We provide IT Staff Augmentation Services!

Data Center Network Engineer Resume

5.00/5 (Submit Your Rating)

Irvine, CA

SUMMARY

  • Network Engineer wif 8 Years of experience in networking, security, installing, configuring and maintainingnetwork devices.
  • Good understanding of networking concepts such as TCP/IP protocols, VLANs, IP address management andnetworksecurity.
  • Experience in Cisco Routing, Switching and Security wif strong Cisco hardware/software experiences wif Cisco Routers such as 1900, 2900, 3900, Cisco ASR - 1k/9k, Cisco Multilayer Switches 4500, 6500, Cisco Nexus 2k/5k/7k/9k.
  • Strong understanding of current and future technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, ACL, VPN, Wireless LAN and configuration of VLANs.
  • Expertise in Configuration of VLANS, using Cisco Multilayer switches and supporting STP, RSTP, PVST, RPVST along wif troubleshooting of inter-VLAN routing and VLAN Trunking using 802.1Q.
  • Experienced in Palo Alto Firewalls, Juniper Firewalls, Checkpoint firewalls, Fortinet Firewalls, Cisco WSA/CWS, Cisco ASA, SSL VPN, Cisco Nexus, Cisco ACS, Cisco ISE and IPS.
  • Hands on wif Blue Coat URL filtering wif white listing and blacklisting URL, creating rules for content filtering.
  • Configure and implement Network Infrastructure monitoring, alerting, backups, and system management solutions built on Linux Firewall and ACL security implementations.
  • Created Route maps on F5 BIG-IP GTM to link various VIPs from different F5 BIG-IP LTM to GTM.
  • Good Knowledge and experience working wif F5 BIG-IP command line interface (CLI) and Traffic Management Shell (TMSH).
  • Administrated a network using Network Access Control List (NAC) to enhance security of the LAN network.
  • Expertise in Endpoint Security Antivirus wif SEPM (Symantec Endpoint Manager).
  • Expertise in URL filtering wif Forcepoint, Email and web security wif Cisco IronPort.
  • Proficient in using firewall technologies including general configuration, security policy, rules creation and modification of Cisco ASA, Juniper SRX and checkpoint.
  • Experience wif Cisco IOS, cat OS, Cisco IOS XR and JUNOS.s
  • Proficiently implemented traffic filters using Standard and Extended access-lists, Distribution lists, Route-maps and Route Manipulation using offset-list.
  • Basic experience in CISCO source fire and its products.
  • Create PowerShell runbooks in Azure Automation.
  • Create AD users\group using the active directory PowerShell module.
  • Expertise in IP Sub netting and worked on various designing and allocating various classes of IP address to the domain.
  • Configured Infoblox failover using Infoblox DHCP dat is based upon ISC DHCP modes on F5 management system.
  • Expertise knowledge in scripting (Perl/Bash/Python), VMware, ticketing tools like ServiceNow, Remedy and networksecurity including NAT/PAT, ACL, VPN and IPSEC on DMVPN.
  • Extensively worked on Cisco catalyst 6509 and implemented VSS along wif VDC and VPC on Nexus 5505, 7009 switches.
  • Experience in configuring and troubleshooting NetScaler, BIG-IP F5 load balancer LTM.
  • Managed the fire sight devices along wif security tools like Symantec, MacAfee.
  • In-depth understanding of UDP and TCP protocols.
  • Responsible for check point and Cisco ASA firewall administration across globalnetworks.
  • Used python, c#, PowerShell programming and language to develop an efficient and working network in the company.
  • Designing, Develop and Execute Test-Cases using C# and python.
  • Worked on Load balancer F5 LTM, Citrix NetScaler, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Established relationships andnetworkconnectivity wif vendors via site to site VPN.
  • In-depth knowledge in Tier-2 ISP Routing policies,NetworkArchitecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, Firewalls.
  • Adept in handlingnetworkmonitoring tools such as Wireshark, Net flow, SNMP and SYSLOG.
  • Highly motivated wif the ability to work independently or as an integral part of a team and committed to highest levels of profession.

