We provide IT Staff Augmentation Services!

Network Engineer Resume

4.00/5 (Submit Your Rating)

Seattle, WA

SUMMARY

  • 7+ years of experience as Network Engineer in troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, IS - IS, RIP & BGP, ability to interpret and resolve complex route table problems.
  • Advanced knowledge of BGP, QOS, IPSec, SSL VPNs, DNS, and DHCP.
  • Excellent written and oral communication skills.
  • Extensive knowledge ofnetworkprotocols (TCP/IP, SNMP, FTP, syslog, TFTP, etc.)
  • Experience in Cisco Routing and Switching using 3600, 3700, 3800, 4500, 5300, 6500, 7200, 7600 Nexus 9k, Nexus 7k, Nexus6k, Nexus 5k, and Nexus 2k & ASR 9000, 1000 series routers
  • Hands on Experience using Infoblox for configuring DNS and DHCP scoops.
  • Expert Level Knowledge about TCP/IP, Spanning-tree, and OSI models.
  • Installing and configuring F5 Load balancers and firewalls with LAN/WAN configuration.
  • Extensive hands-on experience with complex routed LAN and WAN networks, Cisco routers, Hubs, WAPs and switches.
  • Performed migration of legacy Bigip and 3-DNS devices to newer version of LTM 8900 boxer.
  • Hands on experience on configuring IPSec VPNs like dealing with PFS, reverse route, inbound/outbound NATs.
  • Hands on experience with packet sniffer, TCP DUMP and wire shark for packet monitoring.
  • Hands on experience on Cisco VPN and DNS
  • Working experience of protocols Frame relay, MPLS, ATM, and PPP.
  • Expert Level Knowledge about TCP/IP, Spanning-tree, and OSI models.
  • Expert knowledge in implementing filters on Cisco routes using Standard and Extended access-list.
  • Network monitoring and testing from Operation Center (NOC) from a network management perspective.
  • Responsible for Check Point and Cisco ASA firewall administration across global networks.
  • Exposure and hands on experience on Frame Relay, ISDN, Dial T1/E1, Point-to-Point Protocol, Authentication Authorization and Accounting (AAA) with different platforms of Cisco routers.
  • Excellent knowledge and experience on different platforms like Cisco, Juniper, Checkpoint, F5 Big-ip LTM load balancers, Bluecoat, Riverbed, Citrix, and VMware.

TECHNICAL SKILLS

Load Balancer: BigIP 2000, 4000, 5000, 7000 series, F5 LTM 8900, 6400, 6800, GTM and 3-DNS

Firewalls: Checkpoint GAIA, R72, R75, R77.20; Cisco ASA 5505, 5510, 5550; Palo Alto firewalls, Juniper ISG 1000/2000

Switches: Cisco Catalyst 2900, 3500, 4500, 6500 series, Nexus 9000,7000, 5000, 2000 & NX-OS, Cat OS, IOS

Routers: Cisco 1750, 1800, 2500, 2600, 2800, 3800, 3900 &7200 series with IOS, IOS-XE &IOS-XR

Routing: OSPF, EIGRP, BGP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing

Switching: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging, and Data Center Switching

LAN/Features: Ethernet, Fast Ethernet, Gigabit Ethernet, 10 Gigabit, 40 Gigabit Ethernet, HSRP, GLBP, VRRP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP

AAA: Architecture TACACS+, RADIUS, Cisco ACS, LDAP

Network Tools: Wire shark, Fiddler, Solar Winds, and Cisco Works

PROFESSIONAL EXPERIENCE

Confidential, Seattle, WA

Network Engineer

Responsibilities:

  • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Nexus 9k, 7k, 6k, 5k switches and Catalyst 4500 switches.
  • Creating MOPs based on templates which includes implementation, testing and back out procedures for all network implementations, upgrades and modifications.
  • Network Operations and support by providing Tier-2 and Tier-3 support to WAN and LAN related issues including HSRP, VLANs, VTP, STP, RSTP, TRUNKING, SPAN and RSPAN, EIGRP, RIP, OSPF, BGP.
  • Stacked, configured 2960 series switches and connected with Nexus 7000 series switches creating Vpc, spanning tree, Trunk and redundancy for failover.
  • Monitored and analyzed Intrusion Detection Systems (IDS) & Intrusion Prevention System (IPS) to identify security issues for remediation.
  • Responsible for comprehensive testing of all carrier-technologies used in the company using Wireshark, IXIA and Spirent.
  • In-depth knowledge and hands-on experience on IP Addressing, Subnetting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
  • Implementation of HSRP, VRRP for Default Gateway Redundancy.
  • Configured and implemented TACACS+ and Radius for network authentication.
  • Configure and support NATs, access-lists, and routing on Cisco routers Cisco ASA/PIX firewalls, routers and switches.
  • Worked on Cisco PIX 500 series and ASA 5500 series Firewall providing support and configuring for NAT, PAT & advanced Firewall rules implementation. IPS on ASA’s with Botnet protection.
  • Installed redundant BigIP F5 LTM and GTM load balancers to provide uninterrupted service to customers.
  • Configuring and troubleshooting custom Health Monitors in both F5 and A10 Load balancers.
  • Configuring Virtual Server, Service Groups and Load balancing methods in new A10 LTM.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Proficient hands on experience in configuring Cisco Catalyst 2900,2960, 3560, 3750, 4500, 4900, 6500 series and Nexus 2248, 5548 and 7010 switches.
  • Involved in the troubleshooting aspects of complex network infrastructure using the routing protocols like EIGRP, BGP.
  • High level Knowledge on Cisco NX-OS/IOS, Arista EOS operating system, Aruba Networks, Riverbed, Infobox.
  • Configured and deployed wireless access point Cisco Meraki and Cisco WLC.
  • Stacked, configured 2960 series switches and connected with Nexus 7000 series switches creating Vpc, spanning tree, Trunk and redundancy for failover.
  • Good working experience in implementing Voice Protocols (SIP, H.323, SCCP, MGCP)
  • Deployed and managed new Data Center Fabric with new Fabric Extenders - Nexus 2148 and 2248, Fabric Interconnects using 5548 and 7010, 7018 switches with F and M series modules and Supervisor 2E
  • Worked on DHCP scopes and VPN configurations.
  • Implemented Site to site VPN connectivity and cloud base VPN connectivity.
  • Extensive knowledge on Citrix netscalar Devices.

Confidential, Marlborough, MA

Senior Network Engineer

Responsibilities:

  • Extensive worked on BMC Remedy for creating the Change Requests (CRQ’s), Work Orders, Incident Management.
  • Played responsible role for implementing, engineering, & level 2 support of existing network technologies / services & integration of new network technologies / services.
  • Key contributions include troubleshooting of complex LAN /WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
  • Expertise experience in implementing and troubleshooting VLANs, VTP, STP, RSTP, DTP, Root Guard, BPDU Guard, Port Fast, Uplink Fast, Backbone Fast, Ether Channel, PAGP, LACP and 802.1Q.
  • Plan, design and test the application migration from F5 load balancer to new A10 load balancer.
  • Creating App by APP configuration conversions from F5 to A10 load balancers and test it in Lab.
  • Created WIDE-IPs, WIDE-IP Pools and corresponding members in GTM’s.
  • Configuring new Virtual Servers and also updating existing pools for capacity add.
  • Configuring and troubleshooting custom Health Monitors in both F5 and A10.
  • Configuring Virtual Server, Service Groups and Load balancing methods in new A10 LTM.
  • Work on Checkpoint Firewall policy provisioning and use Provider 1 for configuring Checkpoint.
  • Implemented Checkpoint FW Interface, NAT and VLAN using R76 GAIA SmartDashboard.
  • Extensive implementation of firewall rules on R77 GAIA on daily basis using SmartDashboard.
  • Configuration, troubleshooting Checkpoint Firewall using R77 SmartView Tracker and Monitor.
  • Involved in the team for Configuring Nexus 9000/7000/5000/2000 in Top of Rack & End of Row Architecture for a Scalable Production Network that supports Rack & Blade server architecture in a Multi-Tenancy environment using VPC, VDC & VRF.
  • Worked with Cisco Layer 3 switches 3560, 3750, 4500, 6500; Cisco Nexus 5000 and 7000 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, and ether channel.
  • Hands on experience on change management practices like writing change requests, participating in change meetings, mentoring.
  • Hands on experience on NETMRI, spectrum, and splunk, NetQOS.
  • Design and implement GTM wider ip's including required topology and dns setup
  • Hands on experience on configuring IPSec VPNs like dealing with PFS, reverse route, inbound/outbound NATs.
  • Experience with PCI, DSS and interpreting and addressing vulnerabilities like proxyarp, DAI, ip spoofing, dhcp spoofing.
  • Created VPN tunnels and configured them with BGP for various customers.
  • Configured ASR9K routers as per the given requirements.
  • Configured 7609, 7606 with BGP and catalyst 6505, 4500, 3550 switches with various VLAN.
  • Redesign of Internet connectivity infrastructure for meeting bandwidth requirements. .
  • Implemented Quality of Service (QOS), Policy Maps, Class-maps, Policy Routing in the network infrastructure throughout all the different sites.

