We provide IT Staff Augmentation Services!

Sr. Firewall/network Engineer Resume

5.00/5 (Submit Your Rating)

Walnut Creek, CA

SUMMARY

  • With Over all 8+ years of Experience with in designing, deploying and troubleshooting Network & Security infrastructure on routers, switches L2 firewalls of various vendor equipment.
  • Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.
  • Experience in layer - 3 Routing and layer-2 Switching. Dealt with Nexus models like 9K,7K, 5K, 2K series Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches
  • Expertise in installing, configuring, and troubleshooting of Cisco Routers (3800, 3600, 2800, 2600, 1800, 1700, 800)
  • Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)
  • Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and policy routing over Cisco routers.
  • Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, and MPLSQOS
  • Experience in adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications.
  • Worked on Load Balancer F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Performing onsite data center support including monitoring electrical power, switch alarms, network alerts and access logs.
  • Software-Defined Networking (SDN): Hands-on experience and expert knowledge of Cisco Intelligent WAN (IWAN).
  • Experienced with Juniper: EX-2200, EX-4200, EX-4500, MX-480, and M Series, SRX210, SRX240.
  • Configured Client-to-Site VPN using SSL Client on Cisco ASA 5520 ver8.2
  • Configured ASA 5520 Firewall to support Cisco VPN Client on Windows 7/XP/Vista.
  • Installing, Configuring, Monitoring and Troubleshooting of Fortigate Firewalls.
  • Installation, advanced configuration and troubleshooting of Cisco and F5's load balancing (LTM, GTM, ASM, APM) devices.
  • Implemented 802.1x standards for the end user network using CISCO ISE (Identity Service Engine).
  • Hands on experience in managing CISCO ASR, ISR, CSR Routers, switches. Fortigate Firewalls and SonicWALL Firewalls.
  • Experience with designing, deploying and troubleshooting LAN, WAN, Frame-Relay, Ether-channel, IP Routing Protocols - (RIPV2, OSPF, EIGRP & BGP), ACL's, NAT, VLAN, STP, VTP
  • Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology (LACP, PAgP) etc.
  • Strong hands on experience on PIX Firewalls, ASA Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Implement Cisco Unified Wireless solutions based on AireOS and IOS controllers, 802.11a/g/n/ac APs,NCS/PI, MSE, ISE
  • Thorough knowledge of Citrix Xenapp 6.5 and 7.6 LTSR, including provisioning services, VMWare 6.0 & 6.5, Windows Server, Group Policy, Office 365.
  • Efficient designing of IP Addressing Scenario using VLSM and Sub netting.
  • Has done the Configuration on BIG IP (F5) Load balancers, modifying iRules and also monitored the Packet Flow in the load balancers.
  • Configured Security policies including NAT, PAT, VPN's and Access Control Lists.
  • Extensive experience using Microsoft suite like Word, Visio, Excel, PowerPoint
  • Experienced in implementing and managing F5 BIG-IP load balancing, including GTM, ASM, APM, and custom iRules development.
  • Experience in installing, configuring and troubleshooting of Checkpoint Firewall. NG, NGX, NG R55, NGX 60, NGX R65, R70, R75, R77 UTM.
  • Experience in implementing and designing new solutions with Cisco ASA Firewall series 5505, 5510, 5512-X and Palo Alto Firewall series PA-500, PA-2050.
  • Worked on IPSO 2.0, IPSO 4.0, IPSO 5.0

TECHNICAL SKILLS

Wireless: Wireless (802.11a/g/n/ac, WPA, WEP, 802.1x)

Routers: Cisco 7600, 7200, 3800, 3600, 2900, 2800, 2600, CISCO ISR, CISCO ASR, 4331,4341

Routing: OSPF, EIGRP, BGP, RIP v1/v2, PBR, Route Filtering, RedistributionSummarization, and Static Routing.

