We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

3.00/5 (Submit Your Rating)

Bellevue, WA

PROFESSIONAL SUMMARY:

  • Network Engineer with Over 8+ years of experience in testing, troubleshooting, implementing, optimizing and maintaining enterprise data network and service provider systems.
  • Strong hands on experience on Cisco Catalyst (3550, 3750, 6500) series switches, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers, PIX Firewall (506, 515, 525, 535), ASA (5505/5510), Load Balancers using Cisco ACE, F5 LTM/GTM, Security Device Manager (SDM), Cisco Works, HP Open View, Solar Winds, Sniffer, Palo Alto Networks Firewall models (PA - 2k, PA-3K and PA-5K).
  • Implementation of Juniper Firewall, SSG Series, Netscreen Series ISG 1000, SRX Series.
  • Worked on Juniper Netscreen Firewalls like, NS50, SSG 550M, SSG520M, ISG 1000, ISG 200 and Cisco PIX 535, 520, 515, ASA -5500 and 5505
  • Expert Level Knowledge about TCP/IP and OSI models.
  • Provide scalable, supportable military grade TCP/IP security solutions along with expert TCP/IP network designs that enable business functionality.
  • 5+ years of experience in Install and configure Bluecoat Proxy SGmpls in the network for web traffic management and policy configuration.
  • Implementation, working analysis, troubleshooting and documentation of LAN, WAN& WLAN architecture with excellent work experience on IP series.
  • Working knowledge with Load Balancers F5 LTM like 3900, 6900 for various application.
  • In-depth knowledge and experience in WAN technologies including OC3, E3/T3, E1/T1, Point to Point, MPLS and Frame Relay
  • Monitored Network Activity using Cisco Prime 2.2, Splunk, Ops Manager, IPAM, Wire Shark, Tufin Secure Track, ePo, HIPS.
  • Having knowledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
  • Hands on Experience in Bluecoat -Proxy set up, troubleshooting production issues and analysis.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS, switching (VLANS, VTP Domains, STP and Trunking).
  • Basic and advance F5 load balancer configurations, including migrating configurations fromCiscoACEto F5 and general troubleshooting of the F5 load balancers.
  • Installed and configured Network Automation System (NA) to validated compliance checks on Cisco routers, switches.
  • Worked on configuring the Nexus 5K Aggregation Switch and Nexus 2K Fabric Extenders.
  • Implemented VDC, VPC, VRF and OTV on the Nexus 5505 and 7009 switches.
  • Substantial knowledge, including the configuration, of Spanning Tree Protocol (STP), Per VLAN Spanning Tree (PVST), Rapid STP (RSTP) and Rapid per VLAN Spanning Tree (PVST+), TCP and UDP protocols, Next generation data center oriented technologies such as virtual port channels (VPC), Fabric path, Fiber channel over Ethernet (FcoE), virtual switches, network virtualization.
  • Expertise in installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800).
  • Expertise in installing, configuring and troubleshooting Juniper EXSwitches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series) Juniper Routers (E, J, M and T-series).
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
  • Experience in installing and configuring DNS, DHCP server.
  • Experience in Checkpoint IP Appliances R65, R70, R75, R77 &Cisco ASA Firewalls.
  • Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1
  • Upgraded the platforms using the Checkpoint upgrade tools.
  • Provide L3 support for checkpoint and Palo Alto firewalls.
  • Involved in the integration of F5 Big-IP load balancers with Checkpoint firewalls for firewall load balancing and was responsible was trouble shooting and maintenance.
  • Provided administration and support on Bluecoat Proxy for content filtering and internet access between site and VPN client users.
  • Deployment and Management of Bluecoat proxies in forward proxy scenario as well as for security in reverse proxy scenario.
  • Performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.
  • Successfully installed Palo Alto PA-3060 firewall to protect data center and provides L3 support for routers/switches/firewall.
  • Managed Configuration, Logging and Reporting of Palo Alto firewall through the Panorama.
  • Managed URL filtering, File blocking, Data filtering by Palo Alto firewall, Barracuda NG Firewalls.
  • Implementation and maintained intrusion detection/ prevention (IDS/IPS) system to protect enterprise network and sensitive corporate data. For Fine-tuning of TCP and UDP enabled IDS/IPS signatures in Firewall.
  • Performed Installation of Cisco ASA 5585 & 5520 series firewalls as well as Palo Alto 3500 series.
  • Review daily log data gathered from various resources such as sensors, alert logs, firewall logs, content filtering logs.
  • Proficient in using SolarWinds Network Management tools like Network Performance Monitor (NPM), Netflow Traffic Analyzer, Network Configuration Manager (NCM) and Cisco Prime.
  • Provide 24/7 support.

