Data Center Network Engineer Resume
Irvine, CA
SUMMARY
- Network Engineer wif 8 Years of experience in networking, security, installing, configuring and maintainingnetwork devices.
- Good understanding of networking concepts such as TCP/IP protocols, VLANs, IP address management andnetworksecurity.
- Experience in Cisco Routing, Switching and Security wif strong Cisco hardware/software experiences wif Cisco Routers such as 1900, 2900, 3900, Cisco ASR - 1k/9k, Cisco Multilayer Switches 4500, 6500, Cisco Nexus 2k/5k/7k/9k.
- Strong understanding of current and future technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, ACL, VPN, Wireless LAN and configuration of VLANs.
- Expertise in Configuration of VLANS, using Cisco Multilayer switches and supporting STP, RSTP, PVST, RPVST along wif troubleshooting of inter-VLAN routing and VLAN Trunking using 802.1Q.
- Experienced in Palo Alto Firewalls, Juniper Firewalls, Checkpoint firewalls, Fortinet Firewalls, Cisco WSA/CWS, Cisco ASA, SSL VPN, Cisco Nexus, Cisco ACS, Cisco ISE and IPS.
- Hands on wif Blue Coat URL filtering wif white listing and blacklisting URL, creating rules for content filtering.
- Configure and implement Network Infrastructure monitoring, alerting, backups, and system management solutions built on Linux Firewall and ACL security implementations.
- Created Route maps on F5 BIG-IP GTM to link various VIPs from different F5 BIG-IP LTM to GTM.
- Good Knowledge and experience working wif F5 BIG-IP command line interface (CLI) and Traffic Management Shell (TMSH).
- Administrated a network using Network Access Control List (NAC) to enhance security of the LAN network.
- Expertise in Endpoint Security Antivirus wif SEPM (Symantec Endpoint Manager).
- Expertise in URL filtering wif Forcepoint, Email and web security wif Cisco IronPort.
- Proficient in using firewall technologies including general configuration, security policy, rules creation and modification of Cisco ASA, Juniper SRX and checkpoint.
- Experience wif Cisco IOS, cat OS, Cisco IOS XR and JUNOS.s
- Proficiently implemented traffic filters using Standard and Extended access-lists, Distribution lists, Route-maps and Route Manipulation using offset-list.
- Basic experience in CISCO source fire and its products.
- Create PowerShell runbooks in Azure Automation.
- Create AD users\group using the active directory PowerShell module.
- Expertise in IP Sub netting and worked on various designing and allocating various classes of IP address to the domain.
- Configured Infoblox failover using Infoblox DHCP dat is based upon ISC DHCP modes on F5 management system.
- Expertise knowledge in scripting (Perl/Bash/Python), VMware, ticketing tools like ServiceNow, Remedy and networksecurity including NAT/PAT, ACL, VPN and IPSEC on DMVPN.
- Extensively worked on Cisco catalyst 6509 and implemented VSS along wif VDC and VPC on Nexus 5505, 7009 switches.
- Experience in configuring and troubleshooting NetScaler, BIG-IP F5 load balancer LTM.
- Managed the fire sight devices along wif security tools like Symantec, MacAfee.
- In-depth understanding of UDP and TCP protocols.
- Responsible for check point and Cisco ASA firewall administration across globalnetworks.
- Used python, c#, PowerShell programming and language to develop an efficient and working network in the company.
- Designing, Develop and Execute Test-Cases using C# and python.
- Worked on Load balancer F5 LTM, Citrix NetScaler, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
- Established relationships andnetworkconnectivity wif vendors via site to site VPN.
- In-depth knowledge in Tier-2 ISP Routing policies,NetworkArchitecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, Firewalls.
- Adept in handlingnetworkmonitoring tools such as Wireshark, Net flow, SNMP and SYSLOG.
- Highly motivated wif the ability to work independently or as an integral part of a team and committed to highest levels of profession.
