We provide IT Staff Augmentation Services!

Sr.network Engineer Resume

4.00/5 (Submit Your Rating)

Chesterfield, MO

SUMMARY

  • Sr.Network admin and windows admin with 10+ years experience in various technology. Proven record of accomplishments in technical operations & management, well - rounded background across banking center & enterprise platforms including desktop, server and cloud levels (software & hardware), with an emphasis in operational excellence, process improvement and change management.
  • Decisive in implementation with the ability to adapt quickly to new business initiatives and technical environments.
  • Recognized team leader with strong team building skills; able to successfully complete challenging projects.

TECHNICAL SKILLS

Cisco Router Platforms: 1700, 2500, 2800, 2600, 3600

Cisco Switch Platforms: 2950, 2960G, 4506 Series Cisco Nexus 7000, 5000, 2000 series switches (NxOS)

Network Security: Access Control Lists, Radius Authentication, Network Address Translations, IDS, IPS and securing physical LAN media from intrusion, Cisco ASA 5500 series Firewalls, Cisco IOS Firewall feature set (IOS 12.X) and Cisco SDM (Security Device Manager), Checkpoint Firewalls.

Other Hardware: Nortel, Juniper, D-link, Net gear, Linksys etc.

Security Protocols: IKE, IPSEC, MD5, SHA, RSA, DES, 3DES, AH, ESP.

Routing Protocols: BGP, OSPF, EIGRP, IGRP, and RIP.

Switching Protocols: VTP, STP, RSTP, MST, VLANs, Ether Channel, PAgP, LACP

Load Balancing protocols: HSRP, VRRP

Network Security: Access Control Lists, Radius Authentication, Network Address Translations, IDS, IPS and securing physical LAN media from intrusion, Cisco ASA 5500 series Firewalls, Cisco IOS Firewall feature set (IOS 12.X) and Cisco SDM (Security Device Manager), Checkpoint Firewalls.

Tools: HP Open view, SNMP, Cisco Works, Ethereal, Wire shark Network Analyzer

Other Hardware: Nortel, Juniper, D-link, Net gear, Linksys etc.

PROFESSIONAL EXPERIENCE

Confidential

Sr.Network Engineer

Responsibilities:

  • Configured branch to branch VPN in CISCO ASR 1004 series.
  • Worked on NAT sheet for new Branch to Brach VPN connections
  • Worked on NAT Sheet for updating VPN connections.
  • Participated in meetings with project managers regarding New VPN branch to branch connections
  • Switch port configuration / IOS upgrade,
  • Worked on router / switch decommission projects.
  • Worked on router / switch Refresh projects.
  • Created and Implemented 2 New DMZ subnets to abate security nuisance
  • On-Call support for F5 BIG-IP Load Balancers
  • Managed the F5 Big IP backup and VIP creation
  • On call support for Cisco routers (AT & T Managed) and company owned LAN switches.
  • Created new Subnets and configured new routes to reach them
  • Made network changes following company change management policy
  • Managed Ticket queue assigned to himself and his group
  • Designed policies and procedures to establish Citrix system security via monitoring control and secure access.
  • Executed troubleshooting activities to restore systems from outages.
  • Provide remote day-to-day firewall/VPN support for over 30 customer environments, which spans across multiple firewall platforms, including Cisco PIX/ASA, Juniper Netscreen, and Checkpoint. Daily administration of over 100 Netscreen firewalls using NSM (Netscreen Security Manager). Configuration, implementation, and problem determination across the major firewall platforms and understanding each customer environment at a detailed level. Responsibilities include rule implementations, VPN setups, upgrades, and new builds.

