Network Security Administrator Resume
MinnesotA
SUMMARY
- 7+ Years of IT Experience with expertise in Network Security.
- Strong knowledge based in the planning, design, and implementation of Information Systems and Network Technologies.
- Certified cloud based Salesforce developer - 401.
- Experienced in handling and installing Palo Alto Firewalls.
- Proficient in design, implementation, management and troubleshooting of Check Point firewalls like R61/65/R70/R75/R77, Nokia IP 1280, 2450, 61000, Cisco PIX, Check Point Provider-1 / VSX, Nokia VPN, Palo Alto-3060/5020 IDS, Foundry / F5 Load Balancers, and Blue Coat Packet Shaper systems.
- Configure all Palo Alto Networks Firewall models (PA-3000, PA-5000 etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.
- Experience in Network Intrusion detection/Intrusion Prevention System and Firewalls.
- Advanced knowledge in Switches and Routers Configurations.
- Experienced in implementing / maintaining compliance with security and IT standards such as BS7799, BS15000, and SAS70.
- Experience in Deployed Check Point Provider-1 NGX and configured Checkpoint VSX.
- Experienced on Juniper Net screen Firewalls like, NS50, SSG 550M, SSG520M and ISG 1000.
- Proficient at establishing User Tunnels in Nortel VPN Routers, implementing network security protocols, installing and supporting backup strategies, and planning/executing disaster recovery solutions.
- Hands on experience in Implementation, Troubleshooting &configuring for Checkpoint R77. 30 with GAIA and SPLAT.
- Worked on Juniper SRX routers administration and Configured and set up Juniper SRX gateways.
- Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550).
- Experience in Configuring Checkpoint Clusters with Nokia IPSO and GAIA OS.
- Hands-on configuration and operational experience working on Checkpoint Firewalls (Nat policies, VPN Configurations, policies) in both standalone and HA mode.
- Experienced with Cisco routers and switches, and a good understanding of IP sub netting and routing such OSPF, BGP, HSRP, VLAN and MPLS.
- Knowledge of Server Maintenance, including establishing Security Protocols, Configuring Network, and Troubleshooting Problems.
- Thoroughly familiar withCheckpointmodels, capabilities, and architectures.
- Experience with Aruba RF F5 Big IP, Juniper firewalls design and analysis support.
- Advanced Knowledge in IPSEC VPN design connection and protocols, IPSEC tunnel configuration, encryption and integrity protocols.
- Knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
- Has extensive knowledge in implementing and configuring BIG-IP LTM-6400, 8900load balancers.
- Knowledge about Cybersecurity threats and defense mechanisms
- Knowledge on ON target and Remedyticketingtool
- Experience with complex Voice over Internet Protocol (VoIP).
- Knowledge of DNS, Active Directory and Certificate Services (PKI).
- Experience in managing and migration of large scale enterprise networks, extensive knowledge in developing test plans, procedures and testing various LAN/WAN products and protocols
- Knowledgeable in TCP/IP & OSI model, IPv4 & IPv6, NAT/PAT, TACACS+, OSPF and QoS.
