Network Operations Engineer Resume
Lincolnshire, IllinoiS
SUMMARY:
- CCNP certified network engineer with 8+ years of experience in IT industry, which includes expertise in the areas of Routing, Switching, Firewalls management, VPN management, and Administration and troubleshooting.
- Proficient in configuration & troubleshooting of routing protocols: MP - BGP, EIGRP, OSPF, BGP and MPLS.
- Involved in configuration setup and troubleshooting of Cisco and juniper devices to perform functions at the Access, Distribution, and Core layers.
- Experience working with Nexus 7010/Nexus 7018, 5020, 2148, 2248 devices.
- Experience working with Cisco Nexus2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture.
- Experience with configuring Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000.
- Hands on experience in troubleshooting and deploying of various IP Routing Protocols OSPF & BGP on Juniper routers.
- Implemented security policies using ACL, Firewall, IPsec, VPN, Checkpoint, Fire eye, Confidential Security TACACS+, and Radius on different series of routers.
- Worked on Juniper devices like EX-2200, EX-4200, EX-4300, MX-80, MX-480, M Series, SRX210 and SRX240.
- Ability to manage all phases of network installation and administration.
- Excellent customer management/resolution, problem solving and debugging skills with good verbal/written communications and presentation skills.
- Experience with convert Cisco ASA rules over to the Juniper SRX based solution.
- Excellent skills to implement VLANS, private VLANS, Voice VLANS, Port security, STP and RSTP (802.1W), standard and extended access lists for managing access based security, creating root views for administrative privileges.
- Extensive knowledge of deploying & troubleshooting TCP/IP, Implementing IPv6, Transition from IPv4 to IPv6, Multilayer Switching, UDP, Fast Ethernet, Gigabit Ethernet, Voice/Data Integration techniques.
- Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Solar Winds, Splunk and Cisco works to support troubleshooting issues.
- Adept in preparing Technical Documentation, MOPS and presentations using Microsoft VISIO/Office.
- Well organized, Self-starter, Quick learner, Self-Motivated, Team player with analytical, technical and communication skills.
SKILL:
Cisco & other vendor equipment: Nexus 7K, 5K, 2K & 1K, Cisco routers Cisco GSR 00, 3800, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 2900 series). Juniper SRXFirewall (240/550/1500 ), ASA Firewall (5505/5510), Cisco ACE Load Balancers, checkpoint.
RIP, IGRP, EIGRP, OSPF, IS: IS, BGP, HSRP, VRRP & GLBP
Infrastructure services: DHCP, DNS, SMTP, FTP, TFTP
LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet
Port: Channel, VLANS, VTP, STP, RSTP, 802.1Q
WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPPDS1, DS3, OC3, T1 /T3 & SONET
Packet Switched WAN: ATM, FRAME RELAY, MPLS VPNs
Network Security: NAT/PAT, Ingress & Egress Firewall Design, VPN Configuration Internet Content Filtering, Load Balancing, IDS/IPS, Dynamic, Reflexive ACL and authentication Confidential (TACACS+ & RADIUS)
Effectively utilized operating systems: WindowXP/Vista/7/8.1/10, UNIX and LINUX (RedHat, Opens use, Fedora)
PROFESSIONAL EXPERIENCE:
Confidential, Lincolnshire, Illinois
Network Operations Engineer
Responsibilities:
- Configure/implement network infrastructure components such as routers, switches, wireless controllers, and firewalls.
- Support worldwide enterprise network configuration changes and perform changes on all network devices during off production hours.
- Work with level 1,2 and 3 engineers while changes are implementedand open tickets to support changes and document all commands entered for the change.
- Support complex networkoperations support for the System network. Diagnose complex network disruptions and assists in coordination activities for restoration of network services.
- Work closely with At&t and Frontier on testing and troubleshooting circuit issues.
- Analyzes data traffic patterns within network infrastructure to detect operational problems and recommends improvements to ensure optimal performance.
- Investigate/resolve connectivity issues across LAN/WAN.
- Troubleshoot dynamic routing protocols such as EIGRP, OSPF, and BGP.
- Investigate/resolve vendor incidents through maintenance contracts.
- Monitor networktraffic to ensure high quality connectivity.
- Monitor and manage multiple systems for multiple clients remotely and liaised between vendor support and system owners.
- Using Solar Wind monitor network devices globally for network latency and usage, manage internal network IP address using Infoblox.
- Responsible for providing in-depth troubleshooting and resolution of problems while complying with customer SLA times.
- Involved in troubleshooting of DNS, DHCP and other IP conflict problems
- Responsible for Data center operations, monitoring and maintaining the network devices.
- Document and followed the change process as per IT policy it also includes the configuration of port channel between core switches and server distribution switches.