TECHNICAL SKILLS:

Router platforms: Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 6807 series), Nexus 7K, 5K, 2K & 1K.

Switch platforms: Cisco 2900XL, 2950, 2960, 3560, 3750, 4500 and 6500, Nexus (2K, 5K, 7K and 9K)

Juniper Platforms: SRX, MX, EX Series Routers and Switches

Networking Concepts: Access: lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall: Juniper Netscreen 6500, 6000, 5400, Juniper SSG, SRX5600, SRX5800, Checkpoint (NGX, R65, R70 and R71), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo Alto Networks (PA-2K, PA-3K and PA-5K).

Network Management/Monitoring: Solar winds, HP NNMi 8xi (Network Node Manager), Net flow and Cisco prime, Ethereal / Wireshark, TCP Dump.

Load Balancers: F5 BIG: IP LTM 2000, 3900, 5000, 6400, 6800 AND 8900, Bluecoat SG8100, AV 510.

WAN technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

LAN technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Security Protocols: IKE, IPsec, SSL, AAA, Access: lists, prefix-lists, SSL-VPN

Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System: Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

VOIP Devices: Cisco IP phones, Avaya

Software: Microsoft Vision, Remedy, Service Now, MS SQL Server 2008, HTML

WORK EXPERIENCE:

Confidential, Bellevue, WA

Sr. Network Engineer

Responsibilities:

  • Design, deployment and maintenance of security/network devices and datacenters of enterprise.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (36+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Successfully installed Palo Alto PA-5000, PA-3000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls and configured and maintained IPSEC and SSL VPN's on Palo Alto firewalls.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
  • Performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s
  • Creating object, groups, updating access-lists on Check Point Firewall, apply static, hide NAT using smart dashboard.
  • Experience with connectivity of Cisco Networking Equipment with F5 Load Balancer.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Configuration and providing management support for Cisco ASA and Checkpoint Firewalls (R75, R76 and R77).
  • Daily Firewall rule base changes on Cisco ASA and Checkpoint firewalls, Barracuda NG Firewalls.
  • Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1.
  • Built and support VRRP/Cluster based HA of Checkpoint firewalls.
  • Configuring rules and Maintaining Barracuda NG Firewalls and performed OS upgrade and patching.
  • Performed Validation of version end points and definition update on Barracuda NG Firewalls.
  • Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers.
  • Helped installed F5 VIPRION load balancers for one of our new datacenter.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
  • Monitor and troubleshoot BGP, EIGRP, TI circuits, and cellular backup circuits via ICMP and SNMP ticketing systems. Cisco IOS upgrades.
  • Working on Cisco 6509 and 4507 series switches for LAN requirements that include managing VLANs, Port Security and troubleshooting LAN issues.
  • Implementation of various protocols like RIP, OSPF, BGP and STP.
  • Black listing and White listing of web URL on Blue Coat Proxy servers.
  • Worked on design, configuring and managing of Blue Coat Proxy Servers.
  • Deploying Cisco ASA and Bluecoat ProxySG (Web Security Appliance) S170 for URL Filtering Policies.
  • Worked on Blue Coat Proxy SG to safeguard web applications (Black listing and White listing of web URL) in extremely untrusted environments such as guest Wi-Fi zones.
  • Adding agents (IDS/IPS) at Host and Network level to Sentinel.
  • Working on Enterprise AV Solutions, IDS\IPS, Firewalls and SIEM (IBM QRadar\HP Arcsight) tools.
  • Expertise in networking technologies like LAN, MAN, WAN and peripheral devices.
  • Working with VPN tunnels, DS1, DS3 & T1 links.
  • Develop Engineering Documentations to record F5 environment and change processes LTM/GTM/iRules.
  • Used to handle efficiently a workload of nearly 60 Layer 3 MPLS VPN provision orders which included, MPLS network resource reservation & VPNV4, EBGP configuration checking, Troubleshooting of EBGP sessions with customer carriers in the MPLS cloud which is made up of routers Juniper and Cisco housed in different datacenters (Cisco 7609 and Juniper M320).
  • Experience configuring Catalyst (2900, 3500, 3700 and 6500 Series), Nexus (7000, 5000 and 2000 Series) Switches, and Routers (2800, 3600, 4400 Series) and Wireless AP's (1260, 3600) using CLI and GUI.
  • Supporting EIGRP and BGP based network by resolving level 2 &3 problems of internal teams & external customers of all locations.
  • Knowledge and experience with Citrix NetScaler Access Gateway and policy configurations.
  • Configure trunk ports and implement granular control of VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets that can extend further across the network infrastructure than previous generation of switches.
  • Support Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network and Troubleshooting connectivity issues through Blue coat as well writing and editing web policies.
  • Firewall management and troubleshooting on Firewalls (Checkpoint, ASA, PIX, FWSM, Juniper SRX/SSG and Palo Alto).
  • Implementation of Juniper Firewall, SSG Series, Net screen Series ISG 1000, SRX Series.
  • Working on WebSphere application server to deploy java programs.
  • Experience in VMware, Microsoft Active Directory, Puppet, security settings, group policies.
  • Manage Active Directory (Windows 2003, Windows 2008 and Windows 2012 Domains).
  • Citrix Netscalersetup and administration
  • Created progressive new strategy proposals, resulting in two acquisitions for SSL-VPN secure remote access (Net6) and web optimization (Netscaler).
  • Performed massive migration from MS ISA Forefront / TMG to NetscalerLoad Balancers.
  • Utilized Citrix NetscalerVM for load balancing options across multiple development networks.
  • Involved in migrating applications from Netscalerto F5 Big -IP environment.
  • Providing daily network support for national wide area network consisting of MPLS, VPN and point-to point site.
  • Support customer with the configuration and maintenance of PIX and ASA firewall systems.
  • Checkpoint Firewall upgrade from R65 to R77.

