We provide IT Staff Augmentation Services!

Network Admin Resume

0/5 (Submit Your Rating)

Pleasanton, CA

SUMMARY

  • Cisco Certified Network Engineer with 8+ Years of experience across designing, performing Network analysis, Troubleshooting, maintaining and supporting complex network systems
  • Have experience in Security, Cisco Routing and Switching with strong Cisco hardware/software.
  • Extensive working experience on Switching (VLANs, STP, VTP, Ether channels, HSRP), WAN (Frame Relay, IPSec, VPNs, MPLS), VOIP, QoS.
  • Worked on firewall Pix525, ASA and other tools like SNMP, AAA, RADIUS and designed VPN with IPSEC security layer.
  • Implemented traffic filters on CISCO routes using Standard Access List and Extended Access List.
  • Hands - on experience of working on CISCO firewalls, CISCO PIX(506E/515E/525) & ASA 5500(5510/5540) Series.
  • Hands on experience on PIX Firewalls, ASA Firewalls. Implemented Security Policies using ACL traffic filters, IPSEC, SSL, VPN, AAA (TACACS+ & RADIUS).
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Have Hands on experience in implementing F5 BIG-IP load balancer.
  • Having experience in deploying BIG-IP F5LTM load balancers for Load balancing and traffic management of business application.
  • Knowledge of CISCO Wireless networking technology, including ISE configuration and management. Configured Cisco Access Control Server (ACS) to enforce security policy in User Groups.
  • Configured access for all Active directory groups to get network access over WAN connections in Cisco ACS.
  • Worked with F5 Load balancing, Web sense, bluecoat proxy servers and Administrating, authentication controls (Radius, TACACS+)
  • Working knowledge of RADIUS/TACACS authentication mechanisms and configuration of Cisco ISE/ACS.
  • Extensive knowledge in VMware installation, configuration, and virtualized infrastructure management.
  • Configuring VM's on ESX Server and installing hosts and Migrating Virtual Machines across various VMware ESX Server, Workstation and VMware servers.
  • Proficient with network hardware and technologies including Firewalls, Routers, Switches, Ethernet, Fast Ethernet and Gigabit Ethernet.
  • Troubleshoot TCP/IP problems; troubleshoot connectivity issues in multi-protocol Ethernet, Environment.
  • Switched telephone network (PSTN), PPP, ISDN, Frame Relay, TCP/IP, and VPN.
  • Having experience in handling L1 & L2 escalation, configuring & troubleshooting MPLS VPN circuits, IP VPN, L2, Internet circuits.
  • Provided engineering support for network infrastructure such as proxies, load balancers, encryption, remote access servers (terminal servers/Citrix servers), Remote client access, Network Admission Control (NAC), VPNs, SSL accelerators, WAN optimizers, DHCP controllers, and performance analyzers).
  • Performed IOS upgrades on CISCO routers and Switches.
  • Experience in Configuring, upgrading and verifying the NX-OS operation system.
  • Strong gasp of current and future technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, ACL, VPN.
  • Had Substantial Knowledge including the configuration of Spanning Tree Protocol(STP), Per VLAN Spanning Tree(PVST), Rapid STP(RSTP) and Rapid per VLAN Spanning Tree Protocol(PVST+).
  • Proficient in operation of Cisco Nexus 5K switches with Fabric Extender using VPC, VLAN, STP and LACP.
  • Utilize Cisco Prime to monitor network and perform upgrades and mass configurations.
  • Assisted in refresh of data center network refresh to Nexus leaf switches.
  • Troubleshoot and hands on experience on security related issues on Checkpoint, IDS/IPS, Palo Alto and Juniper Net screen firewalls.
  • Experience working on Cisco Catalyst Series (3750, 4500, 4900, 6500); Nexus (2K, 5K, 6K and 7K) series switches.
  • Knowledge on VMware ESX Server security tasks creating and applying Roles and Permission within Active Directory Users and Groups, configuring vMotion, Resource Pool, and DRS, HA Cluster, cloning and migrating VM machines.
  • Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.
  • Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2Kseries, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy
  • Knowledge of JUNOS platform and worked with JUNOS upgrade of Juniper devices
  • Experience with different Network Management Tools and Sniffers like Wire shark (ethereal), HP- Open-view, RSA envision, and Cisco works to support 24 x 7 Network Operation Center

TECHNICAL SKILLS

ROUTERS: CISCO ROUTERS (7200, 3800, 3600, 2800, 2600, 2500, 1800,7500) CISCO GSR 12416,12418, CISCO 7200VXR, ASR 1K and 9K

Cisco Switches: (2900, 3500, 4000, 4500, 5000, 5800, 6500, 7600 Nexus 2k, 3k, 5k, 7k), ASR 1k.

