We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

0/5 (Submit Your Rating)

Spring, TX

SUMMARY

  • Cisco Certified Network Engineer with 9+ years of experience in teh industry which includes Designing, Implementation, Installation, Configuration, Deployment, Troubleshooting, Network Operations, Administration Support and Network Security.
  • Excellent noledge and experience on different vendor’s like Cisco, Juniper, Palo Alto, Checkpoint, F5 And VMware.
  • Strong hands on experience in layer - 3 Routing and layer-2 Switching. With Cisco switches (2900, 3550, 3750, 6500, MDS 9000, 5000), Nexus (3k,5k & 7k), Juniper (EX, QFX, QFabric) switches, Juniper (MX960, MX480, LN, CTP) routers, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers.
  • Experience in Configuring and implementing Palo Alto Firewalls, checkpoint firewalls, PIX Firewall (506, 515, 525, 535), cisco ASA (5505,5510,5520) Firewall, Cisco ISE (Identity Service Engine) Juniper (SRX 220,300) series firewalls.
  • Configured Client-to-Site VPN using SSL Client on Cisco ASA 5520 ver8.2.
  • Modified and worked in teh following platforms to support customer Voice: Cisco Unified Call Manager 6.x through 8.x, Cisco Unity Connection, voice gateways.
  • Hands on experience on Cisco WLC’s and Access Points. Experience in Physical cabling, IP addressing (IPv4 & IPv6), Wide Area Network configurations (Frame-relay & MPLS), Routing protocol configurations (RIP, EIGRP, OSPF, IS-IS, BGP).
  • Supports multiple business lines and a network of global data centers through teh administration ofSSLcertificates.
  • Up-grading and degrading teh OS (IOS, NX-OS, JUNOS) for switches and routers as per requirement
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.
  • Functional Understanding of DNS, DDOS and DOS threats and mitigation techniques.
  • Responsible for installation, configuration and troubleshooting of Cisco NAC on both client end and Manager Server.
  • Strong Knowledge of teh 7layers, TCP/IP, IP Addressing and IPV6.
  • Load Balancing using Cisco ACE, Kemp, ADC, F5, Security Device Manager (SDM).
  • Engineered traffic management solutions, including designing, low level engineering for F5LTM, GTM, ASM, APM environment
  • Performed F5appliance (LTM, GTM, APM, and ASM) maintenance and system upgrades including hot fixes and security configurations.
  • In-depth noledge and experience in WAN technologies including OC3, E3/T3, E1/T1, Point to Point, MPLS and Frame Relay.
  • Configured and troubleshooting theF5LTM andAPMand providing level 2 support for teh customers.
  • Wide experience in implementing and managingF5BIG-IP load balancing, including GTM,APM,ASM, and custom iRule development.
  • Responsible for teh secure development lifecycle for Cisco's Nexus line of products, including Application Centric Infrastructure (ACI), Application Policy Infrastructure Controller (APIC) - Cisco's Software DefinedNetwork(SDN) solution
  • Monitored systemsecurityto maintain protection and align processes with corporate objectives, including review ofsecuritycertification, configuration plans, and risk compliance.
  • Experience in using NetScout sniffer analysis for testing teh performance of teh network.
  • Configured and maintained NetScout nGenius 4200 series packet flow switch as load balancer.
  • Expertise in Virtualization with vSphere, VMware ESXi 5/4.1/4 and 3.x hosts and Virtual Center server
  • Design nextgen data centers with nexus 9500/9300 ACI, Open stack, DCI, EPGs/bridge domains,OTV, and VXLAN.
  • Implementation, configuration and management (manually and using iApps templates) of F5 2400Viprionseries using 2100 series blades, and Brocade (Foundry) devices in a multi-platform network/storage environment.
  • Implementation ofFireMonfor firewall policy compliance, rules cleanup, and complexity reduction.
  • Outstanding experience in designing and configuring ofLayer2/ 3networkingfeatures such as VLAN, ISL, STP, VTP, 802.1X, Port, L2PT and SPAN.
  • Implementation and Troubleshooting of WAN authentication protocols- PPP, CHAP and PAP.
  • IP addressing and IP address scalability by configuring NAT/PAT.
  • Experienced working on network monitoring and analysis tools like, Solar Winds, Cisco Works, River Bed, Cisco Prime, NETQOS.
  • Problem Analysis and Troubleshooting (Wireshark, SolarWinds, Cisco Prime, MRTG, & Custom Scripts)
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with teh firewalls as per teh design.
  • Design and build Windows 2000, 20, Servers.
  • Experience with convert Checkpoint VPN rules over to teh Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • SupportBlueCoatProxy in explicit mode for users trying to access Internet from Corp Network.
  • Experience with BlueCoat URL filtering with whitelisting and blacklisting URL, creating rules for content filtering.
  • Experience in NetworkIntrusiondetection/IntrusionPrevention System.
  • Experience on working with Net cracker, Cramer.
  • Worked with ticketing tools like ServiceNow, Remedy tool.
  • Hands on experiences on McAfee EPO with deploying and removing agent on client’s machine, removing virus and manually updating DAT files.
  • Knowledge on Python scripting.
  • Strong Knowledge on SDN (software defined network).

