Network Security Engineer Resume
Naples, FloridA
PROFESSIONAL SUMMARY:
- Cisco Certified Network Engineer with Around 8 years of real time professional experience in Network Security, Routing, Switching, Firewall technologies, NetworkSupport, VPN, implement and maintaining various LAN/WAN technologies, installing networkingdevices in Windows, Linux environments.
- Hands on experience in configuring and Deployment of Cisco Routers, Cisco Switches, Load Balancers and Firewalls in network support.
- Has knowledge on layer 2 technologies along with Hand’s on experience in implementing and troubleshooting VLAN’s, STP, VTP, VLAN Trunks and Port Security.
- Experience in switched Layer 3 Routing protocol configurations: RIP, IGRP, OSPF, EGP, EIGRP, BGP, CLNP, ICMP, IGMP, IPv4, IPv6, IPSec, IPX, GRE, etc. and switched L2 network VLANs, Trunking, VTP, STP, PVST, RSTP, HSRP, VRRP, and Port Security.
- Good knowledge on security protocols, TACACS+ and RADIUS
- Experience working with Cisco platforms such as ASR9K, NCS6K, NCS5K, Nexus7K, 5K, 2K.
- Expertise in Installation, configuration and troubleshooting of Cisco Gear includes Cisco IOS Switching platforms like 6500, 4507, 3750, 3560, NXOS platforms like Cisco Nexus 7000,5000, Series of Cisco Routers like 7600, 7200, 2911, 2821, Juniper switches EX2200, EX2500, EX3200, EX4200 series, Cisco ASA 5540, 5580 firewalls.
- Switching tasks include VTP, ISL/ 802.1q, IPsec and, VLANs, Ether Channel, Trunking, GRE Tunneling, Port Security, STP and RSTP.
- Worked on F5 Local Traffic Managers (LTM), Global Traffic Manager (GTM) of series 8900, 6400, 6800, 3400, 5100, 3600 and 3DNS migration to GTM
- Communicating and escalating tickets with service providers for network outrage issues.
- Proposed upgrades, installed, and configured Solar Winds Log and Event Manager and Solarwinds Orion modules for network infrastructure monitoring.
- Proficient in Object oriented design experience, with extensive experience of Python - C/C++ binding using Boost Python and Python C types.
- Manage day-to-day operations and configuration of Check Point firewalls.
- Excellent working knowledge of TCP/IP, SMTP protocol suite and OSI layers.
- Experience in configuring VDC, VPC and FCOE, upgrading NX-OS for Nexus Family Switches.
- Work with Cisco partners to help set up and troubleshoot voice network issues.
- Troubleshooting for Layer 2 LAN technologies but not limited to Ethernet (Switched, FastE, GigE), STP, RSTP, VLANs, Cables, Bridges, VTP, and Trunking (802.1q), port security, routing protocols and Aruba Wireless platform.
- Expertise in Packet analyzer tools like Sniffer, Wireshark and Network Management Tools like Solarwinds, HP-Open View.
- Developed and successfully integrated Python scripts to automate SSH login and data collection for network devices not supporting Telnet.
- Implementation of HSRP, VRRP for Default Gateway Redundancy.
- Performed IOS upgrades on Catalyst 2900, 3500, 4500 and 6500 series switches.
- Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
- Worked on Router series such as 2800, 2600, 2900, 3600, 3800,3935 and 7200, switches such as Cisco 3725, 3560, 3550, 2960, 2950, 4500 & 6500.
- Worked on automating data loading, extraction and reports generation using UNIX Shell scripting.
- Password recovery, upgrading of IOS of Cisco devices.
- Hands on experience configuring the 7710, 7010, 5628, 5596T switches with feature-set like Fabric Path, OTV, VPC+, VPC and also VDC for the Border Leaf, SPN and Leaf design and configuring VDC, VPC and other nexus features.
- Knowledge DHCP, DNS, SNMP, RMON, NAT, FTP, AD, NFS.
