Sr. Network Engineer Resume
GA
PROFESSIONAL SUMMARY:
- Cisco certified Network Engineer Professional with 8+ years of experience in Network design, implementation, troubleshooting, and managing of large scale enterprise network systems. Provided level - 3 support for network operation center’s team.
- In-depth knowledge on Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS.
- Experienced on working with network equipment such as Cisco routers, switches, firewalls and F5 load balancers.
- Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 3k, 2K series, Cisco router models like 7200, 6500, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches.
- Provided installation and support of network process components including servers, workstations and software.
- Configured ACL, CBAC, NAT and QoS, encryption and other network controls.
- Testing experience in Cisco UCS solutions including VMware products vCenter/Web Client and Cisco UCSM and UCS Central
- Proficient in configuring, and troubleshooting various routing protocols (BGP, OSPF, EIGRP, RIP, and Static routing).
- Experienced in management of route summarization, default routes, redistribution, sub netting, and VLSM.
- Experienced in Check point, Palo Alto and Cisco ASA firewall administration across different corporate networks.
- Maintain and administer security tools including but not limited to: QRadar SIEM, Palo Alto Firewalls, RSA, FireEye,TippingPoint.
- Proficient working with F5 LTM, GTM series 6400, 6800, 8800 on corporate infrastructure.
- Hands on experience with Cisco iWAN and Cisco ISR technologies.
- Experienced in switching protocols such as VTP, STP, RTP, PVST, and MSTP. Creating VLANs, Ether Channel, and implemented inter VLAN on SVIs and VLAN Trucking using 802.1q standard.
- Experienced in DNS, DHCP, SMTP, FTP, HTTPS, and Web security architecture.
- Experienced in Network planning and implementation of WAN technologies including E3, E1, T3, T1, ISDN, HDLC, PPP, Frame relay, ATM and MPLS VPN.
- Experienced in configuring Security firewalls NAT, PAT, and IPSEC.
- Experienced in Network Security TACACS+, NTP, TFTP, and SNMP.
- Knowledge on design, installation, configuration, maintenance, migration and administration ofCheckpointR55up to R77.
- Troubleshooting & Configuring CUCM, Voice Gateways "H323, MGCP", IP Phones, etc.
- Implemented traffic filters using Standard, Extended, Named access-lists and Route Maps.
- Day-to-day administration, management, maintained and monitored network and network security devices using HPNA, NCM, Zenoss, QRADAR and SolarWinds.
- Used multiple network monitoring tools Cisco works, SolarWinds, Cisco ACS, Cisco NCS, Firemon to troubleshoot network issues for end-users.
- Hands-on experience withCiscoFirepowerFirewalls.
- Hands on experience on all software blades ofCheckpointFirewall.
- Upgrading IOS - Upgrading hardware and installing new devices, Tuning (Configuration), make standardization for the topology.
- Good knowledge on Junos and Cisco IOS operating systems.
- Good Knowledge of Mobile and wireless technologies like CDMA, 2G, 3G, 4G, LTE, WiMax, WiFi, 802.11a, 802.11b, 802.11n, 802.11g, 802.11 ac, and Wireless controllers from Cisco.
- Experience in Installation of VMware ESX server and creation of VMs and install different guest OS.
- Knowledge on Cisco IP Contact Center deployment, configuration and troubleshooting experience.
- ConfigureVRRP & GLBP andVLANTrunking802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
- Creating network diagrams using the Microsoft Visio.
- Expertise inscriptingfor automation, and monitoring using Shell, PHP, & Python scripts.
- Experienced with Cisco ISE for the implementation of security.
- Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analysis results and implement and delivering solutions as an individual and as part of a team.
TECHNICAL SKILLS:
Routers: Cisco ISR G1 and G2 family, ASR9000 series
Switches: Cisco 2960, 3750, 3850, 4500, and 6500 and Nexus
2K/3K/5K/7K Series.: Routing Protocols
EIGRP, OSPF and BGP.: Switching
HSRP, VRRP, GLBP.: Network Security
WAN Technologies: Frame relay, PPP, HDLC, DS3, OC192, Cisco WAAS, MultiLink, QoS
Operating Systems: Red Hat AS/ES /4/5/6 Solaris 8/ 9/10, Windows.
