Sr. Network Engineer Resume
Maplewood, MN
SUMMARY
- Certified Network engineer with 7+ years of professional experience in Network Designing, Security, Deployment, Configuring and Troubleshooting of both Cisco and Juniper Networks.
- Responsible for Checkpoint, Juniper, Palo alto and Cisco ASAfirewalls administration across global networks
- Provided firewall policy configuration and services with Juniper SRX 240 & 650 series
- Experience in managing and securing remote access through designing and implementing various VPN technologies including IPSec, SSL, MPLS, Frame relay.
- Extensive knowledge/experience in implementing, maintaining and troubleshooting LAN/WAN, Network security including Cisco and Juniper devices to perform functions at the Access, Distribution, and Core layers.
- Worked on Routers & Switches: Cisco 2800, 2900, 3900, ASR 1K, ASR 9K, Cisco 3850, 3560, 3750,3580, 2960, Nexus 7010/Nexus 7018, 5020, 2148, 2248 devices.
- Hands on experience onJuniperdevices which includes EX - 2200, EX-4200, EX-4300, MX-80, MX-480, M Series, SRX210 and SRX240
- Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, EIGRP, OSPF, BGP and MPLS.
- Familiar with Cisco firewalls PIX 515, ASA 5500 series.
- Experience with converting Cisco ASA rules over to the Juniper SRX based solution.
- Implemented security policies using ACL, Firewall, NAT, PAT, IPSec, VPN, AAA Security TACACS+, and Radius on different series of routers.
- Experience in Configuration of Cisco Routers and Catalyst Switches.
- Understanding the JUNOS platform and worked with IOS upgrade of Juniper devices
- Good knowledge of IPv4 and IPv6 Addressing, Fixed Length and Variable Length Subnet Masking (VLSM), OSI and TCP/IP models.
- Maintaining and updating inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, NTP.
- Proficiency in the configuration and troubleshooting of Layer 2 technologies: VLANs, VTP, STP, RSTP and PVST.
- Experience in Network Management Tools and sniffers like SNMP, Solarwinds, HP-Open view, Wireshark and Cisco works to support troubleshooting issues
- Experience with CSM, F5 (LTM) Load balancers to provide efficient switching and routing for local and global traffic.
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
- Experience working with Cisco Nexus 2148T Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture.
- Experience in configuration of VLAN with private VLANS, Voice VLANS, Port security, STP and RSTP (802.1W), standard and extended access lists for managing access based security, creating root views for administrative privileges.
- Ability to manage all phases of network installation and administration.
- Excellent customer management/resolution, problem solving and debugging skills with good verbal/written communications and presentation skills.
- Good team player, excellent communication skills, analytical skills and eagerness to learn new technologies
TECHNICAL SKILLS
Routers: Cisco 2800,2900,3900, ASR 1K, ASR9K, Juniper M series, MX series, SRX series
Switches: Cisco 3850, 3560, 3750,3580, 2960. Nexus 7K, 5K, 2K, EX-4300, EX-4500, QFX-5100, CMTS such as Arris E 6000, Arris C4, Cisco 10K, Arista 7280,7010
Firewalls: Checkpoint, Cisco Firewall Service Module, Cisco ASA, Juniper Netscreen, Palo Alto, Fortinet.
Load Balancer: F5 Networks (Big-IP)
Routing Protocols: OSPF, EIGRP, BGP, MPLS, Route Filtering, Redistribution, Summarization, Static Routing
Switching Protocols: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast Operations, Layer 3 Switches, Ether channels, Transparent Bridging
LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, FDDI, CDDI, Frame Relay
WAN technologies: Channelized links (E1/T1/E3/T3), Fiber Optic Circuits(OC-3, OC-12), Frame Relay
WLAN Technology: 802.11 standards, Lightweight and Autonomous systems
Network Security: NextGen Palo Alto Firewalls VM-300, PA 5000 Series, Juniper vSRX and SRX-5800, 5600, Junos Space, Checkpoint 12600,12200, 4600, Smartdashboard 75.40,77.20 and 77.30, Cisco ACS, AAA, IPSec Site To Site, Pulse Secure, HP Tipping Point IPS, Websense.
