We provide IT Staff Augmentation Services!

Network Security Engineer Resume

4.00/5 (Submit Your Rating)

Fremont, CA

SUMMARY

  • Around 8 years of Industrial experience as a Network Engineer, with expertise in the areas of Wireless domains, Routing, Switching and Troubleshooting of switches, routers and firewalls. Profound knowledge in configuring and troubleshooting routing protocols like RIPv2, OSPF, MPLS, VOIP, IS - IS, SNMP, EIGRP and BGP.
  • Installing and Configuring Cisco switches 2960, 3560, 4500, 6500, 4900, 2900, 3750, Nexus 5000, Nexus 7000 series, WS-C4948, Juniper EX, Catalyst Switches (3850 X, 3750 X), QFX and Alcatel 7705 SAR series.
  • Proficient in working with Juniper Routers (MX960, MX480, M320) and Switches (EX2400, QFX Virtual Chassis Switches) with BGP, OSPF, VSTP, MST layer 2 and layer 3 Technologies.
  • Installation & configuration of Cisco VPN concentrators 3060, 3080 for VPN tunnel with Cisco VPN hardware & software client and PIX firewall.
  • Hands-on expertise with routers 2600, 2900, 3600, 3900, 7200, 7600, ASR-901, ASR-903, ASR 1001, ASR 5500, ASR-9010, ASR-9001, Cisco ISR 4451, Nexus 2k,5k and 9k, FEX (2248, and 2232) series, Cisco ASA (5545, 5555. 5500 X, 5512 X) and Juniper ACX, E, M, MX960 series, (Wireless 802.1 a/b/g/n/ac) Cisco Meraki MX.
  • In-depth knowledge and hands-on experience in ISP Routing Policies, NetworkArchitecture, IP Sub netting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, ARP, LDAP, AAA, TACACS/RADIUS, IPSEC and firewalls.
  • Working knowledge on different NetworkTopologies, Frame Relay, Token Ring, ATM, Bridges, Switches, Hubs and Repeaters.
  • Profound knowledge of IEEE standards 802.11g, 802.11n and 802.11/ac wireless standards and PEAP & EAP-TLS.
  • Expertise in enabling security encryption methods i.e. WEP, WPA and WPA2.
  • Assisted in refresh of data center network refresh to Nexus leaf switches.
  • Created data migration strategies to help with completion of migration of data center from one point to another.
  • Thorough understanding of capacity planning, QoS, policy enforcement, and network management, proxy functions, security protocols (SSL, TLS, IPsec, SSH, HTTPS etc.), TCP/IP models, relative OSI models and label switching, real-time protocols for voice (SIP, H.323, RTP), IPv4 and IPv6.
  • Hands on experience in implementing and troubleshooting of SNTP, Telnet, TFTP, FTP, VPN, SSL-VPN, Route-maps, distributive lists and Access Control Lists
  • Proficient in configuring, implementing and troubleshooting of VLAN's, VTP, STP, RSTP, and Trunking protocols in Switches.
  • Experience in set up, configuration and management of Cisco ASA Firewall in various domain such as Internet, DMZ, Business-Partner and Remote-Access VPN etc.
  • Experience with F5 LTM like BIG-IP 3600, BIG-IP 3900 and BIG-IP 6900 load balancers for different applications.
  • Used load balancers ACE and load balancing technique with multiple components for efficient performance and to increase reliability through redundancy.
  • Expertise in Network Scanning, Management, Alerting, devices & Logging tools like Solar Winds, Net cool, Science Logic, Log Logic, EM7, Indeni, nCircle, PRTG, Wire shark Source Fire, Fire eye, and Aruba.
  • Configuring Infoblox for IP address management, DHCP, NTP and DNS
  • Have Hands on experience in implementing F5 BIG-IP load balancer.
  • Having experience in deploying BIG-IP F5LTM load balancers for Load balancing and traffic management of business application.
  • Deployed F5 LTM, ASM, APM and DNS solutions required for DR, and High Availability.
  • Experience installing, upgrading and administering Cisco ISE.
  • Experience with Palo Alto Network Firewalls, Panorama, Autofocus and Wildfire, PAN OS-7.0,8.0.
  • Hands-on experience with scripting languages like Python, PHP, Pearl.
  • Working experience in Operating systems like Windows XP, Windows 7,8,10, Ubuntu, Kali Linux, Red Hat Linux and programming languages like C, C++.
  • Working Knowledge on VMware ESX, VMware Workstation, VMware vCenter Server.
  • Installation and troubleshooting, configuring of VoIP Digium Phones and setting up VoIP over VLAN.
  • Hands on experience on Ticketing Tools like JIRA, Change Management, SR, and Remedy.
  • Provided guidance to Network Support Engineers as well as Junior Network Engineers during responses to emergency work requests.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Experience in Cisco security: Telnet, SDM, NAT/ACLs, AAA, Layer 2 Security, Layer 3 Security, IPS/IDS, Cisco (ASA, PIX) 5510, Cryptography, VPN, IPsec.

