We provide IT Staff Augmentation Services!

Network Engineer Resume

4.00/5 (Submit Your Rating)

Melbourne, FL

SUMMARY

  • Cisco Certified Network Engineer with 8years of experience with routing, switching and Data center environment.
  • CCNA network engineer with extensive experience in various technologies such as switching (STP, Ether Channel, VDC, VPC, FHRP, LLDP, CDP, SPAN, LACP), routing (EIGRP, BGP, OSPF, VRF, PBR, IS - IS, redistribution, route-maps, etc.), deployment, IOS upgrading, etc. on both Catalyst and Nexus platforms.
  • Professionally trained in CCNP-level routing and switching curriculum.
  • Excellent Hands on experience with Cisco ISE and the Migration of Wireless and TACACs to ISE.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Expertise in installing, configuring, and troubleshooting of Cisco Routers (3800, 3600, 2800, 2600, 1800, 1700, 800).
  • Successfully designed and delivered secure cloud solutions for some of the Major organizations on AWS Cloud.
  • In-depth knowledge on various AWSServices including EC2, VPC (NAT, Peering, VPN), IAM, EC2 Container service, Elastic Beanstalk, Lambda, S3, Cloud Front, Glacier, RDS, DynamoDB, ElastiiCache, Redshift, Direct Connect, Route 53, cloud watch, Cloud Formation, Cloud Trial, Opsworks, Amazon Elastic Map Reduce (EMR),AWS IoT, SNS, SQS, Lambda, API Gateway, AWSAlexaetc.
  • Experience working on administering various AWSServices using AWSConsole,AWS CLI.
  • Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550).
  • Configuring and testing Verizon ARC BA850 Cradle Point as the turnkey networking solution for 4G/LTE failover.
  • Worked on Load BalancerF5 LTM, GTM series like 6400, 6800, and 8800.
  • Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
  • Firewall technologies including general configuration, risk analysis, security policy, rules creation and modification of Checkpoint R65, R70, R77, Palo Alto and Cisco ASA.
  • Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.
  • Experience on dealing with VoIP information deployment including troubleshooting protocols like Session Initiation Protocol (SIP), Real-Time Transport Protocol (RTP), Media Gateway Routing Protocol (MGRP) and Session Description Protocol (SDP).
  • Advanced knowledge in Cisco ASA 5500 series and PIX installation, configuration and maintenance, configuration and installation of IOS security features and IPS, security risk analysis, attack mitigation & penetration tests based on LPT methodology.
  • Experienced in handling and installing Palo Alto Firewalls
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.
  • Experience working with Nexus 7K, 5K and 2K and experience usingQualcommtoolslikeQXDM, QPST, QMICM,QCAT
  • Worked on Juniper Net Screen Firewalls like, NS50, SSG 550M, SSG520M, ISG 1000, and ISG 200.
  • Implementation of Juniper Firewall, SSG Series, Net Screen Series ISG 1000, SRX Series.
  • In-depth knowledge and experience in WAN technologies including OC3, E3/T3, E1/T1, Point to Point, MPLS and Frame Relay
  • Experience in Configuring and implementing VLAN, VTP domains, LAN switching and STP/RSTP
  • Experience in QOS on multicast VPN
  • Experience on Wide area application services.
  • Knowledge of Juniper environment including SRX/Junos Space.
  • Maintaining and updating inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, NTP. Implementation of HA-JSRP in JUNOS devices, SRX Series Router/Firewall in both A/A and A/P mod.
  • Experience in Cisco: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay & MPLS), Routing protocol configurations (CIDRIP, RIP, EIGRP, OSPF, and BGP)
  • Proficiency in configuration of VLAN setup on various CISCO Routers and Switches.
  • Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.
  • Strong hands on experience in installing, troubleshooting, configuring of Cisco ASR, 7200, 3900, 3800, and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches.
  • Extensive hand on experience with complex routed LAN networks, CISCO Routers and Switches.
  • Worked on blue coat proxy server as part of recent integration into the project
  • Good experience with Security Incident and Event Management (SIEM), Intrusion Detection and Prevention Systems (IDS/IPS) and log management and database activity monitoring.
  • Hands on experience on Cisco PIXASA Firewalls, Juniper SRX series, Palo Alto, VPN, Troubleshooting Skills, Log Analysis and Review, Compliance Audit.

