We provide IT Staff Augmentation Services!

L3 Network Engineer Resume

4.00/5 (Submit Your Rating)

CO

SUMMARY

  • 8+ plus years of Network and IT administration experience in Data Center network administration and wide network administration.
  • Expertise in creating repeatable, reliable, scalable network architectures, with fault tolerance, performance tuning, monitoring, systems, statistics/metric collection and disaster recovery
  • Extensive experience in working with Cisco Routers, Cisco Catalyst Series Switches, JuniperM and MX series Routers and ASA/PIX firewalls and network gear from other prominent vendors.
  • Experience working in Cloud infrastructure with VMware ESXi Server platforms for application servers. Network Configuration for server apps and app migrations support.
  • Strong knowledge of IP networking and internetworking.
  • Strong in routing and switching protocol knowledge with skills in Layer 2/3 protocol features.
  • Good with both scheduled project timelines and timely resolution of customer issues.

TECHNICAL SKILLS

LAN Technologies: VLAN, 802.1q, Inter - vlan routing, STP, RSTP, PVST, HSRP,VRRP GLBP,LACP

WAN Technologies: Frame Relay, ISDN, PPP, MPLS, Wan Accelerator exposure to DS1, DS3, OC3, OC12, OC48, OC192, T1 /T3, 10G.

Network Hardware, Cisco and other vendor equipment: Cisco routers (7200, 3800, 3600, 2800, 2600, 1800 series), & Cisco Catalyst 6500, 4500, 4900, 3750, 3500, 2900, series Switches, ASA/PIX Firewalls 5510/5520/5550 ,Cisco Nexus 5k,2k, JuniperM and MX series Routers

Network Security: NAT/PAT, Firewall Design, IPSec/SSL/AnyConnect VPN Configuration, Firewall Load Balancing, IDS/IPS, RADIUS, TACACS+, and Digital Signatures.

Routing Protocols: EIGRP, OSPF, BGP, RIP & IGRP

Infrastructure Services: DHCP, DNS, SMTP, FTP, TFTP, IIS

Network Management: SNMP, Netcool, Solar winds, VPM, Cacti, HPNNM, Cisco Works LMS, MRTG 2.13, Ethereal Sniffer & Wire shark.

PROFESSIONAL EXPERIENCE

Confidential, CO

L3 Network engineer

Responsibilities:

  • Implemented, managed a campus network of many devices consisting of Cisco 2600/2800/7200/ ASR1000 Routers and Cisco 2900/3700/4500/6500 switches.
  • Worked on BGP, EIGRP, OSPF, MPLS enabled network environment.
  • Primarily responsible for network re-design for branches/campus locations and re-engineered the LAN to provide more reliable service to reduce the latency.
  • Involved in the configuration & troubleshooting of routing protocols: BGP, OSPF, EIGRP, Configured IP access filter policies
  • Involved in troubleshooting of 4500 and 6500 series switches.
  • Migrated standalone Cisco catalyst 6500 series switches to Cisco 6500 VSS to standardize the Confidential network infrastructure to improve network stability.
  • Installation of new hardware and software integration into the network including testing and implementation.
  • STP attack mitigation using BPDU Guard, Root Guard, authentication for VTP, STP, disabling all unused ports by putting them in unused VLAN and ensuring DHCP attack prevention wherever needed
  • Configured Site-to-Site and Remote Site VPNs using Cisco routers to Cisco routers, ASA Firewall to ASA Firewall, Cisco Router to ASA Firewall and troubleshoot and modify existingVPN
  • Responsible for recommending and deploying single highly redundant Cisco catalyst 4500-E Series platform in large network access closets of the Confidential network.
  • Performed network administration tasks such as creation and management of Vlans, Port Security, Trunking,
  • RPVST+, Inter-Vlan Routing., upgrading Cisco IOS software’s.
  • Responsible for designing and implementing end to end QOS throughout the Confidential Network consisting of 50+ MBOs.
  • Worked with the Cisco team for defining the QOS class structure and network traffic Queuing strategy.
  • Created the QOS design LLDs for different platforms groups of cisco devices defining the trust points and determining which policies to enforce at each device within the network
  • Documented the Confidential network enterprise defining network design standards mentioning the technical details of the MBOs network infrastructure, which includes the architectural and low level technical design information of the Campus LAN of the Confidential network
  • Worked with monitoring tools such as: Solar Winds, VPM (Virtual Performance Manager), Wireshark and Visio.