TECHNICAL SKILLS

Routers: Cisco 7600, 7200, 3800, 3600, 2900, 2800, 2600, ASR 1K, ASR9K, Juniper MX 480, MX 960

Routing Protocols: OSPF, EIGRP, BGP, RIP v1/v2, MPLS PBR, Route Filtering, Redistribution, Summarization, and Static Routing

Switches: Nexus 2K/5K/7K, Cisco Catalyst 6500, 4500, 3850,3560, 3750, 2960, Juniper JunOS

Switching Protocols: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels, Transparent Bridging

Multicast Protocols: IGMP, IGMP version 2 and 3, CGMP, PIM-Sparse and Dense Mode DHCP, FTP, TFTP

LAN technologies: Ethernet, Fast & Gigabit Ethernet, VLANS, VTP, STP, RSTP, 802.1W, Cisco Prime

WAN technologies: Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN and ATM

Load Balancer: F5 Networks (Big-IP) LTM 8900 and 6400 F5 LTM, APM, ASM

Network security: Cisco ASA 5585,5550,5540, ACL, IPSEC, F5 Load Balancer, Checkpoint, Palo Alto 3000, 5000, 7000 series, IPSec VPN, GRE VPN

Network Management: SolarWinds, Proteus, Xilinx 9.21, HP Open-view, Wireshark, Spirent, SNMP

Operating systems: Windows XP/ 7/ 8, Windows Server 2003/ 2008, Mac OS X and Linux

Language skills: C, C++, Python, Bash, SQL

Various Features & Services: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP, FTP

Applications: MS (Office, Word, Outlook, Excel, PowerPoint, Visio), VMware, Adobe Photoshop and Illustrator

PROFESSIONAL EXPERIENCE

Confidential, Irvine, CA

Data Center Network Engineer

Responsibilities:

  • Involved in configuring and implementing of composite Network models consists of Cisco ASR 1K,7600, 7200, 1921 series routers and Cisco 9K, 7K, 5K, 6500 Series switches.
  • Designing and implementing LAN/WAN solutions across locations
  • Data centers consolidation, design, management and supporting network activities.
  • Managing the LAN/WAN devices across locations for day-to-day operations.
  • Networks using routing protocols such as OSPF, BGP, EIGRP and manipulated routing updates using route-map, distribute list and administrative distance.
  • Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter-VLAN routing, LAN security etc. Deploying Layer 2 security in Server Farms by configuring switch for 802.1x port based autantication
  • Configured OSPF redistribution and autantication wif type 3 LSA filtering to prevent LSA flooding.
  • Configured OSPF over frame relay networks for NBMA and point to multipoint strategies.
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path.
  • Managing location specific Cisco ASA Firewalls and also data center internet gateway firewalls.
  • Firewall policy administration and support on PIX Firewalls as well as Cisco ASA Firewalls.
  • Responsible for setting up the infrastructure environment wif majority of Cisco & Palo Alto appliances.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Handling new application load balancing requirements through F5 LTM devices.
  • Experience wif configuring Virtual Server and configuring load balancing methods in F5 12.0 LTM.
  • Configured NAT and SNAT in F5 12.0 LTM. Managed virtual servers in F5 12.0 LTM.
  • Maintain BIG IP F5 configuration for modules LTM, ASM, APM and future GTM.
  • Communicate wif application owners and project management regardingASMissues
  • Drive all technical aspects of the adoption ofF5ASMapplication layer firewall
  • Design, develop and execute network test solutions for large-scale infrastructure products.