TECHNICAL SKILLS

Protocols: RIP, RIP V2, EIGRP, OSPF, IS-IS, IGRP, HSRP, VRRP, GLBP, LACP, PAGP, DNS, SMTP, SNMP, FTP, TFTP, LPD/TDP, WLAN, … WEP, POP3 LADP.

LAN Technologies Workgroup: Domain, HSRP, DHCP, Static, VLAN, STP, VTP, Ether Channel, Trunks.

WAN Technologies Leased Line: Frame Relay, ISDN, PPP, HDLC, ATM, SONET, And Metro Ethernet.

CISCO Routers: 1700, 1800, 2500, 2600, 2800. CISCO High End Router 3600, 3800, 7200, 12010.

CISCO Switches: 1900, 2950, 2960. CISCO Campus switches 3550XL, 3548, 4984 Core Catalyst 4503, 4507 RE, Catalyst … F5 load balancer, Juniper ISG/SRX.

Security & VPN: PIX 500 Firewall, ASA 5505 Firewall, AIP SSM, CSC SSM, FWSM, Fort iGATE, CISCO CSM, ACL- Access Control List, IPS/IDS, NAT, PAT, CISCO ACS, Check point, SonicWALL, RSA Secure ID, pfSense (Linux based firewall), Symantec DLP.

Layer 2 technology: VLAN, VTP, VMPS, ISL, dot1q, DTP, Spanning-tree, PVST

Layer 3 Switching: CEF, MLS, Ether Channel

CISCO ISE: Cisco Integrated Services Engine (ISE) 2.3

AAA Architecture: TACACS+, RADIUS, Cisco ACS.

Monitoring Tools: Wireshark, Nmap, Nessus, OpManager, PRTG Packet Sniffer, Juniper NSM, Junos Space, Riverbed, Netscout. GTMVOIT

Servers: Domain servers, DNS servers, WINS servers, Mail servers, Proxy Servers, Print Servers, Application servers, FTP servers, NTP.

Operating Systems: Windows NT 4.0 (Desktop/Server), Windows … server, Windows XP/7, LINUX, Solaris, Red Hat, Active Directory, UNIX.

Security / Firewalls: Cisco ASA Firewalls 5580-20, IPSEC & SSL VPNs, IPS/IDS, DMZ SetupCisco NAC, ACL, IOS Firewall features.:

Juniper: EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240.

Hardware: Cisco Cat Switches, Routers, Avaya VoIP phones, Cisco IP 796X/794X.

PROFESSIONAL EXPERIENCE:

Confidential, Melbourne, FL

Network Engineer

Responsibilities:

  • Engaged on designing and perform the configuration of a Cisco Identity Services Engine (ISE)
  • Server to migrate of services from Cisco Secure Access Control System (ACS) version 4.2(used for Wireless Client Access), Cisco Secure ACS Agent, Cisco Network Admission Control(NAC) Guest server version 2.0.3 and Cisco Secure ACS version 5.5.0.46 (Used for Terminal Access Controller Access Control System (TACACS+) to Network Devices) to the new Cisco ISE server.
  • Performed support, configuration, testing and documentation for ISE rollout for CenterPoint Energy which includes making configuration changes in access and distribution layer switches, wireless controllers and ISE nodes.
  • Used AWSCloud platform with features EC2, VPC, ELB, Auto-Scaling, Load Balancing, Security Groups, IAM, EBS, AMI, RDS, S3, SNS, SQS, Cloud Watch, Cloud Formation.
  • Executing RADIUS pre-deployment tasks like ISE setup, loading templates into Cisco Prime.
  • Deploy 3 Cisco SNS 3495 ISE appliances.
  • Modify pilot ISE environment for production scaling and performance.
  • Provide ISE deployment services for migration of users from Cisco NAC to Cisco ISE platform for the following locations.
  • Used the ISE Endpoint Analysis Tool (ISEEAT) to analyse data and design new ISE ProfilingPolicies.
  • Performed operational Moves/Adds/Changes in Integrated Services Engine (ISE) 2.3 including but not limited to network devices, Identity Groups, Local Hosts, Local Users, Administrator Policies etc.
  • Performed evaluation and analysis of the environment for NSX deployment, including NSX manager, Distributed Firewall, Distributed Logical Router.
  • Implemented 8x8 VOIP solutions on site and run network diagnostics test and network assessment test and docsis.
  • Configured and tested Verizon ARC BA850 Cradle Point as the turnkey networking solution for 4G/LTE failover.
  • Addressed technical issues and questions regarding Cisco ISE including troubleshooting and feature changes and modifications.
  • Implementation of Cradle point with 3G/4G LTE as Backup Solution for Clients WAN.Connections and using Enterprise Cloud Manager for Monitoring.
  • Test 7750 for bandwidth, packet loss, Jitter, latency using network diagnostic tools, QSCOPE before the site is being integrated to LTE.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN.
  • Consisted of ISE Deployment, Authentication with Active Directory and Microsoft CertificateAuthority.
  • Designed and Configured Cisco Identity Services Engine (ISE v2.3) to support corporateconnectivity to a new wireless environment utilizing Active Directory Authentication.
  • Authorization with EAP-TLS client certificates.
  • Based on interviews conducted with the client, Implemented and documented a custom fullyredundant and Highly Available WLAN environment utilizing Cisco 5508 Wireless LAN
  • Implemented and supported Cisco Identity Services Engine (ISE) with the Cisco ASA 5500 series for VPN connectivity.
  • Designed, built, and deployed F5 Big IP load balancers, F5 Big IP LTM/GTM Global and Local Traffic Manager, F5 DNS Domain Name Services.
  • Provide migration support and oversight resources for NAC to ISE roll-out at 80 Client branch locations in the United States and the Center Point Tower.
  • Implement code upgrades on the DDoS environment and collaborated on load balancing and security tasks.
  • Experience in working with ISE and Microsoft Access database.
  • Deploying ISE Wired and Wireless Authentication, Authorization and Accounting.
  • Identifying endpoints missing from ISE and determine reason for omission.
  • In addition, any deficiencies noted in the guest wireless network during this work documented and recommendations for improvements made in written.
  • Configured the ISE software and provide staff with the necessary configuration changesneeded on the network equipment to facilitate the migration of existing services to the new Cisco ISE server.
  • Created the repository for the backup and upgrades.
  • Worked on assessment and the finalization of the detailed designs and provided a design document for the Implementation of Cisco ISE and the Migration of Wireless and TACACs to ISE.
  • Provided a written detailed design report and assessment report documenting modifications, findings, and recommendations.
  • Involved in Configuring and implementing of Composite Network models consists of
  • Ensuring the Cisco ISE server is correctly installed and licenses are applied.
  • Reviewed vendor system reference documents and creating Operations Proceduresdocumentation for network staff training.
  • Provided engineering support by creating installation approach and cutover/turn-up procedures for validating the system is operating as designed.
  • Performed Migration of Cisco catalyst switches IOS configuration to Juniper MX routers JUNOS platform and Understand the JUNOS platform and worked with IOS upgrade of Juniper device.
  • Provided engineering support by creating as-built system documents such as system drawings or configuration details.
  • Created monthly status reports, on a monthly and as-needed basis, reflecting the overall project Condition, work accomplishments, man-hour expenditures, close out of phase (Close-out and Acceptance Report), future activities, and any identified risk elements.
  • Participated in a kick-off meeting with the Communications Branch personnel to review and affirm goals, objectives, current design, and schedule for the Cisco ISE Deployment and Migration.
  • Contractor will make recommendations if modifications for improvements should be included in the design.
  • Provided engineering support and technical assistance by ensuring the Cisco ISE server is correctly installed and licenses are applied.

Environment: Checkpoint, Nexus, Cisco 3500, 1400, 1500, 5400, ASA firewall -- ASA5545, ASA5585-SSP-20, firewall PIX-525, VPN concentrator -- Cisco 3060, check point firewall -- r77, F5 Local Traffic Managers (LTM) 5000, 7000 series, (ISE) 2.3, VLANs, STP, DNS/DHCP issues, Palo Alto firewalls, Cradle Point, FortiGate TACACs, BGP, AWS MPLS, Algosec, Firewall analyser, Wireless LAN, service desk, Cisco ISE, Cisco Prime, JUNOS.

