Network Engineer Resume
Seattle, WA
SUMMARY
- 7+ years of experience as Network Engineer in troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, IS - IS, RIP & BGP, ability to interpret and resolve complex route table problems.
- Advanced knowledge of BGP, QOS, IPSec, SSL VPNs, DNS, and DHCP.
- Excellent written and oral communication skills.
- Extensive knowledge ofnetworkprotocols (TCP/IP, SNMP, FTP, syslog, TFTP, etc.)
- Experience in Cisco Routing and Switching using 3600, 3700, 3800, 4500, 5300, 6500, 7200, 7600 Nexus 9k, Nexus 7k, Nexus6k, Nexus 5k, and Nexus 2k & ASR 9000, 1000 series routers
- Hands on Experience using Infoblox for configuring DNS and DHCP scoops.
- Expert Level Knowledge about TCP/IP, Spanning-tree, and OSI models.
- Installing and configuring F5 Load balancers and firewalls with LAN/WAN configuration.
- Extensive hands-on experience with complex routed LAN and WAN networks, Cisco routers, Hubs, WAPs and switches.
- Performed migration of legacy Bigip and 3-DNS devices to newer version of LTM 8900 boxer.
- Hands on experience on configuring IPSec VPNs like dealing with PFS, reverse route, inbound/outbound NATs.
- Hands on experience with packet sniffer, TCP DUMP and wire shark for packet monitoring.
- Hands on experience on Cisco VPN and DNS
- Working experience of protocols Frame relay, MPLS, ATM, and PPP.
- Expert Level Knowledge about TCP/IP, Spanning-tree, and OSI models.
- Expert knowledge in implementing filters on Cisco routes using Standard and Extended access-list.
- Network monitoring and testing from Operation Center (NOC) from a network management perspective.
- Responsible for Check Point and Cisco ASA firewall administration across global networks.
- Exposure and hands on experience on Frame Relay, ISDN, Dial T1/E1, Point-to-Point Protocol, Authentication Authorization and Accounting (AAA) with different platforms of Cisco routers.
- Excellent knowledge and experience on different platforms like Cisco, Juniper, Checkpoint, F5 Big-ip LTM load balancers, Bluecoat, Riverbed, Citrix, and VMware.
TECHNICAL SKILLS
Load Balancer: BigIP 2000, 4000, 5000, 7000 series, F5 LTM 8900, 6400, 6800, GTM and 3-DNS
Firewalls: Checkpoint GAIA, R72, R75, R77.20; Cisco ASA 5505, 5510, 5550; Palo Alto firewalls, Juniper ISG 1000/2000
Switches: Cisco Catalyst 2900, 3500, 4500, 6500 series, Nexus 9000,7000, 5000, 2000 & NX-OS, Cat OS, IOS
Routers: Cisco 1750, 1800, 2500, 2600, 2800, 3800, 3900 &7200 series with IOS, IOS-XE &IOS-XR
Routing: OSPF, EIGRP, BGP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing
Switching: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging, and Data Center Switching
LAN/Features: Ethernet, Fast Ethernet, Gigabit Ethernet, 10 Gigabit, 40 Gigabit Ethernet, HSRP, GLBP, VRRP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP
AAA: Architecture TACACS+, RADIUS, Cisco ACS, LDAP
Network Tools: Wire shark, Fiddler, Solar Winds, and Cisco Works
PROFESSIONAL EXPERIENCE
Confidential, Seattle, WA
Network Engineer
Responsibilities:
- Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Nexus 9k, 7k, 6k, 5k switches and Catalyst 4500 switches.
- Creating MOPs based on templates which includes implementation, testing and back out procedures for all network implementations, upgrades and modifications.
- Network Operations and support by providing Tier-2 and Tier-3 support to WAN and LAN related issues including HSRP, VLANs, VTP, STP, RSTP, TRUNKING, SPAN and RSPAN, EIGRP, RIP, OSPF, BGP.
