We provide IT Staff Augmentation Services!

Sr. Network Engineer (security) Resume

2.00 Rating

Newark, NJ

SUMMARY

  • 7+ years of professional experience in Network Designing, Deployment, Configuring, Troubleshooting and testing of networking system.
  • Strong hands on experience in installing, configuring, and troubleshooting of Cisco 7600, 7200, 3800, 3600, 2800, 2600, 2500 and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
  • Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP.
  • Experience in layer - 3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2K series, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches
  • Experience in physical cabling, IP addressing and Subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
  • Maintain a thorough understanding of Local Area Networking
  • Good knowledge and experience in Installation, Configuration and Administration of Windows Servers 2003/2008, Active Directory, FTP, DNS, DHCP, TFTP, Linux OS under various LAN and WAN environments
  • Enterprise Routing experience using protocols RIP v1 & 2, EIGRP, OSPF and BGP.
  • Enterprise Switching with VLANs, Trunks, Spanning Tree, Port Spanning etc.
  • Primary responsibility is to design and deploy various network security & High Availability products like Cisco ASA and other security products.
  • Experience on PIX Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA(TACACS+ & RADIUS)
  • Well experienced in configuring gateway redundancy protocols like HSRP, GLBP, and VRRP.
  • Experience with Load Balancers for administrating and monitoring global & local traffic using Cisco CSM, ACE Module, and F5 BIG IP LTM & GSS
  • Configuring and installing client and server network software for upgrading and maintaining network and telecommunication systems
  • Supervising the administration of systems and servers related network to ensure availability of services to authorized users
  • Experienced in troubleshooting various network related problems by using sniffing tools.
  • Excellent qualities such as Teamwork, Negotiation, Analysis and Communication.
  • Configured ASA 5520 Firewall to support Cisco VPN Client on Windows 7/XP/Vista.
  • Installation, advanced configuration and troubleshooting of Cisco and F5's load balancing devices.
  • Experience with designing, deploying and troubleshooting LAN, WAN, Frame-Relay, Ether-channel, IP Routing Protocols - (RIPV2, OSPF, EIGRP & BGP), ACL's, NAT, VLAN, STP, VTP Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology (LACP, PAgP) etc.
  • Strong hands on experience on PIX Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA(TACACS+ & RADIUS)
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
  • Knowledge in implementing and configuring F5 Big-IP LTM-6400 load balancers.
  • Experience on WAF (Web Application Firewall) to filter on coming security issues.
  • Worked in web hosting environment to publish and maintain various websites on internet.
  • Extensive experience using Microsoft suite like Word, Visio, Excel, PowerPoint
  • Excellent technical and project management skills combined with strong communication skills
  • Worked on Load Balancer F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability

TECHNICAL SKILLS

Protocols: NAT, VTP, VLAN, L2TP, PPTP, RDP, TCP/IP, IPX/SPX, NetBEUI, UDP, ARP, NTP, EIGRP, OSPF, RIP, VoIP, SIP, BGP, SSL, VPN, ESP, 802.11 Wireless, HTTP, HTTPS, FTP, POP3, SMTP, DNS, ICMP

Programming Language: C, C++, SQL

Tools: Tripwire, Rapid 7, Nessus

Routers: Cisco 7609, 2600, 2800, 3800, 3640, 3745, 7600, 7200, 3600, 2500 and 1800

Technologies: MPLS, VPN, IPsec, DMVPN

Switches: Cisco 3500, 5000, 6500 Catalyst Series 7000, 2000, 4500, 3750, 2950 and 3500XL series switches. VLAN, VTP, STP, HSRP, GLBP, Nexus Switches, Wireless

Firewall: Palo Alto PA-500, PA-2k, PA-3k & PA-5k series, Checkpoint Provider-1 R65/R70/R75/R77 & Cisco ASA, WAF

Network Equipment: CISCO 2950,3500,4500,6500 series Switches, CISCO 800, 1600, 2500, 2600,3700,3800,7200 series Routers, Cisco wireless access points.