Switching: Nexus 2k,5k,7k,9k,LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer SwitchEthernet channels, Transparent Bridging, LACP, LAGP, 802.3ad, VTP, 802.1q)

WAN technologies: Riverbed, Leased lines, GRE VPNs, DMVPN, PPTP, L2TP, IPSEC VPNs, MPLS.

Security technologies: Firewalls, ACLs, NAT, IPS, IDS, RADIUS, TACAS+,DDos appliance, IAS,VPN technologies

Network Security: Cisco ASA 5540, Fortinet, Palo Alto, Checkpoint Running R77.10/R77.20, Juniper SRX, Net screen

Load Balancer: F5 Networks (Big-IP) LTM 8900 and 6400, F5, ASM, APM, Citrix NetscalerLAN TechnologiesHSRP, VLAN, STP, VTP, Ether Channel, Trunks, Fast Ethernet, Gigabit Ethernet

VPN: site-to-site, SSL, DMVPN, GRE VPNs,Remote access VPN,PKI,RSA

Network monitoring: SNMP, Netflow, SPAN, WMI

Gateway Redundancy: HSRP and GLBPAAA Architecture TACACS+, RADIUS, Cisco ACS.

Access Control: IPS/IDS, NAT, PAT, SYSLOG, NTP, DHCP, CDPTechnologiesWindows Server, Linux, Ubuntu, Virtualization, VMware, desktop antivirusNexpose / Metasploit/Qualys, Mobile Apps, Web Apps, OWASP Enterprise Security API, HP Fortify, Tufin, Panaram, AWS, OS Hardening, Aruba Wireless

Network Management: Wireshark, SNMP, Solarwinds, HP Openview. Qradar, TCP dump, McAfeeSIEM, Cisco UCS manager.

PROFESSIONAL EXPERIENCE

Confidential, Walnut Creek, CA

Sr. Firewall/Network Engineer

Responsibilities:

  • In-depth Cisco technology experience/knowledge in design, implementation, administration and support.
  • Expertise in network protocols, Firewalls and Communication Network design.
  • Very Good Understanding of Cisco UCS, DMVPN, iWAN, ISE, and telephony including SIP, PBX, and VoIP. Eliminated over 65% of Severity-1 outages, with redundancy and simplified configurations of the new Cisco IWAN.
  • Excellent understanding of VPN architectures —Site to Site, Cisco AnyConnect Client (IPSEC/SSL), DMVPN, ASA Firewalls and FWSMs, HA Configurations, Multi-Context, Transparent Mode, NAT, ACL Configuration, IPSec and SSL VPN, IPS Configuration, CX, Botnet, Next-Gen Features, DMZ.
  • Hands-on experience in some of or all following areas: HSRP, QoS, DMVPN, SSL VPN/Ipsec VPN, Wireless technologies, DHCP management, Firewall skills and MPLS services framework, SD-WAN (IWAN, Viptela, Silver Peak, Riverbed) implementation and migration experience.
  • Experience with Network Redesign for 80 branches. This includes changes to both the voice and data environment.Involved in designing and implementing QOS and policy map to CISCO 4300 series routers for all the branches.
  • Decommission serial T3 circuits and replace with MPLS circuits. MPLS clouds were provided by carriers ATT, Verizon, Century Link or Level 3.
  • Experience Branch Relocation: Connect workstation, servers, etc. Rack and stack Pre-configured new hardware and connect the circuits. Work with Carrier to test and turn-up circuits.
