Security/network Engineer Resume
Seattle, WA
SUMMARY
- CCNP and CCNA certified with 8+ years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and testing of networking system on both Cisco and Juniper Networks.
- Experience with the escalation problems &point - of-contact for Routing, Switching and WAN connectivity issues using ticketing system Remedy.
- Technical responsibilities included but were not limited to system performance and troubleshooting virtual and physical environments of various LAN/WAN technologies, server and enterprise applications and desktop technologies.
- Experience in Cisco Routing, Switching and Security with strong Cisco hardware/software experiences with Cisco Routers such as 800, 1800,1900, 2900, 3900, 7200 Cisco ASR-1k/9k, Cisco Multilayer Switches 4500, 6500, Cisco Nexus 2k/3k/5k/7k/9k and Juniper M320, MX80, MX480, MX960, PTX1000 Routers and EX4200, EX8200 switches
- Experience of routing protocols like EIGRP, OSPF, RIP, and BGP and setup of Access-Lists, and RIP, EIGRP, and tunnel installations.
- Proficiency in configuration of VLAN setup on variousCiscoRouters and Switches.
- Experienced in troubleshooting both connectivity issues and hardware problems on Cisco based networks.
- Well experienced in configuring gateway redundancy protocols like HSRP, GLBP, and VRRP.
- Experience with the implementation of multicast/MPLS/l2vpn.
- Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
- Experience in physical cabling, IP addressing and Subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
- Access control server configuration for RADIUS & TACAS+.
- Expertise with 802.11x wireless technology.
- Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.
- Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (2232, 2248)
- Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
- Good Knowledge on Juniper SRX configurations on various platforms of Junos.
- Installed and configured firewalls, IPS, IPSec VPNs and various screens for intrusion prevention on Juniper SRX equipment.
- Install, turn-up and configured Juniper hardware for Matrix & CPA test labs; routers, switches and test equipment.
- Wrote MoPs to configure Juniper and Tellabsinterfaces10Ge Trunks, OSPF, CoS, QoS, VPLS, EVPL, RSVP.
- Juniper hardware support of MX960e, MX480e, M10, M120, M320, T1600, T640, and Tellabs 8860.
- Managed Datacenter ofF5 load balancers, Cisco 4500, Juniper M120 and Extreme switches
- Support for Juniper M120 & J series, Cisco 3745, 6500, Extreme Summit, GPRS CGSN, and Memotec switch.
- Devised and Implemented procedures for configuration and management of up to 400 Juniper Ex3300 access switches, including planning and development of a standard configuration template.
- Upgrade network equipment, software and hardware components and system configuration.
- Expertise on Cisco IOS, Cisco IOS-XR, Cisco Cat OS, Cisco NX-OS, JUNOS.
- Expertise with monitoring tools like Solar Winds & network packet capture tools like Wire-shark
- Worked with Linux and Unix OS Platforms
- Adept knowledge in preparing technical documentation and presentations using Microsoft Visio/ Office.
- Provided L3 support for checkpoint and Palo Alto firewalls.
- Deployment of the Cisco ISE 2.2 in the current multi-vendor enterprise network to improve the port-security, for centralized monitoring and to manage the whole enterprise network.
- Automated network implementations and tasks and designed monitoring tools using python scripting
- Has experience in Bash and Python scripting with focus on DevOps tools, CI/CD and AWS Cloud Architecture and hands-on Engineering
- Worked with scripting Automation for JavaScript, Linux/Unix toolbox, Python, Perl, Bash, ESX, VMware Virtual Switch with Design/Implementation
- Worked on multiple projects related to Branch networks, Campus networks, external clients and Data Center Environments involving data center migrations.
