We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

3.00/5 (Submit Your Rating)

Jackson, MI

SUMMARY

  • CCNA CCNP CERTIFIED professional with over around 8 years of experience in routing, switching, firewall technologies, systems design, administration and troubleshooting.
  • Exposure to LAN/WAN setup, installation, configuration and troubleshooting.
  • Experience of routing protocols like EIGRP, OSPF, RIP, BGP and IP addressing.
  • Experience in testing Cisco & Juniper routers cum switches in laboratory scenarios and deploy on site for production.
  • Configured syslog - ng forSplunkimplementation, Familiar with monitoring tools such as Nagios and Splunk.
  • Strong experience in Network security using ASA Firewall, Checkpoint, Palo Alto, IDS/IPS and IPSEC/SSL VPN and implementing security rules.
  • Knowledge and experience on F5 load balancers and Cisco load balancers (CSS and ACE).
  • Excellent hands on Cisco ASA and checkpoint firewall to use multiple security levels and interfaces
  • In Depth knowledge of all DNS RFC specifications
  • Experience in working with Cisco Catalyst series 2900, 3560, 3750, 4500, 4900, 6500 Switches.
  • Experienced in Troubleshooting for connectivity and hardware problems on Cisco devices.
  • Hands on experience in configuring Cisco Nexus 2232, 2248, 5548, 6001 and 7018(Sup 2E) and worked on nexus protocols VPC, VRF, VDC and FEX Links.
  • IOS/Juncos upgrade for Cisco & Juniper routers and switches.
  • Hands on experience in cisco call manager and VoIP.
  • InstallAvayaVoIP phones, Polycom and Cisco Codecs.
  • VMware ESX/ESXi, VMware venter, VMware VCSA and Windows 2008 R2 Hyper-V.
  • Implementing, maintaining and troubleshooting switching tasks such as VLANs, VTP, VLAN Trucking using 802.1Q, STP, RSTP, PVST+, Ether channel using LACP and PAGP, Inter-Vlad routing, and CEF.
  • Experience in L2/L3 protocols like VLAN, STP, VTP, MPLS, 802.1Q protocols.
  • Good knowledge in WAN Technologies like ACL, NAT/ PAT, Ether Channels, IPSec VPNs.
  • Enhanced level of knowledge with, PPP, ATM, T1 /T3 Frame-Relay, MPLS.
  • Expertise in implementation and troubleshooting of FHRP protocols such HSRP, VRRP, GLBP, ACL.
  • Prepared, arranged and tested Splunk coresearch strings and operational strings.
  • Worked with Cisco, Palo Alto, Juniper,Splunk, Force point, Nessus, Stealth watch, Checkpoint, Scalar and other vendors to provide a stable, high-speed securenetwork.
  • Experience in working with Cisco 2800, 3600, 3800, 3900 series Routers
  • Extensive knowledge in different networking protocols DHCP, DNS, FTP, VOIP (SIP, H.323)
  • Extensive experience with Cisco IOS, IOS-XR, NX-OS Windows client/server operating systems, Linux, Networking technologies, Firewalls.
  • Troubleshooting & implementation of VLAN, STP, MSTP, RSTP, PVST, 802.1Q, HSRP, VRRP, GLBP, LACP, PAGP, AAA, TACACS, RADIUS, MD5authentication, VTP & SVI.
  • Knowledge on complex Checkpoint, Cisco ASA & Palo Alto Firewalls Environment.
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • IOS/JUNOS upgrade for Cisco & Juniper routers cum switches.
  • Experience working with Nexus 7K, 5K and 2K.
  • Install core components of the7.6XenAppenvironment.
  • Experience with virtualized ISE deployment.
  • Hands on Knowledge/experience on F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs.
  • Experience in design, implementation, and support of F5’s Big-IP Access Policy Manager (APM) software component in a complex enterprise environment
  • Knowledge on F5’s BIG-IP Application security management and Edge Gateway Solution
  • Worked extensively on Palo Alto, Juniper Net screen, Fortinet and SRX Firewalls.
  • Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, MPLS, QOS and ITIL.
  • Hand-on experience in developing scripts using Perl scripting language.
  • Demonstrated success record in managing multiple tasks with proven ability to meet deadlines and proactively identifying the problem to solve complex technical issues.
  • In-depth knowledge of network communication technologies and techniques.
  • Experience on SONET and deployment of DWDM

TECHNICAL SKILLS

Network Protocols: MPLS, VRF, VRRP, Policy Based Routing, Route RedistributionStatic Routing, WCCP, VDC, MPLS, LDP, ISDN, PPP, VoIP, SIP, VTP, STP, RSTP, VLANs, 802.1q/ISL, CDP, LACP, OSPF, BGPv4, EIGRP, HSRP, RIPv2, VPC, VDC.