  • WAN Pilot project to convert branch from dual T1 circuits to WAN only broadband circuit. To Enable Internet WAN connectivity for the Lab in Hauppauge. Test and turn-up IWAN link and disable the 2 existing T1 circuits, running branch on IWAN only.
  • Hands-on experience on Cisco Network Hardware like Cisco switches, Cisco ISR G2/ASR routers, Cisco Wireless Access Points & SD-WAN Platforms experienced configuring and deploying from scratch and fixing them with various modules like Gig card, VPN SPA Card, T1-WIC card and other modules.
  • Experience in deploying VPCs on AWS cloud. Configured and deployed CSR 1000V border routers and implemented EC2 instances on private cloud.
  • CiscoAPIC-EM (IWAN) deployment using CSR1000v Switch and VMware.
  • Coordinated with senior engineers with BGP/OSPF routing policies and designs; worked on implementation strategies for the expansion of the MPLS VPN networks.
  • Designing High Availability architecture and implementation for IWAN. Designed and developed serviceability modules for IWAN using ELK stack. Integrated DMVPN phase 3 into IWAN to support multi endpoint redundancy in intelligent WAN.
  • Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NAT ing, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP & Multicasting protocols.
  • Design and implementation of GET VPN architecture used for multicast and unicast communication on an existing IP VPN.Involved in configuring IP Quality of service (QoS).
  • Experience in Wireless LAN (IEEE 802.11) and deployment of light weight access point.
  • Co-ordinate with ISP / Carriers recommended by Client, commission and decommission the circuits up on the request from businesses through Client ticketing system.
  • Provide direct technical and engineering project support to the client for their specific local and global requirements.
  • Create Network diagrams for all project related network build within its scope.
  • Configuration and management of site to site VPN tunnels using IPSEC, SSL and DMVPN technologies. Possesses an understanding of IPSEC and GRE tunnels in VPN technology. Assisted clients with installing VPN client software and monitoring VPN traffic and connections.
  • Responsible for support of the Wide Area Network (WAN) as well as wired and wireless Local Area Networks (LAN’s) throughout the organization. This includes implementation and maintenance of network hardware (routers, switches, firewalls, load balancers, console servers, etc.) at various geographic locations.
  • Experience in configuring routing protocols like EIGRP, RIP v2, OSPF & BGP and Cisco ACS protocols like RADIUS and TACACS.
  • Excellent Verbal, written communication skills and Interpersonal skills with ability to work with large teams as well as independently with minimum supervision & Team Player.