TECHNICAL SKILLS

Operating Systems: Cisco IOS, Windows NT 4.0 (Desktop/Server), Windows 2000/ 2003/ 2008/ 2012 Server, Windows XP/Windows 7/8, LINUX, UNIX, MS Exchange server, Solaris, Active Directory.

Equipment’s (Switches, Routers): Cisco routers (7600, 7200, 3900, 3600, 2800, 2600,2500, 1800 series, ASR9K(9922) andASR1K) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series, juniper SRX, MX480, 240, 80 series, EX, QFX Series Routers and HP (7000) series Switches.

Routing: OSPF, EIGRP, ISIS, BGP (EBGP/IBGP), RIP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing, IPV4, IPV6.

Switching: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing &Multi-Layer Switching, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.

Firewalls: ASA 5500 series, checkpoint, Juniper NetScreen Firewall ISG100, 2000, SSG, SRX, Palo Alto.

Load Balancer: ACE Module, GSS & F5 LTM

LAN Technology: Workgroup, Domain, HSRP, DNS, DHCP, Static, VLAN, STP, VTP, Ether Channel, Trunks.

WAN technology: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET.

Various Features &Services: HSRP, VRRP, GLBP, NAT, SNMP, SYSLOG, NTP, CDP, DNS, TFTP, FTP, IOS and Features, Management. Wireshark, IXIA chariot, Packet Sniffer, Packet Analyzer and Solar Winds Breaking Point, Tcpdump, Python.

Wireless & Wi-Fi: Canopy Wireless Device (point to point/point to multipoint), D-Link Wireless (point to point), D-Link Access Point, CISCO 1200 series Access Point, and Linksys Wireless/Wi-Fi Router.

AAA Architecture: TACACS+, RADIUS, Diameter, Cisco ACS.

PROGRAMING LANGUAGES: C, C++, EMBEDDED C.

PROFESSIONAL EXPERIENCE

Confidential, Spring, TX

Sr. Network Engineer

Responsibilities:

  • Design, deployment and maintenance of security/networkdevices and datacenters of enterprise.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (36+ firewalls) - PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Successfully installed Palo Alto PA-5000, PA-3000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls and configured and maintained IPSEC and SSL VPN's on Palo Alto firewalls.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
  • Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1.
  • Successfully done with Network device renaming in tools like Open NMS, BNA, ESM, nGenius, EMURALD, Infoblox DNS.
  • Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of teh F5 load balancers.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches.
  • Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.
  • Monitor and troubleshoot BGP, EIGRP, TI circuits, and cellular backup circuits via ICMP and SNMP ticketing systems. Cisco IOS upgrades.
  • Working on Cisco 6509 and 4507 series switches for LAN requirements dat include managing VLANs, Port Security and troubleshooting LAN issues.
  • Expertise in networking technologies like LAN, MAN, WAN and peripheral devices and working with VPN tunnels, DS1, DS3 & T1 links.
  • Troubleshooting of EBGP sessions with customer carriers in teh MPLS cloud which is made up of routers Cisco housed in different datacenters (Cisco 7609).
  • Experience configuring Catalyst (2900, 3500, 3700 and 6500 Series), Nexus (7000, 5000 and 2000 Series) Switches, and Routers (2800, 3600, 4400 Series) and Wireless AP's (1260, 3600) using CLI and GUI.
  • Supporting EIGRP and BGP based network by resolving level 2 &3 problems of internal teams & external customers of all locations.
  • Configure trunk ports and implement granular control of VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets dat can extend further across teh networkinfrastructure TEMPthan previous generation of switches.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x authentication for Wireless users.
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server.
  • Performed all maintenance tasks on teh Nexus Switches, ASR Routers, Checkpoint Firewalls, F5 Load balancers InfoBlox DNS etc.
  • Migration of core DNS, DHCP and NTP services from Microsoft to Infoblox.
  • Supported Infoblox appliances grid environment for DNS, DHCP and IP Address Management tools (IPv4)

