We provide IT Staff Augmentation Services!

Network Security Engineer Resume

4.00/5 (Submit Your Rating)

NC

SUMMARY

  • Around 7 years of professional experience in IT Networking and Security Engineering and Administration of Security, LAN and WAN Technologies.
  • Good hands on experience with Cisco Routing, Switching and Security with Cisco hardware/software Cisco Catalyst 6500, 4500, 2900, 3500, 3750 XL series switches, Cisco 1800, 2500, 2600, 2800, 3600, 3800, 7200 series routers.
  • Maintain and Configure Firewalls like Palo Alto (PA - 3k, PA-5k), Check Point Firewall, Cisco ASA 55XX and Juniper SRX5400.
  • Efficient in Implemented security authentication using TACACS+ & RADIUS.
  • Experienced with network administrative tools like SDN open Stack and managed network behavior dynamically via open interfaces. Initialized programs, control and changes via abstraction of low level functionality.
  • Demonstrated deep expertise in technical and wireless security process with cisco ISE integration with cloud and its security policies.
  • Experience in IP addressing as well as subnetting with VLSM. Configuring and supporting TCP/IP, DNS and working with show and interface command configuration. Usage and knowledge of Cisco switches like 2900 series and their encryption techniques. Working knowledge of routing protocols like RIP-V1, RIP- V2, EIGRP, OSPF, BGP.
  • Experience in Active Directory, TLS, GPOs, DNS, DHCP, File & Print Server, IIS (Web Server), FTP, Terminal Server, Secure Sockets Layer, NAT, Microsoft Clustering.
  • Experienced in handling Level 1, Level 2 and Level 3 Technical Support Calls and conducted RCA
  • Advanced knowledge, design, installation, configuration, maintenance and administration of Palo Alto Firewalls, Checkpoint Firewall R55 up to R80 version, VPN
  • Thorough knowledge of installation, termination and troubleshooting of the physical layer and data link layer of the OSI model & configuration of Palo Alto & Checkpoint Provider Environment.
  • Advanced knowledge in TCP/IP suite and routing protocols, such as OSPF, BGP, & EIGRP, IPSEC VPN design connection & protocols, IPSEC tunnel configuration, encryption and integrity protocols
  • Advanced knowledge in Linux and Unix Operating Systems, web security devices or proxy - Cisco WSA/CWS, understanding of global security policies.
  • Experience in Configuration and deployment of network security devices, including firewalls, Intrusion, Detection Systems, VPN, and Identity Gateways
  • Good knowledge of Windows Vista, XP, Windows Server 2003; 2008; Windows NT; TCP/IP.
  • Motivated, enthusiastic, and pro-active System/Network Administrator with an excellent 'can-do' attitude.

TECHNICAL SKILLS

Routers and Switches: Cisco 2600, 3600, 3800, 7200, 7600, ASR 9001 Cisco 2960, 3750, 45006500 and Nexus 2K/3K/5K/7K series

Protocols: RIP, RIP V2, EIGRP, OSPF, BGP, IGRP, DNS, SMTP, HPNA, FTP, TFTPWLAN, SSH, TELNET, SNMP, LAN/WAN, 802.11(a/b/g/n), WLAN, NAT, Load Balancer, VOIP, 802.3(ethernet) switching

Security Technologies: IPS/IDS, Firewall, TLS, VPN, Tunneling, Riverbed IPSEC, DMZ, ACL, SSL, TACACS+RADIUS

Network Design Tools: Wireshark, Solar Winds, OpenStack cloud, DNS Server, Qualys, Putty, GNS3, Rapid 7.

Firewall: Palo Alto PA-7000 Series, PA-4000 Series, PA-3000 Series, PA 2000, Checkpoint R77/R80, Juniper NSM/SSG/SRX, Fortinet, CISCO ASA 5506, 5508, 5515, 5516, 5520, 5585

Load balancer: Big IP F5 LTM and GTM

Programming: Objective C, C++, Java, HTML, CSS, MySQL, MATLAB and Simulink

Operating System: Linux, Unix, MS-DOS; Microsoft Windows XP/7/8/8.1/2010; Mac OS

PROFESSIONAL EXPERIENCE

Confidential, NC

Network Security Engineer

Responsibilities:

  • Implementing and Troubleshooting Cisco 3750, 3550, 3560, 2924, 6509-V-E, 6513, 6504, 6503, 6506, 6500 series switches, GSR, ASR routers with Cisco IOS and IOS-XR.
  • Worked on 2600, 3500, 7613, ASR 9000 Cisco Routers and 4500, 6500 and ASR9000 series Cisco Switches.
  • Supported core network consisting of Cisco 7200 series routers running multi area OSPF.
  • Worked on 2600, 3500, 7613 Cisco Routers and 4500, 6500 and ASR9000 series Cisco Switches.
  • Worked on ISE Cloud along with fine tuning of Firewall policies based on Information security policy.
  • Implemented and Maintained Routing Protocols EIGRP, BGF and OSPF in the Network.
  • Implemented SCADA, DCS, programmable logic controller (PLC), HMI, remote terminal unit (RTU) or related industrial control systems
  • Designed and deployed Partner IPSEC VPN tunnels.
  • Worked on TLS and SSL to maintain Transport layer security in the Network.
  • Worked on Load balancer and Citrix NetScaler to improve the web application traffic and cut application ownership budgets with server offloading.
  • Secured network access with Cisco Secure (RADIUS/ TACACS+) and Configured network access servers for AAA Security
  • Configured Remote User VPN, Site to Site VPN, and Remote Access VPN, Easy VPN, SSL VPN for Client based and Clientless applications.
  • IOS upgrading of 1900, 2900, 3500 series Cisco Catalyst switches and 2500, 2600, 3600, ASR 9000 series Cisco routers using TFTP
  • Good Experience in Troubleshooting and monitored routing protocols such OSPF, EIGRP & BGP.
  • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Worked on Check Point cluster and installed policies on the multiple context environment.
  • Implementation and configuration of VPN Tunnels.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Implemented Network packet level monitoring using Wireshark, Solarwinds.
  • Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay)
  • Maintained and configured all Extended Access Lists securing VLAN 802.1q trunks to W2003/8 servers, STP, OSPF, Port-Channels, Classes, Group, Objects, Load-Balancing, ACS, Wireless.
  • Remotely configured the Network and profound knowledge of IPv4.
  • Profound working experience on Network Management tools like Infoblox and Solarwind.

Confidential, Charlotte, NC

Network Engineer

Responsibilities:

  • Installing, Configuring and troubleshooting Cisco Routers (ASR1002X, 3945, 3845, 2800, 3600) and Switches (6509E, 4507, 4500-X, 4900M, 3850, 3650, 2960) to perform functions at the Access, Distribution, and Core layers.
  • Configuration of various Cisco Routers & L2/L3 Switches and implementing OSPF and BGP on the routers
  • Configuring, upgrading and deployment of Nexus 7010, 5596 and 2248.
  • Designing and installing new branchnetworksystems. Resolvingnetworkissues, running test scripts and preparingnetworkdocumentation.
  • Working with Cisco Nexus 2248 Fabric Extender and Nexus 5500 series to provide a Flexible AccessSolution for datacenter access architecture.
  • Design, Installation and consolidation of local server farms in multiple branch locations with Cisco 4500-X at distribution and 4948's replacing the 3750's at access level.
  • Worked as a part of data center deployment where we converted from Cisco 6500 to Nexus.
  • Ensuring problems are satisfactorily resolved in a timely manner with focus in providing high level of support for all customers.
  • Modified internal infrastructure by adding switches to support server farms and added servers to existingDMZ environments to support new and existing application platforms
  • Working with wireless technologies troubleshooting and configuration.
  • Working with BGP, OSPF protocols in MPLS Cloud.
  • Establishing VPN Tunnels using IPSec encryption standards and configuring and implementing site-to-site VPN.
  • Troubleshooting of Cisco 2800, 2900, 3900, 7200, 7600, ASR9k, CRS, GSR 12k Series routers
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Configure BGP features such as AS-Override, Local preferences, EBGP load sharing on client connections
  • Configured and resolved various OSPF issues in an OSPF multi area environment between multiple branch routers.
  • Providing dailynetworksupport for national wide areanetworkconsisting of MPLS, VPN and point-to-pointsite.
  • Configuring GLBP, VLAN Trunking 802.1Q, STP, Portsecurityon Catalyst 6500 switches.
  • Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Providing Level 3 support to customers, resolving issues by attending to conference calls.
  • Configuring multiple route reflectors within a cluster.
  • Implementation of Palo alto firewalls in standalone, Vwire, active/passive & active/active modes
  • Setup of Central Panorama console to manage Palo Alto firewalls 3020, 3050, 5020 & VM-200 models
  • Working on a broad range of topics such as routing and switching, dedicated voice access, planning and implementation, large-scale high-visibility outages, change management coordination, proactive monitoring and maintenance, disaster recovery exercise and corenetworkrepairs.
  • Deployed and configured Cisco ASR 1000, 7000, 9000 series routers
  • Involved in L2/L3 Switching technology administration including creating and maintaining VLANs, Portsecurity, Trunking, STP, Inter VLAN Routing, LANsecurity.
  • Working onsecuritylevels with RADIUS, TACACS+.