Confidential - Anaheim, CA

Network Security Engineer

Responsibilities:

  • Design, implementation, and proficiency in configuring various Fortinet firewalls Fortigate-620C,60B, 60D, Forti WI-FI 60D.
  • Manage over large network devices; including over 20 Fortinet Fortigate firewalls from 200b to 3040b's, Cisco ASA and FWSM's, Nokia Checkpoints, Cisco switches, Nexus 5k's and 7k's, 9K’s Cisco ASR 1000's, multiple Cisco UCS's and Fabric Interconnects, and SSL VPN's.
  • Continuous monitoring of FortiGate firewalls installed in more than 2000 franchise stores in various location across the globe using a monitoring tool called IP-monitor.
  • Designed and implemented Cisco ISE on wireless and wired infrastructure
  • Responsible for testing and documenting Information securities issues, creation of APM policies, VPN upgrades.
  • Configuring new sites with LAN and wireless access, enabling of port security using Aruba clear pass and Aruba Wireless devices.
  • Protecting the Web applications using Web Application Firewall (F5 ASM).
  • Monitoring the application level vulnerabilities and patching using F5 ASM accordingly.
  • Configured wireless security by implementing Cisco ISE andArubaClear Pass at the data center.
  • Server load-balancing utilizing F5 LTM-BigIP, including, AFM, APM and ASM modules.
  • Great understanding of WLAN including 802.11 standards, Lightweight and Autonomous systems, WPA, PEAP.
  • Configuring, Managing and troubleshooting Aruba Airwave Appliance.
  • Maintenance of NTP,Arubaclear pass, Net brain and terminal servers
  • Installations of Cisco Meraki Firewalls MX64, Cisco Meraki WAPS, Cisco Meraki Switches.
  • Manage Cisco Meraki Ap's such ass adding them to the networks, adding static Ip's, Installing them to individual clinics all over the country.
  • Configuration, upgrading and deploying of MerakiDevices MX64, MX60, MX65, MX84.
  • Deployed Cisco Wireless Controller 8540, cisco Aironet 1570 Series
  • Aruba wireless access points deliver superb Wi-Fi performance, Aruba 330 series, 501 wireless client bridges, 7220, 7010 MOBILITY CONTROLLERS.
  • Deploy, configure, and support Aruba wireless controller and AP devices globally, also a direct escalation path for all wireless issues.
  • Utilizing new cisco 5760 controllers and a mix of cisco2602i and 3702i (802.11ac)access points. Utilizing cisco PRIME infrastructure for monitoring as well as the cisco MSE Mobility Services Engine to monitor network health, asset tracking, etc.
  • Deployed Intelligent WAN (IWAN) in both Hybrid and Dual-ISP branches to provide an increase in bandwidth capacity, security and reliability.
  • Deployments typically include; HA WLCs. Prime Infrastructure, MSE/CMX and Distributed ISE.
  • Working experience with Tufin, tracking security devices using Tufin secure track, and Tufin skybox.
  • Provide Support to Enterprise networks as well as Production Data Centers and provide immediate assistance in case of network outages and resolve major incidents for customers daily.
  • Work on network tickets to resolve network connectivity as part of break-fix and thus contribute to overall network health in a stipulated amount of time as per SLA.
  • Maintain and support customer's wireless networks with Fortigate controllers and AP's and monitor these appliances with SNMP traps to proactively contain and remedy any link failure or outages.
  • Analyze network traffic and troubleshoot issues for customers that are not able to implement their application due to network connectivity issues.
  • Act as an escalation point for line 2 engineers and resolve most of the major outages and incidents that are highly impacting.
  • Design WAN solution using the AutoVPN technology with Cisco Meraki MX security appliances including DC to DC failover and SD-WAN capabilities.
  • Maintain effective communications with vendors, peers and clients in resolution of trouble-tickets, equipment RMAs, and support requests.
  • Supporting follow on project that will provide our customers with a single user experience when deploying and operating different Cisco controllers (APIC,APIC-EM) as well as workflow simplification.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution and worked on RSA secure IDs to providing VPN Token to Company USERS. Migration with Cisco ASA VPN experience.
  • Interact with various ISP's and vendors like Cisco, Fortigate, F5, Level 3 to look into physical circuit and hardware related problems in MSIT network infrastructure.
  • Remotely upgrading the FortiGate devices by adding patch ups from V3.1.18, V4.0 to the latest released versions V5.0.11 using upgrade paths.
  • Good hands on experience with Linux, Bash scripting, python, and pearl scripting. Ran scripts on VM machines for configuring Fortigate devices remotely.
  • Conduct online product demonstrations using the Cisco Meraki Cloud Controller web interface via WebEx, answer technical questions, contribute to proposals, analyze clients' needs, and develop technical solutions
  • Assist and troubleshoot Cisco Meraki solutions remotely including 802.11a/b/g/n/ac Wireless networks.
  • Resolving tickets related to the escalated network issues. Using service desk.
  • Configuring the new firewalls using the previously saved configurations of the particular FortiGate located in the restaurant franchise stores.
  • Configured Blue Coat ProxySG Web Application Reverse Proxy for securing and accelerate public web applications.
  • Design and create dedicated VLANs for voice and data with for prioritizing VOICE over data on catalyst switches and basic VOIP configuration.
  • Configured Nexus 7K, 9K Basic Interface Parameters, Layer 2 Interfaces, Layer 3 Interface, Bidirectional Forwarding Detection, Port Channels, vPCs, IP Tunnels, Q-in-Q VLAN Tunnels
  • Worked with virtual servers, virtualized firewalls and data base on Hyper-V and VM ware.