Environment: Cisco routers 7200; Cisco Catalyst switches 6500, 4500, 2950; Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP; STP, VTP, VLAN; VPN, MPLS, HSRP, GLBP, Big-IP F5 Load Balancer, Cisco Works; MS Visio, Checkpoint, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy, Infoblox, Solar winds.

Confidential, Detroit, MI

Sr. Network Engineer

Responsibilities:

  • Designed and support teh consolidation of data centers utilizing Nexus 2K, 5K, 7K and juniper (EX, QFX)switch infrastructure.
  • Configure and maintain allPaloAltoNetworksFirewallmodels (PA-3k, PA-5k) as well as a centralized management system (Panorama) to manage large scaleFirewalldeployments.
  • Hands on experience on all software blades of Check Point Firewall. 24x7 on-callstep-upsupport asa part ofthe safetyoperations team.
  • SupportBlueCoatProxy in explicit mode for users trying to access Internet from Corp Network.
  • Working closely withnoledgecenter managementto investigatethe informationcenter sites for cabling necessitiesof assortednetworkinstrumentation.
  • Configured Class of service Policies, Traffic Policies onMX960and MX480.
  • SymantecEndpointProtectionServer and client antivirus installation, configuration and maintained.
  • Functioned as a liaison between teh client andSymantec.
  • Provided application level redundancy andaccessibilityby deploying F5 load balancerslong-term memory.
  • Management of F5Viprionbased load balancer as LTM and GTM for hundreds of applications serving teh needs of thousands of user’s locals and abroad.
  • Dealt with creating VIP pools, nodes and created custom iRules for teh virtual servers like cookie persistency and redirection of URL onF5ASMcookies issues and configuresASMpolicies
  • Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.
  • Configure F5 Load balancers forSSLhandling, Design and Implemented Virtual Server Farm for Web site load balancing in DMZ.
  • ConfiguredTufinSecure Track for checkpoint firewall to analyze teh firewall rules.
  • Created teh AAA servers for LDAP and AD authentication inF5APM.
  • Worked on Cisco ISE with Access control andAAAprotocols.
  • Integrated AWS Network with our existing production and corporate network.
  • Monitor all Malware incidents thruSourcefireIPSsystem.
  • Installed and configured databases on Unix/Linuxplatforms, managing swap configurations, virtualization (VMware ESXi 5, 5.5 and Oracle Virtual Box)
  • Using SolarWinds,NetScoutand windows performance and resource monitor to figure out dat we were losing PCoIP packets dat was degrading teh VDI environment.
  • Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
  • UsingISEDeploymentAssistant (IDA) to validate and document endpoint authentication status during monitor modedeployments.
  • Configured complexISEimplementation involving 6 agencies with GETVPN, DMVPN, SSL VPNs.
  • Configured Cisco ASA 5510 for VPN Network Access Control integration with CiscoISE(Inline PEPs).
  • HavingnoledgeCenterstyleexpertise,putting inand Configuring Network Devicesin a verynoledge Centeras well asmendthe cableswithin thePatch Panel.styleandenforcednetwork
  • DesignedWLANnetwork in newly constructed emergency management center. maintaining and operation including design and rollout of over 360 Cisco Wireless devices utilizing CiscoWLANcontrollers.
  • Provided redundancyin a verymulti homed BorderGatewayProtocol (BGP) network by tunings AS-path.
  • Handling enterprise outages effectively and driving towards teh resolution. Coordination of fault escalations in conjunction withthe firsthigh-level technical management of high priority or technicallycomplicatedcalls.
  • Designing large scale MPLS & Frame relay on Cisco environment for more TEMPthan 5000 Retail sites, 100
  • Configurebestroute map configurationsin teh new Cisco IOS XR Routing Protocol Language (RPL).
  • Perform packet analysis usingRiverbedSteel Central ARX and Steel Central packet analyzer.
  • Performing troubleshooting on slow networkpropertyproblems, routingproblemsdat involves OSPF, ISIS, BGP and distinctivethe foundationreason forthe problems.
  • Adding users and devices toTACACSServer, generating reports fromTACACS, Incident Handling, tracking and responding to all incidents of TACACSServer, Handling Account renewals, password reset forTACACS.
  • Hands-onexpertisewith Ether Channel, Spanning Tree, Trucking, ACLs, Syslog.Expertisewithin thesetup of HSRP, Access-Lists, and RIP, EIGRP, Fabric path and tunnel installations.

