We provide IT Staff Augmentation Services!

Network Security Engineer Resume

4.00/5 (Submit Your Rating)

WA

SUMMARY:

  • Around 7 year’s professional experience in Network Designing, Deployment, Configuring, Troubleshooting of Network Infrastructure and Testing of Networking System.
  • Expertise in configuration of Cisco Catalyst Switches of 1900/2900/3550/3750/6500, Cisco Routers of 2600/2800/3600/3800/7200/7600, Load Balancers ACE and F5.
  • Experience in Checkpoint firewall administration and troubleshooting.
  • Advanced knowledge in design, installation and configuration of Juniper Net Screen Firewall ISG 1000/2000, SSG series and NSM Administration.
  • Implementation and administration of Juniper WX/WXC devices for WAN Traffic Acceleration Policy development and planning/programming on IT Security, Network Support and Administration.
  • Juniper, Checkpoint Cisco ASA, Cisco PIX and Palo Alto Firewalls Administration.
  • Experience with designing, deploying and troubleshooting LAN, WAN, Frame - Relay, Ether-channel, IP Routing Protocols (RIPV2, OSPF, EIGRP & BGP), ACL’s, NAT, VLAN, STP, VTP, HSRP, VRRP & GLBP.
  • Design and configuring of OSPF, BGP on Juniper Routers (MX960).
  • Hands on working knowledge and diverse skills of all routing protocols (For example: BGP, EIGRP, OSPF, RIP).
  • Dealt with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system like Remedy Ticketing System.
  • Experience working with Nexus 7010, 7018, 5020, 2148, 2248 devices.
  • Worked with Cisco for opening TAC Case and resolving issues to meet project deadlines.
  • Strong hands on experience on PIX, Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ &RADIUS).
  • Expertise in VOIP protocols like H.323, MGCP, SIP, and SCCP.
  • Efficient Confidential use of Microsoft VISIO/Office as technical documentation and presentation tools.
  • Working Knowledge with monitoring tools like Solar Winds and Network packet capture tools like Wire-shark.
  • Provided 24x7x365 availability and on-call support as required by the projects.
  • Excellent working knowledge of TCP/IP protocol suite and OSI layers.
  • Experience of communicating with customers, solving complex problems in a timely productive manner.
  • Excellent communication and Interpersonal Skills with the ability to interface Confidential all levels.
  • Detail oriented and hardworking team player who all so work well independently.

TECHNICAL SKILLS:

Network Configuration: Advanced switch/router configuration (Cisco IOS access list, Route redistribution/propagation)

Routing Protocols: RIP, EIGRP, OSPF, IS-IS, BGPv4, MP-BGP

WAN Protocols: HDLC, PPP

LAN Technologies: VLAN, STP, Port Security, 802.1Q

WAN Technologies: Frame Relay, ATM, MPLS, Leased lines & exposure to PPP

Security Technologies: Checkpoint, F5 Load Balancer, Cisco PIX & ASA Firewalls

Physical Interfaces: Ethernet, Fast Ethernet, Gigabit Ethernet & 10 Gigabit Ethernet, Serial

Cisco Routers: Cisco 2500, 2600, 2800, 3600, 3800, 7200, 7600

Redundancy and Management: HSRP, VRRP, GLBP, Wireshark, SNMP

Switches: Cisco 1900, 2900, 2960, 3550, 3750, 4500, 4900, 6500 catalyst switches

Networking Concepts: Access-lists, Routing, Switching, Subnetting, Designing, VLAN, VTP, NAT

Operating System: Windows 7/8/10/XP, MAC OS X, Linux, Unix

Languages: C, C#

Simulators: Cisco Packet Tracer, GNS3, MATLAB, NI Lab VIEW, NS2, NS3

PROFESSIONAL EXPERIENCE:

Confidential, WA

Network Security Engineer

Responsibilities:

  • Installation, configuration and maintenance of Palo Alto Firewalls, Cisco ASA firewalls.
  • Deployed and managed Varonis specifically Data Governance, Data Advantage and Data Alert modules in complex environments.
  • Demonstrate the features and benefits of Varonis software to the staff and documented the operations.
  • Used Varonis Data advantage and Data Alert to monitor and analyze and alert file system activities on NAS.
  • Switch experience includes Cisco Catalyst switches: CISCO 3750, 4500, 6500 series switches and Cisco Nexus switches 7000 and 7700 series.
  • Performed Checkpoint firewall upgrade of 50 firewalls from R55 to R65. Administered Juniper 50, 200, 500, and SSG 520 firewalls.
  • Troubleshoot and hands on experience on security related issues on Cisco ASA/PIX, Checkpoint, IDS/IPS, Palo Alto and Juniper Net screen firewalls.
  • Configuration and maintenance of Juniper Net Screen SSG-550.
  • Configured Routers for OSPF, EIGRP, BGP protocols.
  • Hands on experience and Good Understanding of OSPF, BGP, MP-BGP,MPLS-VPN.
  • Configuration and maintenance of OSPF protocol which was the enterprise IGP. Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Creating Stub Areas & configuring Summarization for effective Routing.
  • Using PBR with Route Maps for route manipulation/filtering. Troubleshooting routing issues like suboptimal routing and asymmetric routing.
  • Provided technical support for full setup, debugged the problems of OSPF, switching and HSRP.
  • Switching related tasks included implementing VLANs, VTP and configuring and maintaining multi VLAN environment and inter-VLAN routing on Fast-Ethernet channel.
  • Configured Object Grouping, Protocol Handling and Code up gradation on Palo Alto Firewalls.
  • Conductedvulnerability assessments and generic security scans of both systems andnetworks to identify and mitigate security vulnerabilities using Nessus Vulnerability Scanner.
  • Design, implement and provide second level support for hostload-balancingsolutions Confidential SWA.
  • Working knowledge of the UNIX and CLI based command to implement the networking tools.
  • Configured and monitored Firewall logging, DMZ’s and related security policies.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support.
  • Configuration of ACLs in Cisco 5540 series ASA firewall for Internet Access requests for servers in LAN and DMZ and also for special user requests as authorized by management.

Confidential, IL

Network Engineer

Key Responsibilities:

  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
  • Windows Server Administration (Windows 2000, 2003 & 2008).
  • Identify, design and implement flexible, responsive, and secure technology services
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Implemented Positive Enforcement Model with the help of Palo Alto Networks.
  • Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
  • Creating and provisioning Juniper SRX firewall policies.
  • Created standard access lists to allow SNMP, NTP and logging servers.
  • Documented new VPN enrollments in a database and create standard procedures for further improvement.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures
  • Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team. The LAN consisted of Cisco campus model of Cisco 3550 Confidential access layer, Cisco 6513 Confidential distribution/core layer.
  • ConfigureVRRP & GLBP andVLANTrunking802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.
  • Negotiate VPN tunnels using IPSEC encryption standards, also configured and implemented site-to-site VPN, Remote VPN.
  • Provided proactive threat defense with ASA that stops attacks before they spread through the network.
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Co-ordinated with the Data Network and Security team and came up with possible solutions.
  • Work on Physical site Inventory verification, gather information of various Cisco Network devices and Security Devices to develop Run book and Spec Book.
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view) and experience with developing complex network design documentation and presentations using VISIO
  • Monitoring and troubleshooting network issues between client site and 85 remote sites with legacy switches and routers.
  • Performed and presented network analysis as a part of network migration. Involved in knowledge transfer to vendors and provided them network support as required
  • Configuration and maintenance of EIGRP and BGP network on router 7200 and 6500 MLS.
  • Configuration and maintenance of 3750 stack and 6500 VSS for improved efficiency of the data plane.
  • Configuration and management of NEXUS network in the existing network infrastructure.

Confidential, Austin, TX

Network Engineer

Responsibilities:

  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Configure the Cisco IOS XR security features in both owner SDR and non-owner SDRs
  • Configure legacy route map configurations using the new Cisco IOS XR Routing Protocol Language (RPL)
  • Maintaining Core Switches, creating VLANs and configuring VTP.
  • Optimized performance of the WAN virtualization network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Installed 802.11 a/b/g/n Ethernet standards for wireless Technology.
  • Worked with other team members in testing of the network architecture.
  • Participated in quality system implementation project.
  • Support Cisco iron port C170 mail security
  • Converting CatOS to Cisco IOS Config Conversion on distribution layer switches
  • Developing global standards for deployment of blue coat proxy servers to replace the older net cache deployments.
  • Performed testing on line card introductions (1G, 10G, 40/100G) for features like PBR, MC-LAG, and ACL.
  • Worked on troubleshooting the connectivity to servers on Fabric path.
  • Upgrading IOS on 2960 and using 2960 switch as a PAGP between VSS
  • Worked on NXOS, IOS and IOS-XR BXB to N7K-NXOS (MPLS) system test.
  • Configured OSPF for Stub area, Totally Stubby Area and NSSA.
  • Coordinated efforts with Engineer’s to ensure all network devices conformed to defined network standards.
  • Configured various Routing protocols such as RIP, OSPF, EIGRP, static routing.
  • Provided configuration of STP and Port Security on Catalyst 6500 switches.
  • Configure the Cisco CRS-1 Routing System, back out of configuration changes, and restore older versions of a configuration.
  • Design, implementation, and management of multiple large filesystems including EMC Isilon’ s OneFS and IBM’s GPFS.
  • Lead Engineer for installing and configuring Trip Wire Perle out of Band Modems for our Distribution centers. This was in place as a backup to the network in case the circuit went down.
  • Regained my role as the Senior VMware Systems Administrator for a company
  • In my absence, the procedures I put in place prior to my brief hiatus were utilized and the company was able to function without any major issues or incidents as the platform I assisted in designing was sturdy enough to function if I had suddenly because no longer part of the team.
  • As they lacked a VMware SME, They were unable to take advantage of increased functionalities provided by VMware that I immediately started the change procedures for to save the company operating costs that were able to be seen and taken advantage of immediately. DRS is one of said functions.
  • Leading the Engineering Test Team to evaluate Master key Plus product with Defense Message System (DMS) and Public Key Infrastructure (PKI) network and computer system management functions including software and hardware configurations
  • Worked with Brocade MLX Net iron switches.
  • Management tools, SNMP, Syslog, Sniffer, and Wireshark.
  • Demonstrable knowledge on WAN encapsulation protocols like HDLC, PPP and Frame Relay. ISDN.
  • Checking and configuring Cisco 7600 routers Confidential data center for remote sites’ issues.
  • Configured and optimization settings of Riverbed.
  • Support Cisco iron port S170 web security
  • Troubleshooting of Cisco 2900, 3900, 6500, 7500, 7200 Series routers.
  • Configured static NAT, dynamic NAT, dynamic NAT overloading.

Confidential

Network Engineer

Key Responsibilities:

  • Responsible for entire LAN and WAN maintenance and troubleshooting of the company network.
  • Involved in the team of Data Center operations to perform duties like administration and deployment of Cisco Routers and Switches per the organization requirements.
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center.
  • Worked with data center planning groups, assisting with network capacity and high availability requirements.
  • Worked on Cisco IPS.
  • Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments in data center.
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus series to provide a flexible access solution for data center access architecture.
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer.
  • Involved in project planning, deploying and reviewing based on the requirements within the existing network.
  • Reviewing all changes to network configuration for technical accuracy and providing solutions to Multi-Protocol Network Problems.
  • Configured and managed VLANs, 802.1Q Trunk, Inter-VLAN routing, HSRP and LAN security for Layer 2 and Layer 3 switching domains as per the organization’s requirement plan.
  • Routing protocol configuration such as OSPF, EIGRP, BGP, Router Redundancy configuration (HSRP, VRRP, GLBP).
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Modified internal infrastructure by adding switches to support servers and added servers to existing DMZ environments to support new and existing application platforms.
  • Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
  • Multicasting, Route redistribution, Route filtering using Distribute list.
  • IP Allocation for all applications and servers with high availability throughout the company.
  • Configured ASA 5540 to ensure high-end security on the network with ACLs and Firewall
  • WAN Technologies (PPP, Frame Relay, ATM, ISDN, Site to Site VPN).
  • Provided application level redundancy and availability by deploying F5 6500 series LTM load balancers.
  • Involved in designing WAN infrastructure for redundancy in case of link failure.
  • Responsible for technical evaluation, troubleshooting, overall project management, problem solving and turn-up of the service with the ISP.
  • Created and designed network layout and documented network system design with detail information using Visio.

Confidential

Network Engineer

Key Responsibilities:

  • Configured RIP, PPP, BGP and OSPF routing.
  • Involved in the configuration & troubleshooting of routing protocols: BGP, OSPF, EIGRP, RIP, BGPv4, Static and Default Route.
  • Identify, design and implement flexible, responsive and secure technology services.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures.
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team. The LAN consisted of Cisco campus model of Cisco 3550 Confidential access layer, Cisco 6513 Confidential distribution/core layer.
  • Worked on Cisco security management.
  • Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF) and IP addressing.
  • Installed different software on the systems. Install and managing network devices including Switches.
  • Layer 2 switching technology architecture, implementation and operations including L2 and L3 switching and related functionality. This includes the use of VLANs, STP, VTP and their functions as they relate to networking infrastructure requirements including internal and external configuration and security.
  • Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope.
  • Design, implementation and operational support of routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1Q.
  • Estimated Project costs and created documentation for project funding approvals.
  • Planned resources and presented project status to higher management.
  • Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
  • Ability to analyze, configure and troubleshoot networks.

We'd love your feedback!