Cisco IP Telephony: Gatekeepers, Voice Gateways, Cisco Unity, Cisco Unity Connection, CME, Cisco Presence, Cisco IP Communicator, Cisco IP Soft Phone, Cisco 792X,794X,796X IP Phones, CUCM, CUE
Network Management Tools: HPNA, NCM, Zenoss, Wireshark, SolarWinds, Firemon
PROFESSIONAL EXPERIENCE:
Confidential, GA
Sr. Network Engineer
Responsibilities:
- Designed, deployed, and managed a network infrastructure for the hosting environment
- Configured F5 load balancers, Cisco routers, switches, and firewalls.
- Wrote and applied ACLs on Cisco and Checkpoint firewalls and Cisco routers.
- Configuring VPN, clustering and ISP redundancy inCheckpointfirewall.
- Configuring, maintaining and troubleshooting IPS and IPS-1 inCheckpoint.
- Work onCheckpointPlatform including Provider Smart Domain Manager.
- Installing and configuringCheckpointNGR55and NGX R60.
- Installed and configuredFirepowerManagement Center 6.0 on VMware and added ASA Sourcefire Agents as well asFirePowerNGIPS for monitoring and management.
- Checkpointfirewall upgrade fromR55to R65 for remote sites.
- Maintain a secure perimeter using Cisco ASA 5500-X with FirePower Services.
- Breaking down the networks to make smaller networks to meet new standards.
- Analyze and monitor network data to determine network usage, disk space availability, or server function using SolarWinds application.
- Responsible for re-configuring all Cisco switches, working with the IP control product, troubleshooting any glitches, working with IP Address Management, planning, but also configuring the networks, and documenting changes in Visio Diagrams.
- Worked on configuring, managing and supportingCheckpointGateways.
- Designed and build new GTM / LTM / ASM with Reverse-Proxy, SSL termination on F5 and Route-Domains for PCI Segment to meet Security Controls.
- Creating Virtual servers onViprion2400 from the scratch according to the application requirement.
- Creating new iRules on 2400Viprionsaccording to the requirements.
- Extensive troubleshooting over Nexus 7K, 3750, 3900 LTM and 2400Viprionsfor any network issues.
- Working knowledge of Frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NAT'ing, subnetting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP & amp; Multicasting protocols.
- Worked in IP network principles including routing (EIGRP, RIP, OSPF and BGP) and DHCP.
- Designed and configured IPsec VPN tunnels on Palo Alto firewalls to establish remote site connectivity.
- Troubleshoot BGP, OSPF, MPLS, VPN MPLS, VLAN,QoS, BGP prefix updates for the customer, L2 issues, link overutilization, packet loss/drop, latency and speed issues and work closely with the customer on their escalation issues and schedule service affecting maintenance when needed and resolve their trouble tickets on SLA basis.
- Validate system integration of Ethernet LAN compatible devices based on application standard and technical specifications, monitoring network performance using Cisco NetFlow, configuring QoS on Cisco routers.
- Successfully installed Palo Alto firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
- Cisco UCS Central expert managing 6200 & 6300 series UCS’s with Global Service profiles.
- Review and optimizefirewallrules using Secure TrackTufintool and runfirewallaudit reports.
- FirewallPolicy Optimization using third party toolTufin to ensure better performance of thefirewall.
- AdministeringVPNconnectivity usingNetMotionsolution.
- Responsible for maintaining multi-vendornetworkenvironment including JuniperJUNOS, Fortinet firewalls, Palo Alto PA-200 and configuring different policies to provide connectivity.
- Responsible for the integration of the UCS Servers testing with the NVT project.
- Designed and implemented replacement of Net-RangerIPSwithTippingPointIPS for security purpose.
- UsedIPSTippingpointto provide real-time protection and proactive network security.
- Used Bluecoat Proxy Server in conjunction with the firewalls to block malware and malicious threats and to provide control access to applications.
- Performed IP network configuration on Cisco devices, Cisco VLAN principles and configuration.