Environment: Nexus 2k/5k/7k, juniper EX, QFX Cisco 6500/7500/7200 Routers, Broadcom switches, Juniper SRX100, Palo Alto Fire Walls, checkpoint, Bluecoat proxy server, LAN, WAN, OSPF, RIP, BGP, SNMP, LDAP, IGMP, SSH, EIGRP, HSRP, PPP, VPN, Checkpoint, Cisco ASA, Cisco ACI.

Confidential, Newark, NJ

Network Security Engineer

Responsibilities:

  • Responsible forfittingthe infrastructure surroundings with majority of Cisco ISE &Palo Alto appliances except for varieddifferentinstrumentality.
  • EfficientlyexploitationServiceNow tool for generation of tickets,distributionseverity to incidents, following up with incidentstandingand troubleshooting incidents.
  • Excellently used Splunkto researchand monitor incident management and incident resolutionissues.
  • Perform 24x7 log monitoring - review and analyze systemsecuritylogs.
  • Monitored & analyzed system logs onSymantecEndpoint Protectionanti-virus,SymantecData Center Security.
  • Responsible for implementation/installation of LAN/WAN/SAN,ArubaSwitches,ArubaWireless AP’s andArubaVirtual Controllers.
  • Installing and configuring CISCO Wireless LANControllers(WLC) with active/ standby state with controlling more 100 Cisco access points.
  • Hands-on experience and expert noledge of Cisco Intelligent WAN (IWAN).
  • Working on Cisco 4400, 5500 serieswirelesscontrollers, Cisco 1130, 1140, 3602 and 2600 Series Access point.
  • Install and configureTufinorchestration suite and manage theTufintool from teh scratch.
  • DeployedTufinin a distributed architecture with central server and remote collectors.
  • Upgraded Showtime contentnetworkwithAristaswitches.
  • Solution program manage TrustSec andSecureXcross multiple Business Units.
  • Made recommendations for teh findings, wat rules and which ones to be turned on within theIDS.
  • Administration of CiscoMerakiNetwork switches, routers and teleworker gateways.
  • Support, Trouble shoot and upgrade smallArubaWirelessNetworks at 2,200 remote dialysis clinics across teh united states.
  • Policy provisioning, access to specific segments of teh networks through CiscoISE.
  • Engineered, configured and deployed routers using CiscoISE.
  • Daily responsibilities included design, implementation, support and administration of multiple security products running CheckPoint Provider-1,SourceFire.
  • Modified existing ACL's, IPsec and preform network translations. WAAS installed for increased network efficiencies and speed. SetupInfloBoxfor local DHCP & DNS configuration.
  • UsingInfloBox- Grid Manager - to Assign IP address to new server Builds, Production DNS System - Used for IPAM.
  • Deployed Intelligent WAN (IWAN) in both Hybrid and Dual-ISP branches to provide an increase in bandwidth capacity, security and reliability.
  • Work withlayer2technologies including Ethernet multi-mode fiber, single mode fiber and media converters.
  • Maintained/monitored a multi-vendor LAN/WAN consisting of Juniper, Cisco, and ATM equipment in amulticastheavy network environment.
  • Implemented and configured Cisco NAC-L2-802.1X and performedRiverbedRIOS operating system upgrades throughout enterprise architecture.
  • Managed a team with serval team members to Upgrade ASA’s from 8.x to 9.x, Install Firepower and Fire AMP for Endpoints,Sourcefire.
  • Investigates traces with TCP, UDP, SCTP, IP, S1AP, GTPv2 andDiameter.
  • Linux/ Unix systems integration with puppet, pulp and RHSAM.
  • Linuxand UNIX systems integration with Microsoft Active Directory.
  • Security Device - Palo Alto/ASA Firewalls,SourcefireIPS/IDS, Cisco Identity Services Engine (ISE), VPN