TECHNICAL SKILLS
Firewall: R61/R65/R70/R75/R77, Provider-1 firewallCisco ASA,VSXFirewalls ISG 1000/2000, Checkpoint Secure Platform (SPLAT) Checkpoint NG FP3 - NGX R75.40 Checkpoint GAiA, Checkpoint SG and SmartAppliances, Palo Alto - 3060/5020
Routers: Cisco 2600, 2800, 3600, 4400, 7200, 7609 Series, CUCM, CUPS
Switches: Cisco 2900, 3500, 3700, 5000, 6500 Catalyst Series, Cisco 7000, 5000, 2000 Nexus Series
Load Balancer: F5-Big-Ip, LTM, Ax10
Communication Protocols: TCP/IP, UDP, DHCP, DNS, ICMP, SNMP, ARP, RARP
Routing Protocols: BGP, OSPF, EIGRP, VRRP, HSRP, GLBP, RIP, QoS
Switching Protocols: STP, RSTP, PVSTP, VTP, ARP, VLA
IP Services: DHCP, NAT, VLAN, DNS, FTP,SFTPTFTP, LAN/WAN
WAN Technologies: ATM, ISDN, PPP, MPLS, ATT, 802.11, 802.11a, 802.11b, APLUS
Network Technologies: IPsec, GRE, NAT/PAT, ACL, IPv4, IPv6
VPN SOLUTION: Cisco & Nortel VPN Clients, ASA SSL VPNs, Nortel Connectivity 600, Nortel 5000 VPN Routers
Operating Systems: Windows XP/7/8, Linux, UNIX, DOS, Windows 2003/2008 server
Tools: SNMP, Syslog, Juniper NetScreen Security Manager NSM Sniffer, Wireshark, Bluecoat Packet shaper
PROFESSIONAL EXPERIENCE
Confidential, Minnesota
Network Security Administrator
Responsibilities:
- Strong hands on and exposure to Checkpoint R77.30 & Palo Alto 5020 on a regular basis.
- Configuration and Administration of Palo Alto Networks Firewall to manage large scale firewall deployments.
- Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection
- Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering)
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
- Configuration, support and administration of Palo Alto and Checkpoint and to migrate all gateways and management servers to new hardware and software - Checkpoint SG appliances running GAiA OS and Checkpoint R75.40
- Upgrade ofCheckpointfirewallsand management servers from Splat R75.30 to Gaia R77.20.
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
- Successfully installed Palo Alto PA-3060 and PA-5020 and firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
- Configuring Palo Alto Firewalls (PA 3020 and PA 5020) with Panorama.
- Generating User Activity and Application Reports on PA-5020 Firewalls
- Implemented Positive Enforcement Model with the help of Palo Alto Networks
- Configuring rules and Maintaining Palo AltoFirewalls& Analysis offirewalllogs
- Administering multiple Firewall of Juniper/Net Screen, in a managed distributed environment.
- Advanced knowledge in design, installation and configuration of Juniper Net Screen Firewall ISG 1000/2000, SSG series and NSM Administration.
- Configured Policies on Juniper Net screen and SRX firewalls and Palo Alto as well.
- Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls and Checkpoint
- Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall
- Exposure to wild fire feature of Palo Alto.
- Implemented Positive Enforcement Model with the help ofPaloAltoNetworks.
- Reviewing & creating the FW rules and monitoring the logs as per the security standards in Checkpoint
- Monitoring Traffic and Connections in Checkpoint.
- Designed application mapping and application delivery usingF5BIG IP LTM
- Exposure on Network monitoring tools - Nagios / Solar Winds
- Configuring VPN, clustering and ISP redundancy in Checkpoint firewall.
- ManagesBlueCoatProxy/ Anti-Virus / Director appliances
- Established IPSec VPN tunnels between branch offices and headquarter usingCheckpoint Firewall
- Set up a DMZ lab for multivendor testing consisting of Checkpoint, Palo Alto as well as Tipping point IPS appliances.
- Configuring F5 Load Balancers: Adding virtual IPs, nodes, pools and health monitoring.
- Implemented and troubleshot of the CSD-Network Managed Services (NMS) to provide administration support.
- Used Wireshark and packet analyzer for packet capture and analysis and traffic monitoring.
- Worked extensively on firewalls and VPN gateways Checkpoint, CISCO, Juniper, Fortigate GUI and Shell.
- Installed and configured Solar winds’ Orion Network Performance monitoring for network infrastructure monitoring purposes.
- Provide Tier1 technical support, with voice over internet protocol (VOIP).
- Troubleshooting ofDNS, DHCP, Wintel, and UNIX server connectivity issues.
- Sound knowledge of EIGRP/ BGP/ OSPF & Firewall / VPN / SSL VPN concepts.
- Sound knowledge of VLAN / STP / RSTP / VRF / Static routing / Dynamic Routing / HSRP / VRRP / MST / Ethernet channel.
