We provide IT Staff Augmentation Services!

Network Admin Resume

5.00/5 (Submit Your Rating)

Houston, TX

SUMMARY

  • Cisco Certified Network Engineer with 7.5 years of professional experience in IP Networking, Routing Protocols, and Network Security.
  • Experienced in trouble - shooting both connectivity issues and hardware problems on Cisco based networks, Routers, Switches, Firewalls.
  • Experience and good noledge over routing protocols like EIGRP, OSPF, RIP, BGP also static route, MPLS, VPN, IPSEC
  • Experience in Configuring and implementing VLAN, VTP, LAN switching, STP and 802.x autantication in access layer switches
  • Experience in configuring high availability protocols like HSRP, VRRP, GLBP
  • Strong Knowledge in WAN technologies including T1,T3, ISDN, HDLC, Point to Point, ATM and Frame Relay.
  • Experience working with Nexus 7010, 5020, 2148, 2248 devices
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
  • Dealt with creating VIP(virtual servers), pools, nodes and applying iRules for the virtual servers like cookie persistency, redirection of the URL
  • Configuring Virtual Chassis for Juniper switches EX-4200,Firewalls SRX-210
  • Strong noledge and experience in implementing, configuring VPN technologies like IPSEC, MPLS
  • Working noledge of security products such as Cisco ISE
  • Strong noledge based in the planning, design, and implementation of Information Systems and Network Technologies
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Implementing and troubleshooting of Palo alto Firewall Model:- 500, 2050, 3020, 5060
  • Managing Palo alto firewall with Panorama
  • Experience with different Network Management Tools and Sniffers like Wireshark (ethereal), HP-Open view and Zenoss monitoring tool.
  • Good understanding of Layer 2 and Layer 3 technologies.
  • Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution and Core layers
  • Experience with Project documentation tools & implementing and maintaining network monitoring systems and experience with developing network design documentation and presentations using Visio
  • Experience in managing complex routed networks providing technical support, troubleshooting and configuration
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Team player and excellent verbal and written communication skills comprehensive problem solving abilities.
  • Extremely well organized, meticulous and highly self-motivated.
  • Quick Acquaintance, understandability, eager to learn new things

TECHNICAL SKILLS

Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch,Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging

Network security: Cisco (ASA, PIX) 5510, ACL, IPSEC, Palo Alto firewalls

Load Balancer: Cisco ACE load balancer, F5 Networks (Big-IP)

LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet

WAN: Leased lines 64k - 155Mb (PPP / HDLC), Channelized links (E1/T1/E3/T3), Fiber Optic Circuits, Frame Relay, ISDN, Load Balancing.

Routers: Cisco 17XX, 18XX, 26XX, 28XX, 37XX, 38XX, 39XX &72XX series

Switches: Cisco 3550, 3750, 45XX, 65XX series

Routing: OSPF, EIGRP, BGP, RIP-2, PBR, IS-IS, Route Filtering, Redistribution, Summarization, Static Routing

Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management.

OS products: Windows (2000/2003, XP, vista, 7, LINUX).

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Network Management: SNMP, Cisco works LMS, HP open view, Ethereal

PROFESSIONAL EXPERIENCE

Confidential, Houston, TX

Network Admin

Responsibilities:

  • Primarily supporting the fabric environment including Cisco and Nexus 6000/5500/2200 series fabric switches and extenders
  • Worked on configuring backup IPSEC tunnels for site to site VPN connections between subsidiary sites and corporate datacenter
  • Implementation of managed Palo Alto firewallsusing Panorama
  • Apply Cisco ISE configuration to switches
  • Advanced proficiency with Cisco Wireless ( APs, Controllers, ISE, Prime)
  • Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
  • Worked on ASA and router installation at remote sites by engaging local onsite technicians
  • Involved in datacenter routing and switching for 212 sites and supporting MPLS, IPSEC, VPN, Metro Fiber (between Houston and Austin 10GB) services
  • Configuration of BGP, EIGRP, OSPF and ASR1002, ISR3900/2900 routers
  • Troubleshooting WAN issues including IPSEC tunneling with Cisco ASA 5500/5520/5510/5505
  • Maintaining Enterprise Wireless - host wireless LAN control at primary datacenter for 400 WAP’s globally - Cisco 5508, and 2504
  • Monitoring SolarWinds for network outages or interruptions
  • Working with other IT teams collaboratively at Houston, Austin, Gainesville, Aberdeen and Brazil datacenters