Confidential

Network Security Engineer

Responsibilities:

  • Design, Build, and Implement various solutions on Check Point Firewalls (R75, R77.10), Blue Coat Proxies, F5 Load balancers and F5 Global Traffic Managers.
  • Worked on various platforms of Checkpoint like - Nokia, Checkpoint (SPLAT), Nokia IP 260, 295, 390, 56x, 69x, 128x, 245x flash & disk based appliances.
  • Experience in different VPN platforms, IPsec, SSL & Web VPN. Mobile VPNs solutions from Cisco and Checkpoint.
  • Configuration, administration and maintenance of Wireless Access Points (Meraki and Fortinet devices).
  • Complex routing,multicast routing, QoS, Internet breakout at the hub and spoke sites, and interoperability betweenIWANsites and legacy non-IWANsites during migration toIWAN.
  • Working experience with Interpretation and packet capturing using TCPDUMP and Wireshark.
  • Change Management: Need to make sure that all the change designs and Implementations are completed and tested as per the schedule required by the customers.
  • Created labs for F5 ASM, APM, and LTM implementations of Microsoft Exchange, Microsoft SQL, Microsoft IIS services, LAMP servers.
  • Anticipate, mitigate, identify, and troubleshoot hardware/software problems related to the Citrix platform and client access software.
  • Migrating to CiscoAPIC-EM with dynamic QoS templates serving 5 high-volume Call Centers with Call Center as a Service.
  • Work in a multi-vendor environment supporting Cisco Juniper MX/SRX Aruba Arista Brocade Palo Alto Firewalls Fortinet Firewalls and F5 devices
  • Worked on Cisco ISE to support authentication for the Wi-Fi users
  • Network Access Controls on L2 devices using Identity Service Engine (ISE).
  • Configuring and optimizing of client-side Switches, WLC's, and ASA's for integration of ISE, 802.1X and Radius into the network.
  • Configure workstations IP address for wireless router.
  • Design and management of wireless infrastructure consisting of over a dozen cisco 5508 & 2504 Wireless LAN Controllers and over 600 Access Points. Implement and manage cisco Prime, ISE, MSE and TACACS servers.
  • Wireless802.11x testing, configuration and implementation.
  • Deployed Aruba and Cisco Wireless controllers, loading an SSL Certificate (GUI), SSL Certificate (CLI), Configuring 802.11 Bands, 802.11n Parameters, DHCP Proxy, SNMP, Aggressive Load Balancing, Fast SSID Changing, 802.3 Bridging, Enabling Multicast mode, IP- MAc Address Binding,
  • Proficiency in configuring Cisco ASA 5540, 5580, AAA authentication, Palo Alto Firewall
  • Implemented, and support WLANs by performing and documenting 802.11 wireless surveys.
  • Designed and configured the commands for QoS and Access Lists for Nexus 9k, 7K and 5K
  • Responsible for Checkpoint firewall management and operations across our global networks.
  • Working with Checkpoint Support for resolving escalated issues
  • Configuration and troubleshooting on HSRP, VRRP, GLBP, RSTP, MST related issues coming in network environment.
  • Performwirelesssite surveys using industry standard tools such as Air Magnet and Cisco & Aruba Switches. Review heat map results from RF surveys performed in the field and make recommendations. Update heat maps with Troubleshooting, Upgrade Troubleshoot and Integrate Switches, Routers, AP's, send recommendations and send it back to NOC.
  • Implementation and configuration of GLBP/HSRP on multilayer switches for first hop redundancy
  • Implementation and Configuration (Profiles, iRules) of F5 Big-IP LTM-6400 load balancers
  • Managed F5 BigIP LTM appliances to load balance server traffic in critical serval access silos.
  • Configuration of Virtual Servers, Nodes, and load balancing Pools
  • Upgraded load balancers from Radware to F5 BigIP v9 which improved functionality and scalability in the enterprise. Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
  • Responsible for hardware and code upgrades according to F5 Recommendation. Updates patches and proactively monitors for any security vulnerability that may impact the F5 Appliance or the application.
  • Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, F5 ASM, APM, Net screen devices for easier management and common configurations.
  • Willingness to expand and branch out knowledge in additional F5 modules, beginning with Access Policy Manager (APM).
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls
  • Configuration and extension of VLAN from one network segment to their segment between Different vendor switches (Cisco, Juniper)
  • Configuring IPSEC VPN on SRX series firewalls
  • Convert Campus WAN links from point to point to MPLS and to convert encryption from IPsec/GRE to Get VPN.
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS IPVPN networks
  • Experience with configuring BGP in the data center and using BGP as a WAN protocol and manipulating BGP attributes
  • Performed basic security audit of perimeter routers, identifying missing ACL's, writing and applying ACL's
  • Troubleshooting and installing of CRS, ISR, GSR, ASR9000 and Nexus 9K devices.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-Trunking, deployed port security when possible for user ports
  • Responsible for Cisco ASA firewall administration across our global networks
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP
  • Involved in the redistribution into OSPF on the core ASA firewall.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
  • Involved in the modification and removal of BGP from the MPLS routers.
  • Worked on Orion for analysis and monitoring purposes
  • Also, prepared documentation for various VLAN's and Voice subnetworks and worked on Visio for the same.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling

Confidential, Tampa, FL

Sr. Network engineer

Responsibilities:

  • Testing Cisco IOS as per existing requirements of technology, involving Layer 3 and Layer 2 Protocols, routing and switching for the Service Provider.
  • Worked on Cisco 2600, 3600, 3700, 3800, 7613 series routers and 3750-G, 4500, 6500 series Catalyst switches.
  • Hands on experience in configuring site-to-site VPN with IPSEC security layer.
  • Configured RIP, EIGRP, OSPF, BGP routing and IP access filter policies.
  • Worked on the upgrades on Cisco Routers during production maintenance windows.
  • Implemented Routing protocols like OSPF, BGP
  • Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes.
  • Working on Cisco Routers and Switches and Wireless networks 802.11a/n at Enterprise level. And acquired good knowledge on Aruba wireless.
  • Handling Network design, upgrades and implementation.
  • Handled most networking problems including servers, routers, switches, base stations and wireless connectivity.
  • Installing & Troubleshooting Cisco Switches and Routers.
  • Experience with CISCO ACE Load Balancer and CISCO ACE to F5 LTM migration.
  • Experience writing F5 irules.
  • Experience with the F5 Traffic Management Operating system, CLI commands, Route Domains
  • Experience planning and implementing enterprise monitoring and configuring tools for the F5 platforms such BiG-IQ.
  • Experience with Network Analysis Sniffer tools, such as Net Scout and Wireshark.
  • Experience with BIG-IP Application Security Manager, Advanced Firewall Manager and BIG-IP DNS.
  • Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs
  • Planned and worked on design with Network team to re-architect F5 load-balancers to load-balance traffic anywhere in the company network.
  • Wide experience in implementing and managing F5 BIG-IP load balancing, including GTM, APM, ASM, and custom iRules development.
  • Perform many day-to-day activities such as node, pool and VIP configuration, DNS provisioning, logging analysis, and configuration backups.
  • Experience supporting Citrix Netscaler
  • Responsible for creating innovation roadmaps, maintenance schedules, life cycle plans, and capacity plans for the Citrix environment and related dependent technologies.
  • Identify inefficiencies, gaps and issues, and drive the analysis and documentation of technical requirements for enterprise Citrix XenApp and XenDesktop architecture, guiding adoption of and adherence to standard operating procedures.
  • Troubleshoot routing protocols OSPF and BGP on company's complex multiprotocol architecture.
  • RIP to OSPF migration at certain branch sites and Implemented OSPF stub networks at some sites.
  • Implemented BGP Mutihop for Load Balancing and preventing SPOF utilizing parallel lines.
  • Configured BGP Multihoming connecting two different service providers.
  • Changes in BGP attributes such as Weight, Local Preference, MED and Extended Communities.
  • Design and create dedicated VLANs for Voice and Data with QOS for prioritizing VOICE over the DATA on Catalyst switches and basic VOIP configurations and worked with IPBB.
  • Implemented Layer 2 security using a dedicated VLAN ID for all trunk ports and setting the user ports in non-Trunking mode.
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
  • Manage and implement STP, VLAN, VTP, HSRP, VRRP, GLBP and firewalls (ASA 5525 and 5545) and routers (1800, 2800, 3660, 2621, 1601, 1700, 2610, 7200, 7500, 12000). Implementation of T1/
  • PRI/related equipment in remote locations. Maintain Cisco ( ) Brocade and IDS, IPS and routing between 800+ nodes which uses Cisco architect routing protocols IGRP, EIGRP, BGP and OSPF.
  • Install/troubleshoot LANS, WANS, routers, switches, software/hardware.