Cisco Router platforms: 1841, 2611, 2621, 2800, 3600, 3845, 3900, 7206VXR

Cisco Switch Platforms: 2900XL, 2950, 2960, 3500, 3550, 3560, 3760, 4500, 6500Nexus 9k 7k, 5k, 4k, 2k, 1k

Firewalls: Juniper (Net screen 5200,5400), Cisco ASA (5510,5520,5540,5550,5580)FWSM, Checkpoint NGX R-55, R-60,R-65, Palo alto- 7500, 7050

LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, Port Channel, TCP/IP, Ether channel, VLSM, Cisco/Catalyst L2/L3 Switches, Wireless (802.11 a/b/g/n), Checkpoint, Juniper/Net screen/Cisco Firewalls

WAN Equipment: Cisco/Juniper Routers, Silver Peak NX-7xxx WAN AcceleratorsOC-192, OC-48, FRAME RELAY, PPP, T1/E1, HDLC, MPLS, DS3, Leased Lines, DSL Modems, ISDN(PRI/BRI)

Network Management Tools: Cisco Works, Silver peak GMS, RSA Security and operations Console, VMware vSphere Client, TFTP, FTP, SSH.

Security Access Control/Policy: Cisco Secure ACS for Windows, RSA, AAA, TACACS+, Radius, MD5, IPsec, GRE, NAT/PAT, ACLs, Juniper SA SSLVPN w/DUO, SSLVPN

Operating Systems: Windows 2003, Windows 2008, Linux, Unix, Windows server 2012

Network Operating Systems: Cisco IOS, NX-OS, CATOS, Aruba, JUNOS.

Documentation Tools: Microsoft Office, Visio, Project, SharePoint.

Load Balancing: F5 LTM, Citrix, Cisco ACE 4700 Series

IP Telephony: H.323, MGCP, SCC, Cisco SRST

VoIP Devices: Cisco IP phones, Avaya

PROFESSIONAL EXPERIENCE

Confidential, Jackson, MI

Sr. Network Engineer

Responsibilities:

  • Worked as a part of network team where my daily tasks included configuring, monitoring and troubleshooting of TCP/ IP networks.
  • Worked on installation, configuration of LAN/WAN Networks, Hardware, Software, and Telecommunication services: Cisco Routers and Switches
  • Managed Cisco call manager, Cisco Voice Mail Unity servers. Worked with in Cisco Routing and switching background w/QOS.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPN's, Troubleshoot IAP (Internet Access Points) on Palo Alto Firewalls.
  • Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • Experience configuring BGP, OSPF in Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 on advanced technologies like, MPLS VPNs, TE and other service provider technologies.
  • Managed AD Domain Controller, DNS and DHCP Servers and configurations
  • Responsible for the IPAM (IP Address management) system for a very large WAN/LAN network.
  • Expertise in configuring and troubleshooting of Palo Alto, SRX Firewalls and their implementation Experience in site-to-site and remote access VPN solutions.
  • Experience in Cisco Unified Communication Manager (CUCM), Call Manager Express (CME), Cisco Unity Connection (CUC), Unified Contact Center Express (UCCX), Unified Contact Center Enterprise (UCCE), IM and Presence, SRST andVoiceGateways.
  • Worked thru Aruba and Cisco WLAN and Controller config files to help Admin with WLAN troubleshooting
  • Design and sessions, installing ICM / UCCE, developing call flows, compose technical documentation & mentoring other team members.
  • Worked with Cisco UCCE, IPIVR, Cisco Unified Communication System
  • Designing, configuring, and troubleshooting QoS, SIP, H.323, RTP, SCCP, Session Border Controllers, Voice Gateways, Voice circuits IP /TDM, Cisco Telepresence Infrastructure, QoS, NAT, PAT, and multicast.
  • Configured (L2 & L3) multi-vendor Routers, Ethernet switches and Load balancers (F5, A10 etc.) to meet application requirements and Project demands.
  • Implemented Firewall rules and Nat rules by generating methods of procedure (MOPs).
  • Experience with F5 load balancers and reverse proxy design and setup and Configured Virtual server, service groups, Session persistence, Health monitors and Load balancing methods in new F5 and A10 LTMs.
  • Configured and implementedvoicegateways(H323/MGCP/SIP), SRST for remote sites
  • Developed MTS software plug-in forMultimediaoverCoaxAlliance (MOCA) configuration capability on DOCSIS cable modem and gateway products.
  • Configured WIDE IP and WIDE IP pool on F5 GTM’s to support load balancing between data centers.
  • Worked on configuring the Nexus 5k Aggregation Switch and Nexus 2k Fabric Extenders.
  • Installed and Configured new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2K
  • Supported Operations team when complex changes are done by developing MOPs for network devices (routers, switches and A10 Load balancers) code upgrades, VLAN/IP migrations from old to new network topology without any service disruption.
  • Configured network using routing protocols such as RIPv2, OSPF and troubleshooting L2/L3 issues.
  • Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Riverbed Steelhead appliances
  • Added and modified the servers and infrastructure to the existing DMZ environments based on the requirements of various application platforms.
  • Assist in creating network design standards for hardware and software. Developing and maintain Network Documentation (Visio diagrams, Excel spreadsheets, Word documents, etc.) Configure and troubleshoot network elements in a test/dev environment.
  • Worked on Inflobox to update the DNS host, Configuring NAT onto the Juniper SRX firewalls and a record to assist the part of the load balancer migration from F5 to A10.
  • Hardware/Software Installation and Maintenance of AvayaAura Communication Manager 5.x, AvayaAura Communication Manager 6.x templates.
  • Worked with AvayaAura g700, g350, g250, g430, g450, g650 VOIP Gateways.
  • Worked on F5 GTM, AFM, ASM and other F5 components to protect against advanced DDoS attacks.
  • Designed, built, and deployed F5 Big IP load balancers (8900’s, Virions, Blades), F5 Big IP TCL, F5 Big IP TMOS, F5 Big IP LTM Local Traffic Manager, F5 DNS Domain Name Services
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Provided Tier II Load Balancer expertise on F5 Big IP Local Traffic Managers (LTM). Designing F5solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 Big IP Load Balancers.
  • Worked on large scale implementation and maintenance for SSH (Secure Shell), PKI/SSH, VPN, IPSEC Satan, ISS, TCP/IP Monitoring.

Environment: Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800), switches (6500/3750/ /2950 ), Nexus7K,5K &2K, F5 Load balancing (LTM, GTM, APM, AFM, ASM), EIGRP, RIP, OSPF, VoiceGateways, BGP, VPN, MPLS, Ether Channels, Cisco Catalyst Switches, Firewalls (Cisco ASA, Palo Alto), Cisco Voice (CCM, UCCE), Shell Scripting, Avaya Aura.

Confidential, NYC, NY

Sr. Network Engineer

Responsibilities:

  • Worked as part of delivery team where my daily tasks included code upgrades, prefix-list addition, and access-list addition using python script and on Linux platform based on tickets generated by customers.
  • Worked on Automation tool called Autopilot an internal tool used for code upgrades and configuring of new devices at different data centers.
  • Migration and implementation of Palo Alto Next-Generation Firewall seriesPA-500, PA-3060, PA-5060, PA-7050, PA-7080.
  • Worked on migration project -XenApp4.5 toXenApp6.5 - Server 2003 (Legacy) to 2008 R2 (Gen 2) environment.
  • Basic understanding of Unified Contact Center Enterprise (UCCE) - Intelligent Contact Management (ICM), CustomerVoicePortal (CVP) and InteractiveVoiceResponse (IVR/VRU).
  • Worked on OSPF routing protocol, configuring BGP sessions and troubleshooting on Nexus 1K, 5K, 7K, Juniper MX-960 routers and cisco ASR routers.
  • Installed and maintained production servers for client services (web, DNS, DHCP, mail).
  • Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 and Juniper J series J230, M 320 and MX960 routers
  • Mitigated security risk from withinAzureCloud. Ensured the secure transfer of data from on-premises toAzure.
  • Use ofAzureservices for HA and DR and developed security policies forAzurecloud.
  • Responsible for planning, documenting and implementation of complex Firewall and VPN solutions.
  • Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability Knowledge in implementing and configuring F5 Big-IP LTM-6400 load balancers.
  • Coordinated with the Application Teams to develop effective Application validations involving F5 LTM and GTM components
  • Designed perimeter security policy, Implemented Firewall ACL's, allowed access to specified services, Configured Client VPN technologies including Cisco's VPN client via IPSEC
  • Installed and configured LAN/WAN Networks, Hardware, Software, and Telecommunication services- Cisco Routers and Switches.
  • Configuring firewall rules in Juniper SRX firewall using cli.
  • Developed entire frontend and backend modules using Python on Flask Web Framework
  • Created MSI packages using Citrix Installation packager in Citrix.
  • Configuring Citrix Load balancing for XenApp 6.5 farm as per the environment demand.
  • Working on configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between different data centers.
  • Implementing IPv6 addressing scheme for routing protocols, VLANs, subnetting and mostly during up gradation of cisco ISR routers 2800/2900/3800/3900 and switches.
  • Configuration and deployment of cisco ASA 5540 firewall for internet Access requests for servers, Protocol Handling, Object Grouping.
  • Worked on Cisco wireless LAN technologies and Switching. Configured Virtual server, service groups, Session persistence, Health monitors and Load balancing methods in new F5 andA10 LTMs. Configured WIDE IP and WIDE IP pool on F5 GTM’s to support load balancing between data centers.
  • Installation & configuration of Microsoft Proxy Server 2.0 and Inflobox DNS, DNCP and IP Address Management (IPAM)
  • Security configuration on Wireless LAN using protocols PEAP, EAP-FAST.
  • Assigning RADIUS and TACACS+ for new deployments in production environment. AAA for users to implement changes on production devices. Most of these devices are cisco propriety.
  • Generating audit reports by running automated scripts on various devices to check the layer 2 issues like errors on the links, port flapping’s.
  • Analyzing the Audit report and work along with Data center teams to check the optics and troubleshoot issues.
  • Developed/Modified/Enhanced existing and new Perl Packages, Perl frameworks and tools
  • Built alert & monitoring scripts for applications & servers using Python & Shell Script
  • Coordinating along with Global data center teams located at different locations and work along with them for troubleshooting layer 2 issues.
  • Worked on Citrix NetScaler load balancer for load balancing and failover across data center and between web servers.
  • Assisting offshore teams located in India in upgrades, VLANs configurations, in troubleshooting layer 3 issues and routing protocol issues mostly BGP.

Environment: Routers (Nexus 1K, 5K,7K, Juniper MX-960), switches (6500/3750/ /2950 ), F5 Load balancing (LTM, GTM, APM, AFM, ASM), EIGRP, RIPv2, OSPF, BGP, VPN, Unified Contact Center Enterprise (UCCE), MPLS, Cisco Catalyst Switches, Firewalls (Cisco ASA, Palo Alto), Cisco Voice (CCM, UCCE, UCCX), Citrix, Python, Shell and Perl Scripting.

Confidential, Seattle, WA

Network Security Engineer

Responsibilities:

  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration
  • Worked on configuring and troubleshooting of routing protocols such as OSPF and BGP for effective communication.
  • Maintain LAN communication between Servers/Workstations.
  • Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls, Installing and configuring new juniper SRX series firewalls to meet day to day work
  • Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
  • Installed and configured SSH (Secure Shell) encryption to access securely on Ubuntu and Red hat Linux.
  • Configure and implement voice gateways (H323/MGCP/SIP), SRST for remote sites, CUCME and CUE distributed design.
  • Performed troubleshooting, fixed and deployed many Python bug fixes of the two main applications that were a main source of data for both customers and internal customer service team
  • Worked on load balancers like F5 10050s, 10250v, GTM 2000s, 2200s to troubleshoot and monitor DNS issues and traffic related to DNS and avoid DDoS
  • Deployment of Palo Alto firewall into the network. Configured and wrote Access-list policies on protocol based services
  • Configured network access servers and routers for AAA security (RADIUS/ TACACS+)
  • Troubleshooting of protocol based policies on Palo Alto firewalls and changing the policies as per the requirement and as per traffic flow.
  • Worked on DNS server involving configuration and resolving DNS related issues
  • Writing rules for NAC servers as per the authentication and authorization of systems within the company.
  • Monitoring the network access points with the help of IBM Q Radar and Cisco prime infrastructure.
  • Implementing and troubleshooting (on-call) IPsec VPNs for various business lines and making sure everything is in place.
  • IPv6 is implemented at a larger scale using cisco ASR 7200 and 9000 series routers delivering flexible service
  • Installing and configuring new cisco equipment including Cisco 1900, 2900, 3900 series routers, Cisco catalyst switches 6807, Nexus 7010, Nexus 5500 and Nexus 2k as per the requirement of the company.
  • Worked on regular troubleshooting of BGP, EIGRP routing protocols
  • Adding and modifying the servers and infrastructure to the existing DMZ environments based on the requirements of various application platforms
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers, switches and firewalls to the DMZs
  • Working closely with Data center management to analyze the data center sites for cabling requirements of various network equipment