- Planed and coordinated with other diverse technical and non-technical teams regarding IP network configuration and troubleshooting.
- Implemented Cisco Unified Communications Manager (CUCM) in order to manage voice, video, mobility.
- Regularly participated in team meetings with the IT, Application Development, and corporate company entities.
- Assisted and mentored clients and employees on the correct use of wireless encryption protocols.
- Resolved network performance issues, analyzed network traffic and provided capacity planning solutions.
- Provided tier 2 and 3 supports to resolve complex technical problems.
- Assisted in backing up, restoring and upgrading the Router and Switch IOS.
- Administered Symantec NetBackup. Worked on EMC Data Domain 890/990. Deployed NetBackup software for Master, Media Server and clients, Resolved daily client backup failures and worked extensively on NetBackup.
- Configured alerts and Monitored reports using Symantec OpsCenter.
- Revised network policies to improve security throughout the company.
- Successfully designed and implemented a plan dat improved the user experience in the usage of the Wi-Fi platform.
- Implementation of Cisco ISE product to enforce security and access policies for endpoint devices.
- DeployISEtechnology in infrastructure to establish secure and autanticated network.
- High availability design and disaster recovery procedures to ensure business continuity.
- Designed a backup plan for the server farm to farther has an extra layer of security for disaster recovery.
Environment: Cisco Routers 3800,3500,2800,2600, Cisco catalyst 4500, 3750, Network monitoring tools Solarwinds and Wireshark, IPS Tipping Point, Cisco ASA 5500-X, Palo Alto,JUNOS Checkpoint Firewall, Bluecoat Proxy, NGX R55, VTP, ACE Load Balancer, OSPF, RIP, IGRP, EIGRP and NAT.
Confidential, CA
Network Engineer
Responsibilities:
- Implemented VPC, VDC on Nexus Switches and also configured FEX
- Worked with the data center planning groups, assisting with network capacity and high availability requirements.
- Responsible for entire LAN and WAN maintenance and troubleshooting of the company network. Involved in the Team of Data Center Level 2 support to perform duties like deployment and troubleshooting of Cisco Routers Switches, Load balancer and Firewalls according to the organization requirements.
- Implemented Layer 3 routing -Ciscoand Juniper Routers: 2900, 3900,ASR9000, 9001, 9006 series, MX480, MX104 and MX80 Devices.
- Performed network administration tasks such as creation and management of VLANS, Port security, Trunking, RPVST+, Inter-VLAN routing, and LAN security
- Implemented the Policy Rules, DMZ and Multiple VDOM's for Multiple Clients of the State on the Fortigate Firewall.
- Setup high visibility into the network operations using Syslog, SNMP,NetFlow.
- Acquired excellent troubleshooting skills on 7613 Cisco Router, which include working on ticketing system and change management system to provide, troubleshoot support.
- Configured and maintained (2921, 3845, 7204, and 6509) and configured OSPF & BGP Protocols.
- Configured and resolved various OSPF multi-area environments, used OSPF as IGP with route filtering and route-redistribution, implemented Stubs/Totally stub areas, implemented features like route summarization and SPF throttling.
- Used BGP for verifying various traffic policies and influencing outgoing, incoming traffic using BGP attributes such as Local Pref., AS Path, Med, Weights.
- Configured ASA 5540 to ensure high-end security on the network with ACLs and Firewall.
- Involved in providing access to user machines and partners outside our network by SSL and IPSEC VPN tunneling.
- Networkproblem identification and resolution using PythonScripting.
- ConfiguredSolarwindsmonitoring and report, alert and monitor entire environment viaSolarWinds.
- Professionally managed network with SNMP/NetFlowmonitoring, reporting and remote packet capture and analysis
- Configured and deployed BIG-IP LTM-6900 for providing application redundancy and load balancing.
- Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.
- Configure Virtual Servers, Nodes, and load balancing Pools in F5 Big-IP LTM.
- Providing Reports and Logs to the Management / Security and Applications teams to their queries generated from F5 Enterprise Manager using LogIQ related to ASM, APM, GTM and LTM.
