We provide IT Staff Augmentation Services!

Network Engineer Resume

Eden Prairie, MN

SUMMARY

  • Around 8 years of experience in system designing, network support, administration, firewall security and troubleshooting of networking systems.
  • Experience in Engineering, Designing and Configuring Layer 2 & Layer 3 Switching, LAN/WAN fundamentals, VLAN, Routing Protocols like OSPF, EIGRP, RIP, BGP & IGRP, ISDN, Frame Relay, MPLS, VPN, VoIP etc. and also configuring Access Points to industry standards.
  • Experience involving in IP multimedia systems development and support.
  • Used Tenable Security Center, to perform regular scans on end user hosts to generate reports on vulnerabilities.
  • Managed conflicts performing threat assessments of alerts by continuous monitoring through SIEM tools (Splunk) and IDS logs on assigned systems and determined the severity of each alert that was issued.
  • Recently moved from CVSS score to VPR - Vulnerability Priority Rating (Tenable owned) which helped a lot on prioritizing the vulnerabilities and what to be patched.
  • Experience running various types of scans, like Wannacry Ransomware, Internal PCI Network scan among others on Tenable.
  • Expert level Knowledge on working withWirelessLANController's, Cisco Meraki, Cisco NCS, Cisco AP's, LWAPS, Standalone AP's and Mesh AP's.
  • Experience in Cisco Routing and Switching using 3600, 3700, 3800, 5300, 6500, 7200,7600 Nexus 9k, 7k, 5k, 2k series routers.
  • Implemented VDC, VPC, Fabric Path on the Nexus 5505 and 7009 switches and also implemented VSS on Cisco catalyst 6509 and 6513 switches.
  • Designed Redundancy Gateways for Campus Network using HSRP/VRRP/GLBP.
  • Experienced inwireless/RF communications with knowledge and experience in technology integration ofWirelessBroadband/Convergence (IEEE 802.11, WiMAX, BYOD, etc.)
  • Worked with MPLS in establishing peer ship with BGP protocol.
  • Constant monitoring of QRadar and Nexpose to identify vulnerabilities in the network devices and mitigating them.
  • Knowledge on ACI design, implementation, and support. Worked on setting up ACI environment with Nexus switches in a spine leaf design model.
  • Configured 7ks and ASA firewalls for the Datacenter Interconnect (DCI)
  • Experience with F5 load balancers 6400 LTM and Citrix Netscaler Load balancers.
  • Proficient with various applications, services and network management tools including FTP, Telnet, Ping, DNS, DHCP, ARP etc.
  • Operating systems package and firmware installation support for networking hardware.
  • Responsible for design and architecture of the LAN, WAN and the security infrastructure.
  • Planning, designing of Corporate Network architecture and implementing in distributed environment with future expansion option.
  • Supported server-based environment on Windows 2003/2008/2012/ R2 with Active Directory, DNS, DHCP, and ADCS.
  • Implemented Security Policies using ACL, Firewall, IPS/IDS, AAA (TACACS+, RADIUS).
  • Experience with automated MAC authentication bypass functionalities.
  • Administered and maintained Active Directory and Exchange servers within production environment.
  • Acquaintance with field engineering such as cabling and troubleshooting hardware at data centers.
  • Experience working with various teams in the organization, supporting incident and change management, product assistance, implementation assistance, and solution audits and tune-ups.
  • Enhanced level of experience with Layer 2 and Layer 3 networking configuration and troubleshooting.
  • Working on the migration of Cisco catalyst 4948 and 3750 with Arista 7280 and 7010.
  • Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
  • Experience in Configuring, Monitoring, and Troubleshooting Cisco ASA 5500/PIX security appliance and failover DMZ zoning.
  • Help diagnose, resolve, and communicate advanced problems inActive Directoryand Windows 2008/12 server
  • Experience in Incident management and Escalation support.
  • Working knowledge on Sourcefire technology.
  • Provided 24x7 on call support when required for the projects.
  • Excellent working knowledge of TCP/IP protocol suite and OSI layers.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.
  • Experience working with standard security procedures and RSA Secure ID System.
  • Strong knowledge on Firepower products. Upgraded the OS for Cisco FMC, and Sourcefire virtual appliance.
  • In-depth knowledge and hands-on experience in ISP Routing Policies, NetworkArchitecture, IP Addressing, Sub netting, ARP, VLSM, TCP/IP, UDP, MPLS, DMVPN, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Ping Concepts.
  • Expertise knowledge in using Putty, Exceed, Secure CRT.
  • Experience working with Checkpoint/Netscreen Firewalls and Enterprise Intrusion Detection/Prevention and Network/Host based Malware Analysis engines like Blue Coat proxies, Cisco/SourceFire, Tufin, FireEye, etc.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.
  • Strong experience working with Symantec Anti-Virus, and other IDP experience.
  • Self-motivated and a proactive team member.
  • Experience working with Windows Server and LDAP for Encryption and Authentication.
  • Strong interpersonal, organizational communication, customer service & presentation skills.
  • Excellent at problem resolving, verbal & written communication and teamwork skills.