Infrastructure services: DHCP, DNS, SMTP, FTP, TFTP, POP3
Network Management: SNMP, CiscoWorks, WhatsUp Gold, HP OpenView
Communication Protocols: TCP/IP, IPv6, ARP, VLAN (802.1q, ATM), PPP, HTTP, SSH, Frame Relay, MPLS, 802.11, Wi-Fi, Wimax, Bluetooth
AAA Architecture: TACACS+, RADIUS, Cisco ACS
Monitoring: Wireshark, Solarwinds, Xenoss, HPNA (Network Automation)
Language: C, Python
PROFESSIONAL EXPERIENCE
Confidential, Maplewood, MN
Sr. Network Engineer
Responsibilities:
- Worked on varieties of troubleshooting related to network issues such as Security (IPSEC, NAT, UTM, ALG, Authentication)
- Good understanding and working knowledge on Fortigate UTM devices, FortiSwitches, FortiVoice, FortiAP, FortiAuthenticator, FortiAnalyzer and FortiManager technologies.
- Monitoring and troubleshooting network issues between client site and 200 remote sites of TSI with legacy switches and routers/firewalls.
- Implemented web-filtering and intrusion prevention solutions for Fortinet customers in order to meet surf control policy and company standards of TSI. Tested intrusion prevented capabilities of Fortinet firewall, web filtering, and VPN.
- Hands on experience on Fortinet UTM features like web filter, email filter, content filter, application control, intrusion prevention, DDoS, etc. Also on VPN Technologies, including IPSec and SSL VPN.
- Worked on implementation of remote authentication servers like TACACS+, RADIUS, FSSO and LDAP in Access Control Network.
- Experience on dealing with VoIP information deployment including troubleshooting protocols like Session Initiation Protocol (SIP), Real-Time Transport Protocol (RTP), Media Gateway Routing Protocol (MGRP) and Session Description Protocol (SDP).
- Installation of IP Voice System PBX and Voice gateway Cisco SPA 8000
- Involved in troubleshooting of DNS, DHCP and other IP conflict problems.
- Experience on dealing with Cisco Meraki and Firewall Wireless products including Access Points, Mobility Access Switches and Outdoor mesh routers.
- Management of each firewall is done remotely and onsite at client sites.
- Working and commenting on global firewall polices.
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
- Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN and Remote VPN.
- Supported in giving access the User machines and partners exterior to the network using IPSec VPN tunneling and SSL.
- Migrated Cisco environment to Fortinet environment.
- Dealt with Internet service providers in the case of WAN outages and also responsible for simulating network operations with the usage of packet analyzer like Wire shark and use to resolve tickets whenever there is an issue.
- Provided proactive threat defense with ASA that stops attacks before they spread through the network. Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
- Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ Environments to support new and existing application platforms.
- Performed switching technology administration including Vlans, inter-Vlan routing, trucking, port aggregation and link negotiation.
- Working on Active Directory to add users to new groups and change user's policies.
- Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
- Performed and presented network analysis as a part of network migration. Involved in knowledge transfer to vendors and provided them network support as required
- Design, develop and execute network test solutions for large-scale infrastructure products.
- Significant experience in documentation and updating client's network documentation using VISIO.
Environment: In Corporate office architecture with highly reliable and secured network including Cisco Routers(7200, 3800, 2800) and Cisco switches(6500, 3750, 2960), Routing protocols(EIGRP, OSPF, BGP), Switching protocols (VTP,STP,GLBP,HSRP) Cisco ASA(5505,5510), Fortigate Firewall 92D, 80C, 100D on FortiOS 5.4, FortiSwitches, FortiManager, Cisco Meraki, TCP/IP,VPN,F5 load balancer, Checkpoint Firewall.
Confidential, Boston, FL
Network Engineer
Responsibilities:
- Configuring and troubleshooting routers and switches Such as Juniper SRX and MX
- Configured BGP load balancing and ensured stability of BGP peering interfaces.
- Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes and route filtering using Route-maps.
- Configured Virtual-link between discontinuous backbone areas in the network and also established authentication between all OSPF routers using MD5 authentication.
