We provide IT Staff Augmentation Services!

Senior Network Engineer Resume

5.00/5 (Submit Your Rating)

Washington, DC

SUMMARY:

  • Over 20 years of experience in the support, designimplementation of LAN/WAN Networks,VPN - IPSec/GRE Tunnels, QOS, VoIP, Unified Messaging and various LAN/WAN Technologies.

TECHNICAL SKILLS:

Network Protocols: TCP/IP, SSL VPN, IPSec; EIGRP/OSPF, RIP; MPLS; 802.11G.

Switching-Network Technologies: Fast/Gigabit Ethernet; FiOEthernet, Port Channel; 802.1QTrunking

Network Operating Systems: Cisco IOS V11.0/12.0 etc.; Windows 2000/2003/2008

Desktop Operating Systems: Windows 2000/XP/NT; MS Exchange 2003/2000/5.5 ; Citrix; etc.

PROFESSIONAL EXPERIENCE:

Confidential, Washington, DC

Senior Network Engineer

Responsibilities:

  • Work as Senior Engineer/Shift Supervisor at headquarters, support WAN/High Speed links to HQ and remote/overseas IT Teams
  • Managed & Reacted to failures (Cisco) routers/switches/FW, connected to Carrier MPLS, VPN connections, Satellite Links (IntelSat) etc
  • Support other networking equipment such as Juniper Netscreen, Cisco ASA firewall, some DNS/DHCP/Unix servers.

Confidential, Wilmington, DE

Sr. Network Security Analyst

Responsibilities:

  • Designing and implementing and International WAN to separate the Alico Insurance company (who was merged with Metlife) from the AIG corporate WAN to include Firewall, IPS/IDS, Secure Router
  • DMZ and ExtraNet design, placement, testing, throughput, redundancy, failover etc. This involved Cisco ASA55xx, ProofpointP850, Bluecoat-Proxy-SG810 Series, Proventia GX52xx, Cisco 7206VXR, 2851, 36xx etc.

Confidential, Adelphi, MD

Network Security Engineer

Responsibilities:

  • Assigned to the UMUC campus Network Security team responsible for Global Security of a Enterprise network which was composed primarily of Cisco, Juniper
  • Checkpoint and Nokia security devices, IDS/IPS, 6500/4500/2811/3750 routers and switches. Designed plans, managed and applied security devices to include Juniper SA4000, Nokia IP690
  • Checkpoint NGX-R65, ASA55xx with SSM20, NetQos, SolarWinds, Tacacs, Cisco 7206VRX; 6509 with BGP/OSPF.

Confidential, Hanover, MD

Sr. Network Security Analyst

Responsibilities:

  • Firewall Administrator on the IBM-Highlas project using Checkpoint NGX-R65 running on Nokia IP380 firewall appliance. Designed/Installed High Availability Firewall/VPNs, administered Security Policies
  • Advised on Network security using SiteProtector IPS, Network Management; maintained Cisco 4500/269x routers, 3550/60 switches, Nokia/IP380, Checkpoint/NGX-R65 Firewall.

Confidential, Gaithersburg, MD

Senior Network Analyst

Responsibilities:

  • Fulfilled a one-year contract to Marriott with the IR-Telcom division, Enterprise WAN Engineering. Supported Core/Distribution network with Cisco 6509/7206/3640/3560/2621/1841/3750
  • Series Switches/Routers Included VPN Services Module, MWAM, FWSM/FWLB, GRE/IPSec tunnels, 5520 ASA/Firewall. Designed VLAN level access for business Partners using IPSec VPN tunnels
  • Failover/Redundancy, BGP/OSPF and other solutions. Configured Voice VLAN for QOS, used Cisco CCMv5 for setup of existing Call Routing Pattern/List/Groups.

Confidential, Baltimore, MD

Senior Network Engineer

Responsibilities:

  • Assignment was at Legg Mason in the Network Support group with their nationwide LAN/WAN Enterprise environment. Supported Cisco 7200/6509 routers, WAN connections, Avaya/Nokia Firewall
  • MS Exchange/Windows 2000/2003 server, Solarwinds, Citrix, Surf Control/Web/Spam filters. Assigned to an RSM McGladrey Insurance Company managed the access of network and Failover of connectivity
  • Configured Voice Call Management, Unified Messaging for user phones, Voice Gateways for a multi-site CallManager cluster with access to PSTN via H.323 gateway.

Confidential

Network Consultant/Sr. Engineer

Responsibilities:

  • Designed and consulted small businesses on WAN communications, Network Security, Firewalls, Voice over IP (VoIP) and VPNs.
  • Installed Cisco/Nokia firewall with VPN and Remote Access. Installed and configured Intrusion Detection System, access-control lists and implemented a cabling system with Gigabit Ethernet.

We'd love your feedback!