TECHNICAL SKILLS
Cloud Based Data Center: AWS, Azure, Google, Aviatrix Multi-Cloud Network Architecture (Overlay)
Fiber Optic Carrier Integration: SONET, DWDM, ATM, F/R, ISDN, PSTN, T1/E1 T3/E3, Metro Ethernet, MPLS
Campus LAN &Data Center: STP, vPC, vPC+, VSS, Fabric Path, VxLAN in Cisco ACI and VMware NSX-v, GENEVE VMare NSX-T
Routing Protocol: TCP/IP, EIGRP, OSPF, BGP, MPLS, IPSec VPN, Multi Cast, DMVPN
VPN: GRE, mGRE, SSL, IPSec, DMVPN, Aruba Global Protect, Cisco Any Connect
SD-WAN: Viptela, Meraki, Fortinet, SilverPeak, VeloCloud
Security: NGFW Palo Alto, Panaroma, FirePower, ASA, CheckPoint, Fortinet, Barracuda, Juniper
Wireless: Cisco WLC Flex Connect, Meraki, HPE/Aruba Master Mobility & Controllers
Network Access Control (NAC): Cisco ISE, Aruba Clear Pass, Radius, 802.1X
WAN Optimization: F5 LTM/GTM; Citrix NetScaler, XenServer, Xend Desktop& Xen App; Riverbed Steelhead
SAN: FC/FCoE to support SAN solution from Dell EMC, HPE Nimble/3PAR, IBM, NetApp
Voice over IP: Cisco Unified Communication Manager, Call Center, Avaya, SIP, MGCP
Network Management: SNMP, Solarwinds, PaesslerPRTG ; Net Flow (Layer 3, 4, 5), nGenius Probes, Cisco Works, HP Open View, Tivoli TME, FireScope, Netreo OmniCenter, Niksun NetVCR, NetQoS AWS Cloud Based Virtual Data Center
Networking: with Virtual Networks VPC, VPNs, AWS Cloud Hub, DirectConnect, VPC Peering, Transit VPCs
Load Balancing: AWS Elastic Load Balancer (and other vendors Barracuda, F5, EdgeNexus, etc.), DNS Route53
Security: IAM services (Identity Access Management); Encrypting data via KMS keys; ACM (AWS Certificate Manager); Application Firewall WAF (and other vendors Barracuda, Palo Altos, etc.); Security Compliance with AWS Inspector (internal scanning)
Computing and Data Storage: Virtual Machines EC2 with storage EBS, Database Cache ElaticCach, DB RDS/ DynamoDB; Serverless Lambda, Docker
External Storage: S3; Video format converter service Content Delivery Service by AWS Cloud Front which caches data in different Edge Locations (S3 data gets cached in nearest Edge Locations where users’ coming traffic);
Storage: Blob, Table, Queue, File, Data Lake Store, Backup, Site Recovery, SorSimple
Network: Vnet, Load Balancer, Application Gateway, Traffic Manager, Express Route, VPN, DNS
Database: SQL DB/DW/SD, Cosmos, Redis Cache, Data Factory
Compute: VM, Cloud service, Service fabric, Batch, VM scale sets, Container services
Monitoring: Log Analytics, Monitor, Alert
Security: Azure B2C, Azure MFA, Azure AD, Key Vault, Security Center
Platform as a Service: Cloud Service, App Service, Service Fabric
Network Monitoring: Fault and Performance Zabbix, Nagios, Solarwinds, CA Suite Spectrum, CAPM (CA Performance Manager), Netflow to ELK. Packet Analysis Netscout and Wireshark. Logging ELK and Splunk
PROFESSIONAL EXPERIENCE
Confidential, Seattle, WA
Security/Network Engineer
Responsibilities:
- Involved in Integration, configuration and maintenance of Cisco Router, Catalyst Switches and Firewalls of Confidential Datacenters ( Confidential .com, Confidential .co.uk. Confidential .in).
- Configured RIP, OSPF and Static routing on Juniper M and MX series Routers.
- Responsible for all routing, switching, VPN, network security, and server load balancing.
- Used PBR with Route Maps for route manipulation/filtering. Troubleshooting routing issues like suboptimal routing and asymmetric routing
- Implemented various EX, SRX & J series Juniper devices
- Created lot of site to site IPSEC VPN tunnel with Checkpoint, Juniper Netscreen firewalls and Cisco PIX/ASA firewalls. Completed a project to update the patch HFA50 across all the firewall to overcome the bugs in the existing version of R65.
- Setup and configure various F5 models: BIG-IP i4000 series, BIG-IP i2000 series, BIG-IP i5000 series, BIG-IP i7000 series / 1RU, VIPRION 2400 Chassis and VIPRION 4800 Chassis in production and non-production environments.
- Established AWS technical credibility with customers and external parties
- Helped customers build scalable, resilient, and high-performance applications and services on AWS.
- Developed/capture/document architectural best practices for building systems on AWS
- Worked on F5 Enterprise Manager 3.1 version to manage multiple F5 LTM devices from single-pane view.
- Hands on Experience configuring and testing F5 I Rules using Browser (IE), HTTP watch.
- Worked on F5 LTM series like 1600, 6400 and Viprions for the corporate applications and their availability.
- Installing and configuring F5 Load balancers and firewalls with LAN/WANconfiguration.
- Worked on F5 LTMs & GTMs to improve web application delivery speed and replication through and between distributed global data centers.
- Responsible for 6500, 3500, Nexus switching, ASA, FWSM Firewalls, CSS and F5 load balancers, Riverbed WAN accelerators, IronPort Proxy, and Linux/Bind DNS servers.
- Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
- Configured PPP, HDLC, BGPv4, EIGRP, MPLS and OSPF routing.
- Configured internal and external networks providing Self IP, default gateway, VLAN Tag ID and using correct interfaces.
- Experienced to setup APM and ASM policies based on client requirements.
