We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

3.00/5 (Submit Your Rating)

Philadelphia, PA

SUMMARY

  • Cisco and Juniper Certified Network Engineer with 9 years of professional experience in Network engineering, performing network analysis, design, implementation & capacity planning with focus on performance tuning and providing support to large Networks.
  • Hands on experience in configuring Cisco Catalyst 2960, 3750, 4500, 6500 and Nexus 3000, 5000, 6000, 7000 series switches, Cisco 2600, 2800, 3600, 3800, 7200, 7600 series routers.
  • Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series) and MX routers (MX240, MX480s).
  • In - depth knowledge of IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
  • Proficient in configuring, troubleshooting, optimizing and testing of static and dynamic routing protocols: RIP, OSPF, EIGRP, MP-BGP, BGPv4, and MPLS.
  • Hands on experience in configuring and supporting site-to-site and remote access, IPSec, VPN solutions using ASA/PIX firewalls, VOIP Networks and VPN client.
  • Expertise of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Expertise in creating groups and pruning traffic flow using VLAN, VTP, ISL, 802.1Q.
  • Implementation of HSRP, VRRP and GLBP for Default Gateway Redundancy.
  • Involved in troubleshooting of DNS, DHCP, and other IP conflict problems.
  • Worked on F5 LTM, GTM series like 6400, 6800 and 8800 for the corporate applications and their availability.
  • Configured BGP/OSPF routing policies and implemented strategies for the expansion of the MPLS VPN networks.
  • Experience in designing MPLS VPN and QoS for architecture using Cisco multi-layer switches.
  • Experience in network migration project to new network management team. Which includes inventory (e.g. routers, switches, firewalls, Palo Alto, checkpoints, load balancer, etc.)
  • Involved in Configuration of Access lists (ACL) on Juniper and Palo Alto firewall for the proper network routing for the B2Bnetwork connectivity. Worked extensively on Palo Alto, Juniper Net screen and SRX Firewalls.
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, VLSM, NAT, DHCP, DNS (Infoblox), FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Strong knowledge of AAA Security: TACACS+, RADIUS implementation in an Access Control Network.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
  • Excellent in documentation and updating client’s network documentation using VISIO.
  • Working experience with REMEDY for ticket change management process.
  • Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analyzing results, implementing and delivering solutions as an individual and as part of a team.

TECHNICAL SKILLS

Routers: Cisco 7600, 7200, 3800, 3600, 2900, 2800, 2600,1800,1700, ASR 9K series

Routing: RIP v1/v2, OSPF, EIGRP, BGP, MP BGP, IS-IS, PBR, Route Filtering, Redistribution, Summarization, and Static Routing

Switches: Nexus 2K/5K/7K, Cisco Catalyst 2900, 3500, 3700,6500, 4500, 3850,3560, 3750, 2960

Switching: LAN, VTP, STP, PVST, RPVST+, Inter VLAN routing, Multi-Layer Switch, Ether channels and Transparent Bridging

VMware: VSphere, VMware ESX and ESXi, VMware NSX

LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet

WAN: PPP, HDLC, Channelized links (T1/T3), Fiber Optic Circuits, Frame Relay, VOIP

Gateway Redundancy: HSRP and GLBP

WAN Optimizer: Riverbed Steelhead Appliance

DHCP and DNS: Infoblox

Load Balancers: F5 Load Balancer (Big-IP) LTM 8900, 8950 and 6400, GTM and 3-DNS, BIG-IP 2000, 4000, 5000, 7000 series; A10; VIPRION 4400, 2400

Security: Cisco PIX & ASA Firewalls, Cisco ACI, Checkpoint, Juniper, NortelAccess lists and Policy based routing, VPN Configuration, Internet Content Filtering, Bluecoat, IPsec, Load Balancing, IDS/IPS, NAC,DLP, HIDS, HIPS

Firewall: Checkpoint Console R75.40 & R77.10;, Palo Alto NG firewall;Cisco PIX - 506, 515, 525 Series, Cisco ASA 5550 Series; Juniper SSG, Juniper SRX Firewalls

Various Features & Services: IOS, IRDP, NAT, SNMP, SYSLOG, NTP, DNS, DHCP, CDP, TFTP, FTP

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Network Management: Wireshark, SNMP, Solarwinds

PROFESSIONAL EXPERIENCE

Confidential - Philadelphia,PA

Sr. Network Engineer

RESPONSIBILITIES:

  • Working on Network Design and implementation for Data center migration projects across North America and South America.
  • Deploying and decommissioning of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.
  • Implement OSPF, BGP, DNS, DHCP, HSRP, IPV6 and Bundle Ethernet on ASR 9K redundant pair.
  • VMware installation, configuration, and virtualized infrastructure management.
  • Support enterprise environment including: Aruba controllers, Airwave, APs/Cisco wireless controllers, remote Cisco router/switch and Cisco/Palo Alto firewall security appliances.
  • Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP stack, Routing Protocols (BGP/OSPF), and IP addressing.
  • Deploy Juniper SSG Routers/Firewalls to increase the Internet security of the company.
  • Configured CIDR IP RIP, PPP, BGP, MPLS and OSPF routing.
  • Troubleshoot and monitor logs using SPLUNK.
  • Assisted in MPLS migrations, implemented a backup for the existing WAN connection using site-to-site IP sec VPN tunnels.
  • Configuring & managing around 500+ Network &Security devicesthat include Juniper MX Series Routers, Juniper SRXFirewalls,and A10 Load balancers.
  • Troubleshoot the Network Issues onsite and remotely depending on the severity of the issues. For instance issues related to VLAN, VLAN Trunking, HSRP failovers and NAT configuration.
  • Design, implement and support the following services: IPAM: DNS/DHCP/NTP (BIND, NetID and Bluecat Networks), PROXY (Bluecoat Networks).
  • Used multiple network monitoring tools such as Cisco Works, Cisco ACI, Cisco NCS, solar winds and Firemon to troubleshoot network issues for end-users.
  • Resolved security issues related to Cisco ASA/PIX, Checkpoint, IDS/IPS and Juniper Netscreen firewalls.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to GetVPN.
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Daily management and troubleshooting of multi-site WAN with Bluecoat Proxy.
  • Configured Adonis Bluecat Network DNS/DHCP Servers to be implemented on remote site.
  • Configured and deployed VMware NSXfor Disaster Recovery/ Business Continuity
  • Configuring & managing around 500+ Network & Security Devices that including Cisco SourceFire, Juniper and Palo Alto Firewalls, F5 BigIP Load
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Hand-on experience with Arista (7304, 7150S, 7050S, 7048T), Cisco SourceFire, Application-ID firewall, Load-Balance (F5 and A10), and critical network services such as DNS & DHCP (Infoblox), AD, Radius, TACACS, SMTP.
  • Installation, maintenance, troubleshooting local and Wide Areas Network (ISDN, Frame relay, DDR, NAT, DHCP, TCP/IP).
  • Troubleshooting issues related to L2 protocols- VLAN, STP, RSTP and IGMP Snooping;L3 protocols- RIP, OSPF, BGP, IPv4, IPv6, TCP/IP stack, DHCP, DNS, Multicast, 1/10 GB,Ethernet& SNMP.
  • Maintained complex LAN/WAN networks with several VLANS and provided support for routing protocols and also providing secure sessions over Internet using IPsec and SSL encryption.
  • Hands on Knowledge/experience on F5 LTM load balancers, its methods, implementation and troubleshooting on LTMs and GTMs.
  • Designed new security VLAN’s with ACL’s for new domain migration. Configure Juniper SSG & Netscreen firewall at clients site, implement site-to-site as well as client-to-site (remote client) VPN,
  • Configured Access lists (ACL) on ASA firewall for B2Bnetwork connectivity and to provide proactive threat defense with ASA that stops attacks before they spread through the network.
  • Migrated Checkpoint R65 to R75 and Installed Smart-Reporter which allows us to run reports on Security rules usage etc.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco SourceFire.
  • Migration of servers from one datacenter to another, providing switch connections to the new servers, updating Check point Firewall rules for the new servers, and aiding F5 to A10 load balancers Migration.
  • Design, implementation and operational support of routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.
  • Worked with creating VIP (virtual servers), pools, nodes and applying iRules for the virtual servers like cookie persistency, redirection of the URL.
  • Created Visio Dean / Visio Documentation to give complete picture of network design for each building.

Environment: Cisco 2948/3560/4500/3560/ 3750/3550/3500/ switches and Cisco, Cisco ACI, 3640/ 00/3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, Juniper Routers and SRX Firewalls, Juniper M and MX series Routers..