Juniper: E series, J series and M series. Juniper SRX & VPN, T-Series, MX-Series Routers

Routing Protocol: (BGP, OSPF, EIGRP, ISIS, IGRP, LDAP, IGMP), Routed protocol TCP/IP, SIPMulticasting (PIM), 802.1Q.

LAN Protocols: VLAN, PVLAN, VTP, IPX, Inter-VLAN routing, ISL, dot.1q, STP, IS-IS, RSTP, MSTP, IPVST, LACP, HSRP, GLBP, VPC, VDC, Ethernet, Port security

WAN Technology: Frame Relay, ISDN, ATM, WAAS, PPP, ICMP, WiSM Module in 6509, X.25, L2VPN, L3VPN, E1/T1/DS1/DS3.

Firewall: ASA Firewall (5505/5510), Cisco ASA Network Tools Solar Winds, SNMP, Cisco Works, Wire shark, Palo Alto Firewalls (PA200, PA2000 PA3000, PA4000,PA5000 series)

Physical interfaces: Fast Ethernet, Gigabit Ethernet, Serial, HSSI, Sonet (POS)

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Operating systems: Linux, UNIX, DOS, Windows 2003 server and Windows 2008 server

Applications/Tools: NCM, Flowtraq, NetworkObserver Packet Capture, Nexus Data Broker, Solar winds, Kiwi Cat Tools, Secure CRT, Wire Shark, Visio, Visual Studio

Hardware: Cisco ASA, Cisco NGA, A10 Thunder DDOS, A10 AX 3400 LB's, Fort inet Firewall, Nexus 3K and 5K, Catalyst, Arista, Force10, Brocade

Operating Systems: Microsoft XP/Vista/7, UNIX, Linux (Redhat, Open Suse, Fedora), PAN

OS: Windows Servers 2003/2008 Windows MS-Office

PROFESSIONAL EXPERIENCE

Confidential, Pleasanton, CA

Sr. Network Engineer

Responsibilities:

  • Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.
  • Working in high availability Nexus Environment with switches like 7k series and provide Level 3 Network Support.
  • Working with Cisco Nexus 2148 Fabric Extender and Nexus 7010, 7018,5000 series to provide a Flexible Access Solution for a datacenter access architecture.
  • Configured trunk and access ports, and implemented granular control of VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets that can extend further across the network infrastructure than with previous generation of switches.
  • Created documents for various platforms including Nexus 7k.
  • Experience configuring Virtual Device Context in Nexus 7k series switch.
  • Experience with configuring Nexus 5000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000.
  • Oversaw migration of WAN links to new service provider, designed full mesh WAN, set up TFTP server to backup, and restored configuration and IOS image files for the PIX, Cisco routers, and Catalyst switches.
  • Migration of application, server, service groups from Citrix Net scalar to F5.
  • Responsible for the design of data centers, WAN, LAN, corporate wireless, and Tier III support.
  • Writing iRules scripting using TCL (Tool command language) for HTTP redirection, redirection of HTTP traffic from one data center to another data center, content based redirection.
  • Worked with iRules using TCL for loading rules in HTTP to HTTPS redirection, SSL Termination.
  • Used load balancers ACE and load balancing technique with multiple components for efficient performance and to increase reliability through redundancy.
  • Assisted in Configuring and Troubleshooting Cisco's ASA 5500, Failover DMZ zoning & configuring VLANs, routing protocols, NAT with the firewalls as per the design. Configured remote access IPSEC VPN on Cisco ASA 5500 series.
  • Successfully installed Palo Alto Next-Generation PA-3060, PA-5060 firewalls to protect Data Center with the use of IPS feature.
  • Implementing and configuring and supporting the WLAN Network using Cisco LAN.
  • Experience with configuring Virtual Server and configuring load balancing methods in F5 12.0 LTM.
  • Configured NAT and SNAT in F5 12.0 LTM. Managed virtual servers in F5 12.0 LTM. Performed Migration from CISCO ACE load balancers to F5 LTM.
  • Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.
  • Worked on F5 and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance.
  • Experience with GTM F5 component to provide high availability with providing services across data centers.
  • Firewall technologies including general configuration, risk analysis, security policy, rules creation and modification of Check Point Gaia R65, R70 & R77, R77.1, VSX R77.1Palo Alto and Cisco ASA.
  • Possess good experience in configuring and troubleshooting WAN technologies like T1, T3, DS3 and ISDN.
  • Responsible for implementing QOS parameter on switching configuration.
  • Troubleshooting Network routing protocols (BGP, EIGRP and OSPF) during the Migrations and new client connections.
  • Did Network monitoring of LAN/WAN use tools like Ethereal and Wire shark.
  • Experience with implementing and maintaining network monitoring system (Cisco works, HP Open view, and Wire shark) and experience with developing network design documentation using VISIO.