TECHNICAL SKILLS

Routing: RIPv2, EGIRP, OSPF, BGP, IS-IS, RIPv1.

Switching: CHAP, VLANs, VTP, STP, PVST+, RSTP, MSTP, ARP, Inter VLAN routing & Multi-Layer Switch, PAgP, LAcP CEF, DECF, Port Security, VSS Cisco 3560, 4500, 6500, 4900, 3750, Nexus (5000,7000), WS-C4948, Juniper EX, QFX and Alcatel 7705 SAR, 802.1Q.

Router: Cisco 2600, 2900, 7609, 7613, 7200, 4500X, 6509,4510,3750,3850 ASR-(901, 903, 1001, 5500, 9010), Cisco ASA (5545, 5555. 5500 X, 5512 X), MWR 2941, Alcatel 7705 SAR, Juniper ACX, E, M, (MX960, MX480, M320) and SRX 240 series.

Switches: Cisco Catalyst 6500, 4500, 3560, 3750 X, 2960, 3850 X, 2960, 4900, 2900Nexus 7000, Nexus 6000, Nexus 5000, Juniper EX2400, QFX Virtual Chassis Switches.

Network Security: Cisco ASA (5545, 5555, 5550, 5540), TACACS+, SSH, Netscreen, Juniper SRXPalo Alto, SCADA, Checkpoints, AAA, FREE RADIUS, CADA, LDAP, GRE, IKE, IPsec VPN, SSL VPN, IDS, IPS, DMVPN, GETVPN, ACL, Modbus TCP, Source Fire, Fire Eye, Cisco NAC (4.9.3), Cisco ISE, Aruba, RSA, RSA 2 Factor, Tripwire, Firemon, Firewall policies, SIEM.

Network Management: Wire shark, SNMP, Ethereal, Solar Winds, Net cool, Science Logic, Log Logic, EM7, Indeni, nCircle, PRTG, Cisco NAC, ISE, Active Directory, Blue Coat, Websense. Citrix NMAS, Cisco ACI, Cisco Any Connect, Infoblox.

Operating Systems: Windows (2000, XP, Sv2003, Sv2008, Sv2012, Vista, 7, 8,10), Ubuntu, Kali Linux, Red Hat.

Software’s: VMware ESX 5.x, VMware Workstation, vCenter Server, System Center 2012 R2, MS SharePoint, C++, Python, Matlab, XML.

PROFESSIONAL EXPERIENCE

Confidential, Fremont, CA

Network Security Engineer

Responsibilities:

  • Major responsibilities include designing, staging, configuration, testing, installation, troubleshooting and maintenance of various equipment.
  • Configured and troubleshoot Nexus 7K, 5K, ASR 1001, ASR 5500, ISR 4451, F5 Load Balancer, Blue Coat, ASA 5500, ASA 5555 firewall and MDS 9000,6905E, Cisco ASA and Checkpoint Firewall.
  • Configured and deployed F5 BIG-IP LTM 3900, 6900 for providing application redundancy and load balancing.
  • Configured and implemented VLANs with 802.1q tagging, Trunk groups, ether channels (LACP, PAGP), and STP for creating Access/distribution and core layer switching architecture.
  • Hands on experience in Aruba S2500 switches, Aruba 7200, 3600 series wireless controllers, Aruba IAP 105. Configuring & managing around 1000+ Network & Security Devices that includes Cisco Nexus Juniper MX Series Routers, and Juniper SRX Firewalls.
  • Hands on Experience with Juniper: EX-2200, EX-4200, EX-4500, MX-480, and M Series, SRX210, SRX240.
  • Optimized performance of the WAN network consisting of Cisco 6500 switches by configuring VLANs. Configured OSPF and BGP on Juniper M and MX series Routers
  • Configured and implemented Palo Alto Firewalls and cutover firewalls from Cisco ASA5540 to PA 5050 and ASA 5510 to PA 3050 including VPN connections
  • Set up Palo Alto firewall rules (security policies and translation rules) and ACL for Core Routers
  • Experience in Configuring VPC, VDC software upgrade in Nexus 7010 Including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer link.
  • Performed the ACL request changes for various clients by collecting source and destination information from them.
  • Designed, Installed & configured LAN, WAN components Cisco Catalyst switches 6500, 4500, 3750 series and Cisco ASR routers 9001, 1001 as per the Network Design along with the Data Center topology.
  • Used tools like Infoblox IPAM to manage IP's.
  • Experience with migrating the Partner IPSEC VPN tunnels from one data center to another data center.
  • Configure WiFi 802.11a/b/n/g/ac Access Points based on requirement and test setup.
  • Contributed to SW development and TR-069 technologies including defining Capital One specifications for CPE WAN Management Protocol (CWMP).
  • Suggested, developed and implemented Cisco Meraki Devices such as routers, switches and security appliances which led the network to become more reliable and robust. In turn increased network growth and functionality to best level.
  • Configured routing protocols like MPLS, OSPF and troubleshooting layer3 issues and routingprotocols EIGRP and BGP for small to medium sized branches based on company branch standards, includingredistribution and route maps.
  • Troubleshooting diagnostics of LAN and WAN with in depth knowledge of TCP/IP, NAT, PPP, ISDN and associates networkprotocols and services.
  • Migrated existing B2B VPN tunnels with the vendors from the 3060 VPN concentrator to ASA Firewall.
  • Implemented Quality of service (QoS) to increase bandwidth utilization in LAN and WAN interface using RSVP and Packet prioritization.
  • Enhanced script development reliability and efficiency wherein worked on multi-layered architecture providing a virtual environment and hardware protocol handling.
  • Involved in design, implementation of checkpoint.
  • Checkpoint Firewall upgrade from Checkpoint R65 to Checkpoint GAIA R77.
  • Monitoring Traffic and Connections in Checkpoint and ASA Firewall.
  • Experienced in Configuring Checkpoint Firewall (Version R62, R65 and R71) and CISCO ASA firewalls as Standard and Distribution deployment to have the networksecure and maintained Site to Site VPN connection through the Firewalls.
  • Experience on Check Point Firewalls NG, NGX, R61, R65, R70, R75, R77.
  • Experience in creating multiple policies and pushing them in to Checkpoint Firewall (Gateways) and hands on experience in managing the Checkpoint Management Server.
  • Responsible for design VPN technologies including concepts, VPN configuration, and VPN deployment with good understanding of networking and application protocols (TCP/UDP, IPv4/IPv6), and security protocols(SSL, IPSEC, IKEv2, PKI)..
  • Providing VPN and SSH access as per role and considering security breaches. Performing Firewall ruleanalysis to secure network.
  • Execute remote installations and upgrades for F5 LTM deployments.
  • Configured ACI such as tenants, application network profiles (ANP), endpoints and VMM integration.
  • Implemented ACI Fabric to an external L2 and L3 networks, along with L4-L7 services.
  • Migrated existing applications to an ACI fabric.
  • Managed rules on Cisco checkpoint NGX firewall.
  • Used ATM LAN emulation using ARM module on Cisco Catalyst 8510 MSR and enabled routing protocols such as OSPF, RIP and EIGRP.
  • Management of various Exchange 2010 & 2013 servers and Office 365 service.
  • Configure and support Customer MPLS-VPN, VRF, and MPLS ICI peering.
  • Exclusively worked on virtualization servers based on VMware and AWS.
  • Managing and configuring of Access lists, configuring of Wide Area Networking Protocols, HDLC, PPP, Frame Relay, ISDN, NAT, HSRP, RSA, AAA, & RADIUS.
  • Well Experienced in configuring protocols HSRP, GLBP, VRRP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP. Aggregating switch links using LACP and PAGP protocols.
  • Used Fabric Path, with Layer 2 like Nexus Switches 7000, 5500 series for configuring Fabric Path VLAN’s.
  • Used JIRA ticketing tool to manage, track development and find bugs in a network managed software system.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Guided and worked several Junior Network Engineers in case of emergency in maintaining network tasks.