- Configured and deployed BIG-IP LTM 6900 for providing application redundancy and load balancing.
- Successfully installed Palo Alto PA-3060 firewall to protect data centers.
- Implemented Firewall and IDS/IPS solutions to mitigate client risks and analyzed security issues.
- Assisted in backing up, restoring and upgrading the Router and Switch IOS.
- Upgrading IOS - Upgrading hardware and installing new devices, Tuning (Configuration), make standardization for the topology.
- Configured and installed Cisco UCS Director to automate network device configurations and NetApp controller configuration.
- Deployed UCS Director to automate Cisco Nexus and Brocade MLX network configuration.
- Used Skype for Business as a tool for the management for certain meetings.
- Helped tanetworkteam to install new switches and routers and configure the IOS according to the requirement which included VLAN, OSPF, Sub netting, EIGRP, IGP, BGP, VTP, STP, wireless access points.
- Assisted corporate infrastructure for VOIPnetworkmanagement and troubleshoot.
- Creation of change tickets and implement according to the customer requirements.
Environment: VLAN, OSPF, Sub netting, SolarWinds, SNMP, NetFlow, EIGRP, IGP, BGP, VTP, STP, F5 Big-IP LTM, TACAS+, LDAP, Radius.
Confidential, RI
Network Engineer
Responsibilities:
- Involved in complete LAN, WAN development including IP address planning, designing, installation, configuration, testing, maintenance etc.
- Installation and Configuration of Cisco Catalyst switches 6k, 3k series and Implementation of EIGRP, OSPF, and BGP routing protocols on Cisco routers.
- Configuration, upgradation and deployment of Nexus 7010, 5596 and 2248 switches.
- Experienced in configuring Nexus 2k fabric extender which behaves as remote line card for Nexus 5k.
- Configured LAN switches Cisco 4500, 6509 and configured Access layer switches Cisco 4507, and 4948 for VLAN, and Fast ether channel.
- Configured LAN protocols such as STP, RSTP, VTP, VLAN, LACP, and PAGP.
- Implemented Cisco layer-3 switches 3750, and 4500 on multi VLAN with Inter- VLAN routing, HSRP, ISL trunk and ether channel.
- Implemented IPsec VPN for different corporate lines to secure the communication for outside traffic.
- Experienced with Checkpoint VPN rules over Cisco ASA VPN. Which filters traffic by inspecting the application layer.
- Provides design, installation, configuration, maintenance and administration of CheckPoint Firewall R71 up to R77 version.
- Used Performance Monitor andSolarwindsto set up alerting for system resources.
- Implementation configuration and troubleshooting ofCheckpointfirewallR 77.
- VerifyFirewallstatus withCheckpointMonitor.
- MonitorCheckpointTracker system logs daily for failures.
- Configured Tufin SecureTrack for checkpoint firewall to analyze the firewall rules.
- Automate IWAN feature configuration using Cisco iWAN in order to control set of traffic and secure the WAN.
- Configuration and managing of network & security devices which includes Firewalls, F5 load balancer, and DNS.
- Experienced in Data, VOIP network management and troubleshoot.
- Provided network support for Check point VPN firewalls and F5 LTM load balancer.
- Certificate Upgradation and Load Balancing through Citrix Netscaler.
- Configuration and Monitoring of Citrix Netscaler (Both MPX and VPX).
- Experienced in configuring and troubleshooting WAN technologies like MPLS, Frame relay and ISDN.
- Assisted in problem analysis and isolation for enterprise users.
- Supported Netscaler utilizing firewalls and content filtering devices.
- Coordinating and Doing POC on F5, Citrix Netscaler and defining safe harbor codes.
- Managed the corporate Internet facing ASA5200 which included VPN access using IPSec and AnyConnect client access and a dual-homed DMZ.
- Experienced in monitoring network traffic with Qradar and Firemon tools.
- Worked on installation, upgrades, and maintenance of LAN/WAN, network security, and firewalls.
- Expertise in implementing gateway redundancy protocols like HSRP, VRRP and GLBP to provide load balancing over multiple routers by using a single virtual IP.
- Worked onVMware Vsphere client 4.1.
