We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

5.00/5 (Submit Your Rating)

MichigaN

SUMMARY

  • Over 6 plus years of working experience in the area of Networking, Security, Administration, AWS cloud services and Network support.
  • Extensive Knowledge on Configuration, Troubleshooting and Migration of Cisco Routers and Switches.
  • Expertise in design, configuring, supporting, and administrating Load Balancers, Cisco Firewalls, Cisco Routers & Cisco Switches.
  • Strong hands - on experience in installing and troubleshooting Cisco Routers such as 7200, 3600, 2800, 2600, 2500; Cisco Multilayer Switches 6500, 5500, 4900, 3550, and 2900s and Nexus 7K, 5K and 2K switches.
  • Proficient in Cisco IOS installation, upgradation and Configuring, Troubleshooting routing protocols like OSPF, BGP (E-BGP, I-BGP), RIP, EIGRP.
  • In depth knowledge and experience working with other protocols like IP, TCP, UDP, SNMP, HTTP, SSH, DNS, NAT, DHCP.
  • Working Experience in Palo Alto Firewall models: PA-2020, 2050, 3050, 3060, 4000, 5020, 5050, and 7080.
  • Proficient in creating Anti-Virus, Anti-Spyware, Vulnerability, Data filtering, and Wildfire profiles in Palo Alto Firewalls.
  • Expertise creating application filtering and zone-based rules in Palo Alto Firewalls.
  • Working Knowledge in Microsoft product line Implementation and Support of Windows 2008 R2, 2008, 2003, 2000 and NT Servers, Citrix, VMware.
  • Extensive Knowledge in configuration and management of Citrix XenApp/Presentation Server/MetaFrameMetaframe Servers 3.x/4.x/5.x/6.5, XenApp & XenDesktop 7.x.
  • Experience in citrix profile management and farm management.
  • Experienced in designing, implementing, configuring with best practices on NexGen IDS/IPS Firewalls such as Cisco Firepower (Source fire), Palo Alto.
  • Established the ACI lab connectivity with Nexus 93128, 93180, Nexus 9336 as Spine, APIC Server UCS-C220M4, as leaf switches.
  • Experience in securing the published applications and content by enabling web access.
  • Experience in Designing and implementation of F5 BIG-IP load balancer.
  • Working Knowledge on F5 LTMs & GTMs to improve web application delivery speed and replication through and between distributed global data centers.
  • Hands on Experience in F5 LTM series like 1600, 6400 and Viprions.
  • Experience working on Panorama firewall management tool which manages multiplePalo Alto devices from single window and provides centralized monitoring.
  • Knowledge on Amazon AWS Virtual private cloud services.
  • Deployed Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway with other vendor security appliances devices.
  • Hands on Experience in Networking Area especially TCP/IP, Routing, Switching.
  • Involved in troubleshooting network traffic and its diagnosis using tools like Wireshark, Solar Winds.
  • Experience in Wireless LAN (IEEE 802.11) and deployment of light weight access point.
  • Migrated and implemented new solution with Cisco ASA firewall series 5505, 5510, and 5540.
  • Experience in Implementing Cisco Secure Access Control Server (ACS 3.0 & 4.0) for TACACS+, RADIUS and LDAP
  • Experience in Migration of Palo Alto firewalls from ASA.
  • Knowledge on CrowdStrike Falcon SAAS console and administration of hosts in the console.
  • Knowledge on CrowdStrike policy and host group creation and administration.
  • Expert in Configuring, implementing, and troubleshooting with HSRP, VRRP, GLBP, Ether channel technology.
  • Working knowledge on networking concepts like TCP/IP, Routing and Switching.
  • Expertise on upgradation of Cisco IOS & Firmware of different Cisco devices & modules.
  • Expertise in installing and configuring DNS and DHCP server.
  • Working Experience with Cisco ISE to identify threats in the network for rapid containment and remediation.
  • Expertise in network security protocols such as GRE tunnels, IPSEC tunnels, and VPN - MP-BGP, NAT/PAT, ACLs.
  • Hands on Experience of routing protocols Wireless security protocols (I.E., 802.1x, EAP, WPA2) and for voice: VoIP, IPSEC, Multicast, MPLS, DSCP/QoS, Cisco IOS
  • Cisco ISE was used to share data with integrated partner solutions to speed up the ability to detect and mitigate attacks.
  • Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

TECHNICAL SKILLS

Routers: Cisco 7600, 7200, 3900, 3800, 3600, 2900, 2800, 2600, 1900 series Juniper M7i, J230, M320

Switches: Cisco Catalyst 6500, 4900, 4500, 3750, 3550 series Nexus 2248, 5548 and 7010 Dell S4810, S60, S55

Firewalls & Load Balancers: Palo alto PA2020, PA3050, PA5050, Cisco ASA 5540 series, IPSEC and F-5 LTM, IPS/IDS, IOS Firewall features, DMZ set up, SSL VPN.

Routing: RIP, PBR, OSPF, EIGRP, Redistribution, Route Filtering, Static routing, Summarization.

