We provide IT Staff Augmentation Services!

Network Engineer Resume

4.00/5 (Submit Your Rating)

SUMMARY:

IT professional with over 6 - 8 years of experience in maintain, planning, implementing, administration (service requests, escalation support (ticket resolution), documentation(maintain policies and procedures), support and problem-solving of various network technologies for data center environments which includes proficiency in high availability Cisco routing/switching (LAN/WAN, VLANs), routing protocols( BGP, OSPF, MPLS, EIGRP), Confidential ( cisco, Palo alto), Monitoring tool within virtual/physical environments in corporate environments, management virtual/physical storage and server environments.

TECHNICAL SKILLS:

Routing/Switching Products: Cisco Routers (7600, 7200, 3900, 2900, 1900, 800), Cisco Catalyst Switch (6500, 5000, 4900, 4500, 3100, 3500, 3000, 2950x), Cisco ASR 9k, Cisco GSR 12k, Cisco Nexus 2k, 5k, 7k Series, Juniper Routers & Switches, HP Routers & Switches, Alcatel-Lucent Routers, Alcatel-Lucent Multilayer Switches.

Protocols & Standards: WAN, LAN, TCP/IP, Spanning Tree, BPDU, CDP, ACL, NAT, PAT, RIP, RIPv2, OSPF, OSPFv6, EIGRP, BGP, MPLS, VTP, SNMP, SMTP, ARP, TCP, UDP, Static Routing, Stub Routing, VLAN, VLAN Trunking, VXLANs, Multicast Routing, HSRP, SVI, CEF, Etherchannel, Portfast, VSS, vPC.

Firewalls Technologies: Cisco Manager Suite, Cisco ASA 5500 series firewalls, Cisco FWSM, Cisco IPS/IDS, Cisco ACS, Advanced Firewall Manager (AFM), Cisco ASA 1000V cloud firewall, Checkpoint Firewall, Juniper SRX series, Palo Alto

Protocols & Standards: AAA, TACACS+, RADIUS, SSH, VPN, IPSec, SSL/IPSec, Data Loss Prevention, Data Management Zone, Pretty Good Protection (PGP), Public Key Infrastructure (PKI), Internet Key Exchange Policy, Port Confidential, MAC Address Filtering

Technologies: Products - Meraki, Cisco WLC(5520, 2500), Aironet, Aerohive (Hive Manger, AP330), Ruckus(Zone Director), Aruba(HP), Bluetooth, CUCM, UCCM, UCCX, Avaya, AURA Comm Mgr, Avaya Definity, Avaya IP Office.

Protocols & Standards: VoIP, VoIP/SIP, MGCP, RTP, SCCP, SRTP, QoS, PoE, IEEE 802.1.xx, WLAN, WAP, AP, SSID, LWAPP, CSMA/CA, MMDS, LMDS, CCK, DSSS.

Monitoring/Enterprise Technologies: Zenoss, Finisar, Wireshark, Remedy, OpNet, Cacti, Nagios, Solarwinds, Riverbed, Cisco Works, LogicMonitor, Cisco Confidential Manager Suite, Server, Sniffer, Ethereal, SNMPv2c, SNMPv3, RMON, Syslog, tcpdump, DNS, DHCP, FTP, Telnet, HTTP(S), SMTP, tunneling protocols, point-to-point, SFTP, VMware VSphere, VCenter Server Appliance, VMware ESXi Hypervisor, F5 Big-IP Load Balancing (GTM/LTM), 10G/40G Ethernet, FCoE, SAN, Port-channels, vPC, Port-Profiles, Routing/Service Profiles, SFP+, NAS, RDX.

Other Tools/Platforms: AD (Active Directory), LAN Manager, IIS Checkpoint Firewall Norton Firewall and Ghost, Mcafee IPS, Norton Virus Protection Utilities, iPhone, Blackberry.

PROFESSIONAL EXPERIENCE:

Confidential

Network Engineer

Responsibilities:

  • Member of a team of professional responsible for designing, implementation, installation, configuration, maintenance and troubleshooting various LAN/WAN infrastructures where they respond to and troubleshoot malfunctions of network hardware /software applications, telephones and Confidential systems to resolve operational issues and restore services.
  • Responsible for various consulting services to include designing, installing, configuring, and administering complex IT infrastructure; Windows Server Local and Cloud installations, configurations, and administration of VMware ESX for Cloud servers, Cisco Firewalls, VPN Concentrators and Confidential appliances; resolving escalated Trouble Tickets performing as-needed configuration and installation for F5 reverse-proxy load-balancers.
  • Technical responsibilities are maintaining multi-site network Local Area (LAN) and (WAN) technologies operations and software applications, operating systems and regular maintenance with both private and public facilities.
  • Specific technologies include but not limited to Solar Winds, Network Performance Monitor, Net Flow Traffic Analyzer, VPN, working in the data center and the Cloud environment, Confidential (802.1x) implementation and troubleshooting, and support for Ruckus, Cisco and Aerohive.
  • Professional responsibilities included administration, RSA SecurID implementation and implementing IT Confidential best practices PCI Compliance, following corporate policies and procedures and scheduling as needed reports to management

