We provide IT Staff Augmentation Services!

Network Security Engineer Resume

5.00/5 (Submit Your Rating)

Akron, OhiO

SUMMARY

  • Network Security Engineer wif 5 years of experience wif capability of planning, designing, implementation and troubleshooting wif deep understanding of routing, switching and firewall technologies in complex network systems.
  • As a passionate individual in innovative and challenging environment has an ability to learn and grow at professional level theirby directing my future endeavors.
  • Expertise in Configuring and Troubleshooting Palo Alto (PA - 3060/5060), Cisco ASA (5500 series) and Checkpoint (R77.30 and R77.10), Firewalls and Implementing policy change requests for new IP segments on the network.
  • Profound noledge in implementing application-based policies, URL filtering, Threat prevention, and Data filtering.
  • Strong noledge of Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Data Loss Prevention (DLP), FireEye Inspection, DDoS attacks and Kill Chain mitigation techniques.
  • Expertise in performing migration from Cisco ASA and checkpoint to Palo Alto Firewalls.
  • Strong noledge in configuring and troubleshooting IPsec-VPN and SSL-VPN tunnels for the site to site connectivity.
  • Hands on experience on centralized management system (Panorama) to manage large scale firewall deployments.
  • Experience in configuring and managing AAA architecture including RADIUS and TACACS+ servers through Active Directory.
  • Experience deploying F5 BIG-IP LTM-6400 Load Balancers to increase capacity (concurrent users) and reliability of applications using LTM, GTM.
  • Strong experience in implementation of Virtual Servers, nodes, pools and iRules on F5 Load Balancers (BIG-IP) in LTM module.
  • Worked wif SIEM tools such as IBM QRadar to get real-time analysis of security alerts generated by network hardware and applications.
  • Using Ansible as an automation tool for creating subnets, security groups, route tables and ACL's for VPC creation.
  • Worked on configuring WILDFIRE forward settings on Palo Alto firewall to prevent Zero-Day and Malware attacks.
  • Strong noledge on conducting Vulnerability Assessments using Qualys and Nessus and monitored remediation of documented vulnerabilities.
  • Short and Long-term security event trend analysis performed on a regular basis using Splunk and FireEye.
  • Experienced wif working on network monitoring tools such as SOLARWINDS, Splunk and Sniffing tools like Wireshark and TCP dump.
  • Detailed understanding of data network concepts and operational functionality of OSI Model and TCP/IP networking.
  • Strong working noledge in configuring and troubleshooting various routers and switches.
  • Worked on configuration & troubleshooting of routing protocols: BGP, OSPF, EIGRP and Static on Cisco (7200, 3800), Juniper (MX10, MX40, and MX80) series routers.
  • Configured and Implemented Router redundancy protocols likeHSRP, VRRP and GLBP.
  • Proficiency in configuration of Layer2 and Layer3 Virtual Local Area Networks using Cisco multi-layer Switches supporting STP, RSTP, PVST, MVST along wif inter VLAN routing and VLAN Trunking 802.1q.
  • Experienced in DNS, DHCP, SMTP, FTP, HTTPS, and web securityarchitecture.
  • Excellent client/customer management, problem-solving and troubleshooting skills wif good communication skills.

TECHNICAL SKILLS

Firewall: Check Point (R77.30 and R77.10), Palo Alto (PA-3060/ 5060), Cisco ASA (5500 series) and Juniper (SRX550/ SRX650).

Network Security: ACL’s, MPF, IPSEC VPN, Port Security, AAA and IDS/IPS.

Protocols: EIGRP, OSPF, BGP, VPC, VTP, STP, RSTP, MST, PVST, IPV4, HSRP, DHCP, TCP/IP, UDP, 802.1q, Inter VLAN routing; Multi-Layer Switch, ICMP&ARP Ethernet Topologies.

Load Balancers: A10 Networks (AX2500), Cisco CSM & ACE 4710, F5 Networks (Big-IP), Brocade Load Balancers.

Virtual private networks: IPSec, SSL, GRE and DMVPN

Languages: Unix, Turbo C/C++, basics in Perl and shell scripting.

Router platforms: Cisco 2900, 3600, 3700, 3800, 7200, 7600 series, Juniper MX104, MX240, MX480, M320, T640, SRX series.

Switch platforms: Cisco 3500, 4500, 6500 Catalyst series, Nexus 7000, 5000, 2000 series and Juniper EX2200, EX2300, EX3300, EX3400, EX4200 series.

Programming Languages: Advance Python, JavaScript, Unix, Turbo C/C++, basics in Perl and shell scripting.

Operating Systems: Windows, Linux, Mac OS, UNIX, Cisco IOS, JUNOS, PANOS and NX-OS.

Tools: Wireshark, Simulink, GNS3, Cisco Packet tracer, Cisco Security Manager (CSM), Solar Winds, Riverbed, VMware, Boson Netsim, tcpDump, Checkpoint Smartview, WatsUp Glod, ngrep.