- Experience working Juniper T-Series, M-Series, MX-Series, J-Series Routers
- Hands on experience in Upgrading IOS, troubleshooting network outages.
- Involved in effective communication with vendors, peers and clients in resolution of problems.
- Working knowledge of juniper SRX240, SRX220 and SRX550 series Firewalls
- Design and configuration of OSPF, BGP on Juniper Routers and SRX Firewalls.
- Administering checkpoint firewall - manipulating policies, troubleshooting, Firewall change requests
- Involved in End-to-End development, design,and requirement Analysis.
- Installation and Configuration of Cisco Catalyst switch 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control list implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of the port channel between core switches and server distribution switches.
- Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls.
- Enabled STP attack mitigation (BPDU Guard, Root Guard) using MD5 authentication for VTP
- Manage Cisco Routers and troubleshoot Layer 1, Layer 2,and Layer 3 technologies for customer escalations.
- Load balancing to manager network traffic
- Monitoring network performance using Logic Monitor tool, Load Balancing experience (Citrix Netscaler)
- Experience in Juniper: Mx960 and Mx480 Nexus: 7000, 6000, 5000 and 2000 Series
Confidential
Network Analyst
Responsibilities:
- Installation, configuration and maintenance of Cisco Routers like 2600, 2800 and 3600 series.
- Developing and maintain the baseline Cisco IOS. Provide upgrade instruction to the Network O&M team on new Cisco IOS.
- Designing Networks for voice and data networks over LAN and WAN. Designing, Implementing and Managing WLAN Distribution Network.
- Installing and configuration and troubleshooting of various Cisco switches like 2900 series, 2950 series, 3550 series, Nexus 5000 and Nexus 7000 series and Juniper EX series.
- Experience working with implementing and configuring checkpoint VSX for security gateways.
- Configuration of checkpoint firewalls in MDS and VSX environment. Worked with creating firewall policies.
- Configuration, Troubleshooting and Maintenance of Palo Alto firewalls PA200, PA2000 series, PA3000 series, PA4000 series, PA 5000.
- Installed and configured Cisco Meraki (MR66, MR18) wireless Access points in the warehouse.
- Troubleshooting Cisco routers, APs, Switches, Fortinet Devices and Meraki appliances.
- Working with carrier Ethernet technologies like L2vpn, VPLS, VPWS. Operating, administrating, managing & testing of carrier Ethernets.
- Used F-5Load balancers to increase capacity (concurrent users) and reliability of applications.
- Configuring, troubleshooting and managing Networks of over 1000 devices by monitoring health of routers, switches and load balancers and working with team to fix any configuration or hardware issue.
- Configuring and monitored different monitor modules F5 BIG-IP LTM F5 and DNS traffic Management.
- Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either comeon lineor that may have been altered during various planned network changes on the network.
- Experience on managing Network-based Intrusion Detection/Prevention Systems (IDS/IPS).
- Working on Wi-Fi Portfolio by Configuring and Troubleshooting Wireless Access Points (WAP) and Wireless Controllers (WLC) for limited connections issue In Wireless Local Area Network (WLAN)
Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/ switches and Cisco 3640/ /3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Checkpoint, Windows server 2003/2008, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP.
Confidential
Network Admin
Responsibilities:
- Implementing Local Area Network Solutions and its remote support.
- Network Troubleshooting, basic system & Network Security support 24x7.
- Configured F5 hardware load balancers to work with WebLogic Server.
- Experience of VoIP allows dynamic interconnection between users on any two domains on the Internet when a user wishes to place a call.
- Installing and configuration and troubleshooting of various Cisco switches like Nexus 5000 and Nexus 7000 series and Juniper EX series.
- Installation, configuration and maintenance of Palo Alto, Cisco ASA 5500, Juniper SRX and ISG Firewalls
- Hold responsibilities of preparing SQL Query reports and performed verification of the functionality of system.
- Networking: TCP/IP, Troubleshooting client network connectivity in SIMS Buildings, DNS Troubleshooting, Remote Access - Virtual Private Network (VPN).
- Password resets/unlocks, giving pseudo-Privileges, Providing LAN and Wan Support.