Network Engineer Resume
Houston, TX
SUMMARY
- I am seeking a challenging technical position in a pleasant working environment, which will permit me to continue practicing, and expanding my skill set and knowledge base while Confidential the same time allowing me to contribute to company’s production.
PROFESSIONAL EXPERIENCE
Confidential, Houston, TX
Network Engineer
Responsibilities:
- Standing up of new ExxonMobil sites across Canada and the USA by ordering the necessary circuits, network hardware equipment, configuring them, connecting them to the Internet Service Provider network, and subsequently connecting them to the ExxonMobil Corporate network in Houston and Dallas, TX in USA.
- Implementing various platform technologies from Cisco ISIS, BGP, MPLS, VPN, IPSEC, ISRWAAS and WAAS, VSS, CSS, ACE, to Juniper Virtual Chassis, VPLS, to F5 load balancing, etc. where needed and appropriate, to upgrade or replace circuits and or hardware, increase network capacity and enhance performance, to extend network area coverage using Cisco Wireless technologies, to using Cisco ASAs and Juniper SRX to secure the networks supporting and servicing various users and business units across the globe.
- Responsible for the creation and maintenance of network documentations and diagrams using various tools including Microsoft Visio, Microsoft Word, and a host of other proprietary tools.
- Provide periodic On - call Network Support to the Network Operations Center troubleshooting any arising network issues.
- Provide technical support for Load Balancing needs of various Application Teams across the company by programming per their application needs, implementing the configurations (across various Cisco and F5 platforms), assisting with application testing, and responding to and maintaining their day-to-day needs.
Confidential
Network Engineer
Responsibilities:
- Performed routine network device management functions on Cisco Nexus 7K, 5K, 3K, and 2K series switches, and Cisco Catalyst 6K, 4K, 3K series switches, which includes troubleshooting to restore network outages, interfacing and providing assistance to the Network Operations and Customer Services Support (NetOps) teams supporting the Joint Staff personnel on the Navy Base in Norfolk and Suffolk, VA.
- Responsible for the creation and maintenance of network documentation and network diagrams using Microsoft Visio, Microsoft word, and other tools.
- Design and implement network technologies and architecture for various protocols including OSPF, BGP, STP, NTP, VTP, HSRP, VDC, vPC, etc. and standards for network operations and performance optimization.
- Assess growing user needs, translating them into testing, upgrades, configurations changes, installation, software and hardware requirements, and network restructuring and reconfigurations.
- Responsible for monitoring the network using WhatsUpGold utility.
- Oversee the testing, upgrading, and installation of network systems/devices to ensure IOS, NX-OS, IAVA and DISA STIG are in compliance and maintaining network security and availability.
- Responsible for issues affecting Naval Base campuses’ connectivity to the Internet Service Provider (ISP).
Confidential
Senior Network Engineer
Responsibilities:
- Performed routine systems administration functions on Cisco Catalyst 2900, 3500, 3700, 4500, 6500 series switches and Cisco 2800, 3900 and 7200 series routers, which included troubleshooting and restoring network outages, coordinating and providing assistance to the Command Joint Task Force, Network Operations and Security Center (CJTF-NetOps) engineers, and reporting corrective network actions.
- Responsible for network new switch and router configurations and installations, LAN/WAN and VOIP troubleshooting, network planning, development and expansion where necessary.
- Responsible for monitoring the networks using the SolarWinds and WhatsUpGold utility tools.
- Designed and implemented routing and network policies for various routing protocols including EIGRP, OSPF, and BGP. Also, other protocols like STP, VTP, NTP, HSRP implementation standards and procedures for network operations and optimization for network equipment and Information Assurance standards.
- Assessed growing user needs, translating them into testing and troubleshooting, installation, software and hardware requirements, and network reconfigurations as needed.
- Stayed abreast with current and emerging protocols and authorized software and hardware technologies and participated in technical discussions for compliance to DISA STIG, NIST and or industry best practices.