Environment: Cisco ASA, Checkpoint, Palo Alto, Big IP F5 LTM/GTM, Nexus switches, TCP/IP, VPN, VPLS, VPWS, Ticketing tools JIRA, Remedy, InfoBlox.

Confidential, Austin, TX

Network Security Engineer

Responsibilities:

  • Designed and implemented network using Checkpoint firewall to secure enterprise networks. Established different PAN and VPN, connections among Head Offices, branch offices and sub- branch offices.
  • Maintained Firewalls like Checkpoint, Juniper and Cisco ASA.
  • In depth knowledge of configuring cisco switches, routers and Cisco ASA Firewalls and Cisco ACE load balancer.
  • Cisco ASA 5510, 5505, Cisco Switches (3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 4510, 4507, 3850).
  • Actively involved in migration from Juniper firewalls to Palo Alto Firewalls depending upon Client requirements.
  • Using Cisco ISE 3315, 3355 configured the Local and Active Directory Based Identity Store and use of Identity Source Sequences.
  • Configured Cisco ISE as a TACACS+ Server for Device Administration with Command Authorization.
  • Integrated the Cisco WSA with Cisco ISE using PxGrid technology to share contextual information about authenticated users. Working knowledge with TrustSec.
  • Worked on Palo Alto PA- 5000 and PA-3000 series and panorama. Worked on creating in creating new policies and OS updates.
  • Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Successfully installed Palo Alto Next-Generation PA-3060, PA-5060 firewalls to protect Data Center with the use of IPS feature.
  • Involved in day to day activities on Palo Alto firewall devices by setting up Panorama, managing firewalls, log files, managing network activity, updates and troubleshooting of devices.
  • Worked on Panorama to aggregate data from different Palo Alto firewalls and monitored the traffic flow throughout the centralized network.
  • Integrated Panorama with SNMP, managed Syslog and deployed M -series Appliances.
  • Used Panorama to manage licenses and maintain updates of Palo Alto firewall’s Threat Intelligence Cloud, Anti - virus, Wildfire and Aperture.
  • Deployment of Palo Alto firewall into the network and configured Access-list policies on protocol based services.Troubleshooting of protocol-based policies on Palo Altofirewalls and changed the policies as per the needs.
  • Experienced with IP Address management (IPAM), DNS, DHCP by using Infoblox.
  • Responsible for Enterprise DHCP Server (InfoBlox) and VPN, SSL, and NetMotion Accounts.
  • Hands on experience on Juniper 4200EX, 8216 EX Switches, SRX firewalls, CISCO Meraki MX series.
  • Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.
  • Worked on F5 and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance.
  • Experience with GTM F5 component to provide high availability with providing services across data centers.
  • Configuration of HSRP for load balancing on L3 switches on different location of office on the switched Network.
  • Using Smart Update, User Management and Authentication in Checkpoint Firewall, Monitoring and troubleshooting traffic through Smart View Tracker.
  • Hands on experience in managing the Checkpoint Management Server, Monitoring Traffic and Connections in Checkpoint and ASA Firewall.
  • Hands-on experience on Checkpoint Firewall R77, Palo Alto and Cisco ASA 5520 firewalls.
  • Reduced risk by optimizing and hardening Checkpoint DMZ firewall policies.
  • Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.
  • Experience working with Nexus 9K, 7K, 5K. Configure VDC and VPC on Nexus 7010 and Nexus 5596, 5600 and 5672 switches.
  • Dealt with creating VIP (virtual servers), pools, nodes and applying iRules for the virtual servers like cookie persistency