- Configured CIDR, IP, RIP, PPP, BGP and OSPF routing
- ConfiguredJuniperMX480s, EX8200s, EX4500s, EX4200s, from scratch to match design.
- Worked with the Trouble Tickets on F5 Load balancers on LTM module
- Switch experience includes Cisco Catalyst switches: CISCO 3750, 4500, 6500 series switches.
- Configuration and maintenance of OSPF protocol which was the enterprise IGP. Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Creating Stub Areas & configuring Summarization for effective Routing.
- Provided technical support for full setup, debugged the problems of OSPF, switching and HSRP.
- Implemented and used SDM to configure Cisco IOS security features and network connection.
- Network Segmentation-application migrations for enterprise Private Data Firewall and data behind ASA 5585-Xs
- Create and testCisco router and switching operations using OSPF routing protocol, ASA Firewalls for stable VPNs.
- Configured Object Grouping, Protocol Handling and Code up gradation on ASA Firewalls.
- Implementation and maintained intrusion detection/ prevention (IDS/IPS) system to protect enterprise network and sensitive corporate data. For Fine-tuning of TCP and UDP enabled IDS/IPS signatures in Firewall.
- Design, implement and provide second level support for hostload-balancingsolutions at SWA.
- Configuration the access-list rules, network object-service group based on well-known port the port i.e. FTP/SFTP, SSH, HTTPS/HTTPS (SSL) and etc
- Switching related tasks included implementing VLANs, VTP and configuring and maintaining multi VLAN environment and inter-VLAN routing on Fast-Ethernet channel.
- Worked with different vendors and implement Site-to-Site VPNs over the Internet.
- Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
- Security policy review and configuration in Palo Alto and JuniperSRX Firewall in US offices and Datacenter.
- Worked with Juniper T-Series, M-Series, MX-Series, J-Series Routers.
- Working knowledge of the UNIX and CLI based command to implement the networking tools.
- Configured and monitored Firewall logging, DMZ’s and related security policies.
- Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all-around technical support.
- Configuration of ACLs in Cisco 5540 series ASA firewall for Internet Access requests for servers in LAN and DMZ and also for special user requests as authorized by management.
- Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-VLAN routing, LAN security.
- Implementing, configuring and troubleshooting routing protocols such as OSPF (v3, v2), RIPv2, BGPv4, EIGRP, HSRP, GLBP and MPLS.
Environment: Cisco Routers, Cisco Switches, Nexus, Routing protocols, AWS, Palo Alto, F5, Load Balancer HSRP, VRRP, IPSEC VPN, VPN, QOS, ASA firewall, Load balancer, MPLS, VLANS, VTP, RSTP, ACL, NAT, IDS/IPS, SIP, RTP, RADIUS, TACACS+, Juniper SRX, Juniper M, MX, ASR 9000, Catalyst 6500, CRS, Cisco ASR, UNIX, Firewall FWSM.
Confidential, Alpharetta, GA
Sr. Network Engineer
Responsibilities:
- Responsible for day to day management of Cisco Devices, Traffic management and monitoring.
- Implemented L2 technologies including VLAN's, VTP, STP, RSTP and Trunking.
- Implemented routing protocols EIGRP, OSPF, and BGP.
- Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
- Experience with converting 6500 to Cisco Nexus in the data Center environment.
- Resolved escalated hardware and software issues related to LAN/WAN.
- Experience with configuring Virtual Server and Configuring Load balancing methods in F5 12.0 LTM.
- Configured NAT and SNAT in F5 12.0 LTM.
- Performed Migration from Cisco ACE Load Balancers to F5 LTM.
- Configuring RIP, OSPF and Static routing on JuniperM and MX series Routers.
- Experience configuring Virtual Device Context in Nexus 7010.
- Configured Easy VPN server and SSL VPN to facilitate various employees’ access internal servers and resources with access restrictions.
- Implemented antivirus and web filtering on Juniper SRX 240 at the web server.
- Experience working with Cisco IOS-XR on the ASR 9000 devices for MPLS deployments.
- Experience with design and configuring Overlay Transport Virtualization (OTV) on Cisco NX-OS devices like Nexus 7000.
- Experience with using F5 Load balancer in providing worldwide data and file sharing, continuous internet connectivity, optimized web performance.
- Installed, configured and troubleshot Cisco wireless network, Wireless LAN controllers.
- Configured Cisco QOS features like Classification, Congestion Management, Policing and Shaping.
- Configured Modular QOS which includes Class Map, Policy Map and Service- Policy.
- Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark tool.
- Used multiple network monitoring tools like Solar Winds,CiscoPrimefor supporting the existing core network environment and Network edge devices.
- Installed, configured and set security policies on Cisco ASA and Checkpoint firewalls.