TECHNICAL SKILLS

Switches: CISCO 2900, 3750, 2950, 2934, 3500, 4500, 4900, 5000, 6500, 7500 Nexus 7k, 5k, 2k. Arista 7280, 7010.

Routing Protocols: OSPF, IGRP, EIGRP, RIP, MPLS, BGP, Multicasting.

Routers: CISCO 2500, 2600, 2800, 3000, 3600, 3601, 3640,3800, 7200, 7500, 7600 Juniper M & T Series, Cisco CRS-1, CRS -3, GSR

Firewalls and Load Balancers: IPSEC, SSL VPN, F-5 BIGIP, Juniper net screen (500/5200), Juniper SRX (650/3600), Pix (500/525/535), ASA (5520/5550/5580 )

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP.

LAN Networks: Ethernet, Fast Ethernet, Gigabit Ethernet & 10 Gigabit Ethernet, VLAN routing, Inter-VLAN Routing, VTP, STP, RSTP.

Networking Hardware: Cisco Switches, Cisco Routers, Cisco ASA firewalls, Palo Alto Juniper routers, Nexus Switches.

Security Technologies: PAP, CHAP, Cisco PIX, Nexpose, QRadar, Tenable

Infrastructure services: DHCP, DNS, SMTP, FTP, TFTP

Monitoring tools: Cisco Works 2000, Wireshark, SNMP, TCP dump, Orion, Splunk

Operating Systems: Cisco IOS, IOS XR, Windows 7, Vista, XP, 2000,2003, LINUX

Network Simulators: GNS3, Packet Tracer, Wireshark, Netflow Analyzer, Solar Winds

Documentation: MS Office, MS Visio, Netbrain

Ticketing Tool: REMEDYBMC, Service now and HP - Service Center/Service Manager, Heat

PROFESSIONAL EXPERIENCE

Confidential, Eden Prairie, MN

Network Engineer

Responsibilities:

  • Engage with new acquisitions to design network taps for their core data centers.
  • Create and manage VMWare virtual server environments to support various tools including Palo Alto, EIS, Rapid7, FireEye and Netbrain VMs that are deployed in new acquisition space.
  • Review existing Ixia network tap solution and recommend new solutions for network taps and network traffic discovery to support M&A integration agenda.
  • Review existing NetBrain network traffic analyzer and recommend new solutions for network discovery.
  • Review existing Palo Alto virtual firewall solution and recommend new solutions for perimeter security.
  • Review existing internet network hub and recommend new solutions to meet enterprise security requirements.
  • Co-ordinate with Project Managers of the work being done and stay on top of the deployment and cutover schedules.
  • Recommend efficient solutions to speed up the Ixia network tap solution deployment.
  • Co-ordinate and Collaborate with the Network Engineers on-site at Business Partner location on piecing together the information required for the deployment.
  • Troubleshooting as required during outages and device failures.
  • Documentation of all the changes made, information gathered and providing them during the hand-over to the Operations team.
  • Implement new Meraki Security Appliance at the end offices of the Acquired Entities to replace their existing firewalls and route their traffic through Regional Hubs.
  • Configuring the various tools part of the Pathfinder kit and get it ready to be deployed based on the Customer’s requirements.
  • Experience working with GitHub, Ansible. Got training on Jenkins and integrating DevOps into Infrastructure.