TECHNICAL SKILLS
Routers: Cisco 7600, 7200, 3800, 3600, 2900, 2800, 2600, ASR 1K, ASR9K, Juniper MX 480, MX 960
Routing Protocols: OSPF, EIGRP, BGP, RIP v1/v2, MPLS PBR, Route Filtering, Redistribution, Summarization, and Static Routing
Switches: Nexus 2K/5K/7K, Cisco Catalyst 6500, 4500, 3850,3560, 3750, 2960, Juniper JunOS
Switching Protocols: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels, Transparent Bridging
Multicast Protocols: IGMP, IGMP version 2 and 3, CGMP, PIM-Sparse and Dense Mode DHCP, FTP, TFTP
LAN technologies: Ethernet, Fast & Gigabit Ethernet, VLANS, VTP, STP, RSTP, 802.1W, Cisco Prime
WAN technologies: Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN and ATM
Load Balancer: F5 Networks (Big-IP) LTM 8900 and 6400 F5 LTM, APM, ASM
Network security: Cisco ASA 5585,5550,5540, ACL, IPSEC, F5 Load Balancer, Checkpoint, Palo Alto 3000, 5000, 7000 series, IPSec VPN, GRE VPN
Network Management: SolarWinds, Proteus, Xilinx 9.21, HP Open-view, Wireshark, Spirent, SNMP
Operating systems: Windows XP/ 7/ 8, Windows Server 2003/ 2008, Mac OS X and Linux
Language skills: C, C++, Python, Bash, SQL
Various Features & Services: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP, FTP
Applications: MS (Office, Word, Outlook, Excel, PowerPoint, Visio), VMware, Adobe Photoshop and Illustrator
PROFESSIONAL EXPERIENCE
Confidential, Irvine, CA
Data Center Network Engineer
Responsibilities:
- Involved in configuring and implementing of composite Network models consists of Cisco ASR 1K,7600, 7200, 1921 series routers and Cisco 9K, 7K, 5K, 6500 Series switches.
- Designing and implementing LAN/WAN solutions across locations
- Data centers consolidation, design, management and supporting network activities.
- Managing the LAN/WAN devices across locations for day-to-day operations.
- Networks using routing protocols such as OSPF, BGP, EIGRP and manipulated routing updates using route-map, distribute list and administrative distance.
- Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter-VLAN routing, LAN security etc. Deploying Layer 2 security in Server Farms by configuring switch for 802.1x port based autantication
- Configured OSPF redistribution and autantication wif type 3 LSA filtering to prevent LSA flooding.
- Configured OSPF over frame relay networks for NBMA and point to multipoint strategies.
- Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
- Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path.
- Managing location specific Cisco ASA Firewalls and also data center internet gateway firewalls.
- Firewall policy administration and support on PIX Firewalls as well as Cisco ASA Firewalls.
- Responsible for setting up the infrastructure environment wif majority of Cisco & Palo Alto appliances.
- Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
- Handling new application load balancing requirements through F5 LTM devices.
- Experience wif configuring Virtual Server and configuring load balancing methods in F5 12.0 LTM.
- Configured NAT and SNAT in F5 12.0 LTM. Managed virtual servers in F5 12.0 LTM.
- Maintain BIG IP F5 configuration for modules LTM, ASM, APM and future GTM.
- Communicate wif application owners and project management regardingASMissues
- Drive all technical aspects of the adoption ofF5ASMapplication layer firewall
- Design, develop and execute network test solutions for large-scale infrastructure products.
- Upgrading and deployment of Nexus 9K,7k, 5k and 2k
- Configured VPC, FEX and VDC’s on Nexus 5K, 7K.
- CreatedACIEPGs (End Point Groups) contract policies, VRFs and bridge domains for tenants
- Experience wif Cisco ASR’s, Catalyst 6500 series switches, 2800 series, and 3800 series. 2900 series and 3900 series routers.
- Coordinating wif service providers like AT&T, Verizon etc. for all network outages /restoration/new implementations.
- Integrating new locations wif existing MPLS Network and enabling standard corporate application access.
- Implementation of Site to Site VPN s wif direct vendors and customers.
- Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
- Experience working wif Cisco IOS-XR on the ASR9000 devices for MPLS deployments.
- Designed multi-siteACISDN networking solution for cloud environment
- Worked on open source Python library dat simplifies SSH management to Network Devices Paramiko SSH Library
- In the Lab Environment recently started working on a method to automate various tasks in Cisco IOS using Python and Ansible. The general method consists of an SSH control Channel and a separate SCP channel to transfer files.
- Developing a stateless firewall in Lab Environment using RYUSDNcontroller to filter network traffic in both directions, Technologies used arePython,SDN, Mininet, OpenFlow switches in both Lab and Production Environments
- Design and programming of new DMZS portal dat includes web site, email and customer provisioning along wif online tools for network and local vulnerability assessment.
- Implementing and maintaining network monitoring system (Cisco works, HP Open view and Wireshark) and experience wif developing network design documentation using VISIO.
- Designed and deployed a Cisco Identity Services Engine (ISE) solution (wired, wireless, and VPN users) for a commercial client wif converged access switches and Cisco ASA firewalls.
- Installed and configure Cisco Identity Service Engine (ISE) 2.0 and implement 802.1x and wireless guest sponsor portal.
- Worked wif team Managing and configuringArubaWireless controller devices (7210, 7240) and Cisco Access Points.
- Experience in performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s.
- Implement Infoblox DNS appliance and run scripts as needed.
- Organized and oversaw application upgrades to ACAS andInfoblox.
- Used DHCP to automatically assign reusable IP addresses to DHCP clients viaINFOBLOXIPAM.
- Worked on Windows layered products including MS Exchange, DNS and Active Directory.
- Used Infoblox for documentation and tools updates.
- Configuration and maintain Active Directory, DNS, DHCP and Domain Controllers.
- Advanced knowledge, design, installation, configuration, maintenance and administration of Junos, Juniper SRX Firewall, Juniper EX and Juniper MX devices.
- Spearhead the complete spectrum of PCI audits to evaluate network and information security from the perimeter of the network to the infrastructure's internal core.
- Attending weekly CAB meetings and ensuring all changes were going through the change process.
- Capacity planning and providing recommendations for infra upgrades
- Infrastructure upgrades and new Infra deployments.
- Managing IT Security & Disaster recovery Management
Environment: Cisco 6506/4948/4510 switches, Cisco 3660/3845/7609 Routers, Cisco ASA, Palo Alto, F5 Load Balancers, OSPF, BGP, MPLS, HSRP, Juniper MX 960, Nexus 2K, 5K, 7K.
Confidential, NY
Network Security Engineer
Responsibilities:
- Worked as a security engineer for migrating the Cisco and FortiGate firewalls to next generation Palo Alto firewalls.
- Worked wif Palo Alto firewalls using Panorama servers and performed changes to monitor/block/allow the traffic on the firewall.
- Responsible to evaluate, test, configure, propose and implement network, firewall and security solution wif Palo Alto networks.
- Performed security audits on Cisco ASA, FortiGate and Palo Alto firewalls in Network and secured the network by bringing it to the present security standards.
- Troubleshooting and implementing changes on Cisco, Checkpoint, FortiGate firewalls, F5 load balancers, Blue Coat proxies, and Juniper SSL/VPN devices.
- Migration of the firewall from Cisco ASA to Palo Alto firewalls using migration tool from PAN.
- Managed firewall design wif network access control, Large Scale VPN deployment, automated firewall Policy deployment utilizing Panorama to build and edit templates for remote sites.
- Provided administration and support on Bluecoat Proxy for content filtering and internet access to head quarter, remote site offices and VPN client users.
- Successfully installed Palo Alto PA-3020, PA-3060, PA-5060 Firewalls to protect Data Centre and provided L3 support for routers/switches/Firewalls and implemented Zone Based security rules on the Palo Alto Firewall.
- Scheduling of Weekly scans and monitoring, generating Vulnerability reports and sharing to appropriate groups or owners for Remediation along wif recommendations.