Operating System: Windows, Linux

Engineering: Matlab, AutoCAD, Arena, IPSec VPN, AAA Architecture, TACACS+, RADIUS

Microsoft Office: Word, Access, PowerPoint, Excel

PROFESSIONAL EXPERIENCE

Confidential, Newark, NJ

Sr. Network Engineer (Security)

Responsibilities:

  • Experience with Supporting bothNetworkand Security infrastructure in data center environment and Campus environment, which involved with devices such as routers, switches, firewalls and wireless access points.
  • Experience with moving data center from one location to another location, from Cisco 6500 based data center to both Cisco 6500 & Nexus based data center.
  • Strong hands on experience on ASA (5505/5510) Firewalls. Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA(TACACS+ & RADIUS)
  • Involved in setting up IP sec VPN between ASA firewalls.
  • Experience with implementing Cisco 6500 VSS on the User distribution switches.
  • Upgraded IOS on the ASA 5520 firewalls
  • Works with client engineering groups to create, document, implement, validate, and manage policies, procedures, and standards that ensure confidentiality, availability, integrity, and privacy of information.
  • Manage firewall policy lifecycle process from review, approval, implementation, publishing, verification and maintenance.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Worked extensively on checkpoint R77.20 on GAiA and SPLAT, Cisco ASA.
  • Strong hands on and exposure to Checkpoint R77.30 & Palo Alto 5020 on a regular basis.
  • Configuration and Administration of Palo Alto Networks Firewall to manage large scale firewall deployments.
  • Working with MPLS Designs from the PE to CE and also configuring VRF on PE routers
  • Experience with designing and deployment of MPLS Traffic Engineering
  • Configuring RIP, OSPF, EIGRP BGP, MPLS, QOS, ATM and Frame Relay.
  • Involved in design and implementation of Data Center Migration, worked on implementation
  • Strategies for the expansion of the MPLS VPNnetworks
  • Working Knowledge of Cisco IOS, Cisco IOS-XR, Cisco Cat OS, Cisco NX-OS, JUNOS
  • Experience with configuring BGP in the data center and also using BGP as a WAN protocol and manipulating BGP attributes
  • Design and deployment of MPLS QOS, MPLS Multicasting per company standards.
  • Experience with F5 load balancing, enabling customization of application load balancing solutions through the control and direct manipulation of the application traffic.
  • Experience with configuring VPC, VDC and OTV between the data centers as a layer 2 extension. Responsible for Checkpoint firewall management and operations across our global networks.
  • Working with Checkpoint Support for resolving escalated issues.
  • Experience with configuring FCOE using Cisco Nexus 5548.
  • Installed controller and light weight access point coordination with TAC.
  • Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multilayer Switching.
  • Performing onsite data center support including monitoring electrical power, switch alarms,network alerts and access logs.
  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
  • Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
  • Dealt with monitoring tools like (Solar Winds, Cisco Works),networkpacket capture tools like Wire shark
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access\Maintained aNetworkwith more than 600Networkdevices, some 25,000 end hosts, and the other Networkdevices like DHCP, DNS servers, Firewall servers.
  • Co-ordination with Hardware vendors, software vendors and service Providers.

Confidential, Santa Ana, CA

Network Engineer

Responsibilities:

  • Configuration and Administration of Cisco and Juniper Routers and Switches.
  • Administration and diagnostics of LAN and WAN with in-depth knowledge of TCP/IP, NAT, PPP, ISDN and associatesnetworkprotocols and services.
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPNnetworks
  • Router/ Microsoft VPN Server in order to access certain limitednetworkresources from customer locations
  • Installed and configured four PIX 525 and two ASA 5505 in customer locations. In addition to that, configured two PIX firewall for the Guest access
  • Experience in migration of Frame-relay based branches to MPLS based technology using multilayer stackable switch like 6500 series and 2800 series router
  • Configuring VLANs and implementing inter VLAN routing.
  • Testing E911, voicemail, Media gateways.
  • Upgrading and troubleshooting Cisco IOS to the Cisco Switches and routers.
  • Configuring Site to Site to VPN connectivity.
  • Implementation of HSRP, IPsec, Static Route, IPSEC over GRE, Dynamic routing, DHCP, DNS, FTP.TFTP, RAS
  • Worked with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience. Involved in configuring Cisco Net flow fornetworkperformance and monitoring.
  • Involved in designing and implementation of wireless IPT devices.
  • Involved in Disaster recovery, like diverting the from one data center to different data center when disaster occurs.
  • Involved in configuration of Cisco 6500 ACE switches
  • Configuring IPSLA monitor to track the different IP route when disaster occurs.
  • Involved in Implementing, planning and preparing disaster recovery.
  • Having meetings with the application group and gathering requirements for disaster recovery.
  • Involved in configuring Juniper SSG-140.
  • Involved in smart view tracker to check the firewall traffic.
  • Troubleshooting hardware andnetworkrelated problems.