Environment: Routers (Cisco 1900, 2900, 3900, ASR 7200, 9000), Switches (Cisco catalyst switches 6807, Nexus 7010, Nexus 5500 and Nexus 2k), Firewalls (Juniper EX, MX, SRX, Cisco ASA, Palo Alto, AAA), F5 Load balancer, Cisco Voice (H323/MGCP/SIP, CUCME, CUE), protocols BGP, EIGRP, OSPF and DNS server and C programming.

Confidential, Chicago, IL

Network Engineer

Responsibilities:

  • Experience with Firewall administration, Rule analysis, Rule modification.
  • Experience on F5 load balancer to maintain balance in the network system with application specific usage.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures
  • Installing and configuring juniper Mx series router along with juniper switches QFX series
  • Configured and resolved various OSPF issues in an OSPF multi area environment mostly on IPv4 and to some extent on IPv6
  • Worked with Cisco Contact Center (UCCE) technologies, including centralized ingress, CVP, VXML, ICM and UCCE/UC integration
  • Managed fast L3 switched/routed LAN/WAN infrastructure as a part of Network team.
  • Hands-on experience with WAN (MPLS/Frame Relay), routers, switches, TCP/IP, routing Protocols (BGP/OSPF), and IP addressing.
  • Configured RIPv2, BGP and OSPF routing.
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, OTV, LDP, EIGRP, RIPv2, BGP v4. Configured IP access filter policies
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Deployed 7613 as PE and CE routers. Configured and troubleshoot the edge routers.
  • Excellent troubleshooting knowledge on T1, T3, OC-3 and OC-12
  • Configured egress and ingress queues for ISP facing routers using CBWFQ
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems
  • Experience with implementing and maintaining network monitoring systems (Cisco works and HP open view) and experience with developing complex network design documentation and presentations using VISIO
  • Worked on SONET and deployment of DWDM.
  • Estimated project costs and created documentation for project funding approvals.

Environment: Switches (Juniper M and QFX series), Routers (Cisco 1900, 2900), F5 load balancer, Protocols BGP, OSPF, FRAME-RELAY, MPLS, CIDR, RIPv2, EIGRP, OTV, LDP and Cisco voice (CVP, VXML, ICM UCCE/UC).

Confidential

Network Engineer

Responsibilities:

  • Worked on Cisco routers 7200, 3700, 3800 and Cisco Catalyst switches 4900, 3750’s and 6500.
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure.
  • Configured firewall logging, DMZs, related security policies and monitoring.
  • Creating private VLANs & preventing VLAN hopping attacks and mitigating spoofing with snooping & IP source guard
  • Installed and configured Cisco ASA series firewall and configured remote access IPSEC VPN.
  • Enabled STP enhancements to speed up the network convergence that include Port-fast, Uplink-fast and backbone-fast
  • Responsible for Configuring SITE-TO-SITE VPN on Cisco routers between headquarters and branch locations
  • Implemented the security architecture for highly complex transport and application architectures addressing well known vulnerabilities and using access control lists that would serve as their primary security on their core & failover firewalls
  • Installation & configuration of Cisco VPN concentrator 3060 for VPN tunnel with Cisco VPN hardware & software client.
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems
  • Used various scanning and sniffing tools like Wire-shark
  • Hands on experience working with security issue like applying ACL’s, configuring NAT and VPN
  • Documenting and Log analyzing the Cisco routers/switches/firewalls.

We'd love your feedback!