We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

5.00/5 (Submit Your Rating)

NJ

SUMMARY

  • Over all 9 + years of experience in Cisco/Juniper Networking, Security which includes designing, Deployment and providing network support, installation and analysis for a broad range of LAN / WAN protocols.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Extensive experience working on Cisco and Juniper routers/switches in complex environments with multiple ISPs.
  • Experience working on Cisco Catalyst Series 3750, 4500, 4900, 6500; Nexus 2000, 5000, 6000, 7000 and 9000 series switches.
  • Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, 6500 and Sound knowledge of Routing and Switching concepts and MPLS design.
  • Expert in dealing with Cisco IOS configuration, networking Protocols and Standards such as TCP/IP, OSI, UDP, Layer 2 (VLANs, STP, VTP), Routing Protocols (RIP, EIGRP, OSPF, BGP), WAN technologies (Frame relay, IPSec, VPNs, MPLS), QoS.
  • Used Cisco ACI Fabric which is based on Cisco Nexus 9000 series switches and Cisco Application Virtual Switch (AVS).
  • Cisco ASA and FWSM, Fortinet, FortiGate, F5 AFM, A10 WAF, IDS/IPS systems and general knowledge of security features and protocols.
  • Installation, deployment, Analysis and troubleshooting of Firewall Technologies i.e. Checkpoint, Fortinet, Palo - alto, Cisco ASA, F5 (LTM).
  • Checkpoint, Cisco ASA, Fortinet and Palo Alto installation, upgrade, Monitoring and patch management.
  • Experience working on Cloud Computing Virtualization using VMWare ESXi 4.0 and Windows Hyper - V.
  • Experience with Cisco Meraki wireless managed network infrastructure.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Performed switching technology administration including Vlans, inter-Vlan routing, trunking, port aggregation and link negotiation.
  • Expert knowledge of all facets of Citrix NetScaler and NetScaler Gateway ADC
  • Experience with Citrix Netscaler 10, 10.5, 11.0; GSLB; Xen App 4, 4.5, 6.0
  • Support of NetScaler VPX in Azure/Amazon cloud.
  • Migrate, Upgrade and Patch Management of Cisco ASA, Checkpoint, Palo alto and Fortinet Firewalls.
  • Knowledge on working with Wireless LAN Controller's, Cisco Meraki, Cisco AP's, Standalone AP's and Mesh AP's.
  • Installed and implemented & troubleshoot the Network Virtualization through VM Ware and NSX.
  • Troubleshoot end-to-end call flow issues in enterprise market involving various VoIP elements.
  • Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible, Python scripting.
  • Working Experience on web content filter and gateways like Blue Coat, Websense.
  • Extensive working experience in AAA protocols such as RADIUS, TACACS+ and Cisco ACS.
  • Experience on Monitoring and Management tools such asHP Open view, Cisco Works, IXIA, Splunk, TCP dump, Solar Winds and Wireshark, Cisco Prime, NetFlow, Riverbed.
  • Extensively used TCP/IP tool like TELNET for remote login to the routers and SSH for secure login.
  • Working experience performing Incident, change management using ticketing tools such as ServiceNow, Remedy. Utilize Remedy ticket system to update network status.
  • Installed and configured Cisco Unified Communications Manager (UCM).
  • Experience in risk analysis, security policy, rules creation and modification of Cisco ASA networks.
  • Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
  • Familiar with products such as Cisco ISE, Cisco ASA 5500 series firewalls and Cisco ACE 4710 Load balancers.
  • Performed IOS Software upgrades on switches 6509, 4510, 3750 and Cisco ASR for compatibility with Cisco ISE.
  • Conversions to BGP WAN routing, which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new WAN links.
  • Experience in troubleshooting NAT configurations, Access-Lists (ACL), and DNS/DHCP related issues within the LAN network.
  • Responsible for Configuration and administration of firewalls, which includes Checkpoint, Cisco ASA and Palo Altofirewalls.
  • In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP servers.
  • Experience in installing and configuring DNS, DHCP server.
  • Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.

TECHNICAL SKILLS

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP

Networking Hardware: Cisco Switches, Cisco Routers, ASA/Pix firewalls, VMware, Ironport

Routing Protocols: RIPv1, RIPv2, OSPF, IGRP, EIGRP, MPLS, IS-IS, BGP, Multicasting

Security: Cisco ASA, Check point, Juniper SRX, Palo Alto

Network Monitoring: Cisco Works 2000, Wire Shark, HRPing, tcpdump, VM Ware

Operating Systems: Windows, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR

Routers: CISCO 2600, 2800,3600,3800,7200, Juniper M & T Series, Cisco CRS-1, CRS -3, GSR

Load Balancers: Cisco CSM, F5 Networks (BIG-IP)