- Familiar in Setting up GTM / LTM for F5BigIP, by writing iRules, SSL offload and creating WIP and VIP's, also familiar with enterprise level traffic managers.
- Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security Settings of the networking devices (Cisco Router, switches) co-coordinating with the system/Network administrator during any major changes and implementation.
- Assist the certification team and perform configuration of LAN\WAN technologies such as Ethernet, Fast Ethernet, and Gigabit Ethernet.
- Implemented Solar Wind & Net flow to maintain configuration backups and have more visibility into our data.
- Troubleshooting the Access points using Cisco Wireless Controllers, Cisco Prime & LED Status on the access points.
Confidential, Dearborn, Michigan
Sr. Network Engineer
Responsibilities:
- Experience with migration of datacenter switches from 6500-based data center to Nexus based data center.
- Responsible for Data center operations, monitoring and maintaining the network devices.
- Experience with communicating with different customers, IT teams in gathering the details for the project.
- Experience working with Cisco IOS-XR on the ASR9000 devices at core layer.
- Involved in Substantial lab testing & validation prior to implementation of Nexus 7K, 5K & 2K connecting to blade servers.
- Infrastructure design, implementation and integration leveraging use of on-site and cloud-based assets to ensure high availability and redundant disaster recovery options.
- Responsible for implementation and troubleshooting of Nexus 7010, 5020, 2148, 2248 devices as a part of the datacenter migration project.
- Perform configuration and maintenance of LAN/ WLANinfrastructure, which included switches, wireless controllers, wireless access points, UPS’s and PDU’s.
- Responsible for implementation of Cisco Nexus 2148 Fabric Extender and Nexus 5000series to provide a flexible Access Solution for datacenter access architecture.
- Experience in working with installing Nexus 7010 NX-OS upgrade.
- Experience with configuring various network services like DNS, DHCP and NAT implementations with Cisco devices.
- Installation and Configuration of Cisco switches 3850 stack wise seriesswitches in the access layer.
- Experience configuringOSPF and BGPon branch routers with Access Control lists implemented as per Network Design Document. Established redundancy at critical sites for high availability.
- Automated network implementations and tasks and designed monitoring tools using python scripting.
- Configuring Cisco ASA firewalls in single and multiple context mode firewalls.
- Experience with F5 load balancers - LTM, GTM series like 5800,7200-V for the corporate applications and their availability.
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/SRX security appliance Failover, DMZ zoning, & Configuring VLANs NATing with the firewalls as per the design.
- Configuration and extension of VLAN from one network segment to other network segment between different vendor switches (Cisco, Juniper)
- Automated network implementations and tasks and designed monitoring tools using python scripting.
- Responsible Configuring OSPF and BGP on Juniper MX series Routers.
- Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, EtherChannel, Trunking, Port Security, STP and RSTP.
- Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
- Involved in design and deploying various network security & High availability products like Cisco ASA and other security products.
- Worked in various wireless installation projects and installation of indoor/outdoor wireless installs, Network cabinet, Fiber/ Ethernet cabling, new equipment and provide new design documentation and inventory spreadsheets.
- Collecting information of Network infrastructure using SNMP tools SolarWinds, HP NNM and Opnet.
- Enabled continuous Layer 2 monitoring with SolarWinds, so that each site can run independently until connectivity is restored.
- Used SPLUNK to monitor traffic flow, and to confirm connectivity.
- Responsible for managing activities, Upgrading IOS - Upgrading hardware and installing new devices, tuning (Configuration), make standardization for the topology.
- Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling.
- Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data environment.
- Replace branch hardware with new 2900/3900/MX-80 routers and 3850 switches.
- Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports.
- Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
- Followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches.
- Responsible for the general upgrade and operation of infrastructure environment's performance, stability and security.
- Implement and configured GLBP (on core switching and for VPN redundancy), HSRP on different location of office on the switched network and managing the entire multilayer switched network.
Confidential, Eden Prairie, MN
Network Security Admin
Responsibilities:
- Involved in design and implementation ofdata center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.
- Build and maintain servers in a data center environment, while troubleshooting a wide range of hardware.
- Responsible for Configuration of Cisco Catalyst switches 6500, 4500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
- Managing health check of Network devices this is involves upgrading IOS on every quarter after checking the vulnerability of IOS and reviewing the configuration.
- Configured BGP routes to enable ExpressRoute connections between on premise data centers and Azure cloud.
- Installation, Configuration and Administration of ADS, DNS, DHCP and Web proxy(ISA)server.
- Router/ Microsoft VPN Server to access certain limited network resources from customer locations.
- Installed and configured ASA 5520 in customer locations for the Guest access.
- Supported data communications and network connectivity across all platforms utilizing a primarily Cisco WAN/LAN/Wireless infrastructure.
- Implemented Splunk for better syslog indexing, searching & troubleshooting.
