We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

3.00/5 (Submit Your Rating)

Dublin, OH

SUMMARY

  • CCNA professional with 8 years of experience in network design, implementation, and support. Routing, switching, firewall technologies, system design, implementation and troubleshooting of complex network systems.
  • Experience in skillful deployment of Layer - 2 technologies like VLANS, VTP, STP, RSTP, Inter-VLAN routing, VLAN Trunking, Ether Channels, VLAN access-maps and port security.
  • Experience with working on latest cisco switches like Nexus 2000, 5000, 6000 and 7000 series switches while implementing advanced features like VDC, VPC, OTV and Fabric Path.
  • Hands On experience Cisco IOS/IOS-XR/NX-OS, Juniper JUNOS for configuration troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS.
  • Extensive experience in configuring and troubleshooting of protocols v1/v2, EIGRP, OSPF, BGP and
  • Experience on dealing with Cisco Application Centric Infrastructure (ACI) by integration hardware and software products as per network layout.
  • Implementing Zscaler in Production
  • Worked with VLAN’s, Trunking, RSTP, SNMP, Ether Channels, HSRP, Port Security, ACL’s, QoS, Traffic Policing, Shaping, EIGRP, OSPF, NAT, PAT, Inspections, VPN’s, DHCP, Wireshark etc.
  • Installing & configuring firewalls like Checkpoint (Provider-1, R65, R70, and R75), Secure Platform (SPLAT), Juniper SRX, Net screen firewall, Palo Alto, Fortinet and Cisco ASA (5510, 5520, and 5550).
  • Experience in Migration from Cisco ASA's toFortinet’ s FortiGate firewalls
  • Configured network security policiesIPSEC, SSL,NAT, PAT,VPN, Route-maps, distribute lists, Prefix lists, Access Control Lists (ACL), filters inCisco ASA,Juniper SRX,Palo Altoenvironments.
  • Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like7K, 5K, 2K series, Cisco router models like GSR-12K, ASR9K, CSR 1000V,7200, 3800, 3600, 2800, 2600, 2500 and 1800 series and Cisco catalyst 6500, 4500, 3750, 3500,3850, 4500 and 2900 series switches.
  • Implementing 3750 Stackable switches using Cisco Stack Wise technology. Experience to review and evaluate current and future design issues as required maintaining network integrity, efficient data flow.
  • Experience ofJUNOSplatform and worked withJUNOSupgrade of Juniper devices
  • Experience working on Cisco IOS, Junos & basic Nexus (9k, 7K, 5K&2K).
  • Experience in working on cloudAWScloud EC2, S3, RDS, Load Balancer, Auto Scaling withAWScommand line interface andAWSpython SDK.
  • Experience in Azure network, VPN and Express route, Azure DNS, Traffic Manager, and Load Balancers
  • Worked on F5 load balancers, its methods, and implementation and troubleshooting on LTMs and GTMs.
  • Experience with Change management process and Project documentation tools like Excel and VISIO.
  • Excellent team player with good communication and leadership skills, Capable of Problem solving, Time management and Decision-making skills with the ability to set priorities and produce results.

TECHNICAL SKILLS

Cisco Platforms: Nexus 7K, 5K, 2K and 1K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 6807 series)

Juniper Platforms: Juniper MX960, MX480, MX104, MX80, Juniper EX and QFX Switches, Juniper SRX4600, SRX4200, SRX550, SRX345

Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPsec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall: ASA Firewall (5505/5510/5520 ), Zscaler, Checkpoint (R75/R76), Palo Alto (2k, 3k, 5k), Juniper SRX (240).

