We provide IT Staff Augmentation Services!

Sr. Network Engineer, Assistant Consultant Resume

3.00/5 (Submit Your Rating)

TX

OBJECTIVE

  • To obtain a challenging position in a professionally managed company where my Professional Qualification, Experiences, Technical skill are put to best of use and I will work with Zeal, Initiative and Business instinct for the growth of the company.

SUMMARY

  • Network Engineer with over 14 years of experience in the industry, which includes expertise in Network Administration.
  • Understanding of OSI Reference Model and layered communication.
  • Excellent qualities such as Teamwork, Negotiation, Analysis and Communication.
  • Knowledge of different types of cabling(Single Mode,Multi Mode) with implementation.
  • Knowledge of troubleshooting, implementing, optimizing, and testing of static and dynamic routing protocols such as EIGRP, OSPF, BGP and ability to interpret and resolve complex route table problems.
  • Experience on multiple types of Optics & troubleshooting.
  • Knowledge of Spirent device connections.
  • Knowledge of PDU mapping & IP assignment in LAB.
  • Experience on VPC creation and troubleshooting in Nexus.
  • Expertise in Routing of all types such as Static & dynamic.
  • Installation of ISDN, Lease Lines (E1, Ethernet, Controllers, STM - 1).
  • Implementation of traffic filters on Cisco routes using Standard and extended Access list.c filters on Cisco routes using Standard and extended Access list.
  • Expert Level Knowledge about TCP/IP and OSI models.
  • In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture.
  • Hands on experience working with Cisco Nexus 7K, 5K & 2K Switches.
  • Strong hands on experience in installing, troubleshooting, configuring of Cisco 7200, 3800, 3600, 3400, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
  • In-depth knowledge and hands-on experience on IP Addressing, ARP, reverse ARP, Ping concepts.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP.
  • Extensive knowledge in different networking protocols DHCP, DNS, FTP,
  • In-depth expertise in the implementation, optimization, troubleshooting and documentation of LAN/WAN networking systems.
  • Installation, Configuration and troubleshooting of P2P Links.
  • Cisco Certified Network Associate (CCNA)
  • Microsoft Azure-900 (Certification Number- H )

TECHNICAL SKILLS

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, STP, VPC, ARP etc.

Routing Protocols: OSPF, BGP, Ospf Multicasting.

Network Monitoring: Cisco Works 2000, Wire Shark, HPNA, HPOV & Internal corporate tools

Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR.

Routers: CISCO 2600, 2800,3600,3800,7200 etc.

Capacity & performance: IXIA, Spirent, PDU, cabling, optics

Switches: CISCO 2900, 3500,4500,5000,6500, Nexus 7k, 5k, 2k.

AAA Architecture: TACACS+, RADIUS

PROFESSIONAL EXPERIENCE

Confidential, TX

Sr. Network Engineer, Assistant Consultant

Responsibilities:

  • Creating/Reviewing and Implementation of various Change Requests like Confidential WIFI, Power Shutdown Activity, VLAN requests Upgradation, Maintenance, CRs, switch upgradation etc.
  • Troubleshooting of all priority-based issues raised by Users.
  • Knowledge of VPC in Nexus with Keep-alive & peer link creation
  • Handling of Wireless and other Wi-Fi related issues.
  • Troubleshooting of different types of tickets like: -VLAN related Issues, Port issues, Device module related issues, SNMP issues, Circuit related issue on different devices.
  • Worked on HPNA tool to implement/push configuration on Confidential Wi-Fi/ Confidential TV
  • Airplay devices.
  • Coordination with different onsite teams (AMR, EMEIA & APAC) for daily incidents and follow-ups.
  • Co-ordination with different ISP’s for any circuit related outages, rigorous follow up for decreasing downtime for network users.
  • Raise and perform Change Requests to accomplish various tasks such as necessary network configuration changes, Local vendors, and ISP circuit maintenance activities.
  • Follow- up and troubleshooting of internal and ISP circuits with different Co-location service providers.
  • ACL 49/50 implementation in Confidential Network.
  • Knowledge of different types of Confidential tools like Shikaku, Capri and drep for monitoring of devices availability.
  • Worked on IXIA and Spirent connection in Confidential LAB
  • Experience on multiple types of Optics & troubleshooting
  • Installation & mounting of different types of Network devices in Confidential LAB
  • Raise and perform Change Requests to accomplish various tasks such as necessary network configuration changes, Local vendors and ISP circuit maintenance activities.

