We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

5.00/5 (Submit Your Rating)

Green Bay, WI

SUMMARY

  • Senior Network Engineer with extensive 8 years of experience in building Network Infrastructure me.e.: LAN, WLAN, WAN topologies, managing teh Networks and Troubleshooting Network issues involving different vendor devices me.e.: CISCO, Juniper, Meraki. Specialization in Routing, Switching, F5 Load balancing, Wireshark, WLC, VOIP, and Firewalls. Excellent communication skills, proven organizational abilities and social impact provide an added dimension of highly efficient team leadership.
  • Installation, troubleshooting, configuring of Cisco ASR1002, 7600, 3800, 2800, 2600 and 1800 series Routers, Cisco switches Nexus, 6500, 4500, 4900, 3600, & 3800.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP - BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS.
  • Design and Configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550).
  • Deployment of Juniper switches EX4500 and EX4200, routers M7i and M10i.
  • Expert in configuring Access point in WLAN Controller - 5520, 2500.
  • Expert in implementing CISCO ISE and ACS for new wireless Networks.
  • Expert in designing, configuration and deployment of F5 Solutions with extensive experience working with APM and ASM technologies.
  • Experience configuring and troubleshooting on Citrix NetScalar Load Balancer.
  • WAN circuit systems design, configuration, implementation, troubleshooting and support.
  • Advanced knowledge in installation and configuration of Juniper Netscreen Firewall.
  • Migrated firewall rules from Cisco ASA to Palo Alto and Checkpoint Firewalls.
  • Shell Scripting for automating tasks using Python.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification.
  • Experienced in handling and installing Palo Alto Firewalls with exposure to wild fire feature of Palo Alto Networks.
  • Configuring, Installing and troubleshooting on Check Point Devices.
  • Experience in STP, PVST, & PVST+.
  • Experience working with OTV & FCOE on teh nexus between teh datacenters.
  • Steered efforts for providing presentation and seminar to teh customers for in-house projects to introduce about teh projects Implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, and Route Maps.
  • Experience with configuring Unified Communications VoIP environment and implementing SIP protocols.
  • Experience with applications in a Unified Communications VoIP environment.
  • Good knowledge of Unified Communications VoIP architecture, firewall/VLAN configuration, encryption, and Unified Communications VoIP security best practices.
  • Managed inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, & NTP.
  • Experience in providing on call supports 24/7 and worked in Network operations center.
  • Deploying new configuration for client requirement using PowerShell.
  • Managing teh Network using CISCO Prime.
  • Working knowledge with monitoring tools like Solar Winds and network packet capture tools like Wire-shark.
  • Knowledge of using Microsoft VISIO/Office as technical documentation and presentation tools.

TECHNICAL SKILLS

LAN Technologies: VLAN, VTP, Inter-Vlan routing, STP, RSTP, PVST, 802.1x

WAN Technologies: Frame Relay, ISDN, PPP, ATM, MPLS, Leased lines

Network Security: NAT/PAT, VPN, Filtering, IDS/IPS, IPSec, ACL

Routing Protocols: RIP, IGRP, EIGRP, OSPF, BGP, IS-IS, HSRP

Routed Protocols: TCP/IP, IPX/SPX

Voice Technologies: (CTI), VoIP, ACD, CUCM, QoS, PoE, H.323, SIP, MGCP, RTP, SCCP, SRTP,UCCM, UCCX

Data Center Technologies: VMware VSphere 5.5, VCenter Server Appliance 5.5, VMware ESXiHypervisor 5.5

Wireless: Wi-Fi, 802.11b, 802.11g, WEP/WAP, Bluetooth, GPRS, Roaming,Wireless Security, CISCO WLC 5520,2500, AP 12

Security: Firewalls, VPN, DMZ, Tunnels, Intrusion detection and monitoring,CISCO, DMZ, ACL

Infrastructure Services: DHCP, DNS, SMTP, MIBs, Syslog, POP3, FTP, TFTP

Network Management: SNMP, SSH, Telnet, ICMP

Operating Systems: Windows Vista/XP/NT/2003, MS DOS, UNIX, Linux

Protocol Analyzers: OPNET, Wireshark.