Confidential, Mclean, VA

Sr. Network Engineer

Responsibilities:

  • Upgraded and updated Cisco IOS from12.3T to 12.4.AccustomedDHCP tomechanicallyassign reusable information scienceaddresses to DHCPshoppers.
  • Palo Altostyleand installation (Application andURLfiltering, Threatbar,informationFiltering).
  • Deployments of top of rack (TORs) switches usingAristaDCS-7050SX and Cumulus Edge-Core to allownetworkconnectivity via MLAG/CLAG of a new environment built from Dell, HPs and Super micros servers
  • Generate a wide variety of reports on firewall andIDSactivity notifying teh end customer concerning suspicious traffic.
  • Configuring rules and MaintainingPalo-AltoFirewalls & Analysis of firewall logs exploitation varied tools.
  • Upgrading teh equipment with latest OS (IOS, NX-OS, JUNOS).
  • Black listing and White listing of web URL onBluecoatProxy Servers.
  • Performing URL filtering and content filtering by adding URL's in Bluecoat Proxy SG's.
  • Serve as teh primarydatapoint for internal and external auditing processes, including third-partydatafor quarterly and annual reports.
  • Configured and maintained NetScout, nGenius 4200 series packet flow switch as load balancer.
  • Successfullyput inPalo AltoPA 3060 firewalls to protectsinformationCenter and provided L3 support for routers/switches/firewalls.
  • IntegratedISEwith an MDM solution for mobile devices including onboarding using EAP-TLS.
  • Maintained SIPRNet Cisco ACS (TACACS) servers.
  • Deployment, configuration, and management of 802.1x solutions to include Cisco IdentityServices Engine (ISE), ACS (Radius and TACACS+), and Cisco Prime Infrastructure.
  • IntegratedTACACSand LDAP for user authentication on webpage and device
  • Implemented Zoneprimarily basedFirewalling and Security Rules on thePalo AltoFirewallExposure to wildhearthfeature ofPalo Alto.
  • Investigates traces with TCP, UDP, SCTP, IP, S1AP, GTPv2 andDiameter.
  • Maintained and managed networks running EIGRP and BGP routing protocols.
  • Regularly performed firewall audits aroundstopFirewall-1 solutionsfor purchasers.
  • Provided tier3 support forstopFirewall-1software systemto support customers.
  • Work on stop Platformtogether withsuppliersensibleDomain Manager. Worked on configuring, managing and supportingstopGateways.
  • Configuration of routing protocols EIGRP and BGPfor littleto medium sized branchessupportedcompany branch standards,together withdistributionand route maps.
  • Experience configuring multiple models of Cisco ASA, 3750, 6500, 7600, 3800,ASR1k/9k, and ISR platforms.
  • Deploying and decommission of VLANs on coreASR9K, Nexus9K, 7K, 5K and its downstream devices and configure 2k, 3k,7k,9K series Routers.
  • Helping remote and local’s users daily technical issues for e.g. related to windows 7 and 10, Internet Application access issue, Shared or mapped folder access issue,office365.
  • Build Incognito DHCP server using Debian O/S and configure rules and classes forDOCSIS headend.
  • Accesspurposerefresh and implementation atvariedsized branches and locations.
  • Used networkobservationtoolslikeSpectrumto confirmnetworkpropertyand protocol analysis tools to assess and pinpoint networkingproblemsinflictingservice disruption.
  • Build IT security infrastructuretogether withstop, Juniper andPalo Altofirewalls
  • Configuring F5 Load Balancers and adding virtual IPs, nodes, pools and healthobservation.
  • Configuring Juniper NetScreen Firewall Policies between secure zonesexploitationNSM (Network Security Manager).
  • ImplementingAAA, Access ControlServerconfiguration for RADIUS and TACACS+.
  • Handling Break/Fixthings, monitor, configure, policy creation on Checkpoint'ssensibleCenter Server running on Secure Platform
  • Monitoring Traffic and Connections using cisco prime and solar winds
  • Manage project task to migrate from Cisco ASA firewallsto examinepurposefirewalls
  • Worked extensively in Configuring,observationand Troubleshooting Cisco's ASA 5500/PIX security appliance, Failoverdemilitarized zonesectionalizing& configuring VLANs/routing/NAT with teh firewalls as perthe planning