- In-depth knowledge on Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS.
- Migrated from legacy catalyst 6500 to ASR 9k.
- Deployed Cisco Wireless LAN Controller (WLC) 5520, created SSIDsfor the shows, mapped VLANs to SSID's and linked AP's with WLC.
- Good knowledge of Tunneling Protocols (IPSEC/GRE).
- Understanding the requirements of the client to deploy an efficient network.
- Proficient in MS Windows, MS/Open Office, MS Project 2013.
- Dealt with monitoring tools like (Solar winds, Cisco prime), network packets capture tools like Wire-shark.
- Knowledge of Cyber Threats and mitigation strategies, network monitoring, intrusion detection, reactive measures and prevention, network assessment methodologies, security vulnerability analysis, data encryption, and IA Tools.
- Worked on OTV to extend L2 VLANs between data centers over IP on Nexus 7710 switches.
- Created scripts in Python for manipulating, parsing and converting data in excel sheets.
- Experience in managing, administration and designing of IP Backbone Network and spearheaded the strengthening IP Backbone Network Security.
- Ensures the daily smooth Network administration for a user base of over 4000 employees at 36 locations and numerous external law-enforcement agencies. Ensures that all operational needs are met within a framework of 7 days-a-week, 24 hours a day to support all network operations. Controls the development, implementation and publication of Network Operations standards and policies and ensures that those standards and policies are followed. Prepares activity and progress reports regarding all network systems and operations.
- Interviewed customers by telephone to identify legal issues, and obtain and process the information, worked with customers in all stages of the Child Support process.
- Possess strong network troubleshooting and communication skills.
TECHNICAL SKILLS:
Networking Skills: Skilled in configuring Nexus (7k, 6k, 5k, 2k (FEX), Nexus 1000V), Cisco Routers, Cisco Switches, Arista, VLANS, Spanning Tree (RPVST+, MST), VTP, Ether Channels, UDLD, MPLS, OSPF, RIP, EIGRP, BGP, VoIP, HSRP, VRRP, GLBP,IMS, QOS, ACL, IP Prefix-list, NEXUS (FEX, OTV, FHRP, VPC, VDC), WAAS, MPLS VPN, IPSEC, IPV4, IPV6
Security protocols: IKE, IPsec, SSL, AAA, Access: lists, prefix-lists
Software Tools: Microsoft Office Suite, MS SQL Server 2008, HTML
Network management: SNMP, Cisco Works LMS, HP Openview, Solarwinds, Ethereal.
Layer 3 Switching: CEF, Multi: Layer Switching, Ether Channel.
Carrier Technologies: MPLS, MPLS: VPN
Redundancy Protocols: HSP, VRRP, GLBP
Operating Systems: Windows XP/Vista/7/8/10, Nexus OS, Cisco IOS, Sun Solaris 10/9/8, Red Hat EL 5.x, 6.x, 7 and Windows Server, VMware ESX, Solaris, MS Windows server, Mac OS, UNIX.
Juniper Routers / Firewall: J2300, J6300, M7i, M10i. SSG: 5, SSG-20.
Juniper Switches: EX3200, EX4200, Ex: 8200
Language: Turbo C/C++,Perl and Shell scripting, Power Shell and CGI Script.
Tools: HPOVI, HP Service Desk, Remedy, Thousand Eyes, JIRA, NETQOS, Net Cool, CISCO Prime, CISCO ISE.
PROFESSIONAL EXPERIENCE:
Confidential, Naples, Florida
Network Security Engineer
Responsibilities:
- Working on Cisco platforms such as 6500,4500 Catalyst and Nexus7K, 9k.
- Working on Installing, configuring and troubleshooting of Cisco Switches .
- Switching tasks include VTP, ISL/ 802.1q, IPsec and, VLANs, Ether Channel, Trunking, GRE Tunneling, Port Security, STP.
- Installed and configured network access control servers for AAA Security (RADIUS/TACACS+)
- Migrated Old Fiber LC-SC to New fiber LC -LC type.
