We provide IT Staff Augmentation Services!

Network Engineer Resume

Columbus, OH

SUMMARY

  • 8+ years of experience in Networking and Security, including hands - on experience in providing network support, installation and analysis for a broad range of LAN / WAN communication systems
  • Implemented Zone Based Firewalling and Security Rules on Firewall
  • Firewall technologies including general configuration, risk analysis, security policy, rules creation and modification of Check Point Firewall R65, R70 & R77 Provider-1/Site Manager-1 R65, R70.30 & R75.40 Smart Domain Manager command line & GUI, Cisco Pix and IOS Firewall, Cisco ACL, Cisco ASA & Junos SRX240, NetScreenOS 208, ISG 2000 & NSM environment
  • Perform Custer configuration, backup and restore the current Gateway installation
  • Knowledge of Intrusion Detection, DMZ, encryption, IPsec, proxy services, Site to Site VPN tunnels, MPLS/VPN, SSL/VPN
  • Familiarity wif Cloud Security and Cloud Disaster Recovery
  • Experience wif Cisco ISE platform and Cisco FWSM
  • Knowledge on Huawei & Juniper Routers, HP & IBM blade switches
  • Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing wif the firewalls as per the design
  • Configuring VLAN’s, Trunking and routing part for Cisco Catalyst 6500, 4500, 3750, 2980 switches
  • Assist in the migration from Cisco 6500 equipment to Cisco Nexus 7000 equipment and stacked Catalyst 3850 switches
  • Expertise in Windows NT/2000/2003 Active Directory design, deployment and troubleshooting, Exchange 2000/2003, WINS/DHCP/DNS, Citrix Presentation Server, Web Interface, Citrix, TCP/IP, Wireless
  • Advanced noledge in TCP/IP suite and routing protocols, such as OSPF, BGP, and EIGRP
  • Advanced noledge of analyzing and implementing complex firewall rules on Checkpoint firewalls and/or FortiGate security devices, MPLS, ATM and Frame-Relay technology
  • Advanced noledge in Design, Installation and configuration of CheckPoint Provider Environment
  • Prepared technical documentation of configurations, processes, procedures, systems and locations
  • Experienced wif IDS/IPS technologies and vulnerability assessment tools & monitoring

TECHNICAL SKILLS

Routers: Cisco 7609, 2600, 2800, 3800, 3640, Cisco 3745, 7200 Series

Switches: Cisco 3500, 5000, 6500 Catalyst Series Cisco 7000, 2000 Nexus Series

Routing Protocols: BGP, OSPF, EIGRP, VRRP, HSRP, GLBP, and RIP

Switching Protocols: STP, RSTP, PVSTP, VTP, ARP, and VLAN

IP Services: DHCP, NAT, VLAN, DNS, FTP, TFTP, LAN/WAN

Firewalls: Checkpoint R65/R70/R75/R76/R77, Cisco ASA, Juniper

Hardware: HP / Compaq / Dell / IBM Servers, SSL, CDP

Languages: C, C++

Operating System: Windows XP / 7, RHEL

PROFESSIONAL EXPERIENCE

Confidential

Network Engineer

Responsibilities:

  • Working wif Confidential business services IT dept
  • Earned Six Sigma Green Belt Certification
  • Developed, tested, and implemented Nexus 7018 core and distribution switches in each global data center.
  • Performed duties of both the project manager as well as the technical lead in working wif Cisco, WAN/LAN operations, and data center operations teams. This project required extensive planning to move SVIs to the Nexus Distribution VDC, and core routing to the Nexus Core VDC, as well as hundreds of new cable patches, uplinks, and patch panels to complete this in an 8 hour change window. This was the first Confidential implementation of Nexus and associated technology such as VDCs and VPCs.
  • Developed the Confidential solution of Cisco Unified Communications Manager Express (CUCME) and Cisco Unity Express (CUE)
  • Managed the NetScout nGenius traffic monitoring tool
  • Supported products from Cisco, F5. Foundry, and NetScout
  • Supported network operations for WAN, LAN, Firewall, VPN, and Load Balancer environments
  • Designed a network application performance review process to provide services including Application Performance Simulation, Application Response Time Prediction, WAN Bandwidth Capacity Analysis, WAN Cost Assessment, and Technical Design
  • Supported products from Cisco, F5. Foundry, and NetScout
  • Supported network operations for WAN, LAN, Firewall, VPN, and Load Balancer environments
  • Updated Cisco PIX and ASA ACLs
  • Configured F5 VIPs, Server Pools, and SSL for load balanced applications
  • Configured and deployed WAN routers (ISR G1 and ISR G2)
  • Configured and deployed LAN switches (Cisco Catalyst 6509, 4510, 3560, etc)
  • Managed and expanded the NetScout nGenius traffic monitoring tool

Confidential

Network Security Administrator

Responsibilities:

  • Experience wif convert Checkpoint VPN rules over to the Cisco ASA solution. Migration wif Cisco ASA VPN experience
  • Migrations included and not limited to Cisco to Cisco and Cisco to Checkpoint and Checkpoint to Checkpoint
  • Designed and implemented various Routing protocols such as OSPF, EIGRP, RIP, BGP across networks in multiple locations
  • Configuring VPN, clustering and ISP redundancy in Checkpoint firewall
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing wif the firewalls as per the design
  • Configuring, maintaining and troubleshooting IPS and IPS-1 in Checkpoint
  • Experience wif configuring Virtual Server and Configuring Load balancing methods in F5 LTM
  • New firewall design, installation, routing configuration & implementation. Manage and support Remote Access VPN setup for users and field locations wif Nortel VPN Captivity Switch and RSA Secure IDS two-factor authentication
  • Maintain the periodical software update on security devices depends upon the bugs fixed wif the new software releases
  • Implemented and troubleshooting the Virtual firewalls (Contexts) solutions in ASA
  • Implementation, configuration and support of Checkpoint and ASA firewalls for multiple clients
  • Firewall Policy administration and work wif user requests submitted by users
  • Maintain the security standards across the security devices as per the security policies. IDS/IPS Signature updates and CSM Management
  • Implemented and troubleshooting the Virtual firewalls (Contexts) solutions in ASA

Confidential, Columbus, OH

Firewall Administrator

Responsibilities:

  • Responsible for installation, troubleshooting of firewalls (Cisco firewalls, Imperva Web app Firewalls, Checkpoint firewalls and Juniper firewalls,) and related software, and LAN/WAN protocols
  • Knowledge of Juniper environment including SRX/Junos Space
  • Hands on experience on all software blades of checkpoint firewall
  • Configuring VPN, clustering and ISP redundancy in Checkpoint firewall
  • Configuring, maintaining and troubleshooting IPS and IPS-1 in Checkpoint
  • Perform advanced troubleshooting using Packet tracer and tcpdump on firewalls
  • Built and support VRRP / Cluster based HA of Checkpoint firewalls
  • Perform Checkpoint and PIX firewall/IDS design, integration and implementation for Cyber Trap client networks
  • Perform QA Checks on block point builds of SPLAT and GAiA Checkpoint Firewalls running on HP Proliant Servers
  • Responsible for the implementation, documentation, and day-to-day support of the Imperva Database Firewall
  • Configuring VLAN, Spanning tree, VSTP, SNMP on Juniper EX series switches
  • Implement changes on switches, routers, load balancers (F5 and CSS), wireless devices per engineers instructions and troubleshooting any related issues
  • Responsible for installation, troubleshooting of firewalls (Imperva Web app Firewalls, Checkpoint firewalls) and related software, and LAN/WAN protocols.
  • Troubleshooting the VPN tunnels by analyzing the debug logs and packet captures
  • Planning, designing and implementing a secure ODC Network setup for upcoming projects
  • Automation of security operations and optimizing the usage of infrastructure
  • Configuring and testing Multicast for both IPv4 and IPv6 routing in Data Center Environment
  • Configuration of SSL VPN through access blade and up-gradation of Firewall

Confidential, Indianapolis, IN

Network Administrator

Responsibilities:

  • Switching tasks include VTP, ISL/802.1q, IPSec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP
  • Using SmartUpdate, User Management and Authentication in Checkpoint Firewall
  • Monitoring Traffic and Connections in Checkpoint and ASA Firewall
  • Analyzing the IPS logs and adjusting the protect mode
  • New firewall design, installation, routing configuration & implementation. Manage and support Remote Access VPN setup for users and field locations wif Nortel VPN Captivity Switch, RSA Secure IDS two-factor authentication and Juniper SSL VPN
  • Monitor the ticket queue for incoming tickets, update tickets in accordance to Service Level Agreement (SLAs) requirements and, escalate based on severity levels using AxiosAssyst
  • Configuring, supporting, and maintaining routers, switches, network appliances, firewalls, concentrators, and other communication devices
  • Responsible for SharePoint Server 2013 for entire Managed Network Security Services
  • Providing VPN and SSH access as per role and considering security breaches. Performing Firewall rule analysis and make decisions on risk to customer network
  • Audit firewall logs on a regular basis and investigate any suspicious activities. Used Bluecoat Proxy SG Appliances to TEMPeffectively secure Web communications and accelerate delivery of business applications
  • Experience wif designing, deploying and troubleshooting LAN, WAN, Frame-Relay, and Ether-channel
  • Experience in Configuring and implementing VLAN, VTP, LAN switching, STP and 802.x authentication in access layer switches
  • Troubleshoot; coordinate wif Application Systems and Network Operations Engineers, and Help Desk, to resolve problems
  • Performed various projects while successfully migrating data to new systems and remote locations

Confidential

Network Admin

Responsibilities:

  • Troubleshooting of LAN, WAN and user technical problem
  • Designed and implemented IT security policies and networked backup systems
  • Configured route redistribution between OSPF and EIGRP in a multi-area OSPF network
  • Implemented Hot Standby Router Protocol (HSRP) by tuning parameters like preemption
  • Installed Cat5, Cat6 and fiber optic cable under guidance
  • Track tickets through custom Service Center and Service Manager Products
  • Monitored LAN/WAN network activity utilizing CA/Spectrum monitoring tools
  • Responsible for reporting to management on Firewall EOL progress
  • Practical noledge about TCP/IP, DHCP, DNS, SMTP, POP3, RIPV1, RIPV2, OSPF, IGRP. EIGRP, BGP Routing protocol Static, default and dynamic

Hire Now