Network Tools: Solar-winds, SNMP, Cisco Works, Wireshark

Load Balancers: Cisco CSM, F5 Networks (Big-IP)

WAN technologies: MPLS, leased lines & exposure to PPP

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Security Protocols: IKE, IPSEC, SSL-VPN

Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System: MAC OS X, Windows Server 2008/2012, Linux, Unix

PROFESSIONAL EXPERIENCE

Confidential, Dublin, OH

Sr. Network Engineer

Responsibilities:

  • Collaborate with Senior Network Engineers in designing, documenting, and implementing of network infrastructure.
  • Hands-on experience on Tufin Secure Track to reduce risk while increasing compliance and efficiency.
  • Worked with VM segmentation (VMware NSX, Illumio, vArmour, GuardiCore), Firewall management and auditing (Firemon, Tufin, AlgoSec, RedSeal, Skybox, etc.) Sandboxing and Analytics (Fire Eye, Damballa, Check Point, Fortinet, Palo Alto) Network packet brokers (Gigamon, IXIA, NetScout)
  • Configuration and installation of LAN switches and wireless network infrastructure equipment and cabling all uplink and user network connections.
  • Worked on the implementation of day-to-day firewall rules, VPN configurations. Deployed CISCO ACI Greenfield and Migrated from Legacy network.
  • Designing and Deploying dynamically scalable, Highly available, fault tolerant and reliable applications on AWS
  • Used security groups, network ACL’s, internet gateways and route tables to ensure a secure zone for organization inAWSpublic cloud
  • Developed ACI (Cisco Application Centric Infrastructure) based Cisco Validated Designs for Enterprises and Service Providers to transform Traditional 3 Layer Architecture to ACI based (Spine, Leaf and APIC) Architecture. Function as part of a Firewall and Security team in support of Checkpoint Firewalls, Zscaler Proxy, Juniper Portals, SecAuth, Open LDAP, and Active Directory.
  • Completed project to evaluate Cisco Next-Generation Firepower 4100 Series security appliances for both the virtual Firepower Threat Detection and the Virtual ASA modules to increase security in a production environment.
  • Handle Service-Now tickets related to Cisco ASA & Zscaler, & VPN along with the connectivity issues and provide support when any issue is raised.
  • Managed DHCP, DNS and IP address thru Infoblox, and Admin for Internet sites access thru Zscaler.
  • Helped team to deploy 100 APs with 15 Switches, Cisco Nexus, Cisco Meraki and 2 Wireless controllers.
  • Diagnose and trouble shoot wireless issues related to Cisco Meraki
  • Upgrading code on Palo Alto firewalls PA 5050 Version 9.0 to meet company security policy and Involved in configuring Palo Alto PA 7020 firewalls.
  • Experience in configuring allPaloAltoNetworksFirewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.
  • Upgrading code onPaloAltofirewalls PA 5050/3020 to meet company security policies.
  • Monitored infrastructure with Nagios like Firewalls, Servers, Services, Network devices, applications, web portals etc. Resolution of tickets fresh & pending
  • Configure, update software, troubleshoot routing issues and maintain various enterprise network devices such as Cisco Nexus 9k's, 7k, 5k and 2k devices.
  • Installed and configured Cisco Meraki (MR66, MR18) wireless Access points in the warehouses.
  • Worked in for the NextGen Datacenter Cloud Architecture, usingCiscoACIand Nexus 9K
  • Configured VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 9k,7k/5k devices
  • Configured BGP load balancing and ensured stability of BGP peering interfaces
  • Implemented site to site VPN in Juniper SRX as per customer Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
  • Implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA 5500 Firewalls.
  • Worked on CISCO Routers - GSR 12000 series, ASR9K, CSR 1000V, 7500, 7200 VXR, 4500M, 3700, 3600, 2600,1700 series, CISCO L2/L3 Switches - 2800, 3500, 3700,4000, 6500 series, CISCO PIX Firewall - 506,515,525,535 and CISCO ASA 5500 Series Firewalls.
  • Configured Cisco 2900, 3900 routers and 3850, 4500, 6500 switches as part of the implementation plan.
  • Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM.
  • Responsible for configuration of F5 Viprion 2200
  • Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series for higher.
  • Provide second/third level technical support forACI(Application Centric Infrastructure)technologies.
  • Maintain and expand the Cisco ACI Network Centric infrastructure including ASRs, ISR, ASAs, Source file, 9k and 7k switches.
  • Designed and configured OSPF, BGP on Juniper Routers and SRX Firewalls
  • Configured NAT and PAT policies.
  • Performed processes of optimization, backup, configuration and updating of Cisco IOS and IOS XR.
  • Configuration and troubleshooting of EIGRP, OSPF, BGP.
  • Configuration and troubleshooting of CSM, integration with ASA devices.
  • Experience in migration of VLANS & Configured VLANs with 802.1q tagging, Ether channels, and Spanning tree for creating Access/distribution and core layer switching.