Confidential

Sr.Network admin

Responsibilities:

  • Switch certification is complete
  • Switch migrations from Cisco 2950 to Cisco 3560 switches are complete (4500 switches nation wide)
  • Switch certification is complete
  • Switch migrations from Cisco 2950 to Cisco 3560 switches are complete (4500 switches nation wide)
  • Level 3 support Firewall Engineer (Cisco ASA and Checkpoint)
  • Lead Firewall and Security Administrator
  • On-call support for 45 Cisco and 3 Checkpoint firewalls
  • Managed Smart Center Checkpoint management server (SmartView Tracker)
  • Managed Checkpoint Firewalls from the command line (cpconfig and Sysconfig)
  • Managed Cisco firewalls from both the Command line and ASDM
  • Managed Linux Syslog server
  • Designed and implemented Company Wide Security Policies
  • Migrated 7 VPN Tunnels from Checkpoint to Brand New Cisco ASA firewalls
  • Worked with an outside vendor to implement new Cisco ASA Remote Access VPN with 750 user licenses
  • Managed WAN Across 40 sites in 4 Continents
  • Implemented the migrated policies from Checkpoint R60 to Cisco ASA 8.6
  • Created and configured VLAN on LAN Switches
  • Set up hide NATs and Static NATs for new company Internet gateway on Cisco ASA
  • Created and Implemented 2 New DMZ subnets to abate security nuisance
  • On-Call support for F5 BIG-IP Load Balancers
  • Managed the F5 Big IP backup and VIP creation
  • On call support for Cisco routers (AT & T Managed) and company owned LAN switches.
  • Created new Subnets and configured new routes to reach them
  • Made network changes following company change management policy
  • Managed Ticket queue assigned to himself and his group
  • Designed policies and procedures to establish Citrix system security via monitoring control and secure access.
  • Executed troubleshooting activities to restore systems from outages.
  • Provide remote day-to-day firewall/VPN support for over 30 customer environments, which spans across multiple firewall platforms, including Cisco PIX/ASA, Juniper Netscreen, and Checkpoint. Daily administration of over 100 Netscreen firewalls using NSM (Netscreen Security Manager). Configuration, implementation, and problem determination across the major firewall platforms and understanding each customer environment at a detailed level. Responsibilities include rule implementations, VPN setups, upgrades, and new builds.
  • Cisco pix firewall 520/515, checkpoint 4.1
  • Managing Cisco Pix firewall, Checkpoint firewall NGX R70
  • Updating the security policy as per the client requirement in Smart Dashboard in NGX R70
  • Maintain, install, configure and troubleshoot firewalls (Cisco ASA's and Juniper SRX's), VPNs (including IPSEC) and application delivery appliances such as Cisco CSS content switches.
  • Responsible for maintaining the data centre such as Switch Migration projects.

Confidential, Chesterfield MO

Sr. Network engineer

Responsibilities:

  • Managed Nortel NORTEL CONTIVITY 1750 SECURITY APPLIANCE in data center.
  • Configured IPSEC vpn in CONTIVITY 1750 to connect branch office (Nortel Contivity VPN Switch 1010) to data center. Also configured IPSEC VPN in Nortel contivity to connect data center to branch offices with different vendor Routers also using cisco routers.
  • Managed the corporate network, implementation and governance of delivery processes for network devices
  • Maintained & implemented MPLS and VPN network support for Insituform branch offices worldwide.
  • Configured VPN tunnel (site to site) between the data center and the branch office routers (routers using ASA firewall and checkpoint firewall)
  • Involved in Cisco VoIP project such as Cisco call manager server, Creating voice VLANS for all the branch offices.
  • Configured and Managed Cisco wireless controller 5500 for Lightweight access point for the branch offices.
  • Managed the Cisco Catalyst switches 4506 series in the Data center.
  • Responsibilities include web administration, adding, and removing accounts including e-mail
  • Cisco 2600, Cisco 3600, series Router and Cisco 2900, Cisco 3500 series switches and some
  • Juniper routers. Knowledge of Installation.
  • Involved in assisting the lab setup and troubleshooting the firewalls (Symantec, Checkpoint and Juniper) at the customer places.
  • Maintained MPLS network cloud for all branch offices.
  • Monitored entire Network by adding and managing the nodes, Net flow of the nodes using SOLARWINDS.
  • Maintained the Cisco ACE device for load balancing the servers, add New URL. Provided virtual IP address for the servers, which has to be load, balanced.
  • Maintained Data center such as cabling, racking the New Network devices.
  • Day to day administration and maintenance of over checkpoint firewalls NTX R65, as well as the design, installation and support of dozens of Remote Access and Site-to-Site VPN tunnels.. Delegate tasks and responsibility to the Network Security Engineers and act as primary escalation point for high level troubleshooting and problem solving.
  • Replacement utilizing new Cisco Nexus network infrastructure. Installed Nexus 7010 core switches and Nexus 5020 and 2248 server access switches. Configured 7010’s with multiple distributions VDC’s running EIGRP for route propagation between them. Installed dual router/dual MPLS.
  • Utilizing new Cisco Nexus network infrastructure. Installed Nexus 7010 core switches and Nexus 5010 and 2148 server access switches. Configured 7010’s with multiple distributions VDC’s running EIGRP for route propagation between them. Installed dual router/dual MPLS provider WAN running eBGP.