Languages/ Tools: Python, Linux Red Hat

PROFESSIONAL EXPERIENCE

Confidential, Green bay, WI

Sr. Network Engineer

Roles & Responsibilities:

  • Experienced working with security issues related to Cisco ASR 9K, Checkpoint and Juniper Netscreen firewalls.
  • Responsible for design & management of Juniper Netscreen Firewalls, Juniper Switches, Cisco Switches.
  • Provided 24x7 Cisco WAN resolution support and Change Management (CM) for an MPLS statewide IP/ATM WAN core backbone consisting of 6 NAPs, 13 POPs, and more than 150 end sites.
  • Configured VSS, VPC and HSRP on Cisco Switches.
  • Hands on experience with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
  • Experience in converting Checkpoint VPN rules over to teh Cisco ASA solution.
  • Experience in Migration of both Checkpoint and Cisco ASA VPN.
  • Configured Cisco Catalyst 6500, 3750, 2960 switches and Cisco 3600, 7200& ASR 1K & 9k Routers for an enterprise network.
  • Configured network services equipment Riverbed accelerators in compliance with security policy.
  • Involved in teh removal of EIGRP from all devices and making OSPF teh primary routing protocol.
  • Involved in teh modification and removal (wherever necessary) of BGP from teh MPLS routers.
  • Configured IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Configured, troubleshoot and administered various technologies: BGP, OSPF, DMVPN, vDC, vPC, STP, IPv4, IPv6, unicast/multicast.
  • Troubleshoot traffic passing managed firewalls via logs and packet captures.
  • Configured and managed Palo Alto Networks Firewall to manage large scale Firewall deployments.
  • Involved in Firewall filtering and NAT, Adding and modifying teh policies in juniper SRX.
  • Advanced knowledge in installation and configuration of Juniper Netscreen Firewall.
  • Design, install, configure, troubleshoot and maintain varies load balancers including Citrix NetScaler.
  • Configuring STP and VLANs for data and voice along with configuring port security for users connecting to teh switches.
  • Configuring SRX devices and troubleshooting them, connecting them with Cisco nexus devices to test connectivity.
  • Configuring VPN, clustering and ISP redundancy in Check Point Firewall.
  • Migrated Firewall infrastructure from Checkpoint R65 to Netscreen ISG2000.
  • Backup and restore of Check Point and Cisco ASA Firewall policies.
  • Managed teh testing deployment and configuration of WLC, WCS and WiSM systems me.e.: WLC CISCO 5520, 2500.
  • Configuring Access points and Hot Spot gateways for Wi-Fi network.
  • Replaced our two IAS radius servers with two Clear Pass servers to provide 802.1x, Mac authentication and Guest access.
  • Implementation and management of ISCSI and SAS direct attached SAN storages.
  • Load balancing Virtual IPs on F5 EBL (LTM and GTM) A10 EFL (SLB and GSLB).
  • Asset management, keeping inventory of every device in teh data center.

Confidential, Lincolnshire, IL

Network Security Engineer

Roles & Responsibilities:

  • Implementation of Cisco H.323 VoIP Gateway.
  • Assisted with helpdesk customer tickets by troubleshooting problems with regard to teh VOIP system.
  • Advanced call manager to teh standard version and updated system to support teh VOIP enforcement.
  • Configured and managed OSPF, BGP on Juniper Routers and SRX Firewalls
  • Configured and managed RIP, OSPF and Static routing on Juniper M and MX series Routers.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Mutual redistribution of OSPF and BGP routes using route maps for WAN optimization.
  • Hands on in deployment of GRE tunneling, SSL, Site-Site IPSEC VPN and DMVPN.
  • Configured VSS, Port Channels, L2 and L3 VLANS, Routing on L3 Cisco Switches.
  • Worked on cisco Nexus 5000 series switches for data center.
  • Installed and configured CISCO Meraki (MR66, MR18) Wireless Access Points.
  • Configuring user access and guest access, and device authentication for wireless environment
  • Configuring Access point in WLAN Controller - 5520, 2500.
  • Implementing CISCO ISE and ACS for new wireless Networks.
  • 802.1x RADIUS authentication using EAP-TLS.
  • Identified opportunities for implementation of network best practices, particularly F5 load balancer implementations.
  • Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.
  • Provided Load Balancing towards access layer from core layer using F5 Network Load Balancers.
  • Storage VDC with FCoE to Nexus 5548UP switch.
  • Monitoring Traffic and Connections in Check Point and ASA Firewall.
  • Deploying, configuring, and administering Checkpoint EndPoint firewalls and hands on experience with network protocols.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.
  • Remote access and site-to-site VPN administration using Cisco ASA/ASR andPaloAlto.
  • Managed and configured NAT's on teh Juniper Netscreen SSG firewalls.
  • Failover, OSPF and Any Connect VPN technologies.
  • Configuration of firewalls 5520 series ASA for business to business connectivity and application of ACL rules for network traffic.
  • Working with Cisco ASA 5585-X firewalls with Firewall rules,IPSec VPN, NAT, Active-Standby.
  • Responsible for installation, troubleshooting of Check Point Firewall and LAN/WAN protocols.
  • Worked on teh migration project of Juniper SSG to Juniper SRX firewalls.
  • Configured Juniper MX480s, EX8200s, EX4200s, and SRX5800s from scratch to match design.
  • Managed teh F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
  • Upgraded system images on Nexus 5 and 7 multi-layers switches using kick start and FTP server.
  • Managed Corporate Checkpoint VPN utilizing SSLVPN and Edge technologies.
  • Implemented Zone Based Firewalling and Security Rules on teh Palo Alto Firewall.
  • Migrate studies from teh Cisco ACE Load Balancer appliance to teh Citrix NetScaler Load Balancer appliance.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate.
  • Monitored network traffic using sniffers (Wireshark) and access logs to troubleshoot and identify network issues.
  • Created and maintained reference architectures, technical standards and network diagrams for LAN/WAN/Data center networks.
  • Managed Data Center and assisted other engineers by troubleshooting teh network devices, storage devices, and blade servers.