Capacity & performance: IXIA, Spirent, Cisco works, IPerf, IXChariot

Switches: Cisco Catalyst 2960, 3500, 3750, 3850, 4500, 4900, 6500, Nexus2K,5K,7Kand 9K series

Programming Languages: C, C++, Perl, VB Script, Power Shell, Python, SQL

Simulation Tools: Qualnet Developer, OPNET IT GURU, OPNET Modelar, Cadence

Firewalls: Cisco ASA, Checkpoint, Palo Alto

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Features & Services: IOS and Features, HSRP, GLBP,IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR’s, HLD and LLD documents, Dell equal logics

PROFESSIONAL EXPERIENCE

Confidential, NJ

Sr. Network Engineer

Responsibilities:

  • Makes recommendations on existing projects to improve network security Created Change Requests, Method of Procedures (MOPS) and assisted on-call migrations and changes.
  • Performed Level 3-4 troubleshooting and analysis of disaster recovery issues, security implementations, firewall configurations, vulnerability assessments, and intrusion detection and analyze, customer consultation.
  • Telnet into Cisco router to configure and update interface, and subnet TCP/IPv4.
  • Used Visio diagram to support the verification of switches and servers in the DMZ.
  • Manage the firewall deployment, rules migrations, and firewall administration.
  • Responsible for converting existing rule base onto new platforms.
  • Experience in Cisco Routing and Switching using 3600, 3700, 3800, 5300, 6500, 7200, 7600Nexus 7k, Nexus 5k, Nexus 2k& ASR 9000, 1000 series routers, Meraki products.
  • Experienced provisioning SD-WAN service as automated failover solution for MPLS VPN by Cisco Meraki MX 80 Firewall.
  • Design, and configuring of OSPF, BGP on Juniper Routers and Palo alto Firewalls.
  • Hands-on experience with SD-WAN (MPLS/Frame Relay), routers, switches, TCP/IP, routing Protocols (BGP/OSPF), and IP addressing.
  • Utilize FortiManager, Forticlient and FortiAnalyzer to maintain and optimize FortiGate firewalls.
  • Configure and administer security rules and policies to permit and/or deny user traffics based on company. security policy with F5 BIGIP, Fortigate 1500D, Checkpoint, Cisco ASA, and Palo alto firewalls
  • Manage Palo alto, Checkpoint, Cisco ASA and Fortinet policy and network.
  • Understand customer requirements for wireless networks and explain how Cisco Meraki will integrate with current infrastructure, as well as service future needs.
  • Upgrade and patch management of Firewalls like Palo-alto, Cisco ASA, Fortinet, Checkpoint
  • Staged, planned and deployed Palo Alto 5060 within Data Centres. Worked with Palo Alto firewalls using Panorama performing changes to monitor/block/allow the traffic on the firewall.
  • Experience with Cisco ACI (Application Centric Integration) technology implementation.
  • Migrated network from EIGRP to OSPF.
  • Managed fast L3 switched/routed LAN/ SD-WAN infrastructure as a part of Network team Configured RIPv2, BGP and OSPF routing.
  • Experience in operational support, troubleshooting on an enterprise network and possess data capture skills in Cisco CSS, Citrix NetScaler 10.x devices.
  • Demonstrated experience with IPSEC VPN design connection and protocols, IPSEC tunnel configuration, encryption and integrity protocols.
  • Continually upgraded Meraki security devices as all store locations and kept current firmware, verified Meraki was upgraded, both circuits were functioning through the Meraki and wireless clients were using the Meraki appliances.
  • Configure / Troubleshoot Juniper: EX-3300, EX-4300, and EX-4500, EX 6200 series switch for LAN /WAN connectivity.
  • Worked extensively with multiple wireless hardware vendors including Cisco, Cisco Meraki.
  • Management of proxies, firewalls and F5 load balancers.
  • Configuring iRules on F5 Load balancers.
  • Migrated from Cisco ASA to Palo Alto.
  • Cisco Meraki Appliance MX (400, 80, 60) and Meraki wireless Access points (MR66,MR18).
  • Work on Change Management for migration from Cisco ASA to Palo Alto.
  • Used KIWI monitoring tool to troubleshoot network issues.
  • Implemented VLAN, VTP domain, Trunking and Ether Channel on Cisco 5500 switches.
  • Monitors network performance and implements performance tuning when necessary.
  • Worked with IPSEC VPN and B2B VPN design connection and protocols, IPSEC tunnel.
  • Provides Local & Wide Area Network and Network Security Support.
  • Upgraded with Nexus 9k, 7k and 5k switches to deal with the vulnerability issues.
  • Manage firewall/security systems by establishing and enforcing policies.
  • Work closely with colleagues to meet team goals and improve processes and practices.
  • Performs network and security hardware and software maintenance.
  • Worked on Great exposure to SDN and Network virtualization technologies like Cisco ACI.
  • Create and maintain detailed network documentation and procedures.
  • Perform research and provide direction on new and emerging security technologies.