Confidential - Plano,TX

Network Engineer

RESPONSIBILITIES:

  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Identify, design and implement flexible, responsive, and secure technology services
  • Experience with Firewall Administration, Rule Analysis, Rule Modification
  • Created and provisioning Juniper SRX firewall policies.
  • Created standard access lists to allow SNMP, NTP and logging servers.
  • Documented new VPN enrollments in a database and create standard procedures for further improvement.
  • Worked extensively onPaloAlto NG firewall, Juniper Net screen andSRXFirewalls. Experience in designing MPLSVPNandQoSfor architecture VMware NSX Supported DNS infrastructure, added new servers & zones to it using BIND & Bluecat appliances.
  • Installed and Configured A10 (AX2500) load balancer as SLB for various application in backend.
  • VMware NSX Supported DNS infrastructure, added new servers & zones to it using BIND & Bluecat appliances.
  • Implemented, maintain and manage 4 VMware ESX and ESXi servers (approximately 30 VMs) with a mix of SANS EMC Direct Attached Storage.
  • Experience working with ARISTA switches like 7100, 7500 for cloud computing, datacenter and low latency networks.
  • Expertise on installing of new Juniper SSG 550 firewalls & Riverbed.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures
  • Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team. The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.
  • ConfigureVRRP & GLBP andVLANTrunking802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience and troubleshooting on NOC system.
  • Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
  • Supported enterprise environment including: Aruba controllers, Airwave and APs/Cisco wireless controllers and APs worldwide, remote Cisco router/switch, Cisco/Palo Alto security appliances.
  • Configured RIP, PPP, BGP and OSPF routing.
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Configuring & managing Network & Security Devices that includes Cisco SourceFire, Nexus Switches, Juniper and Palo Alto NGFirewalls, F5 BigIP Load balancers, Blue Coat Proxies and Riverbed WAN Optimizers.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Co-ordinate with the Data Network and Security team and came up with possible solutions.
  • Managed corporate Checkpoint smart console R77, R75.20 and R75.40 implementing security rules, experience on using Smart Dashboard, Smart view Tracker to mitigate network attacks.
  • Configured and deployed VMwareSRMfor Disaster Recovery/ Business Continuity.
  • Work on Physical site Inventory verification, gather information of various Cisco Network devices and Security Devices to develop Run book and Spec Book.
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view) and experience with developing complex network design documentation and presentations using VISIO.
  • Managed the security infrastructure of the service provider which includes ASA 5585, 5540, 5520, Cisco IPS 4270, Cisco ACS 4.2 & 5.2
  • Supported enterprise environment including: Aruba controllers,Airwave and APs/Cisco wireless controllers and APs worldwide, remote Cisco router/switch, Cisco/Palo Alto security appliances
  • Included Router, Bluecoat and switch configuration VLANs (802.1q), STP, etc.
  • Estimated Project costs and created documentation for project funding approvals.
  • Monitoring and troubleshooting network issues between client site and 85 remote sites with legacy switches and routers.
  • Experienced on Firewalls Cisco ACI, Websence DLP, SonicWall, Palo Alto Networks, Sourcefire, Checkpoint, Juniper Networks, Arista, Huawei, Peplink, and ADTRAN.
  • Performed and presented network analysis as a part of network migration. Involved in knowledge transfer to vendors and provided them network support as required
  • Responsible for 6500, 3500, Nexus switching, ASA, FWSM Firewalls, CSS and F5 LTM load balancers, Riverbed WAN accelerators, Iron Port Proxy, and Linux/Bind DNS servers.
  • Configuration and maintenance of EIGRP and BGP network on router 7200 and 6500 MLS.
  • Configuration and maintenance of 3750 stack and 6500 VSS for improved efficiency of the data plane.
  • Configuration and management of NEXUS network in the existing network infrastructure.
  • Created LAB setup with 7k and 5K NEXUS switches for application testing.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/ 00/3845/3600/2800 routers, Cisco ASA5510, Palo Alto, Cisco Nexus7K/5K, 2248/3560/5020/6509, ASA, LAN, OSPF, DNS, BGP, RIP, EIGRP, Juniper SRX firewall.

Confidential - EastHanover,NJ

Network Engineer

RESPONSIBILITIES:

  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Supporting the team for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BigIP Load Balancers,Citrix netScaler
  • Monitoring system operations using SPLUNK monitoring system.
  • Supporting EIGRP and BGP based PwC network by resolving level 2 &3 problems of internal teams & external customers of all locations.
  • Upgraded Cisco ACI, Switches and Firewall (PIX) IOS using TFTP
  • Configuring HSRP between the 3845-router pairs for Gateway redundancy for the client desktops.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security, arista switches.
  • Configuring STP for switching loops prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc.)
  • Involved in Configuration of Access lists (ACL) on Juniper and Palo Alto firewall for the
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configured switches with port security and 802.1x for enhancing customers security.
  • Configuration of Palo Alto firewalls for remote site implementation
  • Creating new nodes and Pools in F5 load balancers to support newly added servers in Layer 3 environment.
  • Monitored network for optimum traffic distribution and load balancing using Solar winds.
  • Validate existing infrastructure and recommend new network designs.
  • Created scripts to monitor CPU/Memory on various low end routers in the network.
  • Installed and maintained local printer as well as network printers.
  • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices.
  • Handled installation of Windows NT Server and Windows NT Workstations.
  • Handled Tech Support as it relates to LAN & WAN systems

Environment: Net Flow, TACACS, EIGRP, RIP,OSPF,BGP,VPN,MPLS,CSM,SUP720, Ether Channels, Cisco 7200/3845/3600/2800 routers, Fluke and Sniffer, Cisco 6509/ 3750/3550/3500/2950 switches, Juniper and Palo Alto firewall.