Confidential

Network Engineer

Responsibilities:

  • Involved in conversion of PIX firewall to ASA firewall.
  • Experience in adding firewall rules, Network address Translation and also in creating multiple security contexts (virtual firewalls).
  • Involved in setting up IP sec VPN between ASA firewalls.
  • Experience with implementing Cisco 6500 VSS on the User distribution switches.
  • Upgraded IOS on the ASA 5520 firewalls
  • Working with MPLS Designs from the PE to CE and also configuring VRF on PE routers
  • Experience with designing and deployment of MPLS Traffic Engineering
  • Configuring RIP, OSPF, EIGRP BGP, MPLS, QOS, ATM and Frame Relay.
  • Design and deployment of MPLS QOS, MPLS Multicasting per company standards.
  • Implemented site to site VPN in Juniper SRX as per customer.
  • Implemented various EX, SRX & J series Juniper devices.
  • Installed controller and light weight access point coordination with JTAC.
  • Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multilayer Switching.
  • Worked on different phases of testing such as Sanity Testing, Functionality Testing, Smoke Testing, System Testing, Installation Testing, Compatibility Testing, Regression Testing, Stress Testing and UAT Testing.
  • Writing Test cases & Test scripts for the application functionality
  • Testing routers and modems, troubleshot issues related to broadband technologies for Residential and Business Customers.
  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
  • Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wire shark
  • Maintained a Network with more than 600 Network devices, some 25,000 end hosts, and the other Network devices like DHCP, DNS servers, Firewall servers.
  • Co-ordination with Hardware vendors, software vendors and service Providers.
  • Assisted in backup, restoring and upgrading the Router and switch IOS.
  • Attended Team meetings and provided comments on existing network and the recommendations to improve the current network Performance.
  • Maintaining the health of 250+ wireless Access points in two locations.

Confidential

Network Technician

Responsibilities:

  • Used TFTP server to backup Cisco configuration files.
  • Provided technical support for expansion of the existing network architecture to in corporate new users.
  • Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company
  • Configured STP for loop prevention on Cisco Catalyst Switches
  • Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.
  • Worked in setting up inter-VLAN routing, redistribution, access-lists and dynamic routing.
  • Involved in configuring and implementing of Composite Network models consists of Cisco 3750, 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.
  • Implemented various Switch Port Security features as per the company's policy
  • Configured OSPF, and EIGRP on 2901 and 3925 Cisco routers.
  • Configured VLANS to isolate different departments
  • Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
  • Configured IPSEC VPN on SRX series firewalls
  • Design, installation and troubleshooting networks with hand-on experience with OSPF, BGP, VPLS, Multicast, VPN, MPLS, & Traffic engineering.
  • Involved in implementation of Trunking using Dot1Q, and ISL on Cisco Catalyst Switches
  • Worked with snipping tools like Ethereal (Wireshark) to analyze the network problems.
  • Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
  • Performed replacements of failed hardware and upgraded software
  • Performed scheduled Virus Checks & Updates on all Servers & Desktops.
  • Implementing Routing and Switching using the following protocols; OSPF, BGP on Juniper M series routers.
  • Involved in Local Area Network (LAN) implementation, troubleshooting, and maintenance as per company's requirements.

We'd love your feedback!