Environment: Cisco 4900/4500/6500/3750, ISR 4431/4451/2901 ; Nexus 7010/5000/2148 ; Juniper SRX 240/3600; WLC 4400/5508/8540 ; NAT/PAT, OSPF, EIGRP, RIP, BGP, ISIS, GLBP, HSRP, STP, RSTP, SLA, TCP/IP, MPLS, ITIL, VPN, DHCP, QoS; Palo Alto; Wireshark, Solarwinds; F5 LTM, TFTP, Cisco ASA, IPS/IDS; Cisco ISE, Riverbed, SD-WAN

Confidential, IN

Checkpoint Engineer

Responsibilities:

  • Configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000. Configuring VDC & VPC in Nexus 9k, 7k, 5k and 2k.
  • Daily support of Cisco platform devices including Nexus 9K, 7K, 5K and 2K, Catalyst 3750,3850,4500 and 6500 series, 1800, 2800 and 3800 series routers, ASA 5500 series, 3500 and 2900 series
  • Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel on CISCO Catalyst Switches 3500, 3650, 7600.
  • Configuring, Monitoring and Troubleshooting Cisco’s ASA 5500 security appliance, Failover DMZ zoning and configuring VLANs/routing/NAT with the firewalls as per the design.
  • Troubleshot complex routing and switching issues in a HSRP and GLBP environment.
  • Performed Troubleshooting and monitored routing protocols such RIP, OSPF, EIGRP & BGP.
  • Established IPSEC-VPN tunnels with ASA 5500 series Firewall between some branch offices & headquarters.
  • Recently refreshed data center access layer with Nexus 9k's to prepare the infrastructure for future SDA or SD -WAN requirements.
  • Migration from Cisco firewalls to Palo Alto firewalls platforms PA 4000 and PA 500 and PA- 200 firewalls network technologies including Optical VoIP VPN SAN switching and routing.
  • Experience working with HP Aruba wireless controllers and access point configuration, deployment and management.
  • Worked with Design team and installed Aruba Wifi network to supply wireless connectivity to both employees and guests using segregated VLANs.
  • Experience in Citrix NetScaler application delivery controller.
  • Configure IPSEC and SSL VPN with Palo-alto, Cisco ASA, Fortinet, Checkpoint and Router.
  • Performed site refreshes on Cisco switching and Aruba wireless infrastructure.
  • Worked with the level 3 internet service providers (network outage) and the external vendors (Cisco, juniper, genesis, Aruba) for the hardware circuit issues.
  • Hands on experience in configuring the Cisco, HPE (POE+ mode), Aruba and Arista Switches.
  • Modified and reconfigured two factor authentication BIG-IP APM authentication.
  • Created Access policies on APM module using AD and LDAP authentication for external clients.
  • Worked on F5 Enterprise Manager 3.1 version to manage multiple F5 LTM devices from single-pane view.
  • Hands on Experience configuring and testing F5 I Rules using Browser (IE), HTTP watch.
  • Worked on F5 LTM series like 1600, 6400 and Viprions for the corporate applications and their availability.
  • Successfully Design and installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/ switches/ firewalls.
  • Back up, Restore and upgrade of CheckPoint and Fortigate firewall appliances.
  • Configure checkpoint and fortigate firewall to authenticate users based on user identity, user group, session and PC-User Authentication.
  • Configuring rules and maintaining Palo Alto Firewalls& Analysis of firewall logs using various tools.
  • Worked with the installation of Palo Alto firewall, migrated with a team from predominantly ASA environment to Palo Alto global solution.
  • Worked with Palo Alto firewalls PA3020, PA5020 using Panorama servers, performing changes to monitor / block / allow the traffic on the firewall.

Environment: Cisco 3850/3750/3500/3650/6500/7600 switches, SÁ 5500 firewall, Palo Alto PA-3060 firewall, ASR router 1002/1006, juniper SRX 5800 Fire wall, F5 LTM 1600/6400, OSPF, BGP, EIGRP, VLANS, LAN, WAN

Confidential, NJ

Sr. Network Engineer

Responsibilities:

