh TACACS server for both user and network node autantication.
  • Utilize Solarwinds network monitoring tool for proactive warning of any issues with network nodes.

Senior Systems Engineer

Confidential

Responsibilities:

  • Set up Router VPN tunnels to allow encrypted traffic to flow across teh CENTRIXS systems utilizing SIPR tunnels being routed to remote via KG-175 Taclane.
  • Set up BGP, EIGRP and OSPF routing on Cisco 2600, 3800 & 7200 series routers.
  • Performed network traffic analysis me.e ip sniffer applications, Cisco NAPA application performance monitoring tool with alerts to detect application performance issues.
  • Configured HSRP on Cisco routers setting teh standby ip, preempt and priority to provide failover capability.
  • Installed and configured Cisco 2950, 3550, 3560 and 3750 switches for data and voice VLAN on both SIPR (secure) and NIPR (non-secure).
  • Set up etherchannels on Cisco 6509 Core Switch enabling multiple port traffic to flow through a single channel theirby reserving bandwidth.
  • Successfully migrated a tactical network consisting of multiple trunked switches allowing a single point of failure to a redundant fiber ring consisting of two Cisco 6509 MCN’s, 6 Cisco 6509 ADN’s’ and numerous independent EUB’s comprising Cisco 3560 and 3750 switches.
  • Set up OSPF routing protocol for both internal and external router to router connectivity establishing communication within teh local site and between remote sites.
  • Configured Hot Standby Routing Protocol (HSRP) to provide network redundancy and failover capability to Cisco gateway routers.
  • Performed teh IOS upgrade of over 600 switches which encompassed teh NIPR and SIPR network.
  • Installed and configured over 1000 Cisco 7940 and 7960 VOIP phones utilizing teh Cisco Call Manager utility.
  • Configured Quality of Service (QoS) on Cisco routers providing VOIP priority.
  • Resolve tickets issued through teh Remedy Change Management Request system used to fix system anomalies and perform upgrades

We'd love your feedback!