Confidential

Network Engineer, Enterprise Services

Responsibilities:

  • Performed migration of legacy Bigip and 3-DNS devices to newer version of LTM 8900 boxes
  • Participate in design authority and CAB meetings to review and approve load balancer configurations
  • Configured SSL Termination/offloading on the LTM boxes; Installed and renewing SSL certificates
  • Design and engineering Load balancing solutions for multi-tiered applications deployed across multiple data centers and DMZ security constructs
  • Applied iRules such as cookie persistency, SSL termination and SSL initiation, redirection of URL from http to https for application specific e-commerce technology
  • Migrated legacy 3-DNS wider ip's to GTM sync groups
  • Troubleshoot and resolve load balancers related sev1 and sev2 incidents
  • Design and implement GTM wider ip's including required topology and dns setup
  • Work with technical project manager and business teams to design virtual server, pool, lb methods
  • Implement and configure http, https profiles, ecv health monitors
  • Provide rotational on-call engineer services to resolve sev1 and sev2 incidents

Confidential

Network Engineer

Responsibilities:

  • Setup, configuration, troubleshooting and testing of IPSEC site-to-site VPNs and SSL VPN on Cisco ASAs, Checkpoint and Juniper Firewalls
  • Ensurenetwork availability and integrity through preventive maintenance and upgrade
  • Configure and support NATs, access-lists, and routing on Cisco routers Cisco ASA/PIX firewalls, routers and switches
  • Network Operations and support by providing Tier-2 and Tier-3 support to WAN and LAN related issues including HSRP, VLANs, VTP, STP, RSTP, TRUNKING, SPAN and RSPAN, EIGRP, RIP, OSPF, BGP.
  • Maintaining Corporate Firewalls & Analysis of firewall logs.
  • Configuring the Juniper SSG20/SSG550, SRX Gateways 100,110,210,240,250 and Cisco ASA 5500 series across the enterprise with inside, outside & DMZ zones/interfaces.
  • Stacked, configured 2960 series switches and connected with servers for management and LAN configuration.
  • Supported core network consisting of Cisco 7200 series routers running multi area OSPF. Implemented stub/Totally stub areas as per requirements.
  • Implemented IP addressing, Subnetting, Route summarization and Distribution
  • Configured Routing protocols such as VLANs, VTP, STP, MSTP, VRRP and HSRP
  • Configured STP for switching loop prevention, and VLANs for data and voice along with configuring port security for users connecting to the switches.
  • Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site to site VPN and remote VPN
  • Configured NATs, ACL and routing on Cisco routers, firewalls, and layer 2 & layer 3 switches.
  • Configured policy based routing for specific traffic, route filtering with route maps and route redistribution.
  • Implemented Network monitoring tools Wireshark and ManageEngine IT360.
  • Configured and implemented TACACS+ and Radius for network authentication

We'd love your feedback!