  • Performed network engineering, design, planning (WAN & LAN) & implementation. Studied single point failures & designed WAN structure in such a way that there are no failures in network in case of any device or link failure.
  • Installing, Configuring and troubleshooting Cisco Routers (ASR1002X, 3945, 3845, 2800, 3600) and Switches to perform functions at the Access, Distribution, and Core layers.
  • Installing, Maintaining and Troubleshooting of Cisco ASR 1K, 7200, 7750, 7950, 3925E and 2951E Routers and Cisco 6500, 4510, 4500-X, 4948, 3560X, 3750X and 2960S Switches for deployment on production.
  • Envision and drove Cisco's SD-WAN (IWAN) and VPN for Enterprise and MSP networks.
  • Responsibilities include software upgrade, license activation, configuring/installing new GSR router 7000,12000, Nexus switch 9000, 5000,3000, 9504, 9300, 3200, 2308, F5-5050 and maintaining network documentation.
  • Troubleshooting Layer 2 issues, Spanning Tree protocol, RSTP, MST, VTP, VLAN on Cisco - 6500 series switches.
  • Configure and installation Cisco prime infrastructure to deploy IWAN.
  • Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between Switches.
  • Worked in the Datacenters and performed tasks such as Racking, stacking, device testing, faulty management various network devices. Run scripts and perform desired configuration changes on Fortinet 60D, Fortigate 3700D, 1500D firewalls.
  • Create, modify and monitor Fortinet firewall and IDS policies and logs.
  • Configuration of Fortinet 60D firewalls and Cisco WLAN controllers and deployed them into the production network.
  • Assisted with configuring Fortinet for Guest WIFI coach stores in laboratory environment.
  • Experience installing and administering firewall and IDS/IPS systems in enterprise networks including in Datacenter.
  • Design and Implement Catalyst/ASA Firewall Service Module for various LAN’s.
  • Cisco ASA 5585 Firepower hardware module installation and configuration.
  • Checkpoint Firewall Deployment, Upgrade and Administration.
  • Experienced on working with Checkpoint firewalls R75/R77 such as installing/deleting and troubleshooting the networks.
  • Designed security policies on Palo Alto network firewall for controlling what traffic needs to be allowed or blocked based on customer requirements.
  • Extensive Packet level debugging and troubleshooting on Palo Alto Firewalls to resolve numerous network issues.
  • Troubleshooting of protocol-based policies on Palo Alto firewalls and changing the policies as per the requirement and as per traffic flow.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Network-wide implementation of F5 Traffic steering nodes with TCP acceleration,
  • Worked with network services like DNS, DHCP, DDNS, IP4, IP6, IPSec, VPN etc.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS AAA (TACACS+ & RADIUS).
  • Configured Easy VPN server and SSL VPN to facilitate various employees’ access internal servers and resources with access restrictions.
  • Developed and implemented a web crawler program in Python that gathers data from social networking site.
  • Network Address Translation (NAT) and Smart Dashboard Configurations.
  • Blocking Websites with Content Filtering and Layer 7 Firewall Rules.
  • Improve scalability and ease of deployments of the Open stack underlay network by migrating from Standalone Nexus to Cisco ACI platform.
  • Focused on working with Cisco Channel partners to build practices around Cisco ACI.
  • Worked with Cisco ISE to identify threats in the network for rapid containment and remediation.
  • Experience on dealing with Cisco ISE Secure Network Server 3515 and other network security products.

Environment: Cisco 4000/6500/3750, ASR 9001/1006; Nexus 7010/5000/2148 ; Juniper MX480/960; Juniper SRX 550/300; DMZ, NAT/PAT, OSPF, EIGRP, RIP, BGP, ISIS, GLBP, HSRP, STP, RSTP, SIP, SLA, TCP/IP, VoIP, MPLS, ITIL, VPN, DHCP, QoS; Palo Alto

Confidential, NY

Network Engineer

Responsibilities:

  • Configure / Troubleshoot CISCO 12000, 7500, 3800 series routers and 3560 series switch for LAN/WAN connectivity.
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Used Citrix Netscaler 10, 10.5 for load balancing using round robin.
  • F5 Big-IP load balancer configuration, layer 7 load balancing using I-Rules (TCL).
  • Windows Server Administration (Windows 2000, 2003 & 2008).
  • Performed installation and upgrades of office 365 Business as per the changes recommended by the network architect.
  • Performed Cisco ASA Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Troubleshooting the Juniper SRX100 and a hundred and ten series, Juniper NetScreenrouters with Site-Site VPN, and firewalls for Supervalu Retail sites.
  • Identify, design and implement flexible, responsive, and secure technology services
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Implemented Positive Enforcement Model with the help of Palo Alto Networks.
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.

Environment: Cisco 3500/6500, Nexus 7000/5000; Juniper M320/MX480/MX960/EX3400/4200, SRX 300/220, RIP, BGP, OSPF, EIGRP, ISIS, GLBP, HSRP, VTP, RSTP, DNS, DHCP, TACACS, RADIUS, TCP/IP, NAT/PAT, SIP, MPLS, VoIP, QoS, SLA, ITIL, Wireshark.

We'd love your feedback!