  • Upgrading and deployment of Nexus 9K,7k, 5k and 2k
  • Configured VPC, FEX and VDC’s on Nexus 5K, 7K.
  • CreatedACIEPGs (End Point Groups) contract policies, VRFs and bridge domains for tenants
  • Experience wif Cisco ASR’s, Catalyst 6500 series switches, 2800 series, and 3800 series. 2900 series and 3900 series routers.
  • Coordinating wif service providers like AT&T, Verizon etc. for all network outages /restoration/new implementations.
  • Integrating new locations wif existing MPLS Network and enabling standard corporate application access.
  • Implementation of Site to Site VPN s wif direct vendors and customers.
  • Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
  • Experience working wif Cisco IOS-XR on the ASR9000 devices for MPLS deployments.
  • Designed multi-siteACISDN networking solution for cloud environment
  • Worked on open source Python library dat simplifies SSH management to Network Devices Paramiko SSH Library
  • In the Lab Environment recently started working on a method to automate various tasks in Cisco IOS using Python and Ansible. The general method consists of an SSH control Channel and a separate SCP channel to transfer files.
  • Developing a stateless firewall in Lab Environment using RYUSDNcontroller to filter network traffic in both directions, Technologies used arePython,SDN, Mininet, OpenFlow switches in both Lab and Production Environments
  • Design and programming of new DMZS portal dat includes web site, email and customer provisioning along wif online tools for network and local vulnerability assessment.
  • Implementing and maintaining network monitoring system (Cisco works, HP Open view and Wireshark) and experience wif developing network design documentation using VISIO.
  • Designed and deployed a Cisco Identity Services Engine (ISE) solution (wired, wireless, and VPN users) for a commercial client wif converged access switches and Cisco ASA firewalls.
  • Installed and configure Cisco Identity Service Engine (ISE) 2.0 and implement 802.1x and wireless guest sponsor portal.
  • Worked wif team Managing and configuringArubaWireless controller devices (7210, 7240) and Cisco Access Points.
  • Experience in performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s.
  • Implement Infoblox DNS appliance and run scripts as needed.
  • Organized and oversaw application upgrades to ACAS andInfoblox.
  • Used DHCP to automatically assign reusable IP addresses to DHCP clients viaINFOBLOXIPAM.
  • Worked on Windows layered products including MS Exchange, DNS and Active Directory.
  • Used Infoblox for documentation and tools updates.
  • Configuration and maintain Active Directory, DNS, DHCP and Domain Controllers.
  • Advanced knowledge, design, installation, configuration, maintenance and administration of Junos, Juniper SRX Firewall, Juniper EX and Juniper MX devices.
  • Spearhead the complete spectrum of PCI audits to evaluate network and information security from the perimeter of the network to the infrastructure's internal core.
  • Attending weekly CAB meetings and ensuring all changes were going through the change process.
  • Capacity planning and providing recommendations for infra upgrades
  • Infrastructure upgrades and new Infra deployments.
  • Managing IT Security & Disaster recovery Management

