Sr. Network Engineer Resume
Boston, MA
OBJECTIVE
- Committed, proactive engineer with 8+ years of hands - on experience in design, implementation, troubleshooting, verification, project coordination on Computer Networks and Inter-Networks.
- Recognized for strong adherence to deadlines, ability to work well as team member and leader. Proven technical and interpersonal communications.
SUMMARY
- Experience on Deployment, Monitor, Troubleshoot and Development of LAN/WAN infrastructure using Cisco devices.
- Worked on Cisco catalyst switches series 2900, 3560, 3750, 4500, 4900 and 6500.
- Detailed understanding of different layer 2 protocols like VLANs, VTP, STP, RPVST, Port Security, and Ether Channels.
- Experienced in Data-Centre Nexus 7009, 7018, 5548P, 5596T, 2148T, 2224T, 6000 switches.
- Implemented VDC, VPC, VRF and OTV on the Nexus 5505 and 7009 switches and also implemented VSS on Cisco catalyst 6509 and 6513 switches.
- Experienced and skilled in configuring Routing Protocols RIP, EIGRP, OSPF and BGP on Cisco routers like 2600, 2900, 3600, 3900, 7200 and 7600 series.
- Hands-on experience with installation and configuring wireless devices such as Meraki and Ruckus. Worked on Access Point Layer 2 and layer 3 roaming.
- Worked with MPLS in establishing peer ship with BGP protocol.
- Designed Redundancy Gateways for Campus Network using HSRP/VRRP/GLBP.
- Experienced with route manipulation by using Offset-list and route filtration by using Access-lists, Distribution-list and Route Maps.
- Knowledge on different networking protocols DHCP, DNS, FTP, UDP, VOIP, QOS and Frame-Relay.
- Expertise in implementing Security policies like IDS, IPS, PAT, NAT, VPN and Access lists.
- Performed security operations on Cisco ASA 5520, 5550 firewalls.
- Expertise understanding in implementing and configuring F5 Big-IP LTM-3900, and 6900 LOAD BALANCERS, maintained policies.
- Troubleshooting and monitoring application issues using tools like Wire-shark.
- Excellent inter-personal skills with the ability to work in a team of large members with minimum supervision necessary.
- Experienced in Microsoft Visio creating a detail physical and logical network diagrams.
TECHNICAL SKILLS
LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, LWAPs.
WAN Technologies: HDLC, PPP, Frame Relay, Channelized links (E1/T1/E2/T2).
Switching Technologies: VLANs, Inter VLAN routing and Port Channels, VTP, Spanning Tree Protocols like PVST+, RSTP+, Multi-Layer Switching, Port security, VSS, CEF and DCEF.
Switches dealt with: Nexus 5548, 5596, 6000, 7009, 7018; Cisco Catalyst 6506, 6509, 4928, 4948, 4507, 4510, 3750, 3560, and 2960.
NEXUS Features: VDC, VPC, VRF, FEX, F & M Series line cards.
Routing Protocols: OSPF, EIGRP, BGP, RIP v1/v2, PBR, Route redistribution, Route filtering, Summarization, Static route.
Wireless Protocols: 802.11 a/b/g/n/ac
Routers dealt with: Cisco 7606, 7609, 3845, 3660, 2921, 2691, 1812.
Network Security Technologies: ASA 5520/5550 and PIX 525 Firewalls, ACL, IPsec, IDS.
Load Balancers: F5 Network (Big-IP) LTM 8900 and 6400.
Redundancy Protocols: HSRP, GLBP, VRRP.
VPN Technologies: GRE Tunneling, Remote Access VPN, Site-to-Site VPN.
Operating Systems: Windows (98, ME, 2000, XP, Vista, Windows 7, 8.1)
PROFESSIONAL EXPERIENCE
Confidential, Boston, MA
Sr. Network Engineer
Responsibilities:
- Involved in the activity of DATA-Center migration of Cisco catalyst series 4500, 6500 switches with the new Nexus 2148, 2224T, 5548, 6018, 7010 using F3/M3 line-cards with 10GE & 40GE interfaces and Supervisor 2E.