- Stacked, configured 2960 series switches and connected with Nexus 7000 series switches creating Vpc, spanning tree, Trunk and redundancy for failover.
- Monitored and analyzed Intrusion Detection Systems (IDS) & Intrusion Prevention System (IPS) to identify security issues for remediation.
- Responsible for comprehensive testing of all carrier-technologies used in the company using Wireshark, IXIA and Spirent.
- In-depth knowledge and hands-on experience on IP Addressing, Subnetting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
- Implementation of HSRP, VRRP for Default Gateway Redundancy.
- Configured and implemented TACACS+ and Radius for network authentication.
- Configure and support NATs, access-lists, and routing on Cisco routers Cisco ASA/PIX firewalls, routers and switches.
- Worked on Cisco PIX 500 series and ASA 5500 series Firewall providing support and configuring for NAT, PAT & advanced Firewall rules implementation. IPS on ASA’s with Botnet protection.
- Installed redundant BigIP F5 LTM and GTM load balancers to provide uninterrupted service to customers.
- Configuring and troubleshooting custom Health Monitors in both F5 and A10 Load balancers.
- Configuring Virtual Server, Service Groups and Load balancing methods in new A10 LTM.
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
- Proficient hands on experience in configuring Cisco Catalyst 2900,2960, 3560, 3750, 4500, 4900, 6500 series and Nexus 2248, 5548 and 7010 switches.
- Involved in the troubleshooting aspects of complex network infrastructure using the routing protocols like EIGRP, BGP.
- High level Knowledge on Cisco NX-OS/IOS, Arista EOS operating system, Aruba Networks, Riverbed, Infobox.
- Configured and deployed wireless access point Cisco Meraki and Cisco WLC.
- Stacked, configured 2960 series switches and connected with Nexus 7000 series switches creating Vpc, spanning tree, Trunk and redundancy for failover.
- Good working experience in implementing Voice Protocols (SIP, H.323, SCCP, MGCP)
- Deployed and managed new Data Center Fabric with new Fabric Extenders - Nexus 2148 and 2248, Fabric Interconnects using 5548 and 7010, 7018 switches with F and M series modules and Supervisor 2E
- Worked on DHCP scopes and VPN configurations.
- Implemented Site to site VPN connectivity and cloud base VPN connectivity.
- Extensive knowledge on Citrix netscalar Devices.
Confidential, Marlborough, MA
Senior Network Engineer
Responsibilities:
- Extensive worked on BMC Remedy for creating the Change Requests (CRQ’s), Work Orders, Incident Management.
- Played responsible role for implementing, engineering, & level 2 support of existing network technologies / services & integration of new network technologies / services.
- Key contributions include troubleshooting of complex LAN /WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
- Expertise experience in implementing and troubleshooting VLANs, VTP, STP, RSTP, DTP, Root Guard, BPDU Guard, Port Fast, Uplink Fast, Backbone Fast, Ether Channel, PAGP, LACP and 802.1Q.
- Plan, design and test the application migration from F5 load balancer to new A10 load balancer.
- Creating App by APP configuration conversions from F5 to A10 load balancers and test it in Lab.
- Created WIDE-IPs, WIDE-IP Pools and corresponding members in GTM’s.
- Configuring new Virtual Servers and also updating existing pools for capacity add.
- Configuring and troubleshooting custom Health Monitors in both F5 and A10.
- Configuring Virtual Server, Service Groups and Load balancing methods in new A10 LTM.
- Work on Checkpoint Firewall policy provisioning and use Provider 1 for configuring Checkpoint.
- Implemented Checkpoint FW Interface, NAT and VLAN using R76 GAIA SmartDashboard.
- Extensive implementation of firewall rules on R77 GAIA on daily basis using SmartDashboard.
- Configuration, troubleshooting Checkpoint Firewall using R77 SmartView Tracker and Monitor.