Confidential, Lincolnshire, IL

Network Engineer

Responsibilities:

  • Day-to-day work involves scheduling firewall policy provisioning and working with users to identify connectivity related issues and troubleshoot using both Smart Utilities and CLI.
  • Managing and administering Juniper SRX and Checkpoint Firewalls at various zones including DMZ, Extranet (Various Business Partners) and ASZ and internal.
  • Juniper Firewall Policy management using NSM and Screen OS CLI.
  • Troubleshooting Firewall Connectivity related issues using Smart view tracker on Checkpoint, NSM Log viewer for Juniper Firewalls.
  • Configure and administer Cisco ASA Firewalls (5585, 5550, and 5540) and use command line CLI, Cisco CSM, ASDM for day-to-day administration.
  • Active/Standby and Active/Active HA configuration on Cisco ASA Firewalls.
  • Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for stateful replication of traffic between active and standby member.
  • Configuring rules and maintaining Palo Alto firewalls and analysis of firewall logs using various tools.
  • Experience on ASA firewall upgrades to 9.x.
  • Configured Panorama web-based management for multiple firewalls.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Understand the flow of traffic through the Check Point Security gateway cluster and troubleshoot connectivity issues using advanced troubleshooting from Command Line Utilities.
  • Use Tools such as SKYBOX for Firewall Policy optimization and rule base Clean up.
  • Build and configure Active/Standby Failover on Cisco ASA with stateful replication.
  • Configure and tweak the inspection policies on Firewall to allow legacy application traffic.
  • Understand different types of NAT on Cisco ASA firewalls and apply them.
  • Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.
  • Support Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Troubleshooting connectivity issues through Blue coat as well writing and editing web policies.
  • Administration Big IP F5 LTM for all Local Load balancing and use GTM for load balancing across Data Centers.
  • FWSM configurations in single/multiple context with routed and transparent modes.
  • Support Data Center Migration Project involving physical re-locations.
  • 24 x7 on call support.

Confidential, Trenton, NJ

Network Engineer

Responsibilities:

  • Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.
  • Team member of Configuration of Cisco 7206 router with VPN and Configuration of Catalyst switches.
  • Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
  • Configured Routing protocols such as RIP, OSPF, EIGRP, static routing and policy based routing.
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
  • Configuration and troubleshooting link state protocols like OSPF in single area and multiple areas.
  • Redesign of Internet connectivity infrastructure for meeting bandwidth requirements.
  • Performed packet tracing using OPNET.
  • Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Providing Technical Support and solutions for Network Problems.
  • Planned, tested and evaluated various equipment's, systems, IOSs and procedures for use within the Network / security infrastructure.
  • Upgrading IOS, troubleshooting network outages.
  • Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long term planning, implementation, project management and operations support as required.
  • Configured and troubleshoot cisco WAP, and cisco prime
  • Hands-on experience in the network management of circuits using TDM and Frame Relay network, performing configuration and provisioning management, fault management and performance monitoring

Environment: BMC Remedy, Cisco ASA 5540, BIG-IP LTM 8900, QOS, Policy-maps, Class-maps, Nexus, VLAN's, STP, RSTP, PVSTP, VTP, HSRP, Ether Channel, BGP, OSPF, EIGRP, MPLS, ATM, PPP, HDLC. SNMP, TACACS+, DNS, DHCP, Checkpoint, F5 Load balancer, Nexus 7K,5K,2K, Juniper 3600, Juniper 5600

Confidential

Network Engineer

Responsibilities:

  • applications.
  • Created network diagram for employees using the Microsoft Visio.
  • Preparing Client Machines for users with Operating Systems, Software, antivirus and required utilities and mailing clients etc.
  • Primarily responsible in designing and maintaining the budget for the whole network.
  • Perform daily maintenance, troubleshooting, configuration, and installation of all network components.
  • Configuration of CISCO Routers (3600, 4000 Series) and 3550, 4500 series switches.
  • TCP/IP network planning, Implementation and Management with subnets.
  • Enabled SNMP traps for our Cacti Monitoring tool to monitor traffic and check the regular health of Servers and Network Devices
  • Implementation of Virtual LANs across Routers and Switches.
  • Implemented and Configured IP Routing Protocols: OSPF, EIGRP, and RIPv2
  • Implemented and configured LAN Protocols: Ethernet, VLANs, VTP and STP.
  • Worked with Remedy Ticketing tool in maintaining and keep a track of logs/monitor
  • Designed and implemented IP Addressing, Subnetting, Route Summarization and Route Distributions
  • Monitoring the Servers and Networks.

Environment: LAN, WAN, Subnetting, VLAN, VTP, VPN, NAT, OSPF, BGP, EIGRP.

We'd love your feedback!