We provide IT Staff Augmentation Services!

Nsi Engineer Resume

5.00/5 (Submit Your Rating)

Des, Moines-iA

OBJECTIVE

  • With an intensity to build a prosperous career in networking I strongly inculcated the characteristics which gave the scope to exhibit my skills in the network design, implementation, administration, and troubleshooting various networks.
  • I have 8 plus years of experience in this field and in all these years I have put diligent efforts in order to increase my ability in this competitive field of networking and simultaneously utilize my skills to enhance the reputation of the organization I work for.

SUMMARY

  • Excellent working experience on Nexus 2232, 2248, 5548P,56128P, 5596T, 7009, 7706,7710 switches.
  • Extensively worked on Cisco catalyst 6509 and implemented VSS on it.
  • Experienced in implementing VDC, VPC, Fabric Path, VXLAN on the Nexus platform.
  • Detailed understanding of different layer 2 like VTP, VLANs, STP, Port Security, VSS, and layer 3 technologies like NAT, PAT.
  • Expertise in implementing redundancy gateway protocols like HSRP.
  • Hands on experience in performing various configurations on Access, Distribution and Core layer switches like Cisco Cat 2960, 3750, 4507, 4948, 6504E, 6509E switches.
  • Worked on Cisco routers - ASR 9001, 2800, 3845, 7606, 7609.
  • Implemented route manipulation and route filtration with the usage of Off-set lists and distribution-list, access-lists respectively
  • Insightful knowledge in implementing various routing protocols like RIP V1/2, EIGRP, OSPF, BGP.
  • Enterprise level expertise in implementing various switching technologies like VLANS, VTP on Cisco Catalyst switches and on multilayer switches and resolve any issues by addressing the tickets generated by the higher personnel. Implemented TCP/IP, STP, RSTP, PVST+ on Cat 4507, 6506 switches depending on the requirement
  • In-depth knowledge in the usage of ether channels for effective usage of bandwidth with aggregation protocols LACP and PAGP
  • Having decent knowledge on ASA, Checkpoint firewalls providing security to the organization
  • Also have a good insight on F5 -Load balancers
  • Good knowledge in utilizing various packet capture tools like Wire-shark, Ethereal.
  • Excellent inter-personal skills with an ability to work in a team of large members and with minimum supervision necessary.
  • Experienced in Confidential Visio creating a detail physical and logical network diagrams.
  • Involved in configuration of 5520 wireless controllers for our new environment
  • Troubleshoot access point connectivity issues
  • Used SPAN/RSPAN/ERSPAN filters setup to capture traffic and analyze troubleshooting issues using wild packets capture engine
  • Configured GRE /IPSec tunnels in our environment based on design/connectivity requirements

TECHNICAL SKILLS

LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, LWAPs.

WAN Technologies: HDLC, PPP, Frame Relay, Channelized links (E1/T1/E2/T2).

Routing Protocols: OSPF, EIGRP, BGP, RIP v1/v2, PBR, Route redistribution, Route filtering, Summarization, Static route.

Routers dealt with: Cisco 7606, ASR1004, ASR 9001 3945E, 3660, 2951, 2811

Switching Technologies: VLANs, Inter VLAN routing and Port Channels, VTP, Spanning Tree Protocols like PVST+, RSTP+, Multi-Layer Switching, Port security, VSS, and DCEF.

Switches dealt with: Nexus 2232,2248,3048,5548, 5596, 56128P,7009, 7706,7710; Cisco Catalyst 6504E, 6509, 4506E, 4948, 3750, 3560, and 2960.

Network Security Technologies: Checkpoint Firewalls Gaia R77.20 R77.30, R80, R80.10, R80.11, Access Control Lists, IPsec, IDS, and IPS.

Load Balancers: F5 Network (Big-IP) LTM 8900 and 6400.

Redundancy Protocols: HSRP, GLBP, VRRP

Wireless Networking: LWAPP, WLCs, WCS

NEXUS Features: VDC, VPC, EVPC, Flex links, FEX, F & M Series line cards, Config Sync, Cisco Fabric Path, APIC.

VPN Technologies: GRE Tunneling, Remote Access VPN, Site-Site VPN.

Networking Tools: Wire shark, TFTP, SNMP, Ethereal, SYSLOG, ARP, GARP, DHCP, NAT, PAT.

AAA Architecture: TACACS+, RADIUS., Cisco ACS

Operating Systems: Windows (98, ME, 2000, XP, Sv 2003/2008, Vista, Windows 7, Windows 8), Linux.