Environment: Juniper routers and switches, Cisco routers 7200; Cisco Catalyst switches 6500, 4500, 2950; Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP; STP, VTP, VLAN; VPN, MPLS, HSRP, GLBP, Big-IP F5 Load Balancer, Cisco Works; MS Visio, Checkpoint, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy.

Confidential, West Des Moines, IA

Sr. Network Engineer

Responsibilities:

  • Security infrastructure engineering experience as well as a Microsoft Windows, UNIX, Juniper firewalls, Palo Alto firewalls, Bluecoat Proxies, Juniper Intrusion Prevention devices, and wireless switch security management.
  • Configuration of Cisco unified computing system (UCS) and using UCS manager perform operation such as device discovery, inventory, configuration, diagnostics, monitoring, fault detection, auditing, and statistics collection.
  • Administering and evaluating firewall access control requests to ensure that these requests are compliant with client's security standards and policies.
  • Configuration and support of Juniper NetScreen firewalls and Palo Alto firewalls.
  • Successfully installed Palo Alto PA-3060 firewall then configured and troubleshot using CLI and worked with Panorama management tool to manage all Palo Alto firewall and network from central location.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Administer Palo Alto Firewalls to allow and deny specific traffic and to monitor user usage for malicious activity and future QoS.
  • Configuring rules and Maintaining Palo Alto Firewalls& Analysis of firewall logs.
  • Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access, Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Configuring Juniper NetScreen Firewall Policies between secure zones using Network Security Manager (NSM).
  • Configuration of Palo Alto Next-Generation Firewall mainly creating security profiles and VSYS according to client topology.
  • Configuration and installation of Palo Alto Networks 5050 application firewalls (NGFW).
  • Expertise in Palo Alto design and installation for Application, URL filtering, Threat Prevention and Data Filtering.
  • Maintained and updated Active Directory for authentication purposes.
  • Configuration and troubleshooting F5 LTM, GTM series like 6600, 6800 for different applications and monitoring the availability.
  • Deployment of data center LAN using Nexus 7k, 5k, 2k switches.
  • I was involved in migration projects, which involves replacing legacy devices to new Nexus devices and introduced VPCs in the new architecture.
  • Worked on Nexus platform 7k series, 5K series (5548, 5020 and 5010), 2248 and successfully implemented VSS on the Cisco catalyst switches.
  • Used FireEye to detect attacks through common attack vectors such as emails and webs.
  • Gained experience on working with migration to Check Point and Palo Alto next generation firewalls.
  • Managed successful delivery of massive security response portfolio including Splunk and Cisco ISE.
  • Implemented and administered Websense Web Security Gateway for web content filtering and DLP.
  • Improved network and system security through setup and ongoing maintenance of Riverbed IPS and FireEye.
  • Firewall deployment, rules migrations, firewall administration and converting existing rule based onto new Checkpoint and Palo Alto Next-Generation Firewall platforms.
  • Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration.