Confidential, Englewood, CO

Network Engineer

Responsibilities:

  • Configuring and troubleshooting of routing protocols such as OSPF and EIGRP for effective communication on Cisco 3900, 3800 series routers.
  • Worked on configuration, deployment and administration of Checkpoint firewalls versions R77.0, R75.46.
  • Configured Juniper SRX series firewalls for policy management, and Juniper SSL VPNs
  • Configuration of VLANs on cisco switches 3850, 3650 and troubleshooting IP addressing issues, updating IOS images and other hardware installations.
  • Implemented traffic filters using Standard and Extended Access-lists, Distribute-Lists, and Route-Maps.
  • Installing and configuring VPNs for the clients (site to site) and Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.
  • Gained strong experience and knowledge in investigating incidents related to firewall and VPN.
  • Manage installations, configuration and administration of Cisco equipment in IT architecture of organization.
  • Gained advanced knowledge on multiple security technologies Anti-virus, malware, Firewalls, VPN, proxies, vulnerability, DLP.
  • Review and analysis of emerging threats and vulnerabilities, risks and business requirements for detection and remediation measures.
  • Strong experience and knowledge in investigating incidents, remediation, tracking and follow-up for incident closure with concerned teams.
  • Working with Juniper JUNOS operating system and working on M and MX series routers.
  • Working knowledge with white listing webpages and blocking webpages with Blue coat Proxy SG and Blue coat reporter.
  • Establishing and maintaining of setup to Build and deploy the application to the Cloud AWS.
  • Circuit upgrades for T1's and Ethernet circuits. Scheduled maintenance notification. Cradle point, Broadband.
  • Worked on Monitoring and analysis of ProxySG performance.
  • Administration knowledge on Symantec Bright mail Gateway, Symantec Endpoint protection (12.1.6) and Symantec PGP.
  • On daily basis worked with Juniper SRX 650 and Palo Alto 5050 Firewalls.
  • Planning a strategy for Moving from vShield to NSX - including introducing NSX into a VDI designed around vSphere 6.5 and Citrix.
  • Strong understanding of Network Virtualization and experience implementing NSX Security.
  • Design the layout for cable installations.
  • Worked with up gradation of Firewalls (Juniper SRX, Palo Alto and FortiGate Devices).
  • Participate in day to day DLP maintenance activities and analyse DLP incident and report on findings.
  • Experience on Data Loss Prevention (DLP) and information security.
  • Worked on manual Penetration testing of client systems, web sites and discovered network vulnerabilities.
  • Built Cisco Device Profiles using CUCM. This includes being part of the team whom rolled out Cisco VOIP phones when transitioning over from Avaya. We deployed 1500+ phones throughout the campus.
  • Implemented 8x8 VOIP solutions on site and run network diagnostics test and network assessment test.
  • Configured network services equipment Riverbed accelerators in compliance with security policy.
  • Worked on security policies of juniper SRX and Palo Alto and policy clean-up of firewalls.
  • Comprehensive working knowledge of switches, switching technology, LAN/WAN security, LAN/WAN design, capacity planning, server technology, LAN/WAN troubleshooting, Voice over IP (including T1, DS3, OC-3, routing protocols, TACACS, RADIUS).
  • Worked with Bluecoat and Infoblox.
  • Provide support for security solutions related to Bluecoat Proxy, configuring solutions in the development, test and production environment.
  • Gained good knowledge and hands on experience with routing and switching protocols such as OSPF, CIDRIP, BGP and STP.
  • Worked on MPLS between Data center and offices.
  • Good hands on experience with f5 BIG-IP GTM and LTM and Worked on the project of F5 LTM and GTM code upgrade project, doing couple of them every week.
  • Involved in F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers. Configuring and implementing F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic.
  • Worked to implement new data center as well as migrated old Switches Nexus 5000 to new Switch Nexus 7000.
  • Worked on Blue Coat's proxy architecture for the high level of web security.
  • Worked on Cisco ASA 5500 series firewalls, Nexus 7000, 5000 series switches
  • Experience in troubleshooting Nexus switches
  • Administer and support Juniper Firewalls Using NSM (Net Screen and ISG firewalls).
  • Dealt with NAT configuration and troubleshooting issues related to access lists and DNS/DHCP issues within the LAN network
  • Troubleshooting VLAN, Spanning Tree Protocol, Switch trunks and IP conflict issues
  • Coordinated with senior engineers in BGP, CIDR routing policies and designs
  • Monitoring Network infrastructure using SNMP tools
  • Gained good knowledge on integration of logs into Splunk.
  • Gained experience with using NSM, SEP, IPS and IDS.
  • Worked with Juniper M320 multiple edge router.

