We provide IT Staff Augmentation Services!

Network Security Engineer Resume

5.00/5 (Submit Your Rating)

Laurel, MD

SUMMARY

  • Tenured success in Network Optimization and Strategic IT Solutions for more than 15 years.
  • Hands - onNetwork Security Architectwith up to12 yearsof cross functional experience in Designing, Implementation and troubleshooting of LAN/WAN/Wireless Security infrastructure on all of Cisco, CheckPoint, F5 vendor platforms which includes Routers, L2/L3 Switches, Firewalls, Load balancers Wireless Controllers.
  • Capabilities include an extremely broad knowledge base and familiarity with the latest cutting-edge technologies, including firewalls, VPN, IDS, and IPS. In-depth knowledge of TCP/IP, high availability, load balancing, and remote management complements outstanding relationship management, analysis, and problem resolution skills as well as outstanding organizational, multitasking, and team building skills at all levels.
  • Proven ability as a resourceful coordinator, quick to learn new skills in fast-paced IT environments.
  • Three years of Cisco ISE experience.

TECHNICAL SKILLS

Firewalls: Checkpoint, Cisco Firewall Service Module, Cisco PIX, Cisco ASA etc

LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, VLAN, VTP, STP, Token Ring, FDDI, 802.1W.

Security Technologies: ASA 5500 Checkpoint 4600 Firewalls, IP-Sec SSL VPN, Easy VPN DMVPN, FWSM, IOS Firewall, IDS IPS

Network Hardware: Cisco Catalyst Switches 6500, 4500, 4000, 3550 series, Cisco Routers 12000, 7600, 7200, 3900,3800 series, PIX Firewall 515/525, ASA Firewall 5500 series, Load Balancers Cisco,F5, Cisco Nexus 7000/5000/2000/1000 vProtocols- RIPv1 RIPv2, IGRP, OSPF, EIGRP, IS-IS, BGP, MPLS VPN, HSRP, IPv4 IPv6.

Infrastructure: DHCP, DNS, SMTP, POP3, FTP, TFTP, IIS.

Network Management: SNMP, Cisco Works 2000, HP Open View, HP NNM, Cisco MARS, MRTG 2.13, PRTG, Wire Shark, Solar Winds, Nessus 2.5, Sniffer Pro 4.7 Microsoft Net Monitor.

Authentication: TACACS, RADIUS and Cisco ISE

Documentation Tools: MS Visio, Lotus Notes, MS Office Suite, MS Project Server.

Security Management & Log Retention Management: Netscreen Security Manager, Enterasys Dragon Manager, ISS Internet Scanner Console, Cisco Works, Cisco Security Manager, IntruShield Manager Platforms Microsoft Windows XP/2000/NT, Red Hat Linux, Sun Solaris UNIX, FreeBSD

PROFESSIONAL EXPERIENCE

Confidential, Laurel, MD

Network Security Engineer

Responsibilities:

  • Currently managing a team of eight security engineers who were responsible for building/deploying security devices in customer networks and for the full management/maintenance of those devices
  • Responsible for playing a strategic roll by developing the team into a group of highly technical engineers, in parallel implementing procedures and actions which will act as proactive measures in providing value to our customers
  • In the process of creating the team SOP covering all operational and organizations policies and procedures
  • Provide Tier-3 troubleshoot support on all managed devices and supported technologies
  • Responsible for handling customer escalation issues and putting together after action reports when necessary
  • Migrated the team to a central email inbox so work inquiries become visible to the entire group
  • Putting auditable procedures in place to ensure work orders are addressed in a timely fashion
  • Building a formal Tier2-3 hands-on training program which will cover the operation, navigation, and troubleshooting for all managed devices and supported technologies
  • Daily analyzed network traffic looking for trends and or malicious activities, created vulnerability report with action plans.
  • Briefed senior operations managers on quality assurance concerns, security implementations, and hardware inventories.
  • Teamed with partners and management to implement improved operational procedures and advise customers on IT security best practices.
  • Defined/tracked 'how to' documents for supported FW/IPS platforms.
  • Configure and troubleshoot VPN's on infrastructure VPN devices.
  • Provided support for infrastructure FW/IPS platforms.