Environment: Juniper SRX5400, SRX5600, and SRX5800 and Palo Alto PA-3060 & 5050 Firewalls, Bluecoat Proxies, Juniper IPD, Juniper NSM, Panorama, F5 LTM, GTM 6600, 6800, Nexus (2K, 5K, 7K and 9K), Splunk, Cisco ISE, Websense, Solar Winds NPM.

Confidential, Malvern, PA

Sr. Network Engineer

Responsibilities:

  • Day-to-Day work involves scheduling firewall policy provisioning and working with users to identify connectivity related issues and troubleshoot using both Smart Utilities and CLI.
  • Managing and administering Juniper SRX and Checkpoint Firewalls at various zones including DMZ, Extranet (Various Business Partners) and ASZ and internal.
  • Implementing Security Solutions in Juniper SRX and NetScreen SSG firewalls by using NSM.
  • Juniper Firewall Policy management using NSM and Screen OS CLI.
  • Daily technical hands on experience in the configuration, troubleshooting of Juniper SRX firewalls as well as experience working directly with customer in a service/support environment.
  • Troubleshooting Firewall Connectivity related issues using Smart view tracker on Checkpoint, NSM Log viewer for Juniper Firewalls.
  • Install, configure, manage and troubleshoot Cisco Source Fire IPS appliances and defense Center.
  • Creating and provisioning Juniper SRX firewall policies.
  • Worked with JUNOS OS on Juniper Routers and Switches.
  • Experience on ASA firewall upgrades to 9.x.
  • WebsenseWeb Security Gateway Installation, Upgrade & Configuration 8.4
  • Configured Panorama web-based management for multiple firewalls.
  • Worked on configuration, maintenance and administration of Palo Alto PA3000 Firewalls and migrating customers from Cisco ASA to Palo Alto in HA network.
  • Configuring rules and Maintaining Palo Alto Firewalls& Analysis of firewall logs using various tools.
  • Understand the flow of traffic through the Check Point Security gateway cluster and troubleshoot connectivity issues using advanced troubleshooting from Command Line Utilities.
  • Install and configure Bluecoat Proxy SG in the network for web traffic management and policy configuration.
  • Use Tools such as SKYBOX for Firewall Policy optimization and rule base clean up.
  • Build and configure Active/Standby Failover on Cisco ASA with stateful replication.
  • Configure and tweak the inspection policies on Firewall to allow legacy application traffic.
  • Configure and administer Cisco ASA Firewalls (5585, 5550 and 5540) and use command line CLI, Cisco CSM, ASDM for day-to-day administration.
  • Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and providedL3support for routers/switches/firewalls.
  • Configuring and deploying Cisco ASA 5505; Cisco 594/294; I500 web sense manager at customer locations with minimum downtime possible.
  • Active/Standby and Active/Active HA configuration on Cisco ASA Firewalls.
  • Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for stateful replication of traffic between active and standby member.
  • Configuring rules and maintaining Palo Alto firewalls and analysis of firewall logs using various tools.
  • Work with Software Distribution teams to develop and execute Custom Prop for Endpoint systems
  • Became a trusted strategic voice in the company, leveraging a deep understanding of clients to help guide Web sense product and business.
  • Manage and monitor security rules and policies for Endpoint Protection
  • Understand different types of NAT on Cisco ASA firewalls and apply them.
  • Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.
  • Support Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Support the One to Oneproxymigration project from legacy, end of life and proxiestoBlueCoatProxySG units.
  • Configuration, operation and troubleshooting of BGP, OSPF, EIGRP, RIP, VPN routing protocol in Cisco Routers &L3Switches.
  • Configured MPLSL3and L2 VPNs for customers.
  • FWSM configurations in single/multiple context with routed and transparent modes.
  • Convert and migrate from Solaris/Checkpoint and NetCacheproxy platforms toBlueCoatProxySG.
  • Troubleshooting connectivity issues through Blue coat as well writing and editing web policies.
  • Involved in Upgrading bluecoat proxy servers from SG s to SG B.
  • Administration Big IP F5 LTM for all Local Load balancing and use GTM for load balancing across Data Centers.
  • Support Data Center Migration Project involving physical re-locations.
  • 24 x7 on call support

Environment: Juniper routers and switches, Cisco routers 7200; Cisco Catalyst switches 6500, 4500, 2950; Big-IP F5 Load Balancer, Cisco Works; MS Visio, Checkpoint, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy, Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP, STP, VTP, VLAN, VPN, MPLS, HSRP, GLBP.