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, HP (7510,7506) switches, Brocade VPX, ICX series switches, Palo Alto Firewalls, Viprion2400 BlueCoat proxy server, LAN, WAN, WLAN, OSPF, RIP, SNMP, BGP, LDAP, IGMP, SSH, EIGRP, HSRP, PPP, VPN, Checkpoint, Cisco ISE.

Confidential, Sunnyvale, CA

Network Engineer

Responsibilities:

  • Configuration 7609, 7606 with OSPF, Juniper (EX, QFX, QFabric) switches with various VLAN’s.
  • Firewalltechnologies including general configuration, risk analysis, security policy, rules creation and modification ofCheckPointR65, R70 & R77, Fortinet NGFW series firewalls and Cisco ASA.
  • Hands on experience on all software blades ofCheckPointFirewall.
  • Design and Build Windows 2000, 20, Servers.
  • Active Directory Installation, Maintenance and Upgrades.
  • Responsible for All Software Installations on Both teh Servers and Workstations. dis Includes Antivirus Software and Any Custom Applications.
  • Install network backbone,wirelesscontrollers andwirelessaccess points (Cisco,Aruba, Ruckus).
  • Troubleshoot layer 2 issues, routing, HTTP, FTP,SSLCertificatesand IPSec VPN tunnels.
  • Experience in Network administration, management and monitoring using SolarWinds, Tivoli, Info block, ACS andISE.
  • Configured new SSID's on Wireless LANController(WLC) with VLAN's, Security and other needed requirements.
  • Policy Reviewing, Audit and cleanup of teh un-used rule on teh firewall usingTufinand Splunk.
  • Worked on Cisco ISE with Access control andAAAprotocols.
  • ImplementedLayer2andLayer3 security on routers & switches
  • Perform network engineering, design, planning LTM & GTM,APMload balancing implementation and scheduling infrastructure related tasks by coordinating with other teams.
  • Server load-balancing utilizingF5LTM-Big IP, includingAPM,ASMand Viprion device modules.
  • Create and testCisco router and switching operations using OSPF routing protocol.
  • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Optimized performance of teh WANnetworkconsisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
  • Configuration and troubleshooting of Cisco 6500, 7500, 7200 Series routers.
  • Extensively worked on Nexus 5k and 7k configured and troubleshoot.
  • Managing and supporting large scale MPLS & Frame relay on Cisco environment for more TEMPthan 5000 Retail sites, 100 Distribution centers, 100 offices and 3 datacenters.
  • Troubleshooting issues related to Layer 1/2/3 skills like switching / routing, WAN /Hardware and critical network links by coordinating with teh vendor.
  • Involved in Configuration of Access lists (ACL) on ASA firewall for teh proper network routing for teh B2B network connectivity.
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.
  • Configured teh Cisco router as IP Firewall and for NATing.
  • Developed a detailed test plan and executed test cases usingIXIAfor traffic generation.
  • Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching teh cables in teh Patch Panel. Design and implemented network
  • Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter-VLAN routing, LAN security etc.
  • Deploying Layer 2 security in Server Farms by configuring switch for 802.1x port-based authentication.
  • Involved in teh configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.

Environment: Juniper (EX, QFX, QFabric) Switches, Broadcom(PEX), Fortinet, CheckPoint, Palo Alto Firewalls, Cisco ACI, Viprion2400 Cisco 6500/7500/7200 Routers, Nexus, 5K,7K, LTM, GTM, F5 Load Balancer, ASA, OSPF, SNMP, BGP, LDAP, IGMP, SSH, EIGRP, RIP, LAN, WAN, SSL/VPN.