  • Routing protocol configuration such as OSPF, EIGRP and BGP, Router redundancy configuration (HSRP, VRRP and GLBP).
  • Worked on Tools like Net scout, JDSU, Wireshark, HPQC, tcp dump and VoIP protocols RTP, SIP, SCCP, RTCP, MGCP.
  • Expertise in working with Cisco Firewalls, Cisco PIX &ASA 5500(5525/5585). Managing securitytools IPS/IDS, WAFs, DLP and Data at rest encryption and malware detection system.
  • Performed Network SecurityAssessment and implemented securityimprovements such as Network filtering, SSH, AAA, SNMP call routes lists, VTY access lists, EIGRP MD5 authentication, and HSRP authentication.
  • Worked on DOCSIS ARRIS E6000, Cisco 10K I-CMTS, Cisco 10K M-CMTS equipment and implemented in Organization platforms.
  • Advanced knowledge in Enterprise environments and services including Access, DHCP, DNS, Firewalls, Load Balancers, SNMP, network management and common application frameworks.
  • Significant experience in both the design and deployment of large scale service provider wireless networks including both Wi-Fi (IEEE 802.11 standards) and wireless mobility technologies (LTE, UMTS, TDMA, OFDM).
  • Knowledge in implementing and configuring F5 Big-IP LTM 6400 load balancers.
  • Launched numerous Cisco and Arris CMTS with seamless migration of customers in North West and implementing routing protocols like ISIS, BGP, IPv4,and IPv6.
  • Perform and Assist in platforms like IP augmentation and migrate vrf customers from cisco 10k to Arris E6k and validated configuration settings.
  • Working with Cisco Unified Communications such as ACD and IVR systems.
  • Implemented PBX (private branch exchange) such as Netvanta 7100 in enterprise and data center level working with switches, enabling local lines as well as external lines.
  • Hands on experience in Cisco Sourcefire Firepower Network Security and Firewalls.
  • Hardened and enhanced the LAN and remote access security by designing TACACS and Secure ID authentication working criteria in conjunction to firewall policies.
  • Troubleshooting of Checkpoint Security Management Appliances Smart -1 series, Gateway appliances - Power series Cisco ASA and Juniper firewalls.
  • Experience withPLC / SCADA / HMIProgramming.
  • Participate in the testing and startup of the process equipment, instruments and SCADA system to ensure the SCADA system monitors and controls the equipment as intended.
  • Deployed and Build CMTS configurations for new and existing chassis.
  • Installed and configured Citrix NetScaler 9.3/10.1 and supported Windows platform.
  • Configure B2B VPN with various business partners and 3rd parties and troubleshoot VPN Phase 1 and Phase 2 connectivity issues including crypto map, encryption domain etc. Utilized Blue Coat Proxy SG to safeguard web applications in extremely untrusted environments such as guest Wi-Fi zones.
  • Layer 2 working includes include VTP, ISL/ 802.1q, IPsec VPN and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
  • Worked with different project teams to design and implement secure connectivity connections as related to overall security standards.
  • Worked on all the 6-major application in Solar Winds Orion like IPAM, NPM, SAM, NCM, VOIP, and UDT. In Solar Winds Orion, exclusively on configuring the Switches, Routers, firewalls. Solar Winds and Algosec used for critical alerts to on-call person, generating logs for troubleshooting and audit purpose.

Environment: STP, RSTP, NAT/PAT, ACL, JUNIPER SRX and ASA Firewalls, Cisco IOS-XR, ASA, VTP, VOIP, DMZ, HSRP, Palo Alto, InfoBlox, BGP, OSPF, EIGRP, PPP, HDLC, SNMP, DNS, DHCP.