Confidential, Wayne, PA

Network Engineer

Responsibilities:

  • Coding firewall upgrades on Cisco ASA’s ( 5505, 5510, 5508-X ) and responsible for ASA migrations from pre-8.3 to 9.0 code ( upgrading NAT rules and ACLs )
  • Prepping ASA units with correct code for next reboot, addressing non software vulnerabilities and identifying changes in behavior based on code change
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
  • Preparing failover configuration updates for datacenter firewalls ( Cisco5525 )
  • Designing firewall policies for corporate firewalls to support application requirements
  • Assisting Corporate Network team with general router and switch configuration cleanups, IP addressing and documentation
  • Configuring site to site primary and backup VPNs between multiple corporate sites and datacenter locations
  • Configuring SLA monitoring on ASAs for redundant ISP links

Confidential, Philadelphia, PA

Network Engineer

Responsibilities:

  • Responsible for Support of network security and network devices such as routers, switches and wireless access points.
  • Responsible for designing and implementation of Network Infrastructure.
  • Implemented upgraded firewall platform built on Palo Alto Firewall Technologies.
  • Involved in Building, Configuring, maintaining, and troubleshooting network devices in the environment.
  • Implemented high availability solutions through vendor interoperability of Juniper, Cisco, Fortinet, and Palo Alto Networks platforms, including utilization of BGP, OSPF
  • Implemented upgraded firewall platform built on Cisco ASA’s.
  • Involved in Migration of Juniper EX series switches to Cisco 3500 series and 6500 series switches.
  • Coordinated and scheduled the delivery ofF5Professional Service implementations and consulting engagements
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Experience with configuring FCOE using Cisco nexus 5548
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer
  • Configure and troubleshoot Juniper EX series switches and routers
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls
  • Experience with configuring BGP, OSPF in Juniper M and MX series routers
  • Infrastructure trouble shooting and TCP/IP Protocols Experience.
  • Assisted the Network team in maintaining the network in different locations
  • Maintained a Network with more than 600 Network devices, some 25,000 end hosts, and the other Network devices like DHCP, DNS servers, Firewall servers.
  • Responsible for Co-ordination with Hardware vendors, software vendors and service Providers.
  • Involved in installing newer 3502 Wireless Access Points.
  • Helped the Network team to install New switches and routers and configure the IOS according to the requirement
  • Configured VLAN, OSPF, Sub-netting, EIGRP, BGP, VTP, spanning tree, IP Sub-netting, Wireless Access points
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Configuration and extension of VLAN from one network segment to their segment between Different vendor switches (Cisco, Juniper)
  • Convert Campus WAN links from point to point to MPLS and to convert encryption from IPsec/GRE to GetVPN.
  • Assisted in backup, restoring and upgrading the Router and switch IOS.
  • Attended Team meetings and provided comments on existing network and the recommendations to improve the current network Performance.
  • Identifying technical problems and debugging hardware and software related to LAN’s/ WAN’s.
  • Maintaining the health of 250+ wireless Access points in two locations.
  • Interact effectively with other departments and staff to ensure satisfactory and timely resolution of their issues or problems.
  • Involved in installation and configuration of Cisco 3500 and 6500 series switches.
  • Involved smart view tracker to check the firewall traffic.
  • Experience with deployment of Palo Alto firewalls for different NAT, Skype traffic
  • Involved in DNS Management (IP addressing) with infoblox.