- UsedVMwarefor testing various applications.
- Configured Cisco IOS backup, uploading & downloading IOS using TFTP server.
- Real time monitoring and network management using Cisco Works LMS.
- Provided technical support on hardware and software related issues to remote production sites.
- Involved in operations and administration of WAN consisting Ethernet Handoffs, T1, DS3, and Optic Fiber Handoffs.
- Used internal network monitoring tools to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption
- Experience working with migration from 6500 series devices to 4500 Series switches in Campus deployments Confidential Core, Distribution and Access Layers.
- Working with Cisco Nexus 2248 Fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.
Environment: F5 load balancer, SolarWinds, LAN/WAN, network security, and firewalls, Cisco Nexus 2248, T1, DS3, and Optic Fiber Handoffs.
Confidential, PA
Network Engineer
Responsibilities:
- Responsible for installing and supporting hardware and applications on PC.
- Deploy Cisco routers and switches and administer network-monitoring services.
- Implementing security policies using ACL, Firewalls, IPsec, and VPN.
- Installation, configuration and administration of Windows Servers, Active Directory, DNS, DHCP, Linux OS under various LAN and WAN environments.
- Migration of existing IPSEC VPN tunnels from pre-shared key to Certificate.
- Experience with Project documentation tools & implementing and maintainingnetworkmonitoring systems and experience with developingnetworkdesign documentation and presentations usingVisio.
- Troubleshooting complex LAN/WAN infrastructure using routing protocols EIGRP, OSPF& BGP.
- Lab testing and validation prior to implementation of Nexus 7K, 5K & 2K connecting to blade servers.
- IntegratedPaloAltonext-genfirewallswith overlayVMwareNSXSDN network.
- Setting up Cisco router, switches and coordinating with the System/Network administrator during implementation.
- Ensure thorough network documentation, including maintaining each account’s network matrix, backup configurations and network diagram.
- Monitored bandwidth and network activity by analyzing all the information to ensure efficient and effective network operation.
- Deployed and managed Cisco IP phones and Cisco ATA devices Confidential corporate and remote locations.
- Troubleshoot call routing issues using debugs and traces to identify and correct issues.
- Performed cluster wide upgrades and security patches.
- Worked with vendors to resolve voice/data issues with WAN, MPLS, PSTN issues.
- Conducted risk assessments for new customers to ensure compliance to rules and regulations.
- Configuring and resolving various OSPF issues in an OSPF multi area environment,
- Implemented, configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).
- Expertise in maintenance of layer2 switching tasks which advocate VLAN, VTP, STP, RSTP, PVST, RPVST, configuring of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.
- Worked on commissioning and decommissioning of the MPLS circuits for various field offices & POPs.
- IP Allocation & Maintenance for users and other needs throughout company.
- Involved in IOS and CAT OS upgrade procedures and Pre/Post checks for customer production upgrades.
- Ability to analyze, configure and troubleshoot networks
Environment: VLAN, VTP, STP, RSTP, PVST, RPVST, WAN, MPLS, PSTN issues, LACP, PAGP.
Confidential
Jr. Network Engineer
Responsibilities:
- Designed and implemented IP addressing, sub netting, summarization and route distribution on different devices in the network.
- Primarily responsible in designing and maintaining the resources of the complete network.
- Configuration, installation, troubleshooting, and maintaining of all network devices.
- Implementation of LAN protocols like Ethernet, VLANs, VTP and STP.
- Responsible for transferring tickets to L2 engineers for problem resolution, and for active support of team member for daily operations.
- Understanding the business impact and sensitize the reported or proactively observed fault/issue and carry out proper much needed escalation within the management.
- Created network diagrams using Visio.
- Generate scripts fromscriptingtool and verify assigned IP addresses.
- Monitored and troubles hooted LAN and WAN network traffic and performance of the all the devices on the network.
- Worked on Remedy ticketing tool for maintenance and tracking of logs.
- Configured and maintained Microsoft Exchange server.
- Performed update and installation of Operating systems, software, antivirus and server OS on client machines for users.
Environment: Ethernet, VLANs, VTP and STP, Cisco CSM, F5 networks.