Network Engineer Resume
WA
SUMMARY
- 8 years of experience as Network Engineer in Routing, Switching and Firewall Security, including hands - on experience in providing network support, installation and analysis for a broad range of LAN / WAN/Data Center communication systems.
- Expertise in implementing, maintaining and troubleshooting L2 switching tasks such as VLANs, VXLAN, VTP, VLAN Trunking using ISL and 802.1Q, STP, RSTP, PVST+, Ether channel using LACP and PAgP, Inter-VLAN routing.
- Expertise in static and dynamic routing, Dynamic protocols like EIGRP, OSPF, RIP, and BGP.
- Well Experienced in configuring Gateway Redundancy Protocols such as HSRP, GLBP, and VRRP
- Hands on experience in configuring Cisco Prime 2.1 and WCS wireless platforms.
- Design & administer public wireless using Cisco 5500 WLC and Cisco Prime for network monitoring and configuration.
- Experience in managing security policies with CSM, integrated with ASA 5500 devices.
- Performed security operations on ASA firewalls such as IPsec VPN’S, NAT, configuring Active/Standby Stateful failover, and any connect Web VPN.
- Experience in installing, configuring and troubleshooting of Checkpoint and Palo Alto Firewall.
- Worked extensively in Configuring, Monitoring and Troubleshooting Checkpoint security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with teh firewalls per design.
- Configured and managed Nexus platform devices, which includes Nexus 9K, Nexus 7K,Nexus 5K and N2Ks in data center environments.
- Experience working onArubawireless controllers.
- Designing and implementing F5 BIG-IP load balancer.
- Extensive knowledge in implementing and configuring F5 Big-IP LTM-3900, and 6900 Load balancers, these are configured as LTMs.
- Experience with Bluecoat Proxy servers and Packet Shaper Systems.
- Configured Cisco Access Control Server (ACS) to enforce security policy in User Groups.
- Design and deploy Cisco ACS Server solutions including TACACS+, High Availability, Active Directory integration, etc.
- Experience in installing and configuring DNS, and DHCP server.
- Experienced working on network monitoring and analysis tools like SOLAR WINDS, CISCO works.
- Experience in WAN Accelerations devices like, Cisco WAAS and Riverbed.
- Performed deep packet analysis to troubleshoot application issues using tools like Wire-shark.
- Extensive knowledge in different networking application protocols DHCP, DNS, FTP, TFTP, PAP, CHAP, HTTP, HTTPS.
TECHNICAL SKILLS
Switches: Cisco Catalyst 3560, 3750, 3850, 4500, 4900, 6500& Nexus 2K, 5K, 6K, 9K
Routers: Cisco 2900, 3600, 3800, 3900, 7200, ASR 1001X
Routing: RIP, OSPF, EIGRP, BGP, VRFSSwitching VLAN, VXLAN, Dot1Q, VTP, STP, RSTP, PVST, PVST+, HSRP, GLBPPort Security, Nexus VPC/VDC/OTV, FEX, MPLS, WAN
Protocols: TCP/IP, UDP, ARP, ICMP, DNS, DHCP, SNMP, HTTP
LAN-WAN: Ethernet, Frame relay, HDLC, PPP, T1, T3, OC Standard, DSL, ISDN
VPN: PPTP, L2TP, Site to Site, IPSEC, SSL
Firewalls& Security: Cisco ASA 55XX series, Checkpoint R77, Palo Alto, Blue Coat
Load balancers: F5 LTM BigIP (6400 and 6900)
Wireless: Cisco 3600 Access points and Cisco 55XX Wireless LAN controllers
AAA architecture: ACS 5.3 and Window Radius
Tools: SolarWinds, WireShark, WinSQL and GNS3
Others: Windows Server 2008/2012, MS SQL, Oracle, C and JavaScript
Operating System: Win 7 and Windows 2012 server, Linux Fedora, Mac OS X Yosemite
PROFESSIONAL EXPERIENCE
Confidential, WA
Network Engineer
Responsibilities:
- Involved in configuring IP Quality of service (QoS)
- Experienced in WAN environments, installing and troubleshooting data circuit problems (MPLS, T1)
- Involved in designing and applying QOS and policy map to 2800 series routers for all teh branches
- Involved in designing GRE tunnels for encryption of data flow from source to destination
- Implementing VoIP solutions using SIP & H.323 also have sound knowledge of Avaya VoIP product.
- Hands on experience with Cisco 3500, 3750, 4500, 6500 series equipment and configuring and deploying and fixing them with various modules like Gig card, VPN SPA card, WIC card.
- Had exposure to wild fire advance malware detection using IPS feature of Palo Alto
- Successfully installed Palo Alto Next-Generation PA-3060, PA-5060 firewalls to protect Data Center with teh use of IPS feature.
- Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized Management system (Panorama) to manage large scale firewall deployments.
- Hands-on experience on Checkpoint Firewall R77.
- Experience on Check Point Firewalls NG, NGX R65, R70, R75, R77, NSX (VMware Network).
- Experience in creating multiple policies and pushing them in to Checkpoint Firewall (Gateways) and hands on experience in managing teh Checkpoint Management Server.
- Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
- Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
- Configuring BGP/OSPF routing policies and designs, worked on implementation strategies for teh expansion of teh MPLS VPN networks.
- Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
- Black listing and White listing of web URL on Blue Coat Proxy Servers.
- Proficient in handling network traffic generators like IXIA and Spirant and network protocol analyzers like Ethereal, Wireshark.
- Experience configuring and troubleshooting on Citrix NetScalar Load Balancer.
- Design, install, configure, troubleshoot and maintain varies load balancers including Citrix Netscaler, Riverbed STM.
- Experience with Project documentation tools & implementing and maintaining network monitoring systems (Cisco works & Net info, Info man Virtual Change) and experience with developing network design documentation and presentations using VISIO.
- Understanding & Implementation of IPSEC & GRE tunnels in VPN technology.
- Involved in designing L2VPN services and VPN-IPSEC autantication & encryption system.
- Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.
- Implementing & Troubleshooting of T1, MUXES and CSU/DSU and data circuits.
- Have experience with Cisco Works LAN Management Solution.
- Experience in migration of Frame-relay based branches to MPLS based technology using multi-layer stackable switch like 6500 series and 2800 series router.
- Involved in design and implementation of Data Center Migration, worked on implementation strategies for teh expansion of teh MPLS VPN networks.
- Provided technical assistance for LAN/WAN management & troubleshooting and complex customer issues using Network monitoring tools such as Solarwinds.
Confidential, Los Angeles, CA
Network Engineer
Responsibilities:
- Providing consultancy in Network architecture & design for new IT projects within teh organization, working with enterprise design and architect teams.
- Data centers consolidation, design, management and supporting network activities.
- Managing location specific Cisco ASA Firewalls and also data center internet gateway firewalls.
- Handling new application load balancing requirements through F5 LTM devices.
- Experience with configuring Virtual Server and configuring load balancing methods in F5 12.0 LTM.
- Configured NAT and SNAT in F5 12.0 LTM. Managed virtual servers in F5 12.0 LTM.
- New technology evaluation and implementation
- Integrating new locations with existing MPLS Network and enabling standard corporate application access.
- Designing and implementing LAN/WAN solutions across locations
- Managing teh LAN/WAN devices across locations for day - to-day operations.
- Coordinating with service providers like AT&T, Verizon etc. for all network outages /restoration/new implementations.
- Implementation of Site to Site VPN s with direct vendors and customers.
- Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
- Implementing and maintaining network monitoring system (Cisco works, HP Open view and Wireshark) and experience with developing network design documentation using VISIO.
- Designed and deployed a Cisco Identity Services Engine (ISE) solution (wired, wireless, and VPN users) for a commercial client with converged access switches and ASA firewalls.
- Installed and configure Cisco Identity Service Engine (ISE) 2.0 and implement 802.1x and wireless guest sponsor portal.
- Worked with team Managing and configuring Aruba Wireless controller devices (7210, 7240) and Cisco Access Points.
- Performed site refreshes on Cisco switching and Aruba wireless infrastructure at several locations.
- Attending weekly CAB meetings and ensuring all changes were going through teh change process.
- Capacity planning and providing recommendations for infra upgrades
- Vendor/Service provider management/reviews/evaluating new vendors.
- Infrastructure upgrades and new Infra deployments.
- Managing IT Security & Disaster recovery Management
Confidential
Network Engineer
Responsibilities:
- Configuring and troubleshooting RIP, OSPF and EIGRP routing protocols on 2600,2900 and 3600 series Cisco Routers
- Also implanted VTP and Trunking protocols Dot1q/ISL on 2900, 2940 series cisco Catalyst switches.
- Implemented new IP scheme (RFC 1918) in teh company for present and future growth.
- Configured ACL’s to allow teh right users to access teh different applications all over teh company.
- Experience with real-time understanding of OSI layer and TCP/IP models.
- Worked on installation, maintenance and troubleshooting of LAN and WAN when needed.
- Performed network maintenance checks as well as configured and maintained printers, copiers and other miscellaneous network equipment.
- Assisted in teh transition of services from one NOC to another and documented teh company’s design, implementation and troubleshooting procedures.
- Worked on network-based IT systems such as Racking, Stacking, and also making of custom patch cables (straight through and crossover) for connections among teh devices.
- Actively monitor network performance based on company’s Service Level Agreement (SLA) using various network management tools such as WireShark, SolarWinds and openNMS.