- Involved in the Migration of Complete Network Devices From Cisco ACS to Cisco ISE.
- Helped in WAP’s Refresh Project in APAC and USA Sites.
- Worked On Sophos End Point Protection.
- Involved in installing KVM in Datacenters.
- Experience Working with LAN/WAN Technologies and its Protocols.
- Deploy, configure, and support a large-scale production and corporate network and server infrastructure in data centers and Point of Presence (POP) sites.
- Travelling from one location to another in Naples Headquarters in a Monthly basis for Auditing the Network devices and Updated in Share file.
- Configured HA (High Availability) for redundancy in-house and GSLB (Global Server Load Balancing) for DR Citrix NetScaler.
- Upgraded and maintain the Citrix NetScaler firmwares via quarterly software updates from Citrix.
- Built out load balancing or content switching requests for customers based on CitrixNetScaler request form that was made.
- Implementation and administration of Citrix NetScaler Responder response and redirect policiesand rewrite URL transformation policies.
- Designed and implemented DMZ for Web Servers, Mail servers & FTP servers using Cisco ASA 5500 Firewalls
- Responsible forCheck Point, Cisco ASA and Palo-Alto firewalls configuration and administration across global networks for providing IPS/IDS.
- Successfully installedPalo Alto PA-3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls.
- Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering)
- Created statements of work for vendors at the POP sites
- Implementing firewall rules using Panorama, Checkpoint smart dashboard.
- Upgrading the code from PanOS 7.1.X to 8.0.X. Experience working on Panorama.
- Experience with field-based work inPOPs, carrier hotels, or Central Office environments..
- RSA Secure ID token administration for over 12,000 employees and clients.
- Strong knowledge of implementing RSA tokenAuthentication with Good exposure in implementing the oAuth, SAML based Single Sign-on (SSO) and Single Log-Out involving service with Multi factor authentication (MFA).
- Designed and implemented two wireless networks for our locations using Cisco 3502 WAPS and Cisco 3700 series switches for endpoint connectivity back to the wireless control servers using CDP and MAC collection to configure APs.
- Troubleshooting and implementation of VPC, VDC and Fabric path on Nexus 7K Switches Experience in Configuring, upgrading and verifying the NX-OS operation system.
- Designed and configured WAN optimization and acceleration using RiverbedSteelHead 5055, 2050 models
- Performed Configuration on ASR 9K Pairs includes HSRP, VRRP, Bundle Ethernet Config, assigning DHCP profiles
- Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.
- Performed IOS upgradation on Cisco ISR &ASR routers, catalyst switches.
- Successfully replaced INET(DMVPN) and MPLScircuit branch routers (29xx series) with Cisco ISR 44xx series without impacting any ongoing traffic by failing over the traffic using BGP manipulation.
- Experience on Configuration, troubleshooting and support of MPLS L2 and L3 VPN on Cisco ASR series routers.
- Strong Experience on deploying, Configuration and troubleshooting of MP-BGP over DMVPN on Cisco hardware devices.
- Working With Facilities Team for Installing Cabling Requests.
- Communicating and escalating tickets with service providers for network outage issues.
- Proposed upgrades, installed, and configured Solar Winds Log and Solar Winds Orion modules for network infrastructure monitoring.
- Experience Working on Solar Winds Network configuration manager.
- Used DHCP to automatically assign reusable IP addresses to DHCP clients.
- Responding to inbound requests via phone and via Ticketing tool (Foot Prints) for technical assistance with managed services in a timely manner (within documented SLA) to support, threat and other cases.
- Participated in the planning, research, analysis, design, testing, implementation, operation and maintenance support of network
Environment: Switches- Cisco 2960,3506,3750,3850, 4500X, 6500, Nexus 5596T,5548P, 7010 and 2148 Fabric Extender, WAP’s 2802,3502,3602,3702, Riverbed 2050,5055, Cisco ISR Routers- 3800, 3900,4221,4331, Cisco ISE, TCP/IP, Cisco ASR 1000, 7200 VXR; Firewalls- Cisco ASA 5520,5505, PA- 200,500,3020, Checkpoint Firewall, Load Balancer- Citrix Netscaler, Cisco-Prime, DCE, RSA, Sophos.