- Involved in migration from Legacy Catalyst 6509 with SUP-720, Catalyst 4507 with SUP-6 to Nexus 7k with SUP-2E as part of the data center refresh.
- Configured and deployed VDC and VPC between Nexus 7018 and Nexus 5596, 5548 switches along with FEX 2248. Have a good understanding of Fabric Path.
- As part of Data Center fabric remediation/refresh project, deployed Cisco Nexus switches and implemented features like FEX Links, VPC and VDC.
- Involved in the troubleshooting aspects of complex network infrastructure using routing protocols like EIGRP, OSPF and BGP.
- Configured and deployed Cisco Catalyst 6506, 4948E, 4510 switches and Cisco 3660, 3845, and 7609 series routers.
- Deployed VSS on Cisco Catalyst 6509 switches and provided post-deployment support for issues.
- Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
- Implemented firewall policies on Cisco ASA.
- Applied ACLs for Internet access to the servers using Cisco 5550 ASA firewall and performed NAT.
- Performed Security operations in terms of pushing new policies and deploying new rules.
- Performed security troubleshooting in terms of checking ACLs and ACEs and traffic flow analysis using packet capture features.
- Performed load balancing and application level redundancy by deploying F5 BIG-IP LTM 3900.
- Involved in the configuration and maintenance of IPsec Site-Site VPN.
- Supported in giving access to the User machines and partners exterior to the network using IPsec VPN tunneling and SSL.
- Involved in installation and configuration of wireless Access Points such as Ruckus and Meraki at client location. Worked on Access Point Layer 2 and Layer 3 roaming.
- Planned and implemented network designs, including WAN, LAN, MPLS.
- Responsible for simulating network operations with the usage of packet analyzer like Wire shark, and use to resolve tickets whenever there is an issue.
- Had experience in configuring and implementing Prefix-lists, Route-maps, and Ether-channels.
Confidential, Napa, CA
Network Engineer
Responsibilities:
- Responsible for level 2 support of existing network technologies / services & integration of new network technologies / services.
- Configured VSS on Cisco Catalyst 6509 switches in order to have redundancy. Worked on T1/E1/T3 technologies and different LAN & WAN technologies.
- Supported various LAN environments consisting of Cisco 6500 switches with Sup-720.
- Designed and implemented Cisco 7500, 7200, 6500, 3600, 2600 Series routers in lab environment to reproduce various issues and test fixes for them.
- Troubleshooting complex LAN /WAN infrastructure that includes routing protocols EIGRP, OSPF.
- Configured Access-lists, Distribution-lists, Offset-lists and Route Redistribution.
- Supported multi area OSPF implementations.
- Involved in configuration of OSPF Summarization (Summarizing internal and external routes).
- Scalability of OSPF by Filtering of Intra, Inter and External OSPF routes
- Used various BGP Attributes and various Route-filters such as named Access-lists, Prefix lists, Route-maps to permit or deny routes and to change various attribute
- Experienced in implementation and troubleshooting knowledge of protocols and technologies, especially in the following: BGP4, OSPF, IPv4, and Ethernet.
- Configured Ether channels, Trunks, Vlans, HSRP in a LAN environment.
- Configured STP for loop prevention and VTP for Inter-VLAN Routing.
- Responsible for performing administration on BGP, OSPF routing protocols.
- Implemented route redistribution between OSPF and EIGRP.
Confidential
Jr. Network Engineer
Responsibilities:
- Responsible for monitoring the Network performance based on company’s Service Level Agreement (SLA).
- Documented the company’s design, implementation and troubleshooting procedures.
- Configured VLANs with 802.1Q Tagging according to the Server team’s requirements.
- Tested the new zone for failover capabilities and redundancy. Connected the Distribution routers to the Core routers via OSPF Areas.
- Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
- Performed IOS upgrades on various catalyst series switches and maintained latest IOS versions according to company’s policy.
- Responsible for cabling and labelling based on day to day requirement, and Racking & Stacking of various network equipment and made sure that there are no connectivity issues using ping and tracert.
- Provided Helpdesk support that involved identifying and escalating the tickets to specific groups.
- Resolving all computer related problems, such as troubleshooting operating system failure, scheduling and updating virus checks on servers and desktops.