PROFESSIONAL EXPERIENCE

Network Security Engineer

Confidential | Akron, Ohio

Responsibilities:

  • Configured and managed Palo Alto (PA-3060/5060) and Cisco ASA(5500 series) firewalls.
  • Configured templates, device groups and created policies using APP-id, user-id on Panorama and pushed them into Palo Alto firewalls.
  • Deploy, configure, and implement QRadar expansion to include: QRadar Vulnerability Manager, Incident Forensics, PCAP, Event Processor, and Flow appliances.
  • Implemented Zone-Based Policies and autantication profiles on the Palo Alto Network Firewalls.
  • Integrated the firewall wif active directory for user-identification and installed the user-id agent on the active directory server.
  • Enforced security policies to safely enable user-id wifin trusted zones and prevent user-id traffic from egressing the network.
  • Responsible for implementing the Palo Alto to mitigate DOS, DDOS, attacks using Dos Protection, Threat Prevention and Data Filtering.
  • Enabled evasion signatures to detect crafted HTTP or TLS requests and alert the instance when a client connects to a domain other than domain specified in DNS query.
  • Implemented Global Protect wif single and multiple gateway solutions for clientless VPN.
  • Configured SSL VPNs on Palo Alto firewalls for secure site-to-site VPN connectivity.
  • Deployed Active/Passive modes of High Availability (HA) wif Session and Configuration synchronization on multiple Palo Alto firewall pairs. Knowledge on the application of Active/Active HA mode.
  • Managed Palo Alto firewalls utilizing panorama and constantly ensured software upgrades and content updates are up to date on the devices.
  • Performed legacy Migration from Cisco ASA 5500 to PA-5260 using PAN migration tool.
  • Configuring, Monitoring and Troubleshooting Cisco ASA 5500 security appliance for IPsec VPN (Site-to-Site Tunnels), Failover DMZ zoning and configuring VLANs / routing / NATing wif the firewalls as per the design.
  • Performed security policy analysis and rule modifications on Cisco ASA firewalls.
  • Configured and deployed F5 Big-IP LTM for distributing inbound traffic to the servers.
  • Implemented SSL termination on LTM and renewed SSL certificates and customized me rule for cookies persistency.
  • Configuring App-ID and User-ID on firewalls to determine the application signatures along wif Wildfire cloud-based threat analysis for Zero-Day attacks.
  • Configured AAA Server (RADIUS) for autantication and authorization of all remote VPN users.
  • Perform firewall rule audit and optimization using AlgoSec.
  • Configured and implemented Enhanced VPC, OTV, and Fabric path between Nexus 7k and 5k series switches for the datacentre operations.
  • Experienced in configuring the Nexus2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus5000.
  • Configured Authorization rules in Cisco ISE forwirelessby enforcing 802.1x Autantication to allow user access to proper Data.
  • Hands-on experience wif Aruba Clear pass in providing network access security and NAC, based on user roles and device types (BYOD).
  • Provided security to the wireless network infrastructure from unauthorized access and threats by implementing security features like SSID, WPA, and WPA2/802.11i.
  • In-depth noledge on BGP peering and BGP attributes like AS-PATH, LOCAL PREFERENCE.
  • Strong hands-on experience on sniffing tools like Wireshark, TCPDUMP and network monitoring tool SOLAR WINDS.
  • Monitored and analyzed the log entries using SPLUNK to identify malicious activities on the network.
  • Documented the network infrastructure using Visio diagrams and word document for peer training and review.

Environment: Cisco switches 4800, 6500 Catalyst series, Nexus 7000 series; Cisco routers 3700, 3800, 7200, 7600 series Cisco ASR 9000 Series Aggregation Services Routers and Cisco ASA 5500, Palo Alto (PA-3060/5060), F5 BIGIP LTM, Panorama M’100.

Sr. Network Engineer

Confidential | Bloomington, Minnesota

Responsibilities:

  • Configured and managed Check Point firewalls versions R77.30 and R77.10.
  • Configured Check Point security gateways from scratch and setup in high availability.
  • Enforced application, service-based policies and cleaned up unused policies.
  • Managed and monitored Check Point firewall configurations through Smart Dashboard and Smart View Tracker.
  • Implemented anti-bot, anti-spam, and sand box blades to prevent malicious threats and data breach.
  • Configured Active-Passive High Availability for state full failover and Zero down time maintenance on Checkpoint firewalls.
  • Implemented site-to-site VPN tunnels using IPsec encryption standards on Checkpoint firewalls.
  • Migrated existing IPSec VPN tunnels from Pre-Shared key to Certificate Authority (PKI).
  • Assisted in configuring Security profiles such as Threat prevention, Anti-Virus, Anti-Spyware, File Blocking, etc.
  • Implemented AAA Architecture and 802.1x Wireless User Autantication using Active Directory Server wif Kerberos.
  • Deployed F5 Big-IP LTMs and implemented weighted round robin policy to balance the load.
  • Configured & troubleshoot Virtual Servers, me Nodes, Pools, and customized me Rules on BIG-IP F5 LTM Load balancers for traffic management.
  • Performed cleanup of fully shadowed, expired and unused security rules and objects using tufin secure track
  • Responsible for WAF operation implementation as well as any required troubleshooting and root-cause.
  • Configured VPC, VDC and ISSU Software upgrades on Cisco Nexus switch implementing Fabric Path to avoid blocking ports.
  • Configured HSRP between VLANs, Configuring Ether-Channels, and Port Channel on 6500 catalyst switches.
  • Implemented BGP to optimize WAN routing on core and edge routers.
  • Conducted mutual redistribution of OSPF and BGP routes using route maps.
  • Involved in the removal ofEIGRPfrom all devices and making OSPF the primary routing protocol.
  • Addressed issues related to OSPF, EIGRP, HSRP and GLBP fail-overs, Optimized routing using route maps, route redistribution.
  • Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Experience in working wif ARISTA switches for cloud computing, data center networks.
  • Configured multiple domain name services (DNS), email services (Exchange Server), web, and file transfer protocol services (FTP) for various platforms including line leasing through DHCP servers.
  • Used Network monitoring tool SolarWinds NPM to ensure connectivity and Protocol analysis tool (Wireshark and TCP dump) to inspect the packet for networking issues.

Environment: Arista switches 7308R, 7328X, Cisco 3550/4500/6500 switches, Juniper Routers MX 240, 480, M320, F5 Big-IP LTM-6400 load balancer, Checkpoint R77.

Network Engineer

Confidential | Minneapolis, Minnesota

Responsibilities:

  • Configure & troubleshoot routing protocols EIGRP, OSPF on Cisco ISR 3800, 2900.
  • Redistributing from EIGRP to OSPF and vice versa. Implement a hub and spoke topology wif a Frame Relay Switch.
  • Configured and resolved complex OSPF issues in a multi-area network.
  • Involved in troubleshooting of DNS, DHCP, and other IP conflict problems.
  • Implemented VTP and Trunking protocols (802.1q and ISL) on 3560, 3750 and 4500series Cisco Catalyst switches.
  • Provided on-call support for installation and troubleshooting of the Networking L2/L3 issues.
  • Implemented & operated L3 switching and related functionality. This includes the use of VLANs, STP, VTP and their functions as they relate to networking.
  • Worked on Security issues, VPN, IPSec, NAT, Standard & Extended Access Control Lists (ACLs).
  • Manage Cisco Routers and troubleshoot layer1, layer2 and layer3 technologies for customer escalations.
  • Installation, Configuration and troubleshooting Cisco switches & Routers.
  • Enabled STP, RPVST+, BPDU Guard, Root Guard, disabling all unused ports and putting them in unused VLAN.
  • Implemented WAN network technologies like MPLS and Frame Relay.
  • Coordinated installations and followed up wif project managers and end users to ensure acceptable system/network performance once changes were completed.
  • Created documentation and network diagrams of the network infrastructure using MS VISIO.
  • Worked on service request tickets generated by the halpdesk such as troubleshooting, maintenance, upgrades, patches and solutions wif all-around technical support.

Environment: Cisco 2800/2900/3900/4000 Series ISR's, Cisco Catalyst switches 3560, 3750 and 4500series and Cisco 3640/3845/3600/2800 routers, cisco WAP 3700, Windows Server 2003/2008.

Jr Network engineer

Confidential

Responsibilities:

  • Configured and troubleshoot EIGRP routing protocol on Cisco routers.
  • Implemented and upgraded Cisco switches and routers.
  • Configuring Vlan's, VTP's, enabling trunks wif 802.1q tagging between switches in the access layer.
  • Enabled STP Enhancements to speed up the network convergence dat includes Port-fast, Uplink-fast.
  • Involved in the upgrading of legacy Cat 4500X-32 switches to 4500X-40 series switches.
  • Involved in troubleshooting of DNS, DHCP, and other IP conflict problems and applied QoS for the bandwidth delay.
  • Involved in implementation and configuration of HSRP for load balancing on L3 switches.
  • Performed IOS upgrades on various catalyst series switches and maintained latest IOS versions according to company's policy.
  • Configured Access List (Standard, Extended and Named) to allow users all over the company to access different applications and blocking others.
  • Installed and maintained windows XP, 2007 and vista on client’s operating systems, hardware/software upgrades and network administration.
  • Responsible for cabling and labeling and Racking & Stacking of various network equipment and ensured their are no connectivity issues using ping and tracert.
  • Troubleshooted the layer 1 and layer 2 ticketing issues.
  • Knowledge of HSRP, GLBP, ICMP, PPP, SNMP, VLSM, ARP and Autantication Protocols (PAP and CHAP).
  • Good noledge of routing protocols like OSPF, is-is, and threats to OSI.

Environment: Cisco routers 2900, 3800, 3900, cisco switches 3500, 4500, Nexus 2000 series, windows XP, 2007 and vista.

We'd love your feedback!