Confidential, Reston, Virginia
Network Engineer
Responsibilities:
- Provided daily support, maintenance and management for BMO Financial network which comprises of 5000+ nodes in the data center.
- Participated in the planning, research, analysis, design, testing, implementation, operation and maintenance support of network
- Involved in the migration of whole data center architecture from regular 6509 EOL to Nexus 2146, 2224T,5548P, 7018 and 6807 catalyst series using F3/M3 line-cards with 10GE and 40GE interfaces
- Troubleshooting and implementation of VPC, VDC and Fabric path on Nexus 7K Switches Experience in Configuring, upgrading and verifying the NX-OS operation system.
- Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for data center access architecture.
- Configured and deployed VPC between Nexus 7010 and Nexus 5596T and 5548P switches along with 2248
- Implemented 6807-XL as regular Layer3 devices for user access, used 3850 switches in IDF rooms.
- Configured 3850 switches in stack of 8 to serve users with redundancy.
- Configured VSS in 6807 catalyst series to avoid a single point of failure.
- Installation and maintenance of Cisco Layer 3 switch 3750, 4500X, 6500 in the multi-VLAN environment.
- Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLSswitching for stable VPNs.
- Experience with setting up MPLSLayer 3 VPN cloud in data center.
- Implementation of Juniper Firewall, SSG Series, Net Screen Series ISG 1000, SRX Series.
- Configuring and Troubleshooting theJuniper SRX100 and 110 series,JuniperNet Screen routers
- Maintenance and configuration of Cisco ASR1000 series and 7200VXR routers at the data center and deployment of 3900, 3800 for branch connectivity.
- Installed and configured network access control servers for AAA Security (RADIUS/TACACS+)
- Worked extensively in configuring, monitoring and troubleshooting Cisco’s ASA 5500 with ACL, NAT to provide high level of security to the network.
- Experienced in Cisco ASR 9k, CRS and 7600 series equipment and Cisco products such as 3750,2901, and 2811
- Performed Configuration on ASR 9kPairs includes HSRP, VRRP, Bundle Ethernet Config, assigning DHCP profiles
- Implement VRF-lite, Nat rules and Access control policies on Cisco ASRrouters and ASA.
- Managing & troubleshooting day to day operations for our on campus CUCM2 cluster ver 10.5.
- Cisco CUCMupgrade project from various PBX systems to a centralized CUCMsystem.
- Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network
- Designed and implemented DMZ for Web Servers, Mail servers & FTP servers using Cisco ASA 5500 Firewalls
- Implementing firewall rules using Panorama, Checkpoint smart dashboard.
- Responsible forCheck Point, Cisco ASA and Palo-Alto firewalls configuration and administration across global networks for providing IPS/IDS.
- Deployed Site to Site VPNs utilizingCheck Point Firewall.
- Experience in deploying Check Point Provider-1 and configured CMAs.
- Handled various trouble tickets, firewall rule changes, assisting other teams to bring the device to production, making DNS changes in Info Bloxand routing changes.
- Manage a very large DNS environment using Lucent QIPand manual management of DNS for DMZ/External servers.
- Configured BGP and OSPF based Routing.
- Configured IP routing, access control lists, DNS/DHCP, quality of service, and VLANs according to internal documentation.
- Experienced in F5LTM and GTM series 6400, 6800, 8800, 7250 (VIPRION) for corporate applications and their availability.
- Performed complete device installations, maintenance, regular upgrades and patchwork on F5 application delivery controllers (LTM, GTM).
- Maintained and troubleshoot F5 BIG-IP LTM Load balancers for efficient performance and to increase reliability through redundancy.
- Experience in migrating legacy A10 load balancers to F5 load balancers.