Confidential, Roanoke, VA

Network Security Engineer

Responsibilities:

  • Responsible for designing, implementing, and maintaining network infrastructure, included but not limited to switches, routers, firewalls, load balancers and wireless.
  • Working on the Vulnerability management project, classifying the networking devices and providing an action plan on how to mitigate the vulnerabilities on that equipment.
  • Used Tenable Security Center, to perform regular scans on end user hosts to generate reports on vulnerabilities.
  • Managed conflicts performing threat assessments of alerts by continuous monitoring through SIEM tools (Splunk, LogRhythm) and IDS logs on assigned systems, and determined the severity of each alert that was issued.
  • Recently moved from CVSS score to VPR - Vulnerability Priority Rating (Tenable owned) which helped a lot on prioritizing the vulnerabilities and what to be patched.
  • Experience running various types of scans, like Wannacry Ransomware, Internal PCI Network scan among others on Tenable.
  • Worked with Cisco Security Manager (CSM) to push access lists to firewalls. Upgraded firewalls and maintained CSM, scheduling regular backup jobs, security updates. For the rules on the Palo Alto NGFW, implemented zone-based rules on it directly.
  • Part of the upgrade and validation of Internet Gateway Firewall - Juniper to version 6.3.0r24. And then planned the migration from Juniper to Palo Alto 5280.
  • Renewed SSL certificates on Cisco Clean Access Server (CAS) and Clean Access Manager (CAM).
  • Developed an organized and systematic approach while providing cooperative assistance in configurations and restorations of networks and systems during the incidenceresponseprocess
  • Worked on Legacy NAC to ISE migration.
  • Whitelisted device MAC address for access in ISE. Created profiles, endpoint groups and DACLs.
  • As part of the Vulnerability mitigation, I have upgraded the Palo Alto firewalls from version 6.1.21 to 7.1.18 and then to 7.1.23.
  • Worked on McAfee Web Gateway Proxy to bypass SSL proxies to provide restricted access.
  • Worked with Remedy Ticketing system to sort/finish Incident tickets, Changes and Service Requests. And ClearQuest Rational to work on Firewall Requests.
  • Worked on the migration project from ClearQuest Rational to ServiceNow for processing firewall request.
  • Monitoring, reviewing, and working on Incident tickets, Service Requests and Problem tickets in Remedy BMC.
  • Designed and built the new Campus environment. Installing, racking, and configuring the routers, switches, and firewalls. Configuring ISE authentication configuration on the switch-ports to get the end-users authenticated and authorized.
  • Upgraded and renewed the SSL certificates on the ACS servers and ISE servers- PANs, PSNs.
  • Migrated all the firewall access rules, NAT, PAT policies from old 5585 firewalls to the Next Gen Firewall which helped in Data Loss Prevention and decommissioned the old ones.
  • Migrated from the Legacy NAC to ISE2.3, Upgraded the existing ISE 2.1 to 2.3 and merged them to the new environment. Added extra Policy Service Nodes in High Availability in the new Campus.
  • Worked on Cisco Security Manager Upgrade from .
  • Successfully upgraded RSA Authentication Manager from 8.1 to 8.2 sp1.
  • Attended weekly incidenceresponsemeetings with security team.

Confidential, Buffalo, NY

Network Engineer

Responsibilities:

  • Constant monitoring of live logs of Endpoints in ISE to eliminate Fault positives. Worked with the security team on the migration of Firesight IPS, staging new server for the Firewpower Management Center in Vmware and re-imaging the SFR modules in the firewalls 5515, 5525 and 5585 pairs to the latest Cisco recommended version
  • Configured 7ks and ASA firewalls for the Datacenter Interconnect (DCI) during the merger of Confidential and Centene.
  • Maintained documentation up to date on the FidelisCare Wiki page, added Knowledgebase articles and SOPs for future use.
  • Assisted the team in setting up an ACI lab with 3 APICs, Nexus 9396PQs serving as Spine and 9396PXs serving as leaf switches and a Netscaler load balancer. Worked with the Facilites team to secure the closet switches by configuring Biometric devices for all the rooms
  • Experience in operating and the configuration of CiscoMeraki, Cisco Catalyst, Palo Alto firewalls switches
  • Scheduled and Implemented OS upgrades of Cisco routers, switches and firewalls as needed.
  • Manage policy reports and maintain the compliance of all the devices using SolarWinds. Created scripts and job scheduling in SolarWinds to deploy the said configuration into the devices.
  • Experience using NetBrain to oversight, validate Network Changes and dynamically map traffic flows.
  • Used Tufin Orchestration Suite to document and log all the port openings for the servers in the Firewalls and Tufin Secure Track to cleanup firewalls, continuous compliance, and comprehensive view of firewall policy and optimization of security policies.
  • Worked extra hours as needed during the maintenance windows to upgrade software and apply patches to the network infrastructure.
  • Configured and performed software upgrades on CiscoWirelessLANControllers 5508 forWirelessNetwork Access Control integration with Cisco ISE.
  • Troubleshoot Site - Site IPSec tunnels, network connectivity, EIGRP issues, IP SLA issues among other duties.
  • Designed and configured the routing protocols, Local Area Network and Wireless Access points. Expert Hands-on Experience in Cisco ACS & Cisco ISE for 802.1x, AAA Configurations.
  • Successfully Upgraded ArubaClearpass Publisher and Subscriber devices from FIPS version 6.4 to FIPS version 6.7.9
  • Successfully Upgraded ArubaAirwave from AMP FIPS version 8.0.10 to FIPS Version 8.2.4.2
  • Configured Fabric Path to enable L2 routing in Datacenter which would help in providing Stability to F1 module line cards.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Responsible for simulating network operations with the usage of packet analyzer like Wire shark and use to resolve tickets whenever there is an issue.
  • Hands-on experience with Ether Channel, Spanning Tree, Trunking, ACLs, Syslog. Experience in the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.
  • Proficiency in configuration of VLAN setup on various Cisco Routers and Switches
  • Implementing security policies using Cryptography, ACL, SDM, PIX Firewall, IPsec, VPN, and AAA Security on different series of routers.
  • Implement and manage IP network devices including routers, switches, & working with firewalls, and VoIP teams.
  • Responsible for using and managing IP Control system, and work with DHCP configuration team.
  • Using different types of Network Monitoring tools like Solar Winds, Wireshark, Netbrain, Truview, and ISE.
  • Worked on Cisco Firewall ASA 5500(5510/5540) Series, Protocol Handling, Object Grouping and NAT.
  • Configuring IPSEC VPN (Site-Site to Remote Access), Negotiated VPN tunnels using IPSEC encryption standards and configured and implemented site-to-site VPN, Remote VPN.

Environment: LAN/WAN, DNS, DHCP, DDNS, TFTP, IP4, IP6, VPN, F5, Arista 7280, 7010, Cisco 4948, 3750X, 3850, 6506, 4948E, 4510 Switches, Cisco ASA 5500, Cisco 4500X, Cisco 3660, 3845, and 7609 series routers. 6400-LTM MPLS, EIGRP, OSPF, Ether Channel, Port Channel, Trunking, STP, Object Grouping, SNATs, PIX, VPN, Linux.

Confidential, Mt. Laurel, NJ

Network Engineer

Responsibilities:

  • Involved in the activity of DATA-Center migration of Cisco catalyst series 4900, 3750 switches with the new Arista 7280, 7010 with 10GE & 40GE interfaces.
  • As part of Data Center fabric remediation/refresh project, deployed Cisco Nexus switches and implemented features like FEX Links, VPC and VDC.
  • Designed and configured the routing protocols, Local Area Network and Wireless Access points. Expert Hands On Experience in Cisco ACS & Cisco ISE for 802.1x, AAA Configurations.
  • Configured Fabric Path to enable L2 routing in Datacenter which would help in providing Stability to F1 module line cards.
  • Configured VSS on Cisco Catalyst 6509 switches to have redundancy and provided post-deployment support for issues.
  • Worked on T1/E1/T3 technologies and different LAN & WAN technologies and supported various LAN environments consisting of Cisco 6500 switches with Sup-720.
  • Designed and implemented Cisco 7500, 7200, 6500, 3600, 2600 Series routers in lab environment to reproduce various issues and test fixes for them.
  • Planned and implemented network designs, including WAN, LAN, MPLS.
  • Applied ACLs for Internet access to the servers using Cisco 5550 ASA firewall and performed NAT: static NAT, dynamic NAT, and dynamic NAT overloading.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
  • Implemented firewall policies on Cisco ASA.
  • Responsible for simulating network operations with the usage of packet analyzer like Wire shark and use to resolve tickets whenever there is an issue.
  • Provided support in configuring and implementing Prefix-lists, Route-maps, and Ether-channels.
  • Hands-on experience with Ether Channel, Spanning Tree, Trunking, ACLs, Syslog. Experience in the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.
  • Proficiency in configuration of VLAN setup on various Cisco Routers and Switches
  • Troubleshooting of Cisco 2900, 3900, 6500, 7500, 7200 Series routers.
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.
  • Implementing security policies using Cryptography, ACL, SDM, PIX Firewall, IPsec, VPN, and AAA Security on different series of routers.
  • Experience in implementing and configuring F5 Big-IP load balancers 6400-LTM (V9) and working with Blue Coat proxies.
  • Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
  • Implement and manage IP network devices including routers, switches, & working with firewalls, and VoIP teams.
  • Responsible for using and managing IP Control system, and work with DHCP configuration team.
  • Using different types of Network Monitoring tools like Solar Winds, Wireshark.
  • Worked on Cisco Firewall ASA 5500(5510/5540) Series, Protocol Handling, Object Grouping and NAT.
  • Configuring IPSEC VPN (Site-Site to Remote Access), Negotiated VPN tunnels using IPSEC encryption standards and configured and implemented site-to-site VPN, Remote VPN.