- Reviewed network schematics, diagrams, and other program documentation to assist with development and preparation of cost estimates and new installs or upgrades.
- Oversaw the testing and patching of network systems to ensure IOS, IAVA and STIG compliance and maintained network security and availability.
- Managed the Day-to-Day DSCI business activities Confidential the Forward Operations Base (FOB), Camp Lightning, Afghanistan, including interfacing with the Base Commander and other personnel, ensuring there is full coverage as an assistant Site-Lead.
Confidential
Network Administrator
Responsibilities:
- Performed routine network router and switch management functions, which included troubleshooting network outages, coordinating and providing assistance to the theater Regional Network Operations and Security Center (RNOSC) and Command Joint Task Force (CJTF) technicians, and reported corrective network actions to restore networks.
- Responsible for daily operations of network documentation and diagrams, network cable installation, switch/router configurations, LAN/WAN troubleshooting, network planning and development, monitoring, and management of network devices, VLAN administration, DHCP and Print Server administration, equipment and information assurance standards.
- Developed and implemented policies, standards and procedures for network operations and design, implementation, and optimization of network equipment and Information Assurance standards.
- Assessed growing user needs, translating them into testing and troubleshooting, installation, software and hardware requirements, and network reconfigurations.
- Responsible for building and maintaining a stable production environment by implementing a Dell Backup system and Symantec Backup-Exec software, and ensuring production servers were fully functional and accessible to the user community 24/7. Also, provided support for Antivirus, firewall, UNIX, terminal servers, routers, switches, cabling configurations and second-level support for Microsoft Office Suite, Adobe products, and other software in use by over 300 end-users Confidential the military base.
Confidential
Network Management Specialist
Responsibilities:
- Performed initial troubleshooting of network issues Confidential the Theater Network Operations and Security Center (TNOSC), the network tier zero of the Total Army Communications, Southwest Asia, Central Asia and Africa (TAC-SWAACA) including managing the various routing protocols in use (BGP, OSPF, EIGRP and RIPv2). Monitored various military networks using SNMP tools like Solar-Winds.
- Responsible for coordinating with other Regional Network Operations and Security Centers (RNOSC) during personnel relocation within TAC-SWAACA sub region of Kuwait-Qatar-Iraq-Afghanistan for the movement of domain user accounts and their respective mailboxes.
- Responsible for creating, configuring, and terminating Microsoft Active Directory domain User accounts, Mailboxes, and File shares within the TNOSC and also giving the necessary access and permissions to users, servers, workstations, applications, printers, mailbox distribution lists etc. to existing accounts.
- Provided support for the Department of Defense (DoD) remedy ticketing system by coordinating between the various operation units within the TAC-SWAACA in reviewing and assigning tickets to their appropriate units for processing and or for closure.
Confidential
Network Test Engineer
Responsibilities:
- Tested both Cisco and Juniper brands of routers, switches, hubs, modems-T1-ISDN interface cards, and Ethernet and fiber cables, to determine their functionality before shipping them for deployment. Formulated testing procedures for newly purchased hardware models to use as standards for future testing.
- Received all hardware decommissioned for various reasons from the field for testing. If not damaged they are returned to stock otherwise they are forwarded to vendor for repairs or replacement.
- Audited and maintained inventory of routers, switches, and various components in compliance with corporate directives for reporting of inventory usage and tracking of all equipment purchased, in use, in repair and disposed of. A 99.8% of 1400 items inventory was the least attained level over the year from a 67%.
Confidential
Systems Administrator
Responsibilities:
- Responsible for building and maintaining a stable Microsoft Active Directory production environment by implementing a Dell Backup system and Symantec Backup-Exec software, and ensuring production servers were fully functional and accessible to the user community 24/7.