- Basic understanding and knowledge on implementation of DMVPN using multi-point GRE tunneling in the enterprise network.
- Migration of network devices (F5, Juniper, Aruba, Routers& switches) from one zone to other. Changing the management IP address.
- Palo Alto user-identification implementation with KIWI servers userPalo Alto user-id agents.
- Palo Alto integration with VMware Virtual Desktop infrastructure.
- Configured Cisco 7204 routers which were also connected to Palo Alto PA 500 & PA 3020 security appliances providing perimeter based firewall security.
- Palo Alto upgradation and degradation.
- Administration of Checkpoint,Palo Alto and Juniper Firewalls at multiple properties.
- Providing the full deployment services on ISE, Next generation firewall and Prime.
- Worked on ISE802.1X, ISE wired/wireless guest andISEtrustsec implementations and deployments.
- Worked as F5load balancer engineer involving complete support day in and out work on the F5load balancers LTMs, GTMs, EMs, ASM, and Firepass in Datacenter and remote functions.
- Load Balancing with F5GTM and LTM across multiple data centers.
- Experience with Infobloxfor delivering enterprise-grade DNS, DHCP, and IP address management.
- Monitoring the network using the network monitoring tools (Net Cool) to ensure network availability and perform necessary maintenance to support network availability.
- Respond to inbound requests via phone and Service Now ticketing tool for technical assistance with managed services in a timely manner
- Open and work Change Requests for Network Services Group, opened trouble tickets and interfaced with telecom and customer to resolve issues.
Environment: Switches- Cisco 3750, 4500X, 6509, 6807-XL, Nexus 5596T,5548P, 7010 and 2148 Fabric Extender; Cisco ISR Routers- 3800, 3900, Cisco ISE,TCP/IP, Cisco ASR 1000, 7200 VXR; Firewalls- Cisco ASA 5520; Load Balancer- BIG-IP F5 LTM-GTM-ASM, A10 load balancer, InfoBlox, Net Cool, Service Now, PA 500,PA 3020, Juniper 3600, 5600,Perl .
Confidential, Oklahoma City, OK
Network Security Engineer
Responsibilities:
- Build and support data networks comprised of Cisco edge devices
- Maximized network performance by monitoring performance; troubleshooting network problems and outages; scheduling upgrades; collaborating with network architects on network optimization
- Experienced in Cisco ASR 9k, CRS and 7600 series equipment and Cisco products such as 3750,2901, and 2811
- Experience in working with Nexus 7010,5548, 5020, 2148, 2248 devices, applied Cisco ISE configuration to switches
- Deployment of data center LAN usingNexus 7K, 5K, 2k switches
- Configuration of Port Channels and VPC onNexus9K,7K, and 5K.
- Implemented network security with Cisco Adaptive Security Appliance (ASA).
- Managed IP addressing and implemented IP Access Lists
- Managed VLANs, Port Security and troubleshoot LAN issues.
- Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing
- Supported EIGRP and BGP-based network by resolving level 2 &3 problems of internal teams & external customers of all locations.
- Performed switching technology administration including VLANs, Trunking, STP, RSTP, port aggregation & link negotiation
- Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs
- Identified log generation and collection of build requirements for their application/service-specifc logs.
- Experience with setting up MPLSLayer 3 VPN cloud in data center.
- Implemented ACL on Cisco, Arista andJuniperrouters according to the change request.
- Used JuniperQFX5100 switches for high performance and low latency in virtualized data center environment.
- Basic understanding and knowledge on implementation of DMVPN using multi-point GRE tunneling in the enterprise network.
- Implementation of Juniper Firewall, SSG Series, Net Screen Series ISG 1000, SRX Series.
- Configuring and Troubleshooting theJuniper SRX100 and 110 series,JuniperNet Screen routers.
- The configuration of Access List ACL (Std, Ext, Named) to allow users all over the company to access different applications and blocking others.