Environment: F5 Local Traffic Managers (LTM) 5000, 7000 series, GTM load balancers, Spanning tree protocol, VLANs, STP, DNS/DHCP issues, Palo Alto firewalls, Cradle Point, CIDR, BGP,AWS, MPLS, VoIP, ETHER channels, checkpoint, Bluecoat, Nexus, JUNOS, Juniper.

Confidential, Bridgewater, New Jersey

Network Engineer

Responsibilities:

  • Responsible for setting up the infrastructure environment with majority of Cisco & Palo Alto appliances apart from various other equipment.
  • Efficiently using Service Now tool for generation of tickets, assigning severity to incidents, following up with incident status and troubleshooting incidents.
  • Excellently used Splunk to analyse and monitor incident management and incident resolution problems.
  • Designed and deployed AWSsolutions using EC2, S3, RDS, EBS, Elastic Load Balancer, Auto scaling groups.
  • Involved in developing web services deployed to AWSto communicate between web sites, database and mobile applications.
  • Analysed and monitored incident management and incident resolution problems using Splunk.
  • Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
  • Upgraded and updated Cisco IOS from 12.3T to 12.4. Used to DHCP to automatically assign reusable IP addresses to DHCP clients.
  • Configure and Deploy Cradle Point 4G LTE solutions for failover, OOB, and DR purposes.
  • Configuring and troubleshooting perimeter security devices such as Checkpoint NGX R77 Gaia, Provider-1/MDM, Secure Platform, Palo Alto and ASA Firewalls.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering)
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Successfully installed Palo Alto PA 3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall
  • Exposure to wild fire feature of Palo Alto.
  • Implemented 4G wireless tertiary backup WAN solution at many sites in the US using Cradle point ARC CBA850.
  • Logging, analysing protocol stack messages, documenting and filing data collected and bugs reports during data performance, radio performance and device aggression test using QXDM, slick edit and QCAT.
  • Worked with Developer to Debug the Various LTE issues, collect the UE Logs using QXDMand do log analysis.
  • Maintained and managed networks running CIDRIP, EIGRP and BGP routing protocols.
  • Regularly performed firewall audits around Checkpoint Firewall-1 solutions for customers.
  • Provided tier 3 support for Checkpoint Firewall-1 software to support customers.
  • Work on Checkpoint Platform including Provider Smart Domain Manager. Worked on configuring, managing and supporting Checkpoint Gateways.
  • Extensive Juniper Networks experience in Junos, ScreenOS, IVE (Pulse), NSM, and Junos Space.
  • Configuration of routing protocols EIGRP and BGP for small to medium sized branches based on company branch standards, including redistribution and route maps.
  • Access Point refresh and implementation at various sized branches and locations.
  • Used network monitoring tools such as Spectrum to ensure network connectivity and protocol analysis tools to assess and pinpoint networking issues causing service disruption.
  • Worked with management and various departments to develop procedures and troubleshoot problems as they arose.
  • Worked with major carriers for IMSVOLTE projects for acceptance testing/support.
  • Providing UE defect analysis for IMS related features like VoLTE, Vo-WiF, RCS, preparing throughput matrix to carriers
  • Build IT security infrastructure including Checkpoint, Juniper and Palo Alto firewalls
  • Configuring F5 Load Balancers: Adding virtual IPs, nodes, pools and health monitoring.
  • Configuring Juniper Net Screen Firewall Policies between secure zones using NSM (Network Security Manager)
  • Backup and restore of checkpoint and Cisco ASA Firewall policies
  • Handling Break/Fix situations, monitor, configure, policy creation on Checkpoint's Smart Center Server running on Secure Platform
  • Monitoring Traffic and Connections in Checkpoint and ASA Firewall
  • Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960/6500 switches and Cisco 3640/12000/7200/3845/3600/2800 routers, Cradle Point, JUNOS, VoIP, Cisco Nexus 7K/5K, Cisco ASA 500, F5 BIGIP LTM, GTM, RIP, OSPF, AWS, CIDRIP, BGP, EIGRP, LAN, WAN, VPN, HSRP