- Created engineering configuration, Security Standards, documenting processes and Network documentation using Microsoft Visio.
- Has a good experience working with the Trouble Tickets on F5 Load balancers.
- Implementation and configuration of F5 Big-IP LTM-6400 load balancers.
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
- Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500 security appliance, Failover DMZ zoning & configuring VLANs / Routing / NATing with the firewalls as per the design. Primary responsibility is to design and deploy various Network Security & High Availability products like Cisco ASA and other Security Products.
- Experience with configuring Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000.
- Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K.
- Experience configuring Virtual Device Context in Nexus 7010.
- Document and followed the change process as per IT policy it also includes the configuration of port channel between core switches and server distribution switches.
- Manage Cisco Routers and troubleshoot layer1, layer2 and layer3 technologies for customer escalations.
- Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.
- Design, Implement & troubleshooting of Juniper switches, routers, and Firewalls.
- Experience working with Network management software NSM.
- Configuration and extension of VLAN from one network segment to other network segment between different vendor switches (Cisco, Juniper).
- Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.
- Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.
- Responsible for the management of the Engineering Department, operational upkeep and monitoring of the wireless network infrastructures including but not limited to wireless controllers, access points and wireless monitoring software platform.
- Managing a TACACS server for VPN user authentication and network devices authentication
- Handled Corporate and Review Audits from the perspective of IT Security for Network Devices and Servers under our control.
- Troubleshooting the Access points using Cisco Wireless Controllers, Cisco Prime & LED Status on the access points.
- This includes Artifacts for regular Health Checks, IP and System Integrity, Change management, Problem management, Logical Access Controls, Network Connectivity, Service Registration, and Performance Management.
- Installed and configured the Cisco routers 2800 in two different customer locations. It includes coordinating with Verizon and AT&T to bring the serial interface up for T3 link. In addition, configuration includes BGP and VPN tunnel on GRE.
- VLAN Configurations, troubleshooting and Firewall ACLs and Object-Groups configuration and support.
- Configured IPsec site-to-site VPN connection between Cisco VPN 3000 Concentrator and Cisco 3800.
Confidential, California City, CA
Network Engineer
Responsibilities:
- Installation & configuration of Cisco VPN concentrator 3060for VPN tunnel with Cisco VPN hardware & software client.
- Responsible for implementation of wired and wireless solutions in the Physical Layer functionality in areas such as detection, synchronization, channel coding/decoding, parameter estimation and tracking.
- Working on Network design and support, implementation related internal projects for establishing connectivity between the various field offices and data centers.
- Configure, test, and implement dedicated network and security environment in the data center.
- Maintain documentation of all servers, applications and networkcomponents at the data centers to include IP address, physical connections, physical and logical data flows and workflows.
- Planning and configuring the routing protocols such as OSPF, EIGRP and Static Routing on the routers.
- Performed and technically documented various test results on the lab tests conducted.
- Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series.
- Worked onCiscoLayer 2 switches (spanning tree, VLAN).
- WAN Infrastructure running OSPF & BGP as core routing protocol.
- Support various Routers like 2600/3600/7200 series routers.
- Tested authentication in OSPF and BGP.
- Configured and troubleshoot OSPF and EIGRP.
- Hands on Experience working with security issue like applying ACL’s, configuring NAT and VPN.
- Documenting and Log analyzing the Cisco ASA 5500 series firewall.
- Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security.
- Work on different connection medium like Fiber and Copper Connectivity.
- In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
- Planning and configuring the entire IP addressing plan for the clients'network.
- Assist the certification team and perform configuration of LAN\WAN technologies such as Ethernet, Fast Ethernet, and Gigabit Ethernet.
Confidential
Jr. Network Engineer
Responsibilities:
- Responsible for the installation, configuration, maintenance and troubleshooting of the company network. Duties included monitoring network performance using various network tools to ensure the availability, integrity and confidentiality of application and equipment.
- Assisted system administrators in their task of maintaining the company's UNIX servers and workstations.
- Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
- Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security Settings of the networking devices (Cisco Router, switches) co-coordinating with the system/Network administrator during any major changes and implementation.
- Other responsibilities included documentation and change control.
- Worked on Cisco routers 7200, 3800, 2800 and Cisco switches 4900, 2900
- Routing protocols OSPF, RIP & BGP.
- Configured BGP for CE to PE route advertisement inside the lab environment.
- Spearheaded meetings & discussions with team members regarding network optimization and regardingBGP issues.
- Responsible for configuring GLBP between multilayered switch networks.
- Administration of Cisco 11.x and 12.1 versions and higher.
- Monitored all Cisco equipment using Cisco Works.
- Upgrades and backups of Cisco router configuration files to a TFTP server.
- Implementing and maintaining backup schedules as per the company policy.