Environment: Cisco ACE, Cisco Nexus, Cisco Switches, F5 Load-balancer, Cisco Source fire, Juniper Switches, Palo Alto Firewalls, Checkpoint Firewall, Gigamon, Wire shark

Confidential, Acton, MA

Sr. Network Engineer

Responsibilities:

  • Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
  • Configured ASA5540 to ensure high-end security on the network with ACLs and Firewall.
  • Used IPSec VPN tunneling to provide access to user machines and partners in other network. Provided application level redundancy and availability by deploying F5 load balancers LTM.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.
  • Worked on server’s migration and understanding the VMware and virtualization which connected to End of life and End of support switches from 3560, 3750, 3850. which are having no dual power source to the Nexus-5x as part of power redundancy.
  • Configured routing protocols like EIGRP, OSPF & BGP and troubleshooting layer3 issues.
  • Implemented Quality of service (QoS) to increase bandwidth utilization in LAN and WAN interface using RSVP and Packet prioritization.
  • Maintained TACACS and RADIUS servers for AAA and user authentication.
  • Configured PVSTP+ for loop prevention and VTP for Inter-VLAN Routing.
  • Worked on Extensively on Cisco Firewalls ASA5500(5510/5540) Series.
  • Support third party technologies within the ACI ecosystem such as VMware ESX, OpenStack.
  • Involved in design, implementation of checkpoint.
  • Checkpoint Firewall upgrade from Checkpoint R65 to Checkpoint GAIA R77.
  • Monitoring Traffic and Connections in Checkpoint and ASA Firewall.
  • Configuration of HSRP for load balancing on L3 switches on different location of office on the switchedNetwork.
  • Configured and deployed BIG-IP LTM 6900 for providing application redundancy and load balancing.
  • ImplementedNetworkpacket level monitoring using Wire shark, Solar winds
  • Expertise in maintenance of layer2 switching tasks which advocate VLAN, VTP, STP, RSTP, PVST,RPVST,configuring of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.
  • Worked on commissioning and decommissioning of the MPLS circuits for various field offices & POPs.
  • Worked with ASA Firewall configuration and Participated in Migration of PIX to ASA for hardware devices.
  • Knowledge in implementing and configuring F5 Big-IP LTM 6400 load balancers.
  • Configured ASA 5520 to ensure high-end security on thenetworkwith ACLs and Firewall.
  • Build IT security infrastructure including Checkpoint, Juniper and Palo Alto firewalls.
  • Using Smart Update, User Management and Authentication in Checkpoint Firewall, Monitoring and troubleshooting traffic through Smart View Tracker.
  • Hands on experience in managing the Checkpoint Management Server, Monitoring Traffic and Connections in Checkpoint and ASA Firewall.
  • Hands-on experience on Checkpoint Firewall R77, Palo Alto and Cisco ASA 5520 firewalls.
  • Security infrastructure engineering experience as well as a Microsoft Windows, UNIX, Checkpoint Firewalls,Juniper firewalls, PIX firewalls, Bluecoat Proxies, Juniper Intrusion Prevention devices, and wireless switchSecurity Management.
  • Experience on Check Point Firewalls NG, NGX, R61, R65, R70, R75, R77.
  • Experience in creating multiple policies and pushing them in to Checkpoint Firewall (Gateways) and hands on experience in managing the Checkpoint Management Server.
  • Worked with Cisco Catalyst 6500, 4500, 4900 switches and Cisco 2800, 3600, 3800, 7200 & 7600 seriesRouters.
  • Involved innetworkDesigning, Routing, DNS, IP Sub netting, TCP/IP protocol.
  • Worked with Routing Protocols of EIGRP and BGP.
  • Configured PVSTP+ for loop prevention and VTP for Inter-VLAN Routing.
  • GRE tunneling &Site-to Site VPN configuration between other two sites in USA.
  • Implemented redundancy for Routers, Switches and Firewalls.
  • Manage Cisco Routers and troubleshoot layer1, layer2 and layer3 technologies for customer escalations.
  • IP Allocation & Maintenance for users and other needs throughout company.
  • Involved in IOS and CAT OS upgrade procedures and Pre/Post checks for customer production upgrades.