Confidential, Morristown, NJ

Sr. Network Engineer

Responsibilities:

  • Responsible for Installation, configuration and maintenance of Cisco 7200, 3900, 2800, 2600, 2500 and Cisco Catalyst Cisco 6500, 3750, 2950 series Switches.
  • Expert level experience in configuring, implementing and troubleshooting Routing Protocols including OSPF, EIGRP, RIP, BGP, and switched L2 networksVLANs, Trunking, VTP, STP, PVST, RSTP, HSRP, VRRP, and Port Security.
  • Hands on Cisco Catalyst 3750, 3850, 4507, 4510, 6509 and 6807, configuring VLAN, RSTP+, Channel Protocols, VTP, HSRP, EIGRP and creating Trunk between Inter-Switch-Link(ISL).
  • Hands on providing uplinks to Distribution layer switch from Access layer switch and bundling them in single port-channel and implement Data and Voice VLAN to the Switch VLAN Interface.
  • Migrated Cisco ASA to Palo Alto and entries Switches to cisco.
  • Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).
  • Experience in implementing uplinks to the WAN protocols like P2P, Cable Modem and Dark Fiber from WAN Router/Voice Gateway from remote site to Data Center core switches.
  • Provided project management for data center cabling, documented all network drawings using Visio.
  • Created new network design diagrams on Microsoft Visio for presentation to team members for implementing on new remote site building.
  • Prepare and perform scheduled maintenances on the IP networking infrastructure. This involved device configuration modifications to CMTS', routers, switches Juniper, Cisco, IOS/OS upgrades, and follow-up troubleshooting.
  • Provided L1/L2 support on SDN products - ATM and BDSL service.
  • Experience with Cisco advance services to implement data center Nexus environment for new Upgraded the NX-OS in Nexus 7018,7010 and Nexus 5548 and 5596.Consolidated multi-tiered environment into a pair of Nexus 7000 switches using VPC and VRF.
  • Responsible for Checkpoint firewall management and operations across our global networks.
  • Working with Checkpoint Support for resolving escalated issues.
  • Planned and implemented network designs, including WAN, LAN, MPLS.
  • Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation
  • Operate and maintain ground segment networksfor a big network. DMVPN, port-channels, and port-security configurations maintained regularly on Cisco Nexus systems. System changes documented and submitted to configuration boards for approvals for critical systems. Developed and maintained network drawings for system continuity.
  • Designing and implementing Fabric Path on Nexus core switches to avoid blocking ports.
  • Implemented various Juniper products include EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210 and SRX240.
  • Configured Palo Alto network firewall models PA-3k, PA-5k as well as centralized management systems.
  • Participated in the migration project of vSphere 5.5 and Migrated ESXi 4.1 to ESXi 5.1 using VMware vCenter update manger 5.1.
  • Implementation and configuration of F5 Big-IP LTM-6400 load balancers.
  • Thorough understanding of the basics behind the Internet and its workings (DNS, Security, IP Routing, HTTP, VPN, Email Routing, SPAM, etc.)
  • Implemented VTP and Trunking protocols (802.1q and ISL) on 3560, 3750 and 4500, 6500, 3750 X series Cisco Catalyst switches.
  • Configured Network Monitoring Systems (NMS) such as SNMP, Nagios and Syslog-NG server.
  • Nagios - Built monitoring solution for a LAN site, in-depth SNMP checks added to monitor health and LAN path to devices, including routers, switches, Firewalls, Load balancers, servers, and VMware infrastructure
  • Provided Technical reports by analyzing traffic, checking on network infrastructure problems and providing with suitable solutions.
  • Responsible for preparing documents and updating the documents for every change's to existing and new installation to the network.