- Involved in the team for Configuring Nexus 9000/7000/5000/2000 in Top of Rack & End of Row Architecture for a Scalable Production Network that supports Rack & Blade server architecture in a Multi-Tenancy environment using VPC, VDC & VRF.
- Worked with Cisco Layer 3 switches 3560, 3750, 4500, 6500; Cisco Nexus 5000 and 7000 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, and ether channel.
- Hands on experience on change management practices like writing change requests, participating in change meetings, mentoring.
- Hands on experience on NETMRI, spectrum, and splunk, NetQOS.
- Design and implement GTM wider ip's including required topology and dns setup
- Hands on experience on configuring IPSec VPNs like dealing with PFS, reverse route, inbound/outbound NATs.
- Experience with PCI, DSS and interpreting and addressing vulnerabilities like proxyarp, DAI, ip spoofing, dhcp spoofing.
- Created VPN tunnels and configured them with BGP for various customers.
- Configured ASR9K routers as per the given requirements.
- Configured 7609, 7606 with BGP and catalyst 6505, 4500, 3550 switches with various VLAN.
- Redesign of Internet connectivity infrastructure for meeting bandwidth requirements. .
- Implemented Quality of Service (QOS), Policy Maps, Class-maps, Policy Routing in the network infrastructure throughout all the different sites.
Confidential
Network Engineer, Enterprise Services
Responsibilities:
- Performed migration of legacy Bigip and 3-DNS devices to newer version of LTM 8900 boxes
- Participate in design authority and CAB meetings to review and approve load balancer configurations
- Configured SSL Termination/offloading on the LTM boxes; Installed and renewing SSL certificates
- Design and engineering Load balancing solutions for multi-tiered applications deployed across multiple data centers and DMZ security constructs
- Applied iRules such as cookie persistency, SSL termination and SSL initiation, redirection of URL from http to https for application specific e-commerce technology
- Migrated legacy 3-DNS wider ip's to GTM sync groups
- Troubleshoot and resolve load balancers related sev1 and sev2 incidents
- Design and implement GTM wider ip's including required topology and dns setup
- Work with technical project manager and business teams to design virtual server, pool, lb methods
- Implement and configure http, https profiles, ecv health monitors
- Provide rotational on-call engineer services to resolve sev1 and sev2 incidents
Confidential
Network Engineer
Responsibilities:
- Setup, configuration, troubleshooting and testing of IPSEC site-to-site VPNs and SSL VPN on Cisco ASAs, Checkpoint and Juniper Firewalls
- Ensurenetwork availability and integrity through preventive maintenance and upgrade
- Configure and support NATs, access-lists, and routing on Cisco routers Cisco ASA/PIX firewalls, routers and switches
- Network Operations and support by providing Tier-2 and Tier-3 support to WAN and LAN related issues including HSRP, VLANs, VTP, STP, RSTP, TRUNKING, SPAN and RSPAN, EIGRP, RIP, OSPF, BGP.
- Maintaining Corporate Firewalls & Analysis of firewall logs.
- Configuring the Juniper SSG20/SSG550, SRX Gateways 100,110,210,240,250 and Cisco ASA 5500 series across the enterprise with inside, outside & DMZ zones/interfaces.
- Stacked, configured 2960 series switches and connected with servers for management and LAN configuration.
- Supported core network consisting of Cisco 7200 series routers running multi area OSPF. Implemented stub/Totally stub areas as per requirements.
- Implemented IP addressing, Subnetting, Route summarization and Distribution
- Configured Routing protocols such as VLANs, VTP, STP, MSTP, VRRP and HSRP
- Configured STP for switching loop prevention, and VLANs for data and voice along with configuring port security for users connecting to the switches.
- Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site to site VPN and remote VPN
- Configured NATs, ACL and routing on Cisco routers, firewalls, and layer 2 & layer 3 switches.
- Configured policy based routing for specific traffic, route filtering with route maps and route redistribution.
- Implemented Network monitoring tools Wireshark and ManageEngine IT360.
- Configured and implemented TACACS+ and Radius for network authentication