Confidential, Long Island, NY

Sr. Network Engineer

Responsibilities:

  • Extensively worked on deployingASA and Juniper SRX firewalls and worked on operation work like adding security policies, NAT, configuringSite-to-site VPN.
  • Responsible for upgrading various vendor routers (Nexus 7K, Nexus5K, ASR9K, Cisco 3850, Arista) and worked on implementing security policies like port security in LAN infrastructure.
  • Experience in configuring HSRP active-active in the DCs, VRRP andhad exposure toGLBP redundant protocols. Deployed CISCO ACI Greenfield and Migrated from Legacy network.
  • Developed ACI (Cisco Application Centric Infrastructure) based Cisco Validated Designs for Enterprises and Service Providers to transform Traditional 3 Layer Architecture to ACI based (Spine, Leaf and APIC) Architecture.
  • Good knowledge in implementing STP, VLAN,Subnetting as we have the DCs to support multi tenants.
  • Management of F5 LTMs & GTMs Load Balancers. This Includes Incident Resolution Tickets, Service Request Tickets, Certificate renewals
  • Responsible for upgrading the IOS/NXOS/Junos on all network Routers, Switches and ASA/SRX Firewalls. ImplementedDMZfor Web servers, Mail servers &FTPServers Using Juniper SRX 4600 HA pair in datacenter. Provided Desktop Support for internal users Handle Service-Now tickets related to Cisco ASA & Zscaler, & VPN along with the connectivity issues and provide support when any issue is raised.
  • Upgraded the existing Panorama to V8. Integrating the new firewalls to Panorama and responsible for working on change tickets for existing 3250 Palo Firewalls in the environment.
  • Troubleshooting firewall rules in Cisco ASA, Checkpoint, Zscaler.
  • Cisco ACI fabric networks, including python automation.
  • Performed redistribution ofOSPFon the coreCisco ASAfirewall & audited changes inCisco ASA.
  • Created F5 ASM WAF virtual labs and tested certain changes before going live
  • Provision the F5 Application Security Manager from scratch
  • Managed the F5 Big IP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
  • Designing and Deploying dynamically scalable, Highly available, fault tolerant and reliable applications on AWS
  • Migrated complex, multi-tier applications on AWS.
  • Defined and deployed monitoring, metrics and logging systems on Aws. Migrated existing on-premises applications to AWS
  • Monitored infrastructure with Nagios like Firewalls, Servers, Services, Network devices, applications, web portals etc. Resolution of tickets fresh & pending
  • Selecting appropriate AWS service to design and deploy an application based on given requirements
  • Created and Maintained iRules, nodes, pools to direct traffic inF5 Big IP GTMand configuredSSL
  • Utilized SNAT in F5 LTM to define nodes and usedLeast Connectionmethod for server load balancing
  • ConfiguredWIDE IPand WIDE IP pool on F5 GTM's to support load balancing between data centers.
  • Performed application level redundancy by deployingF5Big IP LTM 8950, upgrade codes on a timely basis.
  • Worked on data center Core switches for configuringNexus9k, Nexus 5k, 4500, 4900, 6500series switches.
  • Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark tool.
  • Deployed & decommissioned VLANs on Cisco ASR 9k, Nexus 9k, 7K, 5Kand its downstream devices.
  • Was part of TWC operations teams as well and used to support the network 24/7 during weekends.
  • Worked on configuration, maintenance and administration of Palo Alto PA3000 Firewalls and migrating customers from Cisco ASA to Palo Alto in HA network.
  • Configured Interfaces, zones, security rules, NAT policies, QoS, Decryption, PBR, DHCP for multiple vsys onPalo Alto 3020/5020.
  • Managed Network widePaloFW & registered new Palos thruPanoramafor pushing out standard changes
  • Migrated few Juniper SRX 240, 3600 to Palo Alto 3020/5020/7000 series FW from scratch.
  • Built NAT, access rules, defined routing on logical systems/zones/vsys for access onPalo Alto 3020/5020.
  • Configured Access rules onPalo Alto 3020firewall for network routing for B2B network connectivity.
  • Implemented URL filtering andSSLDecryption inPalo AltoFirewall environment.
  • Had experience troubleshooting various DC technologies like VPC, Fabric path, Port-channels.
  • Also work with Vendors like Cisco and Juniper to find the root causes if we come across any issues.
  • Had experience working on configuring and troubleshooting Multicast issues as we support Video applications.
  • Efficient use of Microsoft VISIO as for technical diagrams, technical documentation and various office suite tools.
  • Administered Cisco ASANGFW, creating policies, rules, users, SSL and IPsecVPNconnections etc.
  • Setup & maintained Cisco ASA security policies includingNAT, VPN, SSL, ACL& Secure Remote access.
  • Performs routine and scheduled maintenance on all network equipment such as Cisco IOS upgrades.