Confidential, Atlanta, GA

Network Engineer

Responsibilities:

  • Design, Install and consolidation of local server farms in multiple branch locations with Cisco 4500-X at distribution and 4948's replacing the 3750's at access level.
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 3850, 3750, Nexus 5548 and Nexus 2k as per the requirement of the Organization.
  • Configuration and troubleshooting of EIGRP, OSPF, BGP.
  • Configuring Static, BGP and OSPF Routing Protocols on Cisco Routers
  • Configuring, Monitoring and Troubleshooting Cisco's ASA 5500 security appliance, Failover DMZ zoning and configuring VLANs/routing/NATing with the firewalls as per the design.
  • Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L2 support for routers/ switches/ firewalls.
  • Experience in deploying and configuring F5 LTM load balancer
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
  • Experience in working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a flexible Access Solution for datacenter access architecture.
  • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices
  • Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210
  • Migrating the policy from Cisco ASA firewall into Palo Alto
  • Developed custom pcap file interpreter in Python.
  • Configuration and troubleshooting of CSM, integration with ASA devices.
  • Configuring VLANs/routing/NATing with the firewalls as per the network design.
  • Working on security levels with RADIUS, TACACS+.
  • Experience in migration of VLANS.
  • Mapped, Network Diagrams and physical identification in MS Visio.

Confidential, Edison, NJ

Network Administrator

RESPONSIBILITIES:

  • Configured, installed software applications, anti-viruses, drivers and security software on user devices, maintained and troubleshoot desktop, laptop and peripheral equipment.
  • Configuration and installation of Cisco Routers 3600, 7200) Series.
  • Configuration and installation of Cisco Layer 2/3 Switches like 2350, 3550, 3750, 4500, 6509.
  • Configuration of RIPV2, EIGRP, IGRP and OSPF routing protocols on cisco routers.
  • Configure the redundancy protocol like HSRP, GLBP on switches and routers.
  • Point to Point, ATM, Frame Relay and BGP implementation for WAN Environment.
  • Implemented and Configured LAN protocols like Ethernet, VLAN, STP, RSTP, and VTP.
  • Plan and Configure Port Security for VLAN on all the Switches.
  • Configured and Maintained Windows 2003, 2008 sever, DNS, DHCP, FTP, TFTP and Microsoft Exchange.
  • Troubleshooting of EIGRP, OSPF, BGP and Design of OSPF areas for reliable access communication and for core IP routing.
  • Configured and implemented Extended ACL’s on the respective interfaces (Inbound and Outbound).
  • Configure and Manage Cisco Firewall ASA 5506, 5510, 5515.

Confidential

Network Engineer

Responsibilities:

  • Responsible for Maintenance and Troubleshooting of large networks with all possible solution like network security, mailing & messaging environment.
  • Administration & managing VLANs on Cisco switches.
  • Operating Cisco Devices (Routers, Switches) using Cisco IOS Commands.
  • Managing & Monitoring Network through Smart Manage server & dashboard. Involve myself in sending daily MIS on LAN & WAN monitoring report.
  • Auditing the network to ensure its adherence to the corporate security policy. It also involves vulnerability scanning of various network devices and applications. Consolidated reports from this activity are used to harden the complete network reducing security risks.

Confidential

Jr. Network Engineer

Responsibilities:

  • Coordinating with Branch office site contact to understand the site specificNetworkdevices and connectivity.
  • Preparing the Task list for remote sites implementation steps with timelines and owners.
  • Implementation & trouble shooting of complex WAN, LAN, VLAN, access control lists, NAT, routing solutions etc.,
  • Configuration & Management of VLANs, 802.1q trunks, VTP, Security policies.
  • Installation and configuration of new devices on LAN.
  • Trouble shooting real time issues working with team.
  • Responsible for configuration ofnetworkdevices used to design the service.
  • Maintaining & Troubleshooting L2 LAN switches.
  • Monitoring and connectivity of all these links, preparing reports and troubleshooting in case of link down.
  • Preparing and sending the daily down time and utilization report.
  • ACLs management on switches & routers, managing inter VLAN communications.
  • Managing Cisco Layer 2, Layer 3 switches & Routers on thenetwork.

We'd love your feedback!