Environment: LAN/WAN, DNS, DHCP, DDNS, TFTP, IP4, IP6, VPN, F5, Arista 7280, 7010, Cisco 4948, 3750X, 3850, 6506, 4948E, 4510 Switches, Cisco ASA 5500, Cisco 4500X, Cisco 3660, 3845, and 7609 series routers. 6400-LTM MPLS, EIGRP, OSPF, Ether Channel, Port Channel, Trunking, STP, Object Grouping, SNATs, PIX, VPN.

Confidential, Bentonville, AR

Network Engineer

Responsibilities:

  • Responsible for implementing and staging firewall policy, rules, firewall objects over Cisco ASA firewalls.
  • Responsible for creating and maintaining access rules for all ASA firewalls through ITSM.
  • Installation and administration of Cisco ASA 5500 series firewalls, Cisco 6500, 3560, 4500, 2950, 2924 series switches, Cisco Router 7200, 3945, 3640, 2600, 2500 and Palo Alto Next Generation firewall.
  • Install and monitor application traffic usingnetworkprotocol monitoring tools such as NTOP or Wireshark.
  • Supported the Designing team with the routing protocols and network design.
  • Create ACL on required firewalls or routers to grant access or decommission access through leadership approval upon LOB request.
  • Provide support to development team for the access to corporate network and outside world. Provide access to specific IP, Static NAT, Hide NAT, PAT, Port filter and port access.
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per the requirement of the company
  • Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Acted as a third level support for Exchange and Active Directory end-user issues.
  • Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Designing, Implementing and Troubleshooting Cisco Routers and Switches using different routing protocols like RIP, OSPF, EIGRP, BGP, ISIS & MPLS L3 VPN, and VRF.
  • Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter Vlan routing, LAN security etc.
  • Involved in the DATA CENTER Implementation techniques and methodologies.
  • Installed and monitored extreme networksS-series, 7100 stackable switches and E4G-400, 1800 router to support VMware machines.
  • Worked closely with the RACF team in the installation of the program in the Z-VM and logging and authorization purposes.
  • Using various types of LAN Concepts like Port Channel, Ether Channel.
  • Working on security levels with RADIUS, TACACS+.
  • Convert Checkpoint VPN rules over to the Cisco ASA solution, Migration with both Checkpoint and Cisco ASA VPN.
  • Checking and configuring Cisco 7600 and 7200 routers at data center for remote sites’ issues.
  • Upgraded and updated Cisco IOS from 12.3T to 12.4. Used to DHCP to automatically assign reusable IP addresses to DHCP clients.
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come online or that may have been altered during various planned network changes on the network.
  • Experience working with design and deployment of MPLS Layer 3 VPN cloud, involving VRF, Route Distinguisher (RD), Route Target (RT), Label Distribution Protocol (LDP) & MP-BGP
  • Configured Ether-channels between Core layer and Distribution layer switches using Link Aggregation Control protocol (LACP) and to increase the link speed and provide redundancy for high availability.

Environment: LAN/WAN, DNS, DHCP, DDNS, TFTP, IP4, IP6, VPN, F5, Cisco 3750X, 3850, 6509E, 6506E, 6504E Switches, Cisco ASA 5580, Cisco 4500X, Cisco 3845,7200 Routers. MPLS, EIGRP, OSPF, Ether Channel, Port Channel, Trunking, STP.