Environment: Nexus, F5 Load balancer, DMVPN, Visio, STP, RSTP, Cisco IOS-XR, ASA, VTP, VOIP, DMZ, HSRP, Palo Alto, Port-Channel, BGP, OSPF, EIGRP, PPP, HDLC, SNMP, DNS, DHCP

Confidential

Network Engineer

Responsibilities:

  • Designed network layouts and made recommendations for key improvements to optimize performance.
  • Established network specifications by conferring with users, analyzing workflow, access, information, and security requirements (AAA, IPS/IDS, DNS, DHCP, web security, TACACS+, VPN and 802.1x NAC, Firewall), designing router administration, including interface configuration and implementing routing protocols (EIGRP, RIP, OSPF, BGP).
  • Configured and implemented switching protocols like VLANs, STP, RSTP, VTP, Trunking, Port Security, Vlan Security to maintain different LAN environments.
  • Implemented data design policy and deployed Cisco ASA firewalls for supporting site to site VPN solutions, used Cisco ASA 5510 and Cisco ASA 5520.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience
  • Troubleshooting experiences with LAN, WAN, VLAN, VPN and DHCP networks.
  • Hands on experience with Redundant Array Independent Disks (RAID) to establish high performance network file system, as well as experience with CISCO routers, switches and firewalls.
  • Collaborate with other support team members to fix network outages, misconfigurations, and complex networking issues on company's network devices.
  • Integrated VMware vSphere client to investigate, recommend and implement network enhancements that improved system reliability and performances in different networks.
  • Installed, configured and maintained voice, video and data communications infrastructure systems and cabling.
  • Used network sniffers like Wireshark, Tcp dump in order to find the vulnerabilities in a network.
  • Examined the branch site requirements by analyzing existing network design and security standards. Using the detailed report, upgraded the IOS of 40 network devices and implemented advanced security standards in branch site which is few miles away from main office. My key contributions include troubleshooting with network protocols, deploying routing protocols such as EIGRP, OSPF, configuring several VLANs and using Cisco Prime Infrastructure, TFTP Server.
  • Involved in day to day network operational tasks like handling network related tickets, documentation.

Environment: EIGRP, OSPF, BGP, CISCO routers and switches, Access Control Server, VLAN, Trunk Protocols, CISCO ASA, DHCP, DNS, SAN, Wireshark, Tcp Dump, Windows Server, Windows NT.

Confidential

Jr. Network Administrator

Responsibilities:

  • Configured a basic Ethernet network, VLAN's, Inter-VLAN and 802.1q trunk links and demonstrated STP protocol operations in an active network.
  • Configured Frame Relay interfaces back-to-back point-to point & point-to-multipoint network.
  • Designed a network with different Interior Gateway routing protocols such as RIP, RIPV2, EIGRP and OSPF and redistributed the routes from RIP to OSPF, EIGRP to OSPF and from OSPF to RIP & EIGRP.
  • Worked on different Cisco Layer 2, Layer 3 Switches (2900, 3550, 6500) and Routers (2600, 3600, 3800, 7200) on the network.
  • Provided assistance in integration of DNS, DHCP and other IP conflicts.
  • Designed, installed and troubleshooting of Palo Alto and Juniper SRX.
  • Planned, Designed, Implemented LAN/WAN and WLAN on wired and wireless networks.
  • Installation & configuration of Cisco VPN concentrator 3060 for VPN tunnel with Cisco VPN hardware & software client and PIX firewall.
  • Configured ACL’s on respective routers, configuring NAT and VPN
  • Configured Site to Site VPN as well as Remote Access VPN on VPN Concentrators series between Headquarters and Branch office.
  • Managed ESXi 5.1 Hosts and Clusters on vCenter Server 5.1. Using vSphere Client 5.1, Power CLI, vSphere CLI, UNIX Shell Scripting
  • Implemented traffic engineering for MPLS network using Frame Relay.
  • Reported progress to my higher staff and created documents regarding the progress.
  • Visually inspected temperature sensors to maintain health of servers and network devices.

Environment: Cisco 7200/3845/3600/2800 routers, TACACS, EIGRP, RIPv2, OSPF. Used Red Hat Operating system. Wireshark, GNS3 and MS Visio are the tools used in this platform.

We'd love your feedback!