Proxies: McAfee Web Gateways WG-5000, WG-5500

PROFESSIONAL EXPERIENCE

Confidential, Des Moines-IA

NSI Engineer

Responsibilities:

  • Part of team that maintains 30 firewall infrastructure clusters that implies a total of 60 firewalls which includes 23500, 15400,5600 models
  • Implemented changes based on user request in accordance to applying the firewall rules or based on Identity awareness to allow access to newly installed applications or making changes to the existing applications
  • Responsible for giving access to various applications, various webhosting servers as required to the DMZ, sourcing from the private network subnets to the DMZ
  • Optimized checkpoint firewall rule base by working on Tufin tool
  • Actively involved in deploying and configuring up of DR site firewall in our Chile location
  • Responsible for giving access to the Virtual Private Network(VPN) for all the Fulltime employees and Non-Employees i.e. contractors based on their roles
  • Involved in the up gradation of firewalls from R77.30 to R80
  • Responsible for creating extranet VPNs on firewalls to facilitate third party communication from our head office to various WAN sites.
  • Troubleshooting any firewall related issues with tools like smart log, smart monitor, smart event manager in R77.30 version
  • Responsible for configuring McAfee Web gateways WB-5000 and WB-5500 from the scratch via BIOS settings, shipping them to remote sites, swapping them with old models and provisioning them completely
  • Responsible for Web-washer tickets on the MacAfee web gate proxy’s i.e. either giving access or denying access to various websites depending upon the business need
  • Played a key role in the setup of brand new firewall cluster in our Hong Kong site by analyzing the traffic in smart log and build appropriate rules in smart dash board
  • Configured 10Gig. Checkpoint Firewall infrastructure with R77.20 and R80 code for all the sync. interfaces and cluster interfaces
  • Key role in configuring nexus 2232s and 2248s required in collapsing of our direct to internet (DIA) firewalls in a VSX environment.
  • Hands on Experience in migration of catalyst 6509 switch to Nexus 7010 switch
  • Involved in the Team of Data Center Operations to perform duties like change management of Cisco Routers and Switches according to the organization requirements
  • Experience in configuring and administering the switch block in data center that involves the Nexus 2000 series fabric-extenders, 5000 series fabric Interconnects and 7000 series core switches
  • Configured and managed Layer 2 technologies like VLANs, STP, VTP, VLANs, 802.1Q Trunk, RPVST+, Inter-VLAN routing
  • Played key role in configuration of VXLAN in 2 tier architectures of spine and leaf
  • Implemented Single Hop Gateway redundancy protocol using HSRP and tested VRRP
  • Heavy role in campus migration of replacing old 4503 devices with new 4506 devices with SUP8
  • Involved in code upgrade of APIC-L2 C220 M4 servers from version 1.0 to 2.2
  • Involved in managing the Dynamic Routing Protocols OSPF-v3, EIGRP and STATIC routes
  • Deep knowledge in installing, configuring VMware vSphere. Creating and managing virtual servers and clients. Advance knowledge on ESXi Vmotion
  • Changing OSPF area id off backbone to groom for OSPF to ISIS IGP protocol transition.
  • Experience in introducing unique concepts into the topology like BGP multi paths to allow more than one best route in to the routing table
  • Moving DSM customers off their local 7750s for standardizing them onto a single node for simplicity
  • Actively involved with discussions with other team members regarding optimizing network and BGP related issues if needed for any route manipulation
  • Acted as a point of contact for designing and documenting a new solution for one of our customers of Pitney Bowes which no longer used analog connections and moved to wireless connectivity
  • Integrated any WLCs in different sites through firewall to achieve DHCP connectivity so that SSIDs are transmitted properly in respective sites
  • Configured Wireless LAN Controllers 5760 (IOS-XE based controller) from scratch across the wide area campus replacing the existing WLC’s 5560-AIR OS based controllers and configured and support more than 3000 Access Points
  • Migrated from 3600 AP to 3800 APs all over the campus and created heat maps for new campus deployments on using Cisco prime
  • Responsible for certificate renewals on all the WLCs managed by us
  • Basic troubleshooting skills on wireless issues via Cisco Prime
  • Created A, CNAME, MX, SPF records for our internal network in our DNS box of IPAM and deployed changes on DNS server
  • Carried out the role of day On Call for our WAN and LAN team and address any issues during my shift working along with NOC team
  • Performed standard network operations via ITIL standard with Incident Management and Change management

Confidential, WA

Network Smart Hands Engineer

Responsibilities:

  • Configured VSS on Cisco Catalyst 6509 switches and involved in resolving the issues which are raised after the configuration and Implemented VDC on Nexus 7010 switch.
  • Configured and deployed VPC between Nexus 7010 and Nexus 5596, 5548 switches along with FEX 2248.
  • Extensively worked on layer 2 features like STP, VLAN, and VTP and implemented them on new switches and used to troubleshoot any issues and if necessary looped in Cisco and worked closely with them.
  • Involved in configuration of Arista 7K series switches.
  • Part of a team which is responsible of managing 15 datacenters across Redmond providing onsite support and troubleshooting any issues related to them.
  • Worked on various projects internally which involved out of band devices management, VLAN pusher tools, port provision tools etc which helped in automation of requests.
  • Involved in break-fixes in layer 3 issues such as OSPF neighbor down/flapping, LDP neighbor down/flapping
  • Deployed and configured many Top of the rack switches like Nexus 3000, Cisco 4948, 3750, and 2350.
  • Experienced in deploying F5 like 8900,8950 and ensuring all the server traffic is properly encrypted using SSL and reaching intended servers
  • Responsible for mitigating inter-server reachability issues by working closely with owners, site services personnel.
  • Investigating issues on ACL’s by working with the requestor and allowing or denying the requested ports or IPs accordingly.
  • Deployed and investigated issues of different types of VLANS on core devices, according to the type of environment.
  • Configuring VIPs, pools and Virtual servers on F5 and allocating requested profiles or monitors for the virtual servers.
  • Good level of hands on experience on implementing the redundant protocols like HSRP
  • Configured IP helpers on the vlans as requested by the customers as per their DHCP settings.
  • Involved in extending vlans from core layer to distribution layer and then to access layer devices.
  • Performed code upgrades during work windows on devices from access layer like 3750, 2360, 4948, Nx 3000 to core devices like 6504, 6509.
  • Also involved in code upgrade during work windows on Nexus 7K and ASR 9K. Conducting prechecks and post checks to make sure there are no issues after code upgrade process.
  • Dealt with device/module/fan/line card down issues. Acted promptly in redirecting the traffic and investigating the cause of failure. If necessary raising RMA with Cisco
  • Providing physical support by means of On-Call duty which included hardware investigation like checking the device, troubleshooting by taking console access, hardware reset and hardware replacement
  • Used to be responsible for resolving the service request tickets from the help desk which involved in providing entire technical support
  • Responsible for monitoring the dashboard with NNMI console and look out for any instabilities in network

Confidential, NJ

Network Engineer

RESPONISIBILITIES

  • Involved in the activity of migrating regular Cisco catalyst switches with the new Nexus 2148, 2224T, 5548, 7010.
  • Contributed in performing the duties of traffic engineering with many BGP related attributes like local preference, MED, Weight.
  • Involved in the troubleshooting aspects of complex network infrastructure using the routing protocols like EIGRP, BGP.
  • Applied ACLs for Internet access to the servers using Cisco 5520 ASA firewall, performed NAT.
  • Performed load balancing and application level redundancy by deploying F5 BIG-IP LTM 3900.
  • Involved in the configuration and maintenance of IPsec Site-Site VPN.
  • Gave support in giving access the User machines and partners exterior to the network using IPsec VPN tunneling and SSL.
  • Worked on python scripting language.
  • Dealt with the service providers in the case of WAN outages.
  • Responsible for simulating network operations with the usage of packet analyzer like Wire shark, and use to resolve tickets whenever there is an issue.
  • Involved in the design and installation of Branch network systems, also maintained network documentation using VISIO.
  • Involved in managing and deployment of code testing to upgrade the wireless systems which included WCS, WLC, and WiSM.
  • Responsible for monitoring both wired and wireless networks so that they work to maximize the operations.
  • Had hands on experience on investigating the issues of wireless network regarding carrier networks.

Confidential

Network Engineer

RESPONSIBILITIES:

  • Key responsibility of LAN and WAN maintenance and troubleshooting any network related problems.
  • Tuned according to the requirements of the organization for deploying and maintaining the routers and switches.
  • Configured and deploying Cisco catalyst 6506, 4948E, 4510 switches and Cisco 3660, 3845, and 7609 series Routers.
  • Tasks involved in making sure that customers are satisfied for their high level of usage of the resources.
  • Also involved in upgrading the necessary IOS and making sure that there is high data availability.
  • Helped in setting up the GRE tunneling over IPSEC between to data centers.
  • Provided high level of security to the network by installing ASA 5510 along with ACLs.
  • Successfully configured and implemented load balancing by using F5 BIG-IP LTM-3900 load balancers.
  • Tasks included in performing network administration issues like configuring RPVST+, Port security etc.
  • Also gave technical support in the issues which involved tasks of debugging OSPF and HSRP features.
  • Dealt with implementation and troubleshooting the EIGRP and OSPF protocols during the process of migration and establishing new client setups.
  • Involved in the troubleshooting of T1, DS3 circuits.
  • Co-ordinate with peers and customers dealing with wireless network innovations also responsible for maintaining wireless IPS infrastructure.
  • Had hands on experience on configuring and implementing Prefix-lists, Route-maps, Ether-channels.

We'd love your feedback!