- Set up and maintained Cisco SIP Voice Conferencing systems
- Engineer responsible for VoIP protocol testing for SBC Net-Net 3820, 4500 and 9200.
- Monitoring the network using the network monitoring tools (Solar Winds and HP NNMi) to ensure network availability and perform necessary maintenance to support network availability.
- Experience in adding devices and creating Maps in Solar Winds.
- Using Solar Winds to generate reports on WAN utilization.
- Successfully installedPalo Alto PA-3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls.
- Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
- Administration of Checkpoint,Palo Alto and Juniper Firewalls at multiple properties.
- Providing the full deployment services on ISE, Next generation firewall and Prime.
- Worked on ISE802.1X, ISE wired/wireless guest andISEtrustsec implementations and deployments.
- Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
- Configured Cisco 7204 routers which were also connected to Palo Alto PA 500 & PA 3020 security appliances providing perimeter based firewall security.
- Provide support and for 2Tier and 3Tier firewall architecture, which includes various Checkpoint, Cisco ASA firewalls andPalo Alto firewalls.
- Security policy review and configuration in Palo Alto.
- Configured security features such as IPSEC VPN, TLS and SSL.
- Configured and maintained BIG IP F5 load balancers LTM 1600 for load balancing and application redundancy.
- Experience in ASR routers ASR 5k, ASR 9k and ASR 9000 in enterprise network environment.
- Experience in configuring security policies includes PAT, VPN, NAT, Access-control lists and Route-maps.
- Good knowledge and hands on experience of implemented firewall policies to Cisco ASA.
- Prepared Check Point firewall configurations for migrating from Cisco ASA 8.2 version to Cisco ASA8.4 versions.
- Responsible forCheck Point, Cisco ASA and Palo-Alto firewalls configuration and administration across global networks for providing IPS/IDS.
- Configuration of the firewall usingCheck Point WEB UI interface.
- Deployed Site to Site VPNs utilizingCheck Point Firewall.
- Experience in deploying Check Point Provider-1 and configured CMAs.
- Managed TACACS server for VPN user authentication and network devices authentication
- Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card(module) for the Nexus 5000
- Managed health check of Network devices which involves upgrading IOS on every quarter after checking the vulnerability of IOS and reviewing the configuration
- Upgraded Cisco Routers, Switches and Firewall IOS using TFTP
- Managed VLANs, Port Security and troubleshoot LAN issues.
- Respond to inbound requests via phone and JIRA ticketing tool for technical assistance with managed services in a timely manner.
- Responsible for deploying and the use of network management protocols (e.g. SNMP, SNMP Traps, Syslog, ICMP and Traffic analyzer using Wireshark).
- Interface with the Threat Management Center teams to identify improvements to detection and alerting capabilities within the SIEM and Data Platforms.
- Resolve problems independently and understand escalation procedure
- Reporting network operational status by gathering, prioritizing information; managing projects
Environment: Switches- Cisco 3750,2901, Nexus 7010, 5k, 2248 and 2148 Fabric Extender, Cisco ISR Routers- 3800, 3900, 2951, 2821, Cisco ASR 9K, 7600, ISEwired/wireless/Trustsec/802.1xFirewalls- PA 500, PA 3020, VoIP, Cisco ASA 5500, Check Points, Solar Winds, JIRA, ArubaControllers 6000, 3600, 3400,650,Juniper 3600, 5600, Azure.
Confidential, Sacramento, CA
Network Engineer
Responsibilities:
- Primary Duties include 24x7 Level II support for the Network. Providing support to offices all over the State.
- Maintained and updated the Network diagrams.
- Co-ordination with Hardware vendors, software vendors and service Providers.
- Assisted in backup, restoring and upgrading the Router and switch IOS.
- Worked on Cisco Routers, Cisco 3750, and Cisco 2960-SF Switches.
- Worked on Citrix NetScaler Load Balancer for Load balancing and failover across data center and between web servers.
- LAN Segments monitoring/troubleshooting LAN related issues.