Confidential, IL

Network Engineer

Responsibilities:

  • Use Firewall Analysis Tool (Tufin) to find and document vulnerabilities in infrastructure. Combine data from other analysts and format to present to team leader.
  • Manage and maintain network security systems by applying system patches and other periodic maintenance tasks.
  • Submit tickets to Security and Network teams for remediation through ServiceNow. Search for hit counts for the rule using Splunk with source, destination and Rule UID’s. Firewalls include Palo Alto, Checkpoint, ASA and Juniper.
  • Ensuring network reliability and availability through well-planned and implemented solutions in NSX.
  • Support and monitor all the backups using VAAEM and Netbackup.
  • Monitor back up jobs in progress and any job alerts using Netbackup.
  • Using NAC solution evaluate the security-policy compliance by user type, device type, and operating system.
  • Experience in VPC Peering/Subnetting, proxy server management, automated failover approaches using Azure services.
  • Conduct regularly scheduled reviews of the organizations firewalls (rule sets, VPN). Using Splunk to extract useful data from syslog events and using this to formulate permit rules.
  • Advanced knowledge of Checkpoint, Juniper, Cisco, Unix, and Linux platforms. Day to day activity includes Change Implementation on firewalls, log analysis and troubleshooting of network access issues.
  • Creating network object groups and Access Control lists and Object group services on Cisco ASA 5500 as per client needs.
  • Configuring & managing around 500+ Network &Security Devices that includes Cisco Routers & Switches, Nexus Switches, Juniper and Palo Alto Firewalls, F5 BigIP Load balancers, Blue Coat Proxies and Riverbed WAN Optimizers.
  • Telnet into Cisco router to configure and update interface, and subnet TCP/IPv4.
  • Used Visio diagram to support the verification of switches and servers in the DMZ.
  • Experience in architectural deployment on APM modules.
  • Management of proxies, firewalls and F5 load balancers.
  • Configuring iRules on F5 Load balancers.
  • Worked with IPSEC VPN and B2B VPN design connection and protocols, IPSEC tunnel.
  • Provides Local & Wide Area Network and Network Security Support.
  • Upgraded with Nexus 9k, 7k and 5k switches to deal with the vulnerability issues.
  • Manage firewall/security systems by establishing and enforcing policies.
  • Troubleshoot, diagnose and resolve complex security attacks.
  • Performed DDOS mitigations and analysis.
  • Perform research and provide direction on new and emerging security technologies.
  • Install, configure and maintain Network Security devices. This includes software installation, patches, and upgrades.
  • Upgraded Panorama version 7.0 to 8.0 on Palo Alto Firewalls.
  • Migrated network from EIGRP to OSPF.
  • Experience also includes working with other vendor firewalls like Cisco's ASA Firewall, Checkpoint Firewall and the Fortinet Firewall.
  • Upgraded with Nexus 9k, 7k and 5k switches to deal with the vulnerability issues.
  • Designed and implementation of the ASCO facility in Stillwater, I designed and configured all networking equipment including Palo Alto Firewalls, HP switches, and Blue Coat Wan ACC Also implemented MPLS network back to Belgium.
  • Implemented VLAN, VTP domain, Trunking and Ether Channel on Cisco 5500 switches.
  • Active/Standby and Active/Active HA configuration on Cisco ASA Firewalls. Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 5000 and 2000.
  • Perform network engineering, design, planning LTM & GTM, APM Load balancing implementation and scheduling infrastructure related tasks by coordinating with other teams.
  • Maintaining the SSL certificates for various applications hosted on the F5s and servers on the hardware

Environment: Windows 7, 10, Solar Wind, Packet Analysis, Big Data, Cisco, Nexus, Firewall and F5 Load balance.