Confidential, Watsonville, CA

Sr. Network Engineer

Responsibilities:

  • Configuring/Troubleshoot issues with the following types of routers Cisco (7200, 6500, 4500, 1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, and DHCP, as well as assisting with customer LAN /WAN
  • Configured and troubleshoot Juniper Ex 4500 and series switches and Juniper ACX series routers.
  • Involved in the deployment of Content Delivery Networks (CDN).
  • Experience with SQL for extracting the data from SQL database, related to network issues.
  • Experience working with Network-attached storage (NAS) to provide Local Area Network (LAN) nodes with file-based shared storage through a standard Ethernet connection.
  • Configuring HSRP between VLANs, Configuring Ether-Channels and Port Channel on Cisco6500 catalyst switches.
  • Cisco Secure Access Control Server (ACS) for Windows to authenticate users that connects to a VPN 3000 Concentrator.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to GET VPN.
  • Assisted in MPLS migrations, implemented a backup for the existing WAN connection using site-to-site IPsec VPN tunnels.
  • Worked on migration of existing PIX firewall to ASA firewall and with converting PIX rules over to the Cisco ASA solution.
  • Worked extensively on Cisco ASA 10/5540) Series.
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2B network connectivity.
  • Experienced in securing configurations of SSL/VPN connections, troubleshooting Cisco ASAfirewalls and related network security measures.
  • Configuring static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation.
  • Experience working with Active Directory (as a centralized system) to automate network security management and user data.
  • Worked with Aruba Access point as a Public Wi-Fi and successfully implemented Wireless Access Point (WAP).
  • Experienced in working with Session Initiation Protocol (SIP) trunking for voice over IP (VoIP) to facilitate the connection of a Private Branch Exchange (PBX) to the Internet.

Environment: Cisco Catalyst 2960/3750/4500/6500 Series Switches, Linux, Cisco 2800/2900/3000 Series ISR's and Cisco 3640/ 0/3845/3600/2800 routers, SQL, Cisco ASA 5500, Juniper Ex switches, Active Directory, Juniper ACX series routers, Windows Server 2003/2008, ACL, SIP, RIP, OSPF, MPLS, BGP, EIGRP, Wi-Fi, LAN, MacAfee, WAN, WAP, IDS, IPS, Aruba WLAN, VPN, HSRP.

Confidential

Network Engineer

Responsibilities:

  • Provide high-level technical support, including identifying and resolving problems on Cisco supported products for e-Commerce infrastructure. This included external routing and internal/intranet routing for DMZ servers.
  • Implemented cable multi-service operator (MSO) to capture traditional Telco subscribers with IP telephony and provide relevant QOS.
  • Configured EIGRP, BGP, and MPLS.
  • Configure Firewall, QOS by SDM and provide security by Prefix list, Access- List and By Distribution List.
  • Moved Core switches and several non-Cisco devices under strict deadlines to maintain network functionality
  • Implemented new ultra-secure networks in multiple data centers that included Cisco, Juniper security devices.
  • Designed VLAN’s and set up both L2 and L3 logical to have it communicate to the Enterprise network.
  • Coordinated with higher-level support and external vendors for resolution.
  • Configured EIGRP and OSPF as interior gateway protocol with route filtering and route redistribution, installed and maintained Cisco 3600, 2600 and 7200 backbone routes with HSRP.
  • Maintained all servers & network equipment with current stable firmware, IOS images & access control lists
  • Scheduled preventive maintenance for fire-protection systems, including new protocols. Utilize MS Windows, Word, and Excel for reporting/documenting process.
  • Satisfactorily Resolved Problems in timely manner with focus on providing a high level of support for all customers.
  • Configured VLANs, Private VLANs, VTP and Trunking on switches.
  • Participated in Installation and configuration of Bluecoat Proxy SG in the network for web traffic management and policy configuration.
  • Performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s.
  • Installed and configured DHCP Client/Server.
  • Open ports for applications and process that require special ports.
  • Experienced in setting a cluster environment for load balancing and HA.
  • Monitored Linux server for CPU Utilization, Memory Utilization, and Disk Utilization for performance monitoring.

Environment: Cisco 2950 switches and Cisco 3825 Routers, EIGRP, BGP, MPLS, VLAN, QOS, DHCP, Trunk protocols, DNS, Spanning tree.

We'd love your feedback!