We provide IT Staff Augmentation Services!

Sr Network Engineer Resume

0/5 (Submit Your Rating)

CA

SUMMARY

  • AccomplishedNetworkand Security engineering professional with 7+ years of real time experience in designing, deploying, migrating & supporting critical multi - site redundantNetworkenvironments.
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.
  • Designed 10 gigabit networks using Cisco Nexus 7000 series switches, Checkpoint NGX firewall and Cisco 3800 series routers
  • Experience testing Cisco & Juniper routers and switches in laboratory scenarios and then deploy them on site for production.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.
  • Enterprise experience with Nexus models like 7K, 5K, 2K series.
  • Experience in configuring VDC, VPC and FCOE, upgrading NX-OS for Nexus Family Switches.
  • Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248)
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Experience on F5 Local Traffic managers (LTM), Global traffic manager (GTM) of series 6400, 6800, 3400, 5100, 3600 and 3DNS migration to GTM.
  • Experience working with Juniper JUNOS version 12 and Version 13 for routing and switching protocols.
  • Responsible for checkpoint and Cisco ASA firewall administration across global networks.
  • Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
  • Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
  • Experience with configuring Nexus2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus5000
  • Hands on experience in configuring and supporting site-to-site and remote access Cisco, IPSec, VPN solutions using ASA/PIX firewalls, Cisco and VPN client.
  • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Good knowledge on juniper SRX240, SRX220 and SRX550 series Firewalls.
  • Implemented Positive Enforcement Model with the help of Palo AltoNetworks.
  • Experienced in handling and installing Palo Alto Firewalls with exposure to wild fire feature of Palo Alto Networks.
  • PerformCheckpointand PIX firewall/IDS design, integration & implementation for Cyber Trap client networks.
  • Hands on experience on configuring Cisco ASA 5540, 5580 firewalls.
  • Experience in installing, configuring and troubleshooting Checkpoint Firewalls.
  • In-depth in preparing Technical Documentation and presentations using Microsoft VISIO/Office.

TECHNICAL SKILLS

Cisco Platforms: Nexus 7K, 5K, 2K, 1K

Cisco Routers: 1700,1800,2500,2600,2800,3600,3800,3900,7200,7600

Cisco L2 & L3 Switches: 2900,3500,3560,3750,4500,4900,6500

Juniper Platforms: SRX, MX, EX Series Router and Switches

Networking Concepts: Access-lists, Routing, Switching, Sub netting, Designing, CSU/DSU, IPsec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall: ASA Firewall (5505/5510), Checkpoint, Cisco ASA

Network Tools: Solar Winds, SNMP, Cisco Works, Wireshark

Load Balancers: Cisco CSM, F5 Networks (Big-IP)

Wan Technologies: Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3,0C3, T1 /T3 & SONET

Lan Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channelVLANS, VTP, STP, RSTP, 802.1Q

Security Protocols: IKE, IPSEC, SSL-VPN

Networking Protocols: RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System: Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

Documentation: MS Office, MS Visio

PROFESSIONAL EXPERIENCE

Confidential, CA

Sr Network Engineer

Responsibilities:

  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Configured IPsec site-to-site VPN connection between Cisco VPN 3000 Concentrator and Cisco 3800.
  • Juniper ContrailSDNdeployment assistance to the senior engineering team
  • Configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000. Configuring VDC & VPC in Nexus 9k, 7k, 5k and 2k.
  • Participated in data center upgrade from Cisco IOS platforms to NX-OS platforms.
  • Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewall 5505.
  • Configured Protocol Handling, Object Grouping and NAT on ASA Firewalls (5505).
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
  • Configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
  • Experience deploying BIG-IP F5LTM Load Balancers for load balancing and traffic management of business application
  • Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
  • Responsible for Check Point and Cisco ASA firewall administration across global networks.
  • Creation of Firewall policies as per the requirements on Checkpoint, ASA, FWSM, and Juniper Firewalls.
  • Working on security devices ASA, Juniper, Palo Alto Firewalls, Routers, and Switches.
  • Configured Cisco routers for MPLS VPN connectivity and VRF tables on edge routers for customer usage of the MPLS network.
  • Configure/upgrade wireless access points and familiar with Cisco wireless controllers.
  • Implemented site to site VPN in Juniper SRX as per customer and various EX, SRX & J series Juniper devices.
  • Responsible for NAT traffic flow in theJuniperSRX 3600 and supportJuniperSpace.
  • Team member of Configuration of Cisco 7206 router with VPN and Configuration of Catalyst switches.
  • Advanced knowledge in Design, Installation & configuration of Palo Alto & Checkpoint Provider Environment.
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the VPN networks.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.
  • Experience with Network Redesign for Company Campus Locations and Moving from 6500 based Data Center to Nexus based Data Center.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.

Confidential, CA

Network Security Engineer

Responsibilities:

  • Technical Knowledge on Cisco PIX/ASA series,JuniperNet screen/SRX firewall gateways.
  • Implemented site to site VPN in Juniper SRX as per customer.
  • Configured and implemented Nexus 5K and 2K in lab environment
  • Experience with configuring Nexus2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus5000
  • Migration from Cisco toPaloAltofirewall & Cisco to Checkpoint firewall
  • Troubleshot VoIP issues with Cisco Call Manager 8.6; Unity Connections and Presence.
  • Worked on wireless networking hardware such as Cisco Wireless LAN Controller and AP 1200.
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
  • Implemented HSRP on the Cisco 3550 Layer 3 switches and OSPF on 2 Cisco 3925 routers, the Layer 3 switch, Cisco 3550 Switches, Cisco 3524XL switches for fail over.
  • Working with Cisco ASA 5585-X firewalls with Firewall rules,IPSec VPN, NAT, Active-Standby Failover, OSPF and Any Connect VPN technologies
  • Configuration of firewalls 5520 series ASA for business to business connectivity and application of ACL rules for network traffic.
  • Design/install/Configure Nexus 7k, 5k and 2k switches, PAN firewall and NetScaler Application load balancer.
  • Experience with converting PIX rules over to the Cisco ASA solution.
  • Maintain Security policy by monitoring PIX firewalls (515 and 520).
  • Installed and designed four PIX 525 and two ASA 5505 in client areas. Notwithstanding that, arranged two PIX firewall for the Guest access.
  • Established IPSEC-VPN tunnels with ASA 5500 series Firewall between some branch offices & headquarters.
  • Configuring and managingF5ASM (Application security manager). Develop security policies.
  • Designed application mapping and application delivery using F5 BIG IP LTM.
  • Experience in working with designing, installing and troubleshooting ofPaloAltofirewalls.
  • Implemented site to site VPN with IPSEC via. GRE ISKAMP
  • Implemented Cisco site to site VPN for partnering with different partners around the world.
  • Configured IPsec VPN access for client to site remote access.
  • Experience with configuring BGP in the data center and using BGP as a WAN protocol and manipulating BGP attributes.
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-Trunking, deployed port security when possible for user ports.
  • Responsible for Cisco ASA firewall administration across our globalnetworks.
  • Involved in the redistribution into OSPF on the core ASA firewall.
  • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling.

Confidential, San Francisco, CA

Network Engineer

Responsibilities:

  • Designing and installing new branchNetworksystems. ResolvingNetworkissues, running test scripts and preparingNetworkdocumentation.
  • Responsible for Working in high availability Nexus Environment and provide Layer 3 Network Support.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Translating Cisco IOS Route maps to Cisco IOS XR Routing policies.
  • Working with Cisco Nexus 2148 Fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.
  • Implemented Positive Enforcement Model with the help of Palo Alto Networks
  • Physically deployed new Cisco Nexus devices, Catalyst and Nexus replacement blades, FWSMs, Cisco ASAs, Citrix NetScaler MPX and SDX chassis
  • Configuring, Installing and troubleshooting on Checkpoint Devices.
  • Isolated network traffic via F5 load balancers for GTMs and LTMs
  • Migrated Cisco ASA firewall to next generation Palo Alto firewalls.
  • Working with wireless technologies troubleshooting and configuration.
  • Establishing VPN Tunnels using IPSec encryption standards and configuring and implementing site-to-site VPN, Remote VPN.
  • Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Config, Assigning DCHP profiles.
  • Implemented Load Balancing between Cisco L3 Switch by HSRP and GLBP.
  • Successfully executed change on Nexus 9K and 7Ks to support redundant platform.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
  • Working with Juniper JUNOS on M and MX series routers.
  • Creating new nodes and Pools in F5 load balancers to support newly added servers in Layer 3 environment.
  • Configuring, Monitoring and Troubleshooting Cisco's ASA 5500 security appliance, Failover DMZ zoning and configuring VLANs/routing/NATing with the firewalls as per the design.
  • Successfully installed Palo Alto PA-3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls.
  • Worked on migrating the F5 LTM 5100 version 9.2 to 5100 LTM version 9.4 and F5 GTM configurations

Confidential

Network Support Engineer

Responsibilities:

  • Hand on experience on IP Addressing, Sub netting.
  • Experience in designing, implementation and operations of enterprise datanetworksasnetwork engineer.
  • Enterprise Switching with VLANs, Trunks, Spanning Tree, Port Spanning etc.
  • Sound knowledge in LAN/WAN setup, installation, configuration, and troubleshooting.
  • Experience in Layer 3 Routing Protocol configurations: RIP, OSPF, BGP, EIGRP.
  • Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco basednetworks.
  • Performed Port channeling and LACP between downstream devices for VPC configuration.
  • Installed and configured CISCO ASA and Checkpoint firewall.
  • Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Config, Assigning DHCP profiles.
  • Policy provisioning, access to specific segments of the networks through Cisco ISE.
  • Configured network access servers and routers for AAA Security (RADIUS/ TACACS+)
  • Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security
  • Implementation of name resolution using WINS & DNS in TCP/IP environment
  • Key contributions include troubleshooting of complex LAN/WAN infrastructure that include knowledge and skill of 802.11 a/b/g/n LAN normal for wireless Technology.
  • Configured and resolved various OSPF issues in an OSPF multi area environment.
  • Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.

Confidential

Network Administrator

Responsibilities:

  • Responsible for implementation and day to day operations of all associated hubs, routers, bridges, gateways andNetworkrelated equipment.
  • Worked on necessary tools for Linux/Unix System, and Microsoft Power shell.
  • Deploying the network infrastructure to meet the requirements.
  • Created VLAN and Inter-VLAN routing with Multilayer Switching.
  • Documenting and Log analyzing the Cisco ASA 5500 series firewall
  • Monitor performance of network and servers to identify potential problems.
  • Real time monitoring and network management using Cisco Works LMS (LAN Management solution).
  • Satisfactorily Resolved Problems in timely manner with focus on providing a high level of support for all customers.
  • Prepared Engineering documents and Network diagrams in Microsoft Visio.
  • Delivered Departmental Efficiency through advanced engineering, technical support, and documentation procedures.
  • Implemented cable multi-service operator (MSO) to capture traditional Telco subscribers with IP telephony and provide relevant QOS.
  • Provided technical support on hardware and software related issues to remote production sites.
  • Responsible for LAN and internet connection file and print server.
  • Active participation on operational support for routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.
  • Managed various teams involved in site surveys, cabling specifications,Networkequipment installation and configuration.

We'd love your feedback!