Switching: VLANs, Dot1Q, RSTP, VLAN Maps, VTP, STP, HSRP, DCEF, Port Security, GLBP, CEF.

LAN/WAN Technologies: Ethernet, Frame relay, MPLS, HDLC, OC Standard, DSL, ISDN, PPP, T1, T3

Protocols: IP, TCP, UDP, ICMP, IPSEC, SSL, HTTP, SSH, NAT, DHCP, SNMP

AAA Architecture: Cisco ACS, TACACS+, RADIUS

Network Monitoring and Management Tools: Solar winds, Wire Shark, SNMP, Elastic Search, Log stash

Operating Systems: Windows Server 2008 R2/ 2003, Windows XP Professional, Red hat Linux, UnixSun Solaris 9/8

TECHNICAL SKILLS

Confidential, Michigan

Sr. Network Engineer

Responsibilities:

  • Experience in Configuration & troubleshooting of Firewall (Cisco, Juniper srx and Palo Alto) and Cisco switches, routers.
  • Experienced installing, configuring, upgrading and support Palo Alto (8.1, 8.2) and Cisco ASA firewalls devices including but not limited to PA3000, PA5000 and Prisma and series FW’s.
  • Working Experience in creating Anti-Virus, Anti-Spyware, Vulnerability, Data filtering, and Wildfire profiles in Palo Alto Firewalls. and creating application filtering and zone-based rules in Palo Alto Firewalls.
  • Involved in the planning and implementation of Cisco ACI devices like 93120, 93180(LEAF), 9336(SPINE) Switches.
  • Experience in Configuration and Installation of Cisco firewalls ASA (5510, 5520 and 5540).
  • Set up the fabric and all the leaf switches got connected to the APIC-L2 C220 M4 Server and are discoverable. Currently the topology is in 2-tier architecture i.e., Spine (NX-9336PQ) and Leaf (NX 93180YC-EX, 93120TX).
  • Configuration and Installation of Cisco Firewall Firepower 4k.
  • Migrated Cisco ASA to Firepower Threat Defense with the Firepower Migration Tool.
  • Experience in Firepower Management Center whichprovides centralized monitoring and management multiple firewalls from single window and on Panorama firewall management tool.
  • For communication from the switch interfaces to the end servers, created End Point Groups and mapped them to the corresponding Domain.
  • Implemented Domain features like STP, CDP, LACP, and LLDP on APIC-L2 Server. Whitelisted the traffic for communication between the EPG's.
  • Created contracts, filters for communication to East-West traffic.
  • Expertise in creating L2 outs, L3 outs for communication between the pods.
  • Expertise in Enhancing the Firmware on APIC server.
  • Created groups to upgrade the Firmware for spine & leaf’s and upgrading each group at a time result in minimizing the down time.
  • Developed a Citrix XenApp 7.6 and XenDesktop environment which supports 1000+ users.
  • Working Knowledge in configuration and management of Citrix XenApp/Presentation Server/MetaFrameMetaframe Servers 3.x/4.x/5.x/6.5, XenApp & XenDesktop 7.x.
  • Working Knowledge in farm management and in citrix profile management.
  • Handling new application load balancing requirements through F5 BIG-IP devices.
  • Worked on corporate applications and their availability in F5 LTM series like 5250v, Viprion 2400
  • Knowledge with administration of hosts in the console like the CrowdStrike Falcon SAAS.
  • Deployed manually CrowdStrike agent for the usage of tags to filter and assign host groups/policy.
  • Deployed the numerous firewalls rules on the Palo Alto with both Hide Nat and Static NAT.
  • Whitelisting and blacklisting the website domains on the McAfee Web Gateway Proxy servers as per organization requirements and standards.
  • Extensive Working on Cisco ISE network Design to install and configure couple of Policy Service Nodes (PSNs) to existing Network and migrate ISE 1.2 v to ISE 2.6.
  • Implemented Infrastructure Network Security by monitoring network authentication logs of all the users using Cisco ISE (Identity Security Engine) which uses MAB (MAC address Authentication Bypass) policy.
  • Handling Whitelisting the Wired and Wireless MAC addresses of various Devices on Cisco NAC (Network Access Control) and Cisco ISE.
  • Deployment and maintenance of McAfee Web Gateway proxy servers to protect against contemporary threats delivered via HTTP and HTTPS channels and also design and implement new proxy policy rules as per the project requirements.
  • Accountable for the support ofCSM (Cisco Security Manager) is an enterprise solution which manage a wide range of Cisco security devices.
  • Worked on catalyst 6500 series service modules security context and firewall service modules.
  • Working Knowledge in Monitoring and Administering all the network devices such as Cisco 2960, 3850 Switches, Routers, Cisco 5500 ASAs, Firepower threat defense (FTDs), Palo Alto’s using Solar Winds monitoring tool.
  • Responsible for monitor networking and systems management products using solar winds Orion platform to Work with IDS/IPS to identify threats in the network for rapid containment and remediation.
  • Day-to-day troubleshooting of various firewall-related issues utilizing ASDM and Splunk as a syslog server by monitoring and recording real-time logs on firewalls.
  • Assisted in Switching Technology Administration including creating and managing VLAN's, Port security, Trucking, GLBP, STP, LAN Security, and Inter-Vlan Routing.
  • Experienced DNS administration like adding/modifying/deleting IP and DNS assignments using log messages.