Confidential, Dover, NH

Network Engineer

Responsibilities:

  • Managed and maintained Global network and Responsible for Tier 3 investigation and resolution of all registered Incidents and Requests.
  • Coordinated with Carrier for MPLS related issues.
  • Found root cause and problem analyzed of all network related issues like traffic, routing and abnormal activities in the WAN and LAN.
  • Provided Network secured using PIX, troubleshooting and verifying NAT and ACL.
  • Worked on Routing protocols OSPF and BGP
  • Client to site VPN related issues on VPN concentrator, authentication methods.
  • Securing VPN connectivity for remote and mobile users, branch offices Checkpoint firewall NGX R65
  • Managing of remote access and site-to-site VPNs in check point firewall

Confidential

Network engineer

Responsibilities:

  • NAT, VPN and Traffic filter implementation in Cisco Router 2801 series.
  • Configured of Cisco Routers 2801 and implemented routing with OSPF
  • VLANS, STP configuration in Cisco 2950
  • Created end-user VPN account with appropriate access after appropriate approval has been issued.
  • Monitored Network traffic and access logs in order to troubleshoot network access issues.
  • Implemented traffic filters using Standard and Extended Access-lists.

Confidential

Network engineer

Responsibilities:

  • NAT, VPN and Traffic filter implementation in Cisco Router 2801 series.
  • Configured of Cisco Routers 2801 and implemented routing with OSPF
  • VLANS, STP configuration in Cisco 2950
  • Maintained the General Networking objectives of System/Network Operations.
  • Installed and configured Cisco (2521, 2801, 3600) Series Routers.
  • Installed and configured of CISCO WAAS
  • Creating and Managing IP access control lists for WAAS devices.
  • Monitoring and troubleshooting WAAS network.
  • Compressing data being downloaded from the back-end server to the client browser using ACE Module.
  • Load balancing decisions based on the specific SSL cipher using CISCO ACE module.
  • Configured MPLS using OSPF.
  • Configured of Routing Protocols RIP, OSPF, BGP.
  • Monitored Network infrastructure.
  • Provided consultation to business area management and staff at the highest technical level for all aspects of LAN/WAN design and configuration in multi-server environment
  • Implemented firewall policy changes after the appropriate review and approval process has been completed.
  • Monitored Network infrastructure using Cisco Network Assistant.

Confidential

Network Engineer

Responsibilities:

  • Configured and Installed of Cisco Routers 2801
  • VLANS, STP configuration in Cisco 2950
  • HSRP Configuration implemented in Cisco 3550
  • Monitored traffic and access logs in order to troubleshoot network access issues.
  • Cisco IOS Architecture for Cisco 2801
  • Gather information for specific technologies as to function and deployment configurations.
  • Prepared technical documents describing implemented technologies.
  • Provided consultation to business area management and staff at the highest technical level for all aspects of LAN/WAN design and configuration in multi-server environment
  • Implemented firewall policy changes after the appropriate review and approval process has been completed.
  • Monitored Network infrastructure using Cisco Network Assistant.
  • Coordinated, installed and troubleshot various leased-lines for dedicated Internet access, such as ISDN, frame-relay, T1/E1/T3

We'd love your feedback!