Confidential, Estero, FL

Network Engineer

Responsibilities:

  • Installing, Configuring and troubleshooting Cisco Routers (ASR1002X, 3945, 3845, 2800, 3600) and Switches to perform functions at the Access, Distribution, and Core layers.
  • Configuring, upgrading and deployment of Nexus 7010, 5596 and 2248.
  • Designing, implementing LAN/WAN configurations on Cisco Nexus 5K, catalyst 6500 switches
  • Configuring and resolving various OSPF issues in an OSPF multi area environment.
  • Implemented, configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).
  • Expertise in maintenance of layer2 switching tasks - VLAN, VTP, RSTP, configuration of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.
  • Packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems
  • Implementing, configuring, and troubleshooting various routing protocols - EIGRP, OSPF, and BGP.
  • Performing network monitoring, providing analysis using various tools like Wireshark, Solar winds etc.
  • Experience working in Datacenter environment, configuration changes as per the needs of company.
  • Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls
  • Redesigned Internet connectivity infrastructure for meeting bandwidth requirements.
  • Configuring, implementing and troubleshooting VLAN's, VTP, STP, Trunking, Ether channels.
  • Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
  • Experience in configuring, upgrading and verifying the NX-OS operation system.
  • Configured and managed Cisco access layer routers and switches
  • Provided support for troubleshooting and resolving customer reported issues
  • Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.
  • Worked on F5 and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance.
  • Configured and managed OSPF redistribution and authentication with type 3 LSA filtering and to prevent LSA flooding and configured OSPF over frame relay networks.
  • Designing, configuring, implementing and troubleshooting (LAN) VLAN's, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience
  • Implemented site-to-site VPN in Juniper SRX as per customer.
  • Implemented various EX, SRX & J series Juniper devices.
  • Implemented 8x8 VOIP solutions on site and run network diagnostics test and network assessment test.
  • Implementing and managing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
  • Configured Cisco 1231 Access points with 5959 and 4941 antennas (802.11/a/g).
  • Designing, configuring, implementing and troubleshooting (LAN) VLAN's, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.

Environment: RIP, OSPF, EIGRP, Cisco 2800/2900/3900/7200/7600, ASR9k, CRS&GSR 12k Series routers, juniper SRX 650/3600, static NAT, VoIP, dynamic NAT, Cisco 3550/4500/6500 switches.

Confidential

Jr. Network Engineer

Responsibilities:

  • Configuring and troubleshooting multi-customer ISP network environment.
  • Involved in network monitoring, alarm notification and acknowledgement.
  • Implementing new/changing existing data networks for various projects as per the requirement.
  • Troubleshooting complex networks layer 1, 2(frame relay, ATM, Point to Point, ISDN) to layer 3 (routing with MPLS, BGP, EIGRP, OSPF and RIP protocols) technical issues.
  • Providing support to networks containing more than 2000 Cisco devices.
  • Performing troubleshooting for IOS related bugs by analysing history and related notes.
  • Carrying out documentation for tracking network issue symptoms and large scale technical escalations.
  • Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-round technical support.
  • Commissioning and Decommissioning of the MPLS circuits for various field offices.
  • Preparing feasibility report for various upgrades and installations.
  • Installation and maintenance of new network connections for the customers.
  • Configuring all the required devices and equipment for remote vendors at various sites and plants.
  • Installing new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations.
  • Installing and maintaining local as well as network printers.
  • Implemented 8x8 VOIP solutions on site and run network diagnostics test and network assessment test.
  • Validating existing infrastructure and suggesting new network designs.
  • Working on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path and Community, MED.
  • Installing and maintaining Windows NT Workstations and Windows NT Server.
  • Providing technical support to LAN & WAN systems.
  • Monitoring Memory/CPU on various low-end routers in a network.

Environment: LAN & WAN, Cisco Devices OSPF, BGP, VoIP, EIGRP, MPLS and Cisco Switches and Routers.

We'd love your feedback!