- Configuration the access-list rules, network object-service group based on well-known port the port i.e. FTP/SFTP, SSH, HTTPS/HTTPS (SSL) and etc
- Built and support VRRP / Cluster based HA of Checkpoint firewalls.
- Perform QA Checks on block point builds of SPLAT and Gaia Checkpoint Firewalls running on HP ProLiant Servers
- Capable of developing and implementing newITILframework and procedures as well as improvements to existing policies and procedures.
- Security monitoring process with the help of Log management tools (i.e. Splunk) and Security Information Event Management (SIEM) tools
- Utilize network analysis tools such as tcpDump, WireShark, QRadar, andArcSightSIEM
Confidential, Wisconsin
Network Security Engineer
Responsibilities:
- Primary responsibility for the Core Security of the Network. Managing the entire Network Security Products deployed in the network such as Checkpoint (GAIAR61/ R75.40/77)
- Experience onCheckpointfirewalls with R65, R70, R75, and R76 version IPSO 6.2 OS
- Worked oncheckpointprovider R71, R75.40 and R77 GAIA and secured policies and blocked websites using URL filtering, application identification and threat prevention
- ImplementedCheckpointFW Interface, NAT and VLAN using R77 GAIA Smart Dashboard.
- Migrated firewalls from ASA to Palo Alto.
- Worked on the migration to new Checkpoint R61/R75.40 firewalls from Cisco ASA firewalls
- Implementingproxyrules inBluecoatProxySG using blue coat director.
- Bluecoat (SG810) Administration - Blocking/Unblocking URL's
- Extensive knowledge and Implementation on Firewalls design (e.g. Checkpoint R71, R77, and McAfee), IPSec VPN and working experience on IPS / IDS.
- Blue Coat Web Proxies - Proxy SG, Proxy AV, Content Analysis System, Packet Shaper, Threat Detection Proxy CAS, Director, Reporter.
- Deploying Cisco WSA and Bluecoat ProxySG (Web Security Appliance) S170 for URL Filtering Policies.
- Good experience on Secure Application design in DMZ related infrastructure.
- Installed and ConfiguredCheckpointFirewallin Internet Edge
- Good experience and understanding on F5 Load balancers (LTM, GTM) and Proxy devices (Bluecoat).
- New firewall design, installation, routing configuration & implementation. Manage and support Remote Access VPN setup for users and Juniper SSL VPN
- Complete renaming of all firewall objects and rules.
- Configured and maintained DNS, Mail andFTP/SFTPservers and its related applications.
- Experience in adding Rules and MonitoringCheckpointFirewall traffic through Smart Dashboard and Smart View Tracker applications.
- Review and optimize firewall rules using Secure Track TufinISIMtuff tool and firewall audit reports
- Daily responsibilities included design, implementation, support and administration of multiple security products running CheckPoint Provider-1 and VSX, Source Fire, and ISS Real secure.
- Provide best practice security consulting for multiple compliance initiatives, with a focus on highly resilient solutions.
- Maintained checkpoint 41000 and 61000 systems, Participated in the OS and firmware upgrade of the 61K.
- TroubleshootVoIPrelated issues such as call setup failure, one way audio, voice quality, and phone registration
- Creating technical implementation plans, project plans, and worked closely with internal and external customers to supply solutions that fulfill their needs.
- Regularly performed firewall audits around Checkpoint Firewall-1 solutions for customers.
- Troubleshoot and hands on experience on security related issues on Checkpoint and Palo Alto Firewalls.
- Implementation of Checkpoint VSX, including virtual systems, routers and switches.
- Implementing and configuring Checkpoint VSX for security gateways.
- Work with Tier1 technology to provide VoIP support.
- VoIP - Monitor and maintain all IP Telephony installations
- Proficient in design, implementation, management and troubleshooting of Check Point firewalls, Cisco PIX, Net Screen Firewalls, Check Point Provider-1 / VSX, Nokia VPN, Palo Alto, IDS, F5 Load Balancers, CISCO ASA, and Juniper SRX.