Confidential

Network Engineer

Responsibilities:

  • Responsible for various consulting services to include architecture technical support, implementing, configuration, administration and troubleshooting on various network infrastructures and enterprise applications such as Cisco router, switches, Confidential, F5 load balancers and VoIP systems
  • Lead on projects that included but not limited to client/vendor’s relationships, administration, engineering and project management including any aspect of a home or business networks.
  • Additional responsibilities included desktop support to ensure proper functionality by engaging with the customer’s teams or one-on-one in these activities to ensure proper implementation.
  • Specific projects include design, implement and support of network environments and training on use of various applications.

Confidential

Network Administrator

Responsibilities:

  • Member to a team of professionals responsible for the day-to-day maintenance of the IT infrastructure to include onsite administration, support, configuration, installation and troubleshoot activities for healthcare applications.
  • Technologies handled by the team include but not limited to local area network (LAN) technologies, wide area network (WAN) technologies, server and enterprise applications and desktop technologies.
  • Professional responsibilities included administration, following corporate policies and procedures, documentation, and scheduling as needed reports to management.

Confidential

Network Administrator

Responsibilities:

  • Primary activities included contributing to critical solutions, consulting, resolving hardware problems daily, providing scripts, repair and troubleshooting for business and personal needs.
  • Resolved escalated Trouble Tickets performing as-needed configuration, installation, testing, provisioning, implementation, and troubleshooting of on-site computer services which includes Store Associates and Assets Protection.
  • Specific activities include being committed to helping and providing solutions to clients.

Confidential

Citrix Administrator

Responsibilities:

  • Team member of professionals responsible for the day-to-day maintenance of the IT infrastructure to include onsite and remote users and applications, Citrix administration, support, installation, configuration and troubleshoot activities.
  • Technologies handled by the team include but not limited to local area network (LAN) technologies, wide area network (WAN) technologies, server and enterprise applications and desktop technologies. And Citrix based technology
  • Professional responsibilities included daily backups, system monitoring, administration, publishing Apps and following corporate policies and procedures.

Confidential

Network Engineer/System Administrator

Responsibilities:

  • Member to a team of professionals responsible for the support, design, implementation, maintenance, administration, installation, configuration, monitoring tools and troubleshooting activities.
  • Technologies handled by the team include but not limited to VoIP phones, SAN, ESX servers for workstations and SAN’s, servers, firewalls, switches at the data center and virtual environments, routers, VPN, network Confidential, and companywide systems for various LAN/WAN technologies, server and enterprise applications and desktop technologies.
  • Responsibilities included daily backups, disaster/operational recovery, system monitoring, administration and following corporate policies and procedures.

Confidential

Network Engineer/System Administrator

Responsibilities:

  • Professional lead responsible for the support, design, integration, planning, product evaluation, production, maintenance, migration, administration, installation, configuration, client/vendor relations and troubleshooting activities.
  • Technologies handled by the team include but not limited to switches, routers, EMC SAN solution FC4700 and NAS solution Network Appliance F820, local and remote servers, network Confidential, and companywide systems for various LAN/WAN technologies, server and enterprise applications and desktop technologies.
  • Professional responsibilities included daily backups, supporting traffic, administration and following corporate policies and procedures and updating management.

Confidential

Responsibilities:

  • Configure trunk ports and implement granular control of VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets that can extend further across the network infrastructure than previous generation of switches.
  • Configure port-profiles as part of the NX-OS command structure that allows for configuration of multiple ports and port-types via inherited configurations applied via a single command that reduces administrative error and allows for better configuration readability.
  • Integrate a virtual version of Nexus: Nexus1000v into VMWare to extend Nexus capabilities directly adjacent to virtual machines so that they benefit from Cisco switching capabilities and network topology consistency ensuring VMs maintain their subnet/VLAN relationships during failover.
  • Configure secure privileged administrative access to the Cisco IOS system. Enable the encryption of system passwords to prevent unauthorized users access to passwords in the system configuration.
  • Configure secure access to the console and vty ports, and set the interval that the EXEC command interpreter waits until user input is detected on the Console and vty ports. Also, configure the console and vty ports log messaging to not interfere with active device configuration.
  • Configured and administrated VLAN Trucking Protocol to reduce administrative overhead. Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switches ports following Layer 2 Confidential best practices.
  • Administrated Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trucking using Pap for layer 2 forwarding. Utilize VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays. Modify spanning-tree parameters for manual root bridge assignment. Implement ether-channels between each switch using Pap for negotiation. Modify ether-channel load balancing method.
  • Integrated WAN links between sites using frame-relay point-to-point and multipoint connections to establish connectivity between each of the four sites as required. Establish two frame-relay point-to-point connections between a central site and two remote sites. Configured multipoint connections between three of the sites forming a full-mesh.
  • Configured EIGRP MD5 Message Authentication between sites to prevent unauthorized insertion of routes into the domain. Integrate manual EIGRP route summarization to reduce routing protocol demand on CPU resources, memory, and bandwidth used to maintain the routing table.
  • Configure and administrated OSPF routing with multiple areas for networks between sites. Implement OSPF MD5 Authentication between each OSPF enabled subnet to prevent unauthorized insertion of routes into the domain.
  • Integrated static NAT/PAT to provide access to services located on a server in the private network to the public network. Implement standard and extended access-lists to filter network traffic.
  • Configured backup and recovery of Cisco IOS Images. Perform password recovery on Cisco IOS routers/switches and a Juniper EX2200 Series switch to restore administrative access. Backup and Restore startup-comfit file for disaster recovery
  • Configured on BIG IP (F5) load balancers and load also monitored the Packer Flow in the load balancers.

Confidential

Responsibilities:

  • Configured and administrated an IPSec Site-to-Site VPN between the Cisco ASA5505 at small office location and Cisco 1841 ISR with a Confidential IOS image at the main office. Implementation of the VPN includes the following configurations: Internet Key Exchange Policy using DES and SHA for encryption and authentication, access-lists to define VPN traffic, transform set using esp.-des esp-sha-hmacto define how the traffic is protected, crypto-map to associate the previously configured elements to a peer, and application of the crypto map to appropriate interface or VPN endpoint.
  • Configured and administrated Zone-Based Policy Firewall on the Cisco 1841 ISR with the following components: three zones, class-maps specifying traffic that must have policy applied as it crosses a zone-pair, policy maps to apply action to the class-maps’ traffic, zone-pairs, and application of policy to zone pairs.

Confidential

Responsibilities:

  • Configure Cisco 2811 ISR (VoIP) with a Cisco Unity Express Network Module (NM-CUE) installed, Cisco Communications Manager Express, a standard Cisco 3550 Switch, and a Cisco 3550 switch with Power-over-Ethernet. Create and manage Data and Confidential VLANs, and configure ports with static VLAN assignment and 802.1Q trunks for layer 2 forwarding. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.
  • Configure Fast Ethernet main and sub-interface assignments as required for intervlan routing. Implement static routes for local connectivity. Configured NTP server, DHCP server, and TFTP server for support of the VoIP network. Modification of system level parameters including max phones, max directory numbers, display format for date and time, and setting the Time-Zone.
  • Integrate Unity Voicemail on the Cisco Unity Express Network Module. Configure a dial-peer on the Cisco 2811 ISR to define the attributes of the packet Confidential network connection to the Cisco Unity Express Network Module. Enable call forwarding on busy or no answer. Implement Message Waiting Indicators and Voicemail access via SMTP. Daisy-chain PCs to VoIP phones to reduce network cabling costs. Utilize PoE ports for VoIP phones to reduce power infrastructure costs.

Confidential

Responsibilities:

  • Administrated a Confidential network infrastructure providing access to wired LANs to increase mobility and productivity utilizing the following network elements: Cisco Confidential LAN Controller (WLC) 2106, a Cisco 3550 switch, a Cisco 1130AG series Access Point, and a Cisco 1121G series Access Point. Create Confidential LANs and configure interface association, Confidential parameters, and radios used. Utilize the Confidential LAN Controllers web GUI to configure and manage the Confidential network. Configure internal DHCP scopes for WLANs.
  • Prepare configuration for AP registration on same subnet as management VLAN and for AP registration on different subnet. Implement option 43 for DHCP where necessary. Configure AAA AP policies to allow Self Signed Certifications for APs shipped without a Manufacturer Installed Certificate. Implement AP Grouping to ensure WLAN SSIDs are only broadcast by the APs desired.

We'd love your feedback!