- Load Balancing using F5 Networks Big IP and configured the Automatic policy builder using the deployment wizard tool in Application Security Manager.
- Created Route maps on F5 BIG-IP GTM to link various VIPs from different F5 BIG-IP LTM to GTM.
- Performed complete setup of new F5 BIG-IP LTM, GTM and APM device, including license activation, VLANs configurations, Device certificates etc.
- Performed numerous SSL certificate renewals for customer VIPs, maintaining and renewing of all Load Balancers Device certificates.
- Performed hardware refresh on existing F5 BIG-IP Load Balancers to replace wif new F5 BIG-IP devices and bought the F5 devices into the network in an uninterrupted manner.
- Create AD users\group using the active directory PowerShell module.
- Wrote a PowerShell runbook to interact wif SCOM and put a VM into maintenance mode and tan shutdown the VM on azure thus maintaining the agreed SLA.
- Installed, configured and implemented NetscalerManagement and Analytics (MAS), for single platform Netscaler administrations.
- Installed and configured NetScaler's MPX 5509 HA cluster mode to manage Citrix and WEB applications load-balancing
- Daily, worked on clearing existing tickets regarding firewall policies, proxies, weekly policy updates and documenting these events and changes.
- Expanded Data Loss Prevention (DLP) program to include all the high-risk applications, protocols, platforms, and devices.
- Responsible for the daily monitoring and investigation of violated Data Loss Prevention (DLP) policies using the Forcepoint Triton Security Gateway.
Confidential, Bloomington, IL
Network Engineer
Responsibilities:
- As a Network Engineer worked wif teams supporting Cisco routers, Switches, Firewalls, F5 Load Balancer and Bluecoat Proxy Servers.
- Responsible for entire LAN and WAN/WLAN maintenance and troubleshooting of the company network.
- Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements.
- Handling Incident tickets, Service requests and Change requests raised by the customers through REMEDY tool.
- Extensive working knowledge in Security tools to maintain the client domain Infrastructure clean from the threats, virus and malware using tools like MacAfee, Symantec.
- Day-to-day work involves scheduling firewall policy provisioning and working wif users to identify connectivity related issues and troubleshoot using CLI.
- Experience wif designing and implementation of Virtual Switching System (VSS) for both User segment and server segment using catalyst switches.
- Responsible for troubleshooting Cisco ISE and new added devices on network based on policies on Cisco ISE.
- Configured F5 GTM solutions, which includes Wide IP, Pool Load Balancing Methods, probers and monitors and created complex rules utilizing TCL scripting to perform load balancing decisions.
- Involved in developing required classes and interfaces using C#.
- Providing Dailynetworksupport for Wide AreaNetworkconsisting of MPLS, VPN and point-to-point site.
- Extensively worked on Cisco catalyst 6509 and implemented VSS along wif VDC and VPC on Nexus 5505, 7009, 9kswitches.
- Experience wif configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
- Installing, configuring Cisco Catalyst switches 9k6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP wif Access Control lists implemented as perNetworkDesign.
- Managed VPN, IPSec, Endpoint-Security, status policy, Application control, IPS, Monitoring, Anti-Spam, Smart Provisioning, and DLP using Checkpoint Firewalls.
- Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications.
Confidential, NJ
Network Engineer
Responsibilities:
- Troubleshooting the latency issues in the WANnetwork.
- Participated in on call support in troubleshooting the configuration and installation issues.
- Ensure all elements wif 100 % uptime, Ensure redundancy for all Criticalnetworkelements in LACP mode.
- Configured Routing protocols such as OSPF, BGP static routing and policy-based routing.
- Monitoring the WAN links using Solar winds and wat's up gold.
- Continually monitor, assess and improvenetworksecurity test wif the help of Solar winds.
- Provided deployment guidelines for inserting new IP technology and upgrades into MPLS on backbonenetwork.
- Switching related tasks included implementing DHCP, VLANS, VTP, RSTP and Port security.
- Experience in configuring Site-to-site and remote access VPN solutions.