Environment: Routers(ASR,3k6k,7k), Switches(3k,4k)nexus(5k,7k),Palo Alto,ASA,F5 load balancer, ITIL framework, TACACS, Protocols-STP,WIRESHARK,SOLAR WINDS

Confidential, Mountain View, CA

Network Engineer

Responsibilities:

  • Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance).
  • Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter Vlan routing, LAN security .
  • Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.
  • Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.
  • Experience working on Cisco Catalyst Series (3750, 4500, 4900, 6500); Nexus (2K, 5K, 6K and 7K) series switches.
  • Monitoring the traffic through Cisco catalyst switches for Detection of Intrusion using IDSM2 and its Prevention IPS.
  • Implementing and troubleshooting (on-call) IPSec VPNs for various business lines and making sure everything is in place.
  • Configure Cisco ASR 9001/9010/9910 and Catalyst 6509 routers for L3 Vlans with HSRP and advertise network in BGP and OSPF in complex DC environment.
  • Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer.
  • Involved in setting up Voice VLANs on distribution switches, and configuring access switches ports for AVAYA IP PHONES.
  • Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.
  • Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per the requirement of the company.
  • Experience with Firewall Administration, Rule Analysis, Rule Modification
  • Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
  • Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
  • Responsible for Cisco ASA firewall administration across our global networks
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience
  • Setup simplified and traditional VPN communities, and Cisco Any connect
  • Experience with F5 load balancers andCiscoload balancers (CSM, ACE and GSS).
  • Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers.
  • Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs.
  • Adding and removing checkpoint firewall policies based on the requirements of various project requirements.
  • Implementing IPSec and GRE tunnels in VPN technology.
  • Supporting project test teams in analyzing the bandwidth utilization. installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
  • Designed, configured, implemented site-site VPN on Cisco ASA 5500 firewall.

Environment: Nexus devices, F5 Load balancer, Cisco devices, Layer 3 issues, Checkpoint Firewall, QOS, IPSEC VPN, WAN

Confidential

Network Engineer

Responsibilities:

  • Responsible for the configuration of Cisco Routers (7000, 5300, 4000, 2500, 3000, 2600) using RIP, IGRP, OSPF, EIGRP.
  • Managed office network with Cisco devices with network devices including 2500 and 3600 series routers and 3500, 2900, 1900 series switches
  • Analyzed and resolved a high percentage of initial customer contact in the areas of PC/LAN.
  • Dealt with customer problems to management and support groups utilizing standard escalation model.
  • Configured EIGRP and OSPF as interior gateway protocol with route filtering and route redistribution, installed and maintained Cisco 3600, 2600 and 7200 backbone routes with HSRP.
  • Hands-on experience with WAN technologies like T1/T3, DS3, STM1 and STM4 circuit types
  • Configured Security policies including NAT, PAT, VPN, Route-maps and Access Control Lists.
  • Handled Network Migration from RIP to OSPF.
  • Implementation of TCP/IP and related Services-DHCP/ DNS
  • Configured, maintained and troubleshot routing protocols such as OSPF, EIGRP.
  • Engaged in office moves, helped in identifying network requirements of new building, installed new networking hardware, and coordinated with vendors for cabling/wiring
  • Assisted with escalation procedures and customer notifications.
  • Configured Cisco Routers for OSPF, IGRP, RIPv2, EIGRP, Static and default route.
  • Upgraded Cisco Routers, Switches and Firewall (PIX) IOS using TFTP
  • Experience with Server Administration using Linux
  • Acted as Tier 3 support for connectivity, failures, configuration, implementation, and troubleshooting.
  • Provided project management for data center cabling, documented all network drawings using Visio

Environment: Cisco Routers 2600, 2800 and 3800 series, Cisco Switches Cat 1900, 2900, 3500series, Cisco ASA5506, 5510.

Confidential

Network Admin

Responsibilities:

  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications.
  • Configured Cisco Routers for OSPF, RIP, RIPv2, EIGRP, Static and default route.
  • Configured the Cisco router as IP Firewall and for NATing.
  • Work with Help Desk for circuit troubleshooting to give Support to the Tech persons at the site.
  • Configuring routers and send it to Technical Consultants for new site activations and gives online support at the time of activation.
  • Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access.
  • Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.
  • Responsible for configuring GLBP between multilayered switch networks.
  • Installed and configured PIX 520, 525, 535 series firewalls, configured standard and extended access-lists and policy- based filters.
  • Configured ASA 5510 appliance and VPN.
  • Responsible for implementing QOS prioritizing voice traffic over a data.
  • Implemented SNMP on Cisco routes to allow for network management. Completed the installation and configuration of T1, T3 & OC3 circuits.
  • Troubleshoot TCP/IP problems, troubleshoot connectivity issues.

Environment: ACI, Nexus 9k.7k,5k,2k, Cisco 6500,3850,3950,4500, Cisco ASA, ACE and Net scalar load balancers.

We'd love your feedback!