- Wireless - Internal and Guest Wi-Fi infrastructure including configuration, Maintenance and regular administration.
- ImplementedMPLSVPNsolution for IP backbone of 2.5G mobile Network successfully.
- Installed and configured DNS on servers.
- Provided tier 3 support for CheckPoint Firewall-1 software to support customers
- Strong working knowledge of Checkpoint VSX virtual firewall.
- Configuring Bandwidth allocations (QoS) inCheckpointFirewalls.
- Strong knowledge and understanding with IPsec, Remote Access VPN, and Source Fire intrusion prevention systems.
Confidential - San Diego, CA
Network Engineer
Responsibilities:
- Configuring Routers as of client requirement which includes routing protocols such as RIPv2, EIGRP and OSPF.
- Technical support for field engineers during installation.
- Implement Security using access-list, route maps & NAT depending upon the network requirement.
- Hands on experience in Juniper Firewall and experience in ScreenOS and Junos OS commands.
- Responsible for implementation and troubleshooting of network connectivity at all the locations.
- Responsible to provide network connectivity as and when new location comes in to the network.
- Troubleshooting hardware and network related problems.
- Configured and managing site-to-site VPN tunnel in Checkpoint R75.10 Firewall.
- Configured and managing Remote Access VPN on Checkpoint Firewall.
- Upgrading the existingCheckpointR70 toCheckpointR75.10.
- Creating object, groups, updating access-lists on Check PointFirewall, apply static, hide NAT using smart dashboard
- Configuration ofCheckpointR75 Firewall Rules and Application and URL Blades and VPN\IPSEC Set up IPSEC Tunnels and VPN. Upgrade when needed.
- Support Video On Demand content, transcode and package processing per platform requirements while delivering files through FTP, SFTP
- VerifyFirewallstatus withCheckpointMonitor.
- Worked onCheckpointFirewalls Clusters of both High-Availability and Load-Sharing
- Maintained aCheckpointNG Firewall infrastructure
- Designing, installing and configuringCheckpointfirewalls - NGX R65 in active/active mode
- Subnetting networks. Troubleshooting DHCP and DNS Servers.
- Performed upgrades on allCheckpointfirewalls, and support for client services
- Installed high availability Big IPF5LTM and GTM load balancers to provide uninterrupted service to customers.
- Managing Checkpoint (NGX 70) on SPLAT platform, Standalone and HA mode implementation, Hide NAT and Static NAT configuration as per clients requirement.
- Managed multiple ISP providers to insure adequate provisioning of connectivity services (Ex: Circuit termination, MPLS,QoS, etc.). This included refresh of WAN routers and modification of the routing design.
- Support complex solution for user MPLS, VoIP, SIP, or any IP transport.
- Configured and administered Windows server 2008 R2 Active Directory.
- Responsible for the setup of user accounts, organizational units, and security groups, setup group policy for users OS Windows XP, 7, and 8.
Confidential
Network Support Engineer
Responsibilities:
- Provides technical support to all areas of Network Administration, Telecommunications, Systems and Network Architecture, and Personal Computer Administration.
- Maintaining of Cisco Adaptive Security Appliances (ASA firewall) for LAN, WAN and Internet connectivity.
- Manage Local Area Network by Maintaining VLANs and Wireless Aps (TP Link devices).
- Setup and configure network monitoring and management systems, which include Cisco Works 2000 to manage Cisco devices.
- Troubleshoot network connectivity issues such as DNS, WINS and DHCP.
- Develops and maintain IT security policy related to LAN and WLAN.
- Operated the router-point-defense Intrusion Detection System for the data network (ASIMS Director, Net Ranger Director, and via Firewall VPNs).
- Helped standardize workstations and file servers including: hardware software, naming conventions, and IP addresses.
- Implemented file system, firewall security and disaster recovery strategies.
- Designed and implemented Windows networks and Active Directory (AD) and security group hierarchy based on delegation requirements.
- Installed external storage raid servers for corporate and production use.