Confidential, IL

Network Engineer

Responsibilities:

  • Worked on BGP, OSPF, MPLS enabled network environment.
  • Provided last point of escalation to high care network incidents and provide immediate break-fix remediation such as disaster recovery re-configuration.
  • Enforced network security to DMZ & external Market Data vendors via Cisco PIX 515 and ASA 5500 series firewall rules, and NAT.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms
  • Diagnose and resolve application and network issues through Wireshark packet captures, ensuring end-to-end IP connectivity.
  • Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers.
  • Configuration of BGP using attributes, route-map, prefix-list etc.
  • Configuring BGP features such as Route Reflectors, BGP metrics such as MED, AS path, local preference and communities.
  • Break-fix routing issues and implement best practices of OSPF and BGP routing protocols.
  • Configuration of 7609, 7606 with Trunking 802.1Q.
  • Experience in working with unix/linux environment for solving the network related issues.
  • Conduct extensive root cause analysis to quickly alleviate technical problems. Network documentation creation for all deployed solutions across network environment.
  • Consistently complete projects ahead of schedule, facilitating quality customer satisfaction.
  • Collaborated extensively with various telecommunications firms including AT&T, Verizon etc. and quickly resolved technical issues, specifically related to T1, T3, OCx and Frame-Relay.

Confidential, NJ

Network Engineer

Responsibilities:

  • Provided staff augmentation support for BGP, EIGRP, OSPF and Multicast enabled enterprise network using Cisco equipment including 6509s with FWSMs, 3750 Stack wise switches, PIX & ASA firewalls.
  • Worked on Juniper MX 80 and 3D, MX240 and 3D, MX480 and 3D, MX960 and 3D, MX2010 and MX2020
  • Support WAN connectivity using Level-3, ZAYO MPLS multi-campus infrastructure.
  • Migrated Vlans from ASA (perimeter firewalls) to FWSM’s for better security management.
  • Provided detailed network analysis, investigation and documentation services, including written site information and detailed physical and logical Visio network drawings.
  • Performed 24*7 on-call rotation schedule over network monitoring tool interface and configures Loopback connectivity for enterprise network.
  • Worked with ACL (access control list) requests like add-remove-audits.
  • Network monitoring, trends, outage tracking, Perform and schedule preventative maintenance and periodic high availability testing on all network equipment.
  • Participate in Change control reviews and team change configuration peer reviews as a part of agile methodology.
  • Work with Load Balancing team to build connectivity to production and disaster recovery servers through Citrix Net scalers.

Confidential, CO

Network consultant

Responsibilities:

  • Support WAN connectivity using Verizon-based MPLS multi-campus infrastructure.
  • Worked on OSPF, EIGRP BGP and MPLS enabled network
  • Involved in FWSM/ASA firewall implementations and security management for corporate data center and remote locations.
  • Provided detailed network analysis, investigation and documentation services, including written site information and detailed physical and local Visio network drawings.
  • Installed/managed Intermediate/Main distribution frame (IDF/MDF) components, edge switches/routers of Cisco series 3750/3750G PoE/3845/Foundry 2402 for VLAN management, Trunking 802.1Q/EIGRP routing to main frame.
  • Configured/managed Window server 2003/2008 Active Directory/group policies/terminal services/DHCP services/server disk management/periodic server based maintenance.\
  • Performed on-call rotation schedule over SNMP network monitoring tool interface as well as on site duties.
  • VLAN design and implementation, Spanning Tree protocol configuration and support using Rapid PVST to avoid loops in the network. 802.1q Trunking and port channel creation.

Confidential

Network Admin

Responsibilities:

  • Create and test Cisco router configurations with OSPF, routing protocols.
  • Trouble shooting single arm and multi arm topologies. Fix routing issues and misconfigurations.
  • Performed on-call rotation schedule using SNMP network monitoring tool for client support sites.
  • Work with field engineers and escalation teams to patch and update networking software on client’s network gear, mostly using Cisco routers and switches.
  • Provide staff support for a multi-campus enterprise using Cisco equipment including 6509s with Firewall and Cisco Catalyst switches.
  • Provide recommendations on network infrastructure and reorganization with detailed network analysis using VISIO network drawings.
  • VLAN design and implementation for new network requirements, including VLAN bridging and multi-port Trunks.
  • Provide on call network support for various enterprise network clients.
  • Installed and configured Cisco PIX 515E firewall with IPSEC VPN tunneling on site-to-site. Upgrading and maintaining latest PIX OS & ASDM images.

We'd love your feedback!