- Ensure allNetworkelements are deployed as per deployment template and standard configuration template.
- Worked wif vendors Cisco, Huawei in validating hardware and software features.
- Providing 24x7 technical supports to complete team. Management of Netops server for providing uninterrupted services to customers.
- Ensurenetworkis migrated to MPLS architecture up to Core switch level.
- Configured Client VPN technologies including Cisco's VPN client via IPSEC.
- Developed route redistribution mechanism between BGP and OSPF for large scalenetworks.
- Configuring IP sec VPNs as per customer requirements wif standard encryption and encapsulation.
- Documentation ofNetworkdetails, reporting theNetworkhealth status to respective teams for action.
- Configured SNMP on all tanetworkdevices and added them to SolarWinds for monitoring.
- Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP and RSTP, MSTP, LACP.
- Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
- Dealt wif the configuration of Standard and Extended ACLs for Security.
- Worked along wif the team in resolving client raised incident tickets using service now tool.
- Monitoring &Troubleshooting Cisco core Routers (7200, 3600, 1700 and 1600) and Switches. (Cisco 2900, 6500, 3500, 3700 and 3Com Switches)
- Configuring ACL to allow only authorized users to access the servers.
- To ensure high availability of system resources to the end users and to maximize the uptime of doing the necessary work to diagnose, detect and rectify the faults in time.
- Coordinating the technical activities wif their vendors & Telco to keep the systems andnetwork uptime to 98% and submission of monthly reports on the project.
Confidential
Network Engineer
Responsibilities:
- Tanetworkinfrastructure for Cisco platform for more than 300 devices i.e. 2800, 3600 series Routers and switches for office and for various Customers.
- Migration of RIPv2 to OSPF, BGP routing protocols.
- Designed Configured, Installed, and Maintained and provided T-Shoot.
- Troubleshoot problems on a day to day basis and providing solutions dat would fix the problems wifin theirnetwork.
- Designing Solutions for frozen requirements using Cisco Routers and Switches.
- Configured EIGRP for Lab Environment.
- Maintained Redundancy on Cisco 2600, 2800 and 3600 routers wif HSRP.
- Created VLAN and Inter-VLAN routing wif Multilayer Switching.
- Played role as VMware/windows admin to provide L1&L2 supports in complex environment.
- Designed and installed Vmware site recovery manager.
- Designing Solutions for frozen requirements using Cisco Routers and Switches.
- Implemented ISL and 802.1Q for communicating through VTP.
- Working wif client team to find out requirements for theirnetwork.
- Configured RSTP, LACP and VTP on Cisco devices.
- Installing, Configuring Cisco Catalyst switches 6500, 3750 and 3550 series and configured routing protocol OSPF, EIGRP, BGP wif Access Control Lists implemented as per Network Design.
- Experience in deploying EIGRP/BGP redistribution and the changing the metrics for the primary and back up.
- Fourth tier troubleshooting, support and implementation for DNS/DHCP.
- Involved in Troubleshooting IP addressing Issues and Updating IOS Images using TFTP.
- Performed DHCP, RIP and OSPF Routing Protocol Administration.
- Other responsibilities included documentation and support other teams.
Confidential
Network Administrator
Responsibilities:
- Worked wif upgrade, replacement of NICs, display cards, RAM, peripheral devices.
- Worked on DNS, DHCP protocols.
- Worked in Network building and Network infrastructure management team.
- Experience wif Remedy ticketing system in resolving tickets related to routing and Switching.
- Handled installation, configuration and troubleshooting of operating systems NT/2000, XP, and Solaris.
- Remotely testing links up to 1.5 Mbps using tools like REACTS.
- Implemented redundancy using STP protocol in switched Network
- Assisted Network Engineer in the installation and configuration of firewalls.
- Performed on-call support for installation and troubleshooting of the configuration issues.
- Configured and installed Cisco routers 2500, 2600, 3601 and 4000 series.
- Recovered lost passwords and created standard access-lists and extended access list for new users.
- Monitoring network performance to improve the backup strategy using Netrep, Solar winds.