Confidential

Network Engineer, Specialist

Responsibilities:

  • Leading efforts across installation, maintenance, procurement & monitoring of lease line & ISDN.
  • Configuration, installation & upgradation of routers iOS of different series.
  • Expertise in sekng network such as router, modem, and switches.
  • Defly experience of NOC (Networking Operating Centre) for the Confidential (National Stock Exchange) customers.
  • Managed & Troubleshooting of VSAT technology at client end.
  • Adept at configuring and troubleshooting the Router for the PRI/Lease and VSAT.
  • Knowledge of monitoring tools like BMC Remedy, Netcool, NNM & Net console.
  • Working as a Lead Network Engineer (L2 support) in a Team comprising of 6 members.
  • Configuring and troubleshooting Cisco routers, Cisco IP phones and Call manager, RAD/Tell labs modems and various technologies and protocols like VLAN, Inter VLAN routing, EIGRP, BGP, static routing, Channelized E1, access-lists, ISDN-PRI/BRI, PPP, HDLC, static routing etc.
  • Effectively coordinating with field engineers for remote leased line and ISDN commissioning / testing / maintenance and successfully remotely troubleshooting / identifying WAN and LAN related problems.
  • Perform installation of hardware and implementation of sofware, review network management and monitoring tools.
  • Providing technical support to the Confidential Helpdesk-Team resident at Data center which manages and monitors the Network Connectivity for Remote locations of Bank
  • Coordination with organizations such as Bandwidth provider (MTNL/BSNL,
  • VSNL, Reliance, Bharti), Network Equipment Supplier (Wipro, Tulip IT Services, CMC India Ltd), VSAT and RF link Service Providers (BSNL, Tulip) etc.
  • Managing over 6000 Remote office and 7500 ATM’s spreading all over world including Hong Kong, UK, Dubai, Kabul, and Bhutan. related problems.

Confidential 

Network Engineer, Specialist

Responsibilities:

  • Responsible to gather client requirements and build network typologies/designs based on provided information.
  • Provide technical guidance to other IT streams in all aspects of Data Center planning, designing and deployment strategies.
  • Prepare test cases,test data and test environment based on requirements in UNIX scripting (Perl, Bash).
  • Perform debugging using Perl and Bash scripting.
  • Managed F5 BigIP LTM appliances to load balance server traffic in critical serval access silos. Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Netscreen devices for easier management and common configurations.
  • Involved in setting up IP sec VPN between ASA firewalls. Experience with implementing Cisco 6500 VSS on the User distribution switches. Upgraded IOS on the ASA 5520 firewalls
  • Performed basic security audit of perimeter routers, identifying missing ACL’s, writing and applying ACL’s. Network security including NAT/PAT, ACL, and ASA Firewalls.
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with ASA and JUNIPER SRX Firewalls
  • Configure and troubleshoot Juniper EX series switches and routers at branches/back offices.
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
  • Upgrading code onPaloaltofirewalls PA5050/3020 to meet company security policy
  • Implemented Zone Based Firewalling and Security Rules on thePaloAltoFirewall
  • Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network.
  • Performed basic security audit of perimeter routers, identifying missing ACL’s, writing and applying ACL’s. Network security including NAT/PAT, ACL, and ASA Firewalls.
  • Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection. Experience configuring VPC, VDC and ISSU software upgrade in Nexus 701.
  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers. Configuring VLAN, spanning tree, VSTP, SNMP on EX series switches. Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wire shark
  • Configured Client VPN Technologies such as Cisco’s VPN Client via IPSEC. Configured Cisco ASR, ISR 2800 & 3800 series routers with OSPF as an enterprise.
  • Manage SolarWinds WPM, NPM and monitoring services and nodes.
  • Involved in Implementation and Configuration (Profiles, I Rules) of F5 Big-IP C-4400 load balancers.
  • Upgrading code onPaloaltofirewalls PA5050/3020 to meet company security policy
  • Implemented Zone Based Firewalling and Security Rules on thePaloAltoFirewall

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/ 0/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K, Checkpoint, Cisco ASA.

We'd love your feedback!