Confidential, Baltimore/MD

Network Security Administrator/Engineer

Responsibilities:

  • Answered inquiries by clarifying desired information; researching, locating, and providing information.
  • Resolved problems by clarifying issues; researching and exploring answers and alternative solutions; implementing solutions; escalating unresolved problems.
  • Fulfilled requests by clarifying desired information; completing transactions; forwarding requests.
  • Sold additional services by recognizing opportunities to up-sell accounts; explaining new features.
  • Installing, configuration and monitoring of Checkpoint Firewall.
  • Kept equipment operational by following established procedures; reporting malfunctions.
  • Updated job knowledge by participating in educational opportunities.
  • Enhanced organizational reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments.
  • Firewall, router and VPN concentrator configuration.
  • Was assigned to configure and maintain the following wireless devices: Cisco 5508’s, 4400 as well as Cisco Catalyst Support, 6500 and 4500 series.

Confidential, Lorton,VA

Network Security Engineer

Responsibilities:

  • Responded in a timely fashion to customer locations for scheduled installations.
  • Inspected installation sites to determine best line placement.
  • Installing, configuration and monitoring of CheckPoint Firewall.
  • Running and termination of data cables like CAT 5e, CAT 6, RG-6,etc.
  • Installed Cox entertainment systems regular cable systems networking systems and security systems.
  • Tested all installed components to insure they were working properly.
  • Activated new installations on-site; gave customers brief tutorials on their new equipment.
  • Responded to Cox repair calls; tested existing systems with which customers were experiencing problems; tested lines and signals using meters and tools; replaced lines as needed.
  • Exhibited excellent customer responsiveness and received high marks on telephone and computer surveys.

Confidential

Network & Security Administrator

Responsibilities:

  • Responsible for assisting Networking and Communications Manager in maintaining and developing all aspects of the hospital wide voice and data infrastructure.
  • Experience with load balancers, F5 or Netscaler preferred
  • Experience with thin/zero clients as well as end point management tools
  • Installing, configuration and monitoring of CheckPoint Firewall.
  • Provided strong knowledge of protecting government data security standards as well as technical support for networking, personal computers specialized software andWindows server administration.
  • Administration of Exchange email, email encryption web filtering, SPAM/malicious software prevention, Mcafee antivirus, HP switches, Cisco Routers, Cisco ASAFirewall, Cisco Wireless controllerand email accessories (i.e. hospital wide disclaimers).Was on call 24 hours a day 7 days a week for emergency situations.
  • Strong working familiarity with Cisco IOS with hands-on experience configuring Cisco routers, switches and firewalls.
  • Excellent experience on Nexus switches
  • Network Monitoring: Analyzes network activity and issues to discover and prevent systematic errors. Recommends network design changes/enhancements for improved systems availability and performance.
  • Installed, administered and managed the IFMIS application which is comprises of the Financial Accountability and Human Capacity programs.
  • Supervised 50 employees in department.
  • Ability to coordinate large scale wireless surveys and remediation, with 3rd party vendors. (Dell, CBTS, Radiant, etc.).
  • Strong background in 802.1x to LDAP authentication configuration.
  • Experience configuring and designing wireless profiles in Windows and other operating systems.
  • Experience in installing and administering multiple network devices: B2B and B2C VPN configurations via CISCO ASA’s and CISCO’s AnyConnect client, Firemon IPS, Blue Coat Proxy, CISCO ASA firewalls CheckPoint firewalls.
  • Forecasted the complete equipment need for the project, considering bandwidth, circuit type, routing platform, host switch, POE, house power, and HVAC.
  • Communicated any issues with supervisor and participated in weekly meetings. Developed hybrid cloud delivery model allowing for customers to choose the mix of public and private clouds to meet their individual needs.Also set up a WAN for all the ministries in Freetown.
  • Implemented labeling in the DFID and World Bank projects.
  • Produced monthly IT report to management.
  • Under the ADB project at the Confidential, installed hardware, Racking & Stacking, Power On Self-Test (Cisco UCS, Nexus,NetApp, Storage Cisco networking devices, PDU’s, Wireless Access Points) for five years.
  • Experienced leader in disaster recovery efforts and expert relevant to multi-site environment.
  • Managed the efforts of infrastructure, server, and applications recovery plans.
  • Conducted site assistance visits identifying critical assets, system interdependencies, cyber vulnerabilities.
  • Briefed management on findings that led to heightened security awareness.
  • Activated the fiber link between the Confidential and the central bank in the implementation of the Real Time Gross Settlement (RTGS) system for immediate payment transactions between banks.
  • Provided resolutions to clients’ problems and hardware functions.
  • Configuration of Firewalls, VPN Concentrators and routers.
  • Expertise in Network Intrusion Prevention Systems and Network Intrusion Detection Systems as well as in Host Intrusion Prevention Systems.
  • In charge of DFID and World Bank projects that involved cloud management and server virtualization.

We'd love your feedback!