Confidential

Network Engineer

Responsibilities:

  • Configured and deploying Cisco catalyst 6506, 4948E, 4510 switches, Broadcom(PEX), Cisco 3660, 3845, and 7609 series Routers.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.
  • Experience in migration of VLANS.
  • Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls
  • Involved in teh troubleshooting aspects of complex network infrastructure using teh routing protocols like EIGRP, OSPF & BGP.
  • Implementation of Access Lists for allowing/blocking desired traffic.
  • Configuring VLANs/routing/NATing with teh firewalls as per teh network design.
  • Responsible for Cisco ASA firewall administration, Rule Analysis, Rule Modification.
  • Configuration and maintenance of Cisco PIX and ASA firewall systems.
  • Good noledge in systems integration, software hardware emulation experience.
  • Responsible for Configuring, Maintaining, And Repairing All Servers, Workstations, Laptops, And Peripherals.
  • Worked on change management documentation of Network infrastructure design using Microsoft Visio, SYSLOG.
  • Perform setup of test scenarios, both hardware and software components, and perform troubleshooting.
  • Experience working in Datacenter environment, configuration changes as per teh needs of company.
  • Configured and performed troubleshooting on link state protocols like OSPF in single area and multiple areas.
  • Configure iBGP and eBGP peering between L3 routers and core routers
  • Configuring, implementing and troubleshooting VLAN’s, VTP, STP, Trucking, Ether channels.
  • Designing, implementing LAN/WAN configurations on Cisco 5K, catalyst 6500 switches.
  • Installing, configuring Cisco 2500, 2600, 2800, 3600 series routers and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
  • Experience in configuring, upgrading and verifying teh NX-OS operation system.
  • Troubleshoot issues with network connectivity and issues related to neighbor relationship and peers
  • Experience working with Nexus 7010, 5020, 2148, 2248 switches.
  • Experience configuring Virtual Device Context in Nexus 7k series switch.
  • Strong noledge on networking concepts like TCP/IP, Routing and Switching.
  • Designed, configured, implemented site-site VPN on Cisco ASA 5500 firewall.
  • Implemented, configured redundancy protocols HSRP, VRRP, GLBP for Default Gateway Redundancy.
  • Worked in projects converting P2P circuits into MPLS circuits, commissioning and decommissioning of teh MPLS circuits for branch offices.
  • Configuring and resolving various OSPF issues in an OSPF multi area environment.
  • Implemented, configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).
  • Packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems.
  • Implementing, configuring, and troubleshooting various routing protocols like RIP, EIGRP, OSPF, and BGP
  • Performing network monitoring, providing analysis using various tools like Wire Shark, Solar winds.

Environment: CheckPoint, CISCO ASA, PIX, Broadcom, Cisco 6500/7500/7200 Routers, Nexus, 5K,7K, LTM, GTM, CISCO ASA, OSPF, BGP, EIGRP, RIP, LAN, WAN, SSL/VPN.

Confidential

Network Engineer

Responsibilities:

  • Performed Troubleshooting and observed directing conventions such OSPF, EIGRP & BGP.
  • Involved in composing investigating rules for MPLS VPN.
  • Experience with conventions, for example, Frame Relay, IEEE 802.11 and VLAN, OSPF and BGP, DNS, DHCP, FTP, NTP, SNMP, SMTP and TELNET.
  • Installed, designed (through CLI & SDM) and oversaw CISCO Routers and Catalyst switches.
  • Set up Internet, executing Networking items like Servers, Proxy servers, Switches, Firewalls, Routers.
  • Involved in client accelerations and investigating issues identified with integration, STP, VLAN, Trunking, VTP, Layer 2/3 exchanging, Ether channels, Inter-VLAN directing, log messages, high CPU usage and parameters dat can debase execution of system.
  • Strong hands on experience on PIX, Firewalls, ASA 5500 series firewalls. Implemented Security Policies using ACL, IPSEC, SSL, VPN, IPS/IDS,AAA(TACACS+ & RADIUS)
  • Configured VLANS on different impetus switches performed investigating on TCP/IP system issues, Administered Frame-Relay and systems.
  • Provided specialized backing and issue determination for teh LAN and its surroundings by breaking down teh issue, recognizing teh reason and circumstances of teh issues and discovering an answer for teh distinguished issue.
  • Good noledge in Configuring Access Control List(ACL).

Environment: Windows Server, Windows NT, CISCO 2600, 2800 and 3200 series routers, CISCO 3300 and 2950 switches, TCP/IP, Proxy servers, Switches, Firewalls, Routers.

We'd love your feedback!