Environment: Cisco routers, switches, ASA Firewalls, Palo alto Firewalls, OSPF, EIGRP, BGP routing protocols, VLANs, F5 load balancers, Citrix netscaler, checkpoint, wireless access points, IP, TCP, UDP, ICMP, NAT, DHCP, SNMP, IPSEC, SSL, HTTP, SSH protocols.

Confidential, Addison-Dallas

Network Engineer

Responsibilities:

  • Experience in Configuration & troubleshooting Cisco and Dell Routers and Switches.
  • Experienced Installing and configuring firewalls with LAN/WAN configuration and F5 Load balancers.
  • Worked on Cisco,Nexus5672 SeriesSwitch fabric links for Configuring, deploying & upgrading.
  • Experience in Configuration & troubleshooting of Cisco and Dell switches, routers, and Firewall.
  • Configured, managed, troubleshooted Palo Alto firewalls and IPSec VPN's.
  • Configured various zones in Palo Alto firewalls like PA2020, PA5020, and PA5050.
  • Experience on Panorama firewall management tool whichmanages multiple Palo Alto Devices from single window and provides centralized monitoring.
  • Configuration and Installation of Cisco firewalls ASA 5510, ASA 5520, and ASA 5540.
  • Migrating Cisco ASA Firewalls to Palo Alto firewall.
  • Implemented Duo Security two-factor authentication as a service to access data centers via VPN.
  • Duo Security two-factor authentication was implemented as a service through VPN to access data centers.
  • Hands on Experience of F5 LTMs & GTMs to improve web application delivery speed and replication through and between distributed global data centers.
  • Hands on Experience with corporate applications and their availability of F5 LTM series like 1600, 6400 and VIPRIONS.
  • Worked on F5 GTM for external DNS resolutions configured all listeners and created all zone files, A record and CNames.
  • Used F5 Enterprise Manager 3.1 version to manage multiple F5 LTM devices from single-pane view.
  • Worked on F5 VIPRIONS 2400 model with dual blades also had licensed this chassis with vCMP which can run multiple instances and versions of BIG-IP.
  • Using solar winds Orion platform to monitor networking and systems management products.
  • Experience with IDS/IPS to identify threats in the network for rapid containment and remediation.
  • Shared the data with integrated partner solutions to accelerate the capabilities to identify and remediate threats using Cisco ISE.
  • Proficient in analyzing, configuring and troubleshoot networks.
  • Implemented VPN tunnels using IPSec encryption standards and configured and established site-to-site VPN, Remote VPN.
  • Worked on Amazon AWS and Microsoft Azure could network services.
  • Deployed a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway with other vendor security appliances devices.
  • Set up and fixed various OSPF issues in an OSPF multi area environment.
  • Implemented HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches. improved efficiency of the WANnetworkconsisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Working Knowledge on Fortigate Firewall Appliances.
  • Experience in changing internal infrastructure by adding servers to existing DMZ environments to support new and existing application platforms and added switches to support server farms.
  • Deployed the numerous firewalls rules on the Palo Alto with both Hide Nat and Static NAT.
  • Experience in DNS administration like adding/modifying/deleting IP and DNS assignments using log messages.
  • Identification, design, and implementation of flexible, responsible, and secure technology services in the network.
  • Experience in Troubleshooting network problems and upgrading IOS.

Environment: Cisco routers, switches, ASA Firewalls, Palo alto Firewalls, OSPF, EIGRP, BGP routing protocols, IP, TCP, UDP, ICMP, NAT, DHCP, SNMP, IPSEC, SSL, HTTP, SSH protocols, VLANs, F5 load balancers, checkpoint, wireless access points.

Confidential

Network Engineer

Responsibilities:

  • Support to plan and execute LAN (VLAN Management) and WAN management activity.
  • Creating VLANs and Inter-VLAN routing with Multi-Layer Switching (MLS).
  • Configuration and administration of Cisco Router 2800 and 2960, 3560 series catalyst switches.
  • Configuration and troubleshooting Cisco routing protocols including RIP, BGP, OSPF, EIGRP
  • Extensively used TCP/IP tools like TELNET for remote login to the routers and SSH for secure login.
  • Deployed WAN technologies like HDLC and PPP in the branch office network connectivity.
  • Provided customer support including daily backup procedures, testing network connections, equipment installation, and turn-up, and remote hands assistance.
  • Co-ordinating with vendors in ordering new products and provide high-level support.
  • Monitor performance of network and servers to identify potential problems and bottlenecks.
  • Planned and implemented IP address schemes and subnet masks.
  • Configured Ether-channels between cisco switches to increase bandwidth.
  • Installed and maintained network hardware and software.
  • Designed network connectivity and network security, between various offices and data centers.

Environment: ASA Firewalls, OSPF, EIGRP routing protocols, Cisco routers, switches, VLANS, Cisco work, WAP.

We'd love your feedback!