- Carried out periodic backup of Router/Switch configurations, configured and upgraded Cisco IOS
- Troubleshoot IOS related bugs based on past history and appropriate release notes
- Worked in VPN (IPSEC and GRE) migrations and new designs for the clients.
- Configured SSH on all network switches and routers for secure management purposes.
- Troubleshoot the Network Routing protocols (OSPF and RIP) during the migrations and new client connections.
- Primarily focused on Automation and failover capabilities on Security Compliance Operation.
- Involved in maintaining STP, RSTP and PVST+ for the catalyst switches.
- Implemented Trunking protocols like 802.1q on 3750 switches.
- Experience in Installing, configuring, and maintaining of Cisco Switches (2900, 4500, 3500, 7200), Cisco Routers (7200, 3600, 2800, 2900) & ASR 1000, Nexus 5k & 2k.
- Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, Frame relay, NAT, DHCP, TCP/IP).
- Knowledge on VOIP protocols like H.323, RTP, SIP and good understanding about VOIP devices.
- Planned and Implemented New Infrastructure in the Data Center.
- Used Wireshark Network Packet Analyzer to capture live packet data from network interface and troubleshoot network related problems
- Hands on experience of Cisco works and Cisco configuration professional tools used for Network discovery, topology views and VLAN management
- Configured IP, RIP & OSPFin routers.
- Performed switching technology administration including VLANs, inter-VLAN routing, Trunking, STP, RSTP, port aggregation & link negotiation.
- Responsibilities also include technical documentation of all upgrades done
- Design, execution of installation and configuration of VPN, LAN/WAN as per organizational requirements.
- Used DHCP to automatically assign reusable IP addresses to DHCP clients
- Involved in troubleshooting of DNS, DHCP, and other IP conflict problems
- Upgrades and backups of Cisco router configuration file to a TFTP server
- Cisco IOS upgrade and device password recovery
- Configured and Implemented VLANS over the core Switch, configured VTP to manage VLAN database
- Enable STP attack mitigation using BPDU guard, Root guard and BPDU filters.
- Managed IP addressing and implemented IP Access Lists
- Converted Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
- Respond to inbound requests via phone and via Remedy Ticketing tool for technical assistance with managed services in a timely manner (within documented SLA) to support, threat and other cases.
- Worked with Configuration Management Database (CMDB) a centralized repository that stores information about the IP address, Vlan's info of the hardware devices.
- Collaborate effectively with local team members and offshore staff to create best practice processes
Environment: Switches- 3750, 3850, 2960-SF, 4500, 4900 series, ISR Routers-2900, 3800, 3900 series, Cisco ASA, End point Security, Checkpoint firewalls, Remedy, Azure.
Confidential
Network Associate
Responsibilities:
- Helped the team to configure, manage and troubleshoot network devices (Routers, Switches).
- Worked on Routers Cisco 1600, 2800, 3600 and Cisco 2950, 3550, 3750 Switches
- Maintained complex LAN/WAN networks with several VLANS and provided support for routing protocols.
- Managed IP address space using Subnets and VLSM, implemented IP Access Lists and configured VLAN, VTP, STP, and Trunks.
- Troubleshooting of the connectivity and network problems
- Upgrades and backups of Cisco router configuration file to a TFTP server
- Involved in troubleshooting of DNS, DHCP, and other IP conflict problems.
- Installed WAP at various locations in the company
- Configuring static and OSPF routing protocols on Cisco 1600, 2800,3600 series Routers
- Implemented port aggregation & link negotiation using LACP and PAGP.
- Design network and create physical and logical network layout diagrams
- Maintained technical documents describing implemented technologies and architecture, logs of the network, bandwidth utilization of servers and network devices.
- Configured NAT and PAT policies
- Extensively used TCP/IP tool like TELNET for remote login to the routers and SSH for secure login
- Builds simulated networks in test labs to resolve highly complex problems and compatibility issues.
Environment: Switches- Cisco Catalyst 2950, 3550, 3750, Routers-1600, 2800, 3600 series