Confidential, Columbus, OH

Network Engineer

Responsibilities:

  • Maintain and track the status of device supplied to the client.
  • Implemented Juniper firewall switches.
  • Identified opportunities for implementation of network best practices, particularly F5load balancer implementations.
  • Worked on migration of existing ASA firewall to Palo Alto firewall,
  • Monitor performance of network appliances and WAN utilizing using network analyzer like Wireshark.
  • Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, SRX devices for easier management and common configurations.
  • Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series for higher.
  • Integration of JuniperSRX series firewalls, SA VPN Appliances, J series Routers, and EX series switches.
  • Configuring and managing FC zones on Cisco 9K/7K/5K.
  • Focused on building new content and functionality for several F5ecommerce sites.
  • Configuration of Fabric path and connectivity between Nexus 7K and Nexus 5K.
  • Configuring Routing protocols like BGP, OSPF, multicast and L2 protocols in ASA to check it is passing through via ASA in customer deployments.
  • Maintenance and troubleshooting of LAN, WAN, IP Routing, Multilayer Switching.
  • Performed interconnection of customer sites using IPSec VPN.
  • Palo Alto Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Performing onsite data center support including monitoring electrical power, switch alarms, network alerts and access logs.
  • Installation and troubleshooting of routing protocols like static and dynamic.
  • Installed high availability Big IP F5LTM and GTM load balancers to provide uninterrupted service to customers.
  • Optimizing and monitoring the performance of a WLAN, LAN, WAN and user's segments
  • Configuring RIP, OSPF and Static routing on JuniperM and MX series Routers
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
  • Maintain connectivity for approximately 300 switches and routers in a 500+ node network.
  • Experience with deploying Fabric Path using Nexus 7000 Devices
  • Experience with configuring OTV between the data centers as a layer 2 extension.
  • Managing health check of Network devices this is involves upgrading IOS on every quarter after checking the vulnerability of IOS and reviewing the configuration

Confidential

Network Support Engineer

Responsibilities:

  • Responsible for troubleshooting of CISCO routers like ping, trace route and basic issues.
  • Ensured connectivity and communication among networks, servers and clients inside and outside department.
  • Involved in IOS upgrade for Cisco routers & switches.
  • Configured and troubleshoot OSPF and BGP in the network environment.
  • Ensure reliability, stability and recoverable of specific server environments.
  • Manage the WAN Infrastructure running OSPF & BGP as core routing protocol.
  • Involved in Planning and configuring the routing protocols such as OSPF, BGP, and Static Routing on the routers.
  • Worked on ASA firewalls and F5 load balancers
  • Managed Layer 2 switches of Cisco, VLAN configuration and assigning ports to specific VLAN as per requirement.
  • Monitor and tune network to ensure acceptable levels of performance.
  • Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security

We'd love your feedback!