Confidential - Gibbsboro,NJ

Network & System Engineer

RESPONSIBILITIES:

  • Provided estimated bandwidth requirements for data replication, to best determine adequate timing for migration service levels.
  • Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst
  • Switches Replace branch hardware with new 2851 routers and 2960 switches.
  • Implemented WLAN Aruba Wireless Access Points and its Controllers at various corporate sites fort 11n Infrastructure and its legacy technologies.
  • Experience in working with Cisco Nexus 5000 series switches for data center.
  • Configured OSPF on CISCO devices with multiple routing processes and redistributed them. Tested and hands on experience in multi area OSPF topologies.
  • Configuring, managing and troubleshooting networks using routing protocols like RIP, EIGRP and OSPF (Single Area and Multi Area).
  • SCCMinformation gathering, application Responsible for supporting and maintaining the High Frequency Trading (HFT) network. Devised and implemented routing schemes and firewall policies to vendors and transaction partners. Supported and maintained Cisco routers, switches, PIX firewalls, Cisco Works, and F5 BigIP.
  • Assisted with troubleshooting all network issues with routers and switches when necessary and consulted with on call tech as needed for client.
  • Configuring/Troubleshoot issues with the following types of Cisco routers (7200, 6500, 4500, 1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, and DNS, DHCP, as well as assisting with customer LAN /MAN, router/firewalls.
  • Wrote IOS and CAT OS upgrade procedures and Pre/Post checks for customer production upgrades.
  • Migration of servers from one datacenter to another, providing switch connections to the new servers, updating Check point Firewall rules for the new servers, Palo Alto Firewalls, F5 to A10 load balancers Migration.
  • Excellent Troubleshooting Skills and Customer Centric approach.
  • Actively participated in upgrading fast Ethernet, Layer 3-switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, BlueCoat Proxy and Riverbed Steelhead appliances.
  • Assisted in network engineering efforts consistent with the infrastructure of an Internet Service Provider and support of such network services. Helped in designing and implementation of VLAN for the new users.
  • Installation and Configuration of various types of Personal Computers and Printers. Installation of different operating systems on Intel based PC's.
  • Installed Hard disks, Floppy drives, CD Drives, Sound Blaster cards, CPU, Memory, Power supply unit, Network card, Video graphics card, and Hard disk controller card on PC systems.
  • Troubleshooting of personal computers. On line Support to customers concerning their computer problems.

Environment: Cisco 7200/3845/3600/2800 routers, TACACS, EIGRP, RIP, OSPF, BGP, VPN, Ether Channels, Fluke and Sniffer.

Confidential

Network Engineer

RESPONSIBILITIES:

  • Implemented the security architecture for highly complex transport and application architectures addressing well known vulnerabilities and using access control lists that would serve as their primary security on their core & failover firewalls
  • Hand-on experience with Arista(7304, 7150S, 7050S, 7048T), Cisco IOS, Application-ID firewall, Load-Balance(F5 and A10), and critical network services such as DNS & DHCP(Infoblox), AD, Radius, TACACS, SMTP
  • Involved in troubleshooting of DNS, DHCP, and other IP conflict problems
  • Used various scanning and sniffing tools like Wire-shark.
  • Spearheaded meetings & discussions with team members regarding network optimization and regarding BGP issues.
  • Plans, coordinates, implements and supports the LAN / WAN hardware, software and Internet /Intranet integration network connectivity, diagnose network failures and resolve any problems.
  • Responsible for implementation and day to day operations of all associated hubs, routers, bridges, gateways and related equipment
  • Monitoring the network, troubleshooting network problems, implementing changes, communicating & working closely with vendors, customers and system administrators
  • Troubleshoot Frame Relay; T1, T3, IP and OSPF related router and circuit issues.
  • Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Responsible for LAN and internet connection file and print server.
  • Validate existing infrastructure and recommend new network designs.
  • Created scripts to monitor CPU/Memory on various low-end routers in the network.
  • Installed and maintained local printer as well as network printers.
  • Handled installation of Windows NT Server and Windows NT Workstations.
  • Handled Tech Support as it relates to LAN & WAN systems

We'd love your feedback!