Confidential, Rockville, MD

Sr. Network Engineer

Responsibilities:

  • Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network
  • Configuration and Administration of Cisco and Juniper Routers and Switches
  • Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
  • Experience configuring VPC(Virtual Port Channel), VDC(Virtual Device Context) in Nexus 7010/7018
  • Experience with configuring FCOE using Cisco nexus 5548
  • Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Involved in iRule management like loading rules, writing iRule syntax using TCL language
  • Hands on Experience testing iRules using Browser(IE), HTTP watch
  • Dealt with creating VIP(virtual servers), pools, nodes and applying iRules for the virtual servers like cookie persistency, redirection of the URL
  • Configure and troubleshoot Juniper EX series switches and routers
  • Migrated to Juniper EX series switches from Cisco 3500 series and 6500 series switches
  • Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
  • Network Redesign for Small Office/Campus Locations. dis includes changes to both the voice and data environment
  • Network security including NAT/PAT, ACL, and ASA/SRX Firewalls.
  • Good noledge with the technologies VPN, WLAN and Multicast.
  • Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
  • Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
  • Experience with communicating with different with different customers, IT teams in gathering the details for the project
  • Switching tasks include VTP, ISL/ 802.1q, IPSec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
  • Experience in installing and configuring DNS, DHCP servers.
  • Replace branch hardware with new 3900 routers and 2960 switches.
  • Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPSec/GRE to GetVPN.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports
  • Involved in configuring Juniper SSG-140 and Cisco ASA firewall
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 autantication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.

Confidential

Network Engineer

Responsibilities:

  • Implementing new/changing existing data networks for various projects as per the requirement.
  • Troubleshooting complex networks layer 1, 2to layer 3 (routing with MPLS, BGP, EIGRP, OSPF protocols) technical issues.
  • Providing support to networks containing more than 2000 Cisco devices.
  • Performing troubleshooting for IOS related bugs by analyzing past history and related notes.
  • Carrying out documentation for tracking network issue symptoms and large scale technical escalations.
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Completed service requests (i.e. - IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc.)
  • Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-round technical support.
  • Commissioning and Decommissioning of the MPLS circuits for various field offices.
  • Preparing feasibility report for various upgrades and installations
  • Identify, design and implement flexible, responsive, and secure technology services
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Configured switches with port security and 802.1 xs for enhancing customer’s security.
  • Monitored network for optimum traffic distribution and load balancing using Solar winds.
  • Validate existing infrastructure and recommend new network designs.
  • Created scripts to monitor CPU/Memory on various low end routers in the network.
  • Installed and maintained local printer as well as network printers.
  • Handled installation of Windows NT Server and Windows NT Workstations.
  • Handled Tech Support as it relates to LAN & WAN systems
  • Configuring and troubleshooting multi-customer network environment.
  • Involved in network monitoring, alarm notification and acnoledgement.
  • Subnetting networks. Troubleshooting DHCP and DNS Servers.

Confidential

Network Engineer

Responsibilities:

  • Monitoring the NMS system for different Network Alerts.
  • Set up of distributed core LAN using Cisco 6500 series switches.
  • Coordinating with service providers for WAN link outages.
  • Performed switching technology administration including VLANs, inter-VLAN routing, Trunking, STP, RSTP, port aggregation & link negotiation.
  • Network Cabling, dressing, labeling and troubleshooting various network drops onsite.
  • Design, execution of installation and configuration of VPN/IVPN, LAN/WAN as per organizational requirements.
  • Experienced in Planning and Organizing Change Managements.
  • Maintenance/updating of Network diagrams.
  • Worked on Network Operations using Ticketing system.
  • Ensure standard Router and Switch Configurations are maintained.
  • LAN Segments monitoring/Trouble shooting LAN related issues.
  • Carryout periodic backup of Router/Switch configurations.
  • Analyzing the Bandwidth Utilization of the Links.
  • Equipment Installation/Removal in the NOC.
  • Attended meetings and technical discussions related to NOC changes

We'd love your feedback!