- Supported customer with the configuration and maintenance ASA 5550 firewall systems. Configured object groups on ASA 5550 firewalls.
- Experience working with Nexus 7010, 5020, 2148, 2248 devices.
- Deploying and decommission of VLANs on core ASR 9K, Nexus 9k, 7K, 5K and its downstream devices.
- Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.
- Designed 10 gigabit networks using Cisco Nexus 7000 series switches, Checkpoint R77.10 firewall and Cisco 3800 series routers.
- Successfully installedPaloAltoNext-Generation PA-500, PA-3060, and PA-5060firewallsto protect Data Center with the use of IPS feature.
- Configured and maintained IPSEC and SSL VPN's onPaloAltoFirewalls.
- Implemented Zone Based Firewalling and Security Rules on thePaloAltoFirewall.
Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960/6500 SwitchesandCisco 3640/1200/7200/3845/3600/2800 routers, Cisco 1200 Aironet Access Points, Cisco Nexus 7K/5K/2K, Cisco ASA 500, Checkpoint, SD-WAN, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP.
Confidential
LAN/WAN Network Engineer II
Responsibilities:
- Supported operational business systems by providing 1st and 2nd line IT support, utilizing a high standard of technical and customer service skills, knowledge and ability
- Installed, configured, tested, maintained and troubleshooting of a wide range of Cisco products; Firewall, various switch and router product lines
- Installed, configured and troubleshooting of Cisco Routers (3945, 3800, 2800, and 3600) and Switches (6509E, 4507, 4500-X, 4900M, 3850, 3650, 2960) to perform functions at the Access, Distribution, and Core layer.
- Worked on routing protocols like EIGRP, OSPF, RIP, BGP also static route, MPLS, VPN, IPSEC
- Maintained multi-vendor devices (Cisco, Juniper, Checkpoint, Arista etc) of the AWS
- Worked in Solarwind to log and even the suspicious activity and security threats, conducting an investigation and respond to mitigate issues in real-time, which include blocking IP addresses, disable accounts, changing privileges and permissions and killing applications.
- Worked as Network Consultant for Nexus Next-Generation project. Built out several MPLS/BGP VRF for multiple clients. Included implementation of 9K, 7K, 5K, 3Kand 2K configuration for integration witch UCS and legacy systems. Developed process for Network Engineering Peer review for all network related systems.
- Worked in WAN technologies including T1, T3, ISDN, HDLC, Point to Point, ATM and Frame Relay
- Advanced knowledge of OSI model, TCP/IP, Internet technologies, systemsecurity,firewall infrastructure, network architecture andCisconetworkrouting/switching(Layer 2 and 3) experience, including LAN and WAN, design and implementation which includes Layer 1 to Layer 7 experience.
- Worked in Security issues related to Cisco ASA/PIX, Checkpoint, IDS/IPS and Juniper Netscreen firewalls.
- Worked on MPLS for redirecting data from one network to another network node based on the shortest paths.
- Managed Active Directory Domain Controllers, DNS and DHCP Servers
- Migrating Users, Groups, Workstations and Application windows servers from source domain to Target domain using QMM and AD Domain
- Designed, implanted and installation on AWS cloud engineering for AWS internal business units.
- Created AD Group policies to Enforce Domain and OU Level Security of Users and Computer objects
- Expertise in Migrating Group and Exception Policies from one domain to another domain in AD forest
- Installed, maintained and managed various rack mounted and Blade servers from CISCO UCS, Dell, HP, and IBM
- Created and tested Cisco router and switching operations using OSPF routing protocol, Cisco ASA Firewalls, and MPLS switching for stable VPNs.
- Supported core network consisting of Cisco7200 series routers running multi area OSPF.
- Worked on network-based IT systems such as racking, stacking, and cabling
- Managed service providers/vendors relationships from a project and technology perspective.
- Worked with the basic communication protocols like TCP/IP.
- Proactively monitored including a weekly review of log files, reports, weekly Knowledge Base updates, etc. to determine the health and performance of Secures appliances.
- Established development lab for testing of network equipment. Models included EX4200, EX3200, J2350, J6350, Cisco 6500, and Cisco 3560.
- Planed and performed quarterly microcode, firmware and driver updates on all SAN switches, arrays and hosts
- Implemented security Solutions using Palo Alto (PA-5020/PA-3020), Cisco 5580/5540.
Environment: AWS, LAN, WAN, VLAN, HSRP, Arista, Aruba, ISL TRUNK, OSPF, BGP, DHCP, IPV6, ISDN, ATM, IPX/SPLX, HDLC, EIGRP, VRRP, CISCO ACI, Arista, VXLAN, MPLS, Juniper, PALO ALTO Firewalls, Cisco ASA, Checkpoint, CISCO ASR1000, CISCO ASA, DMZ, VMware, SD-WAN.