Confidential, Sacramento, CA

Network Support Engineer

Roles & Responsibilities:

  • Designed MPLS VPN and QoS for teh architecture using Cisco multi-layer switches.
  • Configured Juniper Firewall, SSG Series, Netscreen Series ISG 1000, SRX Series.
  • Configured Cisco IOS, IOS-XR, CAT-OS and Nexus hardware and software: 1000v to 7000 series.
  • Imaging of Windows and Linux OS.
  • Configured Firewall, IPS and QOS by SDM and provide security by Prefix list, Access- List and distribution list.
  • Designed and configured teh commands for QoS and Access Lists for Nexus 7K, 2K, and 5K.
  • Configured and troubleshoot issues related to STP, RSTP and VLAN's allocation in teh Organization for maintaining Layer 2/3 switching intact.
  • Worked on 4500 Catalyst switches for LAN requirement and for troubleshoot LAN issues.
  • Design and execute various Cisco Unity configurations and provide support to Unified Messaging.
  • Performed troubleshoot on all voice services for all LAN and WAN hardware modules and configure appropriate communication media modules. **
  • Maintained Checkpoint security policies including NAT, VPN and Secure Remote access.
  • Configured IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
  • Adding Websites to teh URL filtering blocklist in Bluecoat Proxies and upgrading firmware on teh bluecoat proxies.
  • Utilized VMware ESX configured and installed to implement Cisco, Microsoft Server 2008, Linux, MySQL builds, designs, throughout teh entire Network Infrastructure.
  • Created and troubleshoot VDC, allocate resources, interfaces, NTP.
  • Maintenance and Troubleshooting of LAN connectivity problems using Ping, Trace route.
  • Experience on a mesh 6500 and 5500 series switches to support teh core trading system.
  • Managing F-5 LTM, GTM, APM, ASM Administration, creating virtual servers, mapping pools, iRules and Profiles. SSL traffic offloading, also managed PCI Security Audit with F5 ASM.
  • Implemented cable multi-service operator (MSO) to capture traditional Telco subscribers with IP telephony and provide relevant QOS.

Confidential

Network Admin

Roles & Responsibilities:

  • Configuration of Cisco Routers 2500, 3000, 4000 using Routing protocols me.e.: RIP, OSPF, EIGRP & configuration of Cisco Switches 2960, & 3560.
  • Installation and configuration of workstations as IP based LAN’s.
  • Installation and configuration of DHCP Client/Server.
  • Configuring L2 and L3 security features on devices.
  • Using Smart Update, user management and authentication in Check Point Firewall.
  • Provide 24/7 on site support for Managing and Troubleshooting Plus Integration, Commissioning and Implementation of IP/MPLS core network containing 250+ Node (Customer Edge, Provider Edge, Firewalls).
  • Experience in Configuring VLANs, Private VLANs, VTP and trunking on switches.
  • Experience in Inter-Vlan routing, redistribution, access-lists and dynamic NAT.
  • Efficient in cabling as per co-location contracts with loop-back testing, including all DS1, DS3, T1, T3, CAT 6 and CAT 5 connections as per defined cabling procedures.
  • Involved in SNMP Network management. Worked on various scanning and sniffing tools like Etheiral.
  • Log messages using Syslog server and analyze teh issues related to high CPU utilization and parameters dat can degrade performance of teh network.
  • Documentation of Critical Network topology me.e.: backup procedures, server specs, installation details, & etc.

We'd love your feedback!