- Provided daily direct support for Windows XP, Windows Advance Server 2003, Windows Exchange Server 2003, and a couple of Solaris Unix server operating system configurations including workstations, terminal servers, routers and switches installation, helping with cabling, and providing second-level support for Microsoft Office Suite of products, Adobe products, and other software in use by about 550 end-users.
- Supported more than 170 local network laptops, workstations, and production servers by restoring, repairing, troubleshooting and imaging them as and when necessary.
Confidential
Systems Support Technician
Responsibilities:
- Terminated both fiber and copper cables for use as patch cables and or ran them to connect devices to networks and Intermediate Distribution Frames (IDFs) and Main Distribution Frames (MDFs) within the Collocation Center (Colo). Assisted various Carriers (like Verizon, Confidential &T, XO, and Sprint) with loopbacks jumpers to troubleshoot Optical and copper circuit drops in the Colo, and extended various circuits including DS1/T1, ISDN, POTs lines delivered on behalf of Colo clients.
- Performed remote-hands services for various Colo clients. Installing and configuring both software and hardware of various operating systems including Windows XP, Window NT, Windows Server 2000, Redhat Linux, Mandrake Linux, Caldera Linux, and Solaris Unix, FreeBSD Unix in the Co-location (Colo).
Confidential
PC Technician
Responsibilities:
- Monitored the installation of year 2000 census sites nationwide. Escalated issues arising during 2-/3-day period installation of each site. Wrote progress reports of each site installation, from start to finish.
- Tested and upgraded various models of Dell PC BIOS, installed, configured, and troubleshot Windows 98, and Windows NT Workstations and printers and administered User Accounts. Also applied various OS patches on PC Assisted end-users with transition from Novell to Windows NT environment.
- Imaged, migrated, installed and configured applications on Windows Workstations and various hardware.
Guardsmark Securities, Security Guard
Confidential, VA
Responsibilities:
- Secured various Sprint office campuses, Oracle Training Center, Quest Communications, Sallie Mae locations in and around Northern Virginia by observation and reporting.
- Over the years, I worked through various departments within the bank: from being a Teller, the Branch's Clearing Agent, the Bills & Exchange clerk, to administering the Branch's network of 13 workstations and 24 personnel.
- Performed daily runs of End-of-Day and Start-of-Day processes Confidential the close and start of the business day.
- Installed and configured both workstation hardware and software and managed a Novell Network System supporting DOS, Windows NT 3.x Workstations and generated branch reports including General Ledgers, Balance-Sheets, and Customer Statements etc.
TECHNICAL SKILLS
ECPI University (Fmrly: ECPI College of Tech/Computer Learning Center) Diploma in Computer Electronics Technology, Manassas Campus, VA (06/1997 - 10/1998).
HardwareRouters: Cisco ISR4K, ASR1K, 2K, 3K, and 7K Series routers.
Juniper: MX5, MX10, MX960, MX240, and T640 Series.
Switches: Cisco Nexus 7K, 5K, 3K, 2K series, Cisco Catalyst 6K, 4K, 3K, and 2K series.
Firewalls: Cisco ASA5K series and Juniper SRX220 and SRX550.
Software: Cisco Works, Cisco Call-Manager, Cisco Prime, Remedy, Splunk, NetScout, SolarWinds, Wireshark, and WhatsUpGold,.
Routing: RIPv2, EIGRP, OSPF, IS-IS, ODR, BGP, MPLS, IPv6, GRE, Traffic Engineering, Policy Based Routing PBR, NAT, HSRP, VRRP, GLBP, DHCP, NTP, SNMP, IP SLA, AAA (RADIUS/TACACS+), QoS, Route Filtering, Redistribution, Multicasting, Summarization, and Static routing. All over TCP/IP.
Switching: OTV, VDC, vPC, STP, RSTP, MSTP, VTP, DTP, VLANs, Trunking, Layer 3 capabilities, and Ether-channels or Port-Channels, and FEX (Fabric Extenders).
Clearance Status: Active Secret Clearance (thru. 2018).