Environment: Cisco 6506/4948/4510 switches, Cisco 3660/3845/7609 Routers, Cisco ASA, Palo Alto, F5 Load Balancers, OSPF, BGP, MPLS, HSRP, Juniper MX 960, Nexus 2K, 5K, 7K.

Confidential, NY

Network Security Engineer

Responsibilities:

  • Worked as a security engineer for migrating the Cisco and FortiGate firewalls to next generation Palo Alto firewalls.
  • Worked wif Palo Alto firewalls using Panorama servers and performed changes to monitor/block/allow the traffic on the firewall.
  • Responsible to evaluate, test, configure, propose and implement network, firewall and security solution wif Palo Alto networks.
  • Performed security audits on Cisco ASA, FortiGate and Palo Alto firewalls in Network and secured the network by bringing it to the present security standards.
  • Troubleshooting and implementing changes on Cisco, Checkpoint, FortiGate firewalls, F5 load balancers, Blue Coat proxies, and Juniper SSL/VPN devices.
  • Migration of the firewall from Cisco ASA to Palo Alto firewalls using migration tool from PAN.
  • Managed firewall design wif network access control, Large Scale VPN deployment, automated firewall Policy deployment utilizing Panorama to build and edit templates for remote sites.
  • Provided administration and support on Bluecoat Proxy for content filtering and internet access to head quarter, remote site offices and VPN client users.
  • Successfully installed Palo Alto PA-3020, PA-3060, PA-5060 Firewalls to protect Data Centre and provided L3 support for routers/switches/Firewalls and implemented Zone Based security rules on the Palo Alto Firewall.
  • Scheduling of Weekly scans and monitoring, generating Vulnerability reports and sharing to appropriate groups or owners for Remediation along wif recommendations.
  • Load Balancing using F5 Networks Big IP and configured the Automatic policy builder using the deployment wizard tool in Application Security Manager.
  • Created Route maps on F5 BIG-IP GTM to link various VIPs from different F5 BIG-IP LTM to GTM.
  • Performed complete setup of new F5 BIG-IP LTM, GTM and APM device, including license activation, VLANs configurations, Device certificates etc.
  • Performed numerous SSL certificate renewals for customer VIPs, maintaining and renewing of all Load Balancers Device certificates.
  • Performed hardware refresh on existing F5 BIG-IP Load Balancers to replace wif new F5 BIG-IP devices and bought the F5 devices into the network in an uninterrupted manner.
  • Create AD users\group using the active directory PowerShell module.
  • Wrote a PowerShell runbook to interact wif SCOM and put a VM into maintenance mode and tan shutdown the VM on azure thus maintaining the agreed SLA.
  • Installed, configured and implemented NetscalerManagement and Analytics (MAS), for single platform Netscaler administrations.
  • Installed and configured NetScaler's MPX 5509 HA cluster mode to manage Citrix and WEB applications load-balancing
  • Daily, worked on clearing existing tickets regarding firewall policies, proxies, weekly policy updates and documenting these events and changes.
  • Expanded Data Loss Prevention (DLP) program to include all the high-risk applications, protocols, platforms, and devices.
  • Responsible for the daily monitoring and investigation of violated Data Loss Prevention (DLP) policies using the Forcepoint Triton Security Gateway.

Confidential, Bloomington, IL

Network Engineer

Responsibilities:

  • As a Network Engineer worked wif teams supporting Cisco routers, Switches, Firewalls, F5 Load Balancer and Bluecoat Proxy Servers.
  • Responsible for entire LAN and WAN/WLAN maintenance and troubleshooting of the company network.
  • Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements.
  • Handling Incident tickets, Service requests and Change requests raised by the customers through REMEDY tool.
  • Extensive working knowledge in Security tools to maintain the client domain Infrastructure clean from the threats, virus and malware using tools like MacAfee, Symantec.
  • Day-to-day work involves scheduling firewall policy provisioning and working wif users to identify connectivity related issues and troubleshoot using CLI.
  • Experience wif designing and implementation of Virtual Switching System (VSS) for both User segment and server segment using catalyst switches.
  • Responsible for troubleshooting Cisco ISE and new added devices on network based on policies on Cisco ISE.
  • Configured F5 GTM solutions, which includes Wide IP, Pool Load Balancing Methods, probers and monitors and created complex rules utilizing TCL scripting to perform load balancing decisions.
  • Involved in developing required classes and interfaces using C#.
  • Providing Dailynetworksupport for Wide AreaNetworkconsisting of MPLS, VPN and point-to-point site.
  • Extensively worked on Cisco catalyst 6509 and implemented VSS along wif VDC and VPC on Nexus 5505, 7009, 9kswitches.
  • Experience wif configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Installing, configuring Cisco Catalyst switches 9k6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP wif Access Control lists implemented as perNetworkDesign.
  • Managed VPN, IPSec, Endpoint-Security, status policy, Application control, IPS, Monitoring, Anti-Spam, Smart Provisioning, and DLP using Checkpoint Firewalls.
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications.

Confidential, NJ

Network Engineer

Responsibilities:

  • Troubleshooting the latency issues in the WANnetwork.
  • Participated in on call support in troubleshooting the configuration and installation issues.
  • Ensure all elements wif 100 % uptime, Ensure redundancy for all Criticalnetworkelements in LACP mode.
  • Configured Routing protocols such as OSPF, BGP static routing and policy-based routing.
  • Monitoring the WAN links using Solar winds and wat's up gold.
  • Continually monitor, assess and improvenetworksecurity test wif the help of Solar winds.
  • Provided deployment guidelines for inserting new IP technology and upgrades into MPLS on backbonenetwork.
  • Switching related tasks included implementing DHCP, VLANS, VTP, RSTP and Port security.
  • Experience in configuring Site-to-site and remote access VPN solutions.
  • Ensure allNetworkelements are deployed as per deployment template and standard configuration template.
  • Worked wif vendors Cisco, Huawei in validating hardware and software features.
  • Providing 24x7 technical supports to complete team. Management of Netops server for providing uninterrupted services to customers.
  • Ensurenetworkis migrated to MPLS architecture up to Core switch level.
  • Configured Client VPN technologies including Cisco's VPN client via IPSEC.
  • Developed route redistribution mechanism between BGP and OSPF for large scalenetworks.
  • Configuring IP sec VPNs as per customer requirements wif standard encryption and encapsulation.
  • Documentation ofNetworkdetails, reporting theNetworkhealth status to respective teams for action.
  • Configured SNMP on all tanetworkdevices and added them to SolarWinds for monitoring.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP and RSTP, MSTP, LACP.
  • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Dealt wif the configuration of Standard and Extended ACLs for Security.
  • Worked along wif the team in resolving client raised incident tickets using service now tool.
  • Monitoring &Troubleshooting Cisco core Routers (7200, 3600, 1700 and 1600) and Switches. (Cisco 2900, 6500, 3500, 3700 and 3Com Switches)
  • Configuring ACL to allow only authorized users to access the servers.
  • To ensure high availability of system resources to the end users and to maximize the uptime of doing the necessary work to diagnose, detect and rectify the faults in time.
  • Coordinating the technical activities wif their vendors & Telco to keep the systems andnetwork uptime to 98% and submission of monthly reports on the project.

Confidential

Network Engineer

Responsibilities:

  • Tanetworkinfrastructure for Cisco platform for more than 300 devices i.e. 2800, 3600 series Routers and switches for office and for various Customers.
  • Migration of RIPv2 to OSPF, BGP routing protocols.
  • Designed Configured, Installed, and Maintained and provided T-Shoot.
  • Troubleshoot problems on a day to day basis and providing solutions dat would fix the problems wifin theirnetwork.
  • Designing Solutions for frozen requirements using Cisco Routers and Switches.
  • Configured EIGRP for Lab Environment.
  • Maintained Redundancy on Cisco 2600, 2800 and 3600 routers wif HSRP.
  • Created VLAN and Inter-VLAN routing wif Multilayer Switching.
  • Played role as VMware/windows admin to provide L1&L2 supports in complex environment.
  • Designed and installed Vmware site recovery manager.
  • Designing Solutions for frozen requirements using Cisco Routers and Switches.
  • Implemented ISL and 802.1Q for communicating through VTP.
  • Working wif client team to find out requirements for theirnetwork.
  • Configured RSTP, LACP and VTP on Cisco devices.
  • Installing, Configuring Cisco Catalyst switches 6500, 3750 and 3550 series and configured routing protocol OSPF, EIGRP, BGP wif Access Control Lists implemented as per Network Design.
  • Experience in deploying EIGRP/BGP redistribution and the changing the metrics for the primary and back up.
  • Fourth tier troubleshooting, support and implementation for DNS/DHCP.
  • Involved in Troubleshooting IP addressing Issues and Updating IOS Images using TFTP.
  • Performed DHCP, RIP and OSPF Routing Protocol Administration.
  • Other responsibilities included documentation and support other teams.

Confidential

Network Administrator

Responsibilities:

  • Worked wif upgrade, replacement of NICs, display cards, RAM, peripheral devices.
  • Worked on DNS, DHCP protocols.
  • Worked in Network building and Network infrastructure management team.
  • Experience wif Remedy ticketing system in resolving tickets related to routing and Switching.
  • Handled installation, configuration and troubleshooting of operating systems NT/2000, XP, and Solaris.
  • Remotely testing links up to 1.5 Mbps using tools like REACTS.
  • Implemented redundancy using STP protocol in switched Network
  • Assisted Network Engineer in the installation and configuration of firewalls.
  • Performed on-call support for installation and troubleshooting of the configuration issues.
  • Configured and installed Cisco routers 2500, 2600, 3601 and 4000 series.
  • Recovered lost passwords and created standard access-lists and extended access list for new users.
  • Monitoring network performance to improve the backup strategy using Netrep, Solar winds.

We'd love your feedback!