Confidential, Mooresville, NC

Network Engineer

Responsibilities:

  • Installed various branch Cisco devices including switches and routers.Compiled diagrams in Visio of the WAN and LAN infrastructure
  • Configured and performed software upgrades on CiscoWirelessLANControllers 5508 forWirelessNetwork Access Control integration with Cisco ISE.
  • Work with static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation.
  • Worked on commissioning and decommissioning of the MPLS circuits for various field offices
  • Designing, Implementing and troubleshooting with BGP, OSPF, EIGRP routing protocols.
  • Expert level WLAN design work, being a subject matter expert with 802.11 concepts.
  • Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.
  • Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.
  • Troubleshot complex routing and switching issues in a HSRP and GLBP environment.
  • Used DHCP to assign reusable IP addresses to DHCP clients via IPAM.
  • Worked on larger projects, I oversaw junior level personnel, managing new cabling andwirelessaccess point placement. Well versed in multiple CiscowirelessLANproducts includingWirelessControl System (WCS), Mobility Services Engine (MSE), 2700 Series Location Appliance, 5500 and 4400 SeriesWirelessLANControllers and lightweight access points, as well as legacy autonomouswirelessLANsolutions.
  • Used Solar winds network monitoring tool to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications.
  • Configured policy statements, and routing instances
  • Experience on Policy based IP routing
  • Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
  • Hands on Experience with Cisco Wireless Controllers 5500’s and 2500’s and coming to access points, worked on 3700’s, 3500’s and 1142 access points.
  • Involved in the redistribution into OSPF on the core ASA firewall.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
  • Involved in the modification and removal (wherever necessary) of BGP from the MPLS routers.
  • Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.
  • Tuned BGP internal and external peers with manipulation of attributes such as metric, origin and local Preference.
  • Worked on Security issues, VPN, IPsec, NAT, Configuration Standard and Extended Access Control Lists (ACLs) and Firewalls.
  • Implemented virtual Network Environment on VMware VSphere 4.1 and 5.5. Designed topologies to connect physical layer 2 and virtual layer 2 switches.
  • Upgraded the Cisco Secure ACS server from v5.2 to v5.3
  • Analyzed Network design to determine what were the major problems and improvements needed to be made to the network infrastructure.
  • Design, configuration and installation of Cisco routers and catalyst switches.
  • Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access
  • Experience in Cisco switches and routers: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay)
  • Worked on A10 and F5 load balancing

Environment: Cisco Catalyst 4500, 4900, 6500, Juniper ACX 1100, VMware VSphere, Solarwinds, A10 and F5 Load Balancer

Confidential

Network Engineer

Responsibilities:

  • Installation and Configuration of Composite Network models consists of Cisco7600, 7200, 3800 series routers and ASR 9k, GSR 12K routers and Cisco 2950, 3500, 5000, 6500 Series switches.
  • Configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
  • Experience configuring Virtual Device Context Virtual Port Channel in Nexus 7010.
  • Dealt with Cisco and Nortel VoIP devices.
  • Implemented user change requirements, including feature changes to Nortel PBX, Cisco Call Manager, Unity Voice Mail, and Nortel Call Pilot.
  • Responsible for day to day management of Cisco Devices, Traffic management and monitoring.
  • Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS
  • Installation, Configuration and troubleshooting Cisco switches and Firewall on multi-mode context based environments
  • Implemented various OSPF scenarios on networks consisting of 7600 routers.
  • Configured policy based routing for BGP for complex network systems.
  • Configured Multiprotocol Label Switching (MPLS) VPN on the customer’s Site.
  • Designed Core System architecture for Voice and Data networks
  • Deployment and Management of Cisco call Manager 4.x, 6.x, 7.x and hands on experience on call admission control
  • Router Microsoft VPN Server in order to access certain limited network resources from customer locations
  • Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
  • Worked as Telecommunications technician with broad experience in both business and consumer lines
  • Configuring, Installing and troubleshooting on Check Point Devices.
  • Good knowledge on Intrusion Detection and Intrusion Prevention System.
  • Involved in migration of Cisco Pix firewall to Cisco ASA.
  • Configured networks using routing protocols such as OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure.
  • Implemented Hot Standby Router Protocol (HSRP) by tuning parameters like preemption.
  • Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LANs of network.
  • Used Tcpdump to analyze packets on the TCP/IP and also provides brief display of packet.

Environment: Cisco 00 / 3800 routers, ASR 9k, GSR 12k. Cisco 00 / 00 switches, Nexus 7000 series, Cisco wireless controllers 00 Cisco Access points 00 / 1142 access points.

Hire Now