We provide IT Staff Augmentation Services!

Network Service Engineer 1 Resume

4.00/5 (Submit Your Rating)

SUMMARY:

  • Confidential Veteran and Information Technology professional with over 7 years of experience in network engineering, server administration, desktop support both on - site and remote for medium to global enterprise offices and datacenter environments.
  • Proficient in Network design, installation, configuration, troubleshooting, support and escalation in areas of routing, switching, security, voice, wireless, server and desktop technologies.

TECHNICAL SKILLS:

Network Hardware: Cisco Routers (3900, 2900, 2800, 1900, 1800, 800), Cisco Catalyst Switch (6500, 5500, 4900, 4500, 3560, 3550, 3100, 3000), Cisco Nexus 5k and 7k Series, Cisco ASA 5500 Series, Cisco WLC, some Juniper (E, M, MX, T) Series and Adtran routers.

Routing/Switching: WAN, LAN, TCP/IP, Spanning Tree, BPDU, CDP, Frame-relay, PPP, ACL, Network Address Translation (NAT), Port Address Translation (PAT), Access Control List, RIP, OSPF, EIGRP, BGP, MPLS, VTP, SNMP, SMTP, ARP, TCP, UDP, Static Routing, Stub Routing, VLAN Trunking, Multi-Area OSPF, VLAN, VTP, HSRP, SVI, CEF, Etherchannel, Portfast.

Software/ Operating Systems: Cisco Internetwork Operating System Release 15.2, 12.4., Microsoft Windows 7, 8 and 10. Microsoft Windows Server 2003 R2, 2008 R2, 2012 R2 and Hyper-V. Lite Exchange 2003, 2007, 2010 and 2013. System Center Configuration Manager 2007, System Center Operations Manager 2007 R2, System Center Virtual Machine Manager 2008, R2, System Center Essentials 2010, System Center 2012, R2. OS X El Capitan, macOS Sierra and macOS High Sierra. Microsoft Office 2007, 2010 and 2013. Utilities WinPcap, WOPK, WAIK, MDT, ACT, MAP, VMATv2, USMT, WINPE, WET, Sysprep, WDS, BCDboot

Server Technologies: Sun SPARC II - Ultra (5, 10, 30, 60), Sun SPARC III - Ultra (25, 45), Sun Blade (1500, 2500), Sun Fire, Oracle, HP Openview. Dell Poweredge (650, 1750, 1850, 1950, 2950, 6800, R200, R300, R900), DEC Alpha Server, DEC 2K, 3K, 4K, VAX 6K and 7K.

Voice Technologies: Computer Telephony Integration (CTI), VoIP, CUCM, QoS, PoE, H.323, SIP, MGCP, RTP, SCCP, SRTP, UCCM, UCCX and ShoreTel.

Security Technologies: AAA, IPS/IDS, TACACS+, RADIUS, SSH, VPN, Cisco ACS, Data Loss Prevention, IPSec, Data Management Zone, Pretty Good Protection (PGP), Public Key Infrastructure (PKI), Internet Key Exchange Policy, Port Security, MAC Address Filtering, IPS/IDS.

Wireless Technologies: IEEE 802.1x & 802.11 a/b/g/n, WLAN, WAP, AP, SSID, LWAPP, CSMA/CA, Bluetooth, HomeRF, MMDS, LMDS, Aironet, CCK, DSSS.

Monitoring Tools/Hardware: Finisar, Wireshark,, Openview, Cacti, Nagios, Solarwinds, F5, Cisco Works, LogicMonitor, Cisco Security Manager Suite, DNS Servers, DHCP Servers, NTP Server, FTP, TFTP Server, Exchange Server, Blade Servers, Web Servers, Syslog, ITIL, ITSM,Remedy database and Service NOW CRM software.

SUMMARY OF TECHNICAL ACCOMPLISHMENTS

Server Administration:

  • Administer, deploy and configure, local or remote physical or virtual server and desktop machines via System Center Configuration Manager (SCCM) and System Center Virtual Machine Manager (SCVMM).
  • Install, configure and optimize resource utilization by adding and removing features on demand, migrating and deploying roles, managing storage spaces of basic, dynamic, (MBR) and GUID (GPT) disks, along with virtual hard disks (VHDs) storage and disk pools.
  • Configure sever roles and features for file and share access using NTFS permissions, print and document services by printer pooling, priorities, permissions and servers for remote management by WinRM and RDP.
  • Configure Hyper-V and VMware virtual machines dynamic memory, smart paging and resource metering of Gen 1 and 2 VMs. Create or modify VHD and VHDX pass through disk and manage check points or snapshots. Configure virtual switches for network optimizing.
  • Deploy and configure core network services of IPv4 and IPv6 using Intra-site Automatic Tunnel Addressing Protocol (ISATAP), deploying DHCP configuring PXE boot, relay, authorize DHCP and DNS zone with root hint, DNS cache, A and PTR resource records.
  • Install and administer Active Directory Domain Services (AD DS) from (IFM) resolving DNS registration issues, creating, copy, configure and delete users and computer in bulk operations, create and managing groups and (OUs) distribution and security.
  • Create and manage Group Policy by configuring central store, security policies of user rights assignment, templates, audit policy and local user, groups and (UAC). Configuring Windows Firewall to allow or deny applications, scopes, ports, and users.

Routing & Switching:

  • Configure secure privileged administrative access to the Cisco IOS system. Enable the encryption of system passwords to prevent unauthorized users access to passwords in the system configuration.
  • Configure secure access to the console and vty ports, and set the interval that the EXEC command interpreter waits until user input is detected on the Console and vty ports. Also, configure the console and vty ports log messaging to not interfere with active device configuration.
  • Configured and administrated VLAN Trunking Protocol to reduce administrative overhead. Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switchports following Layer 2 security best practices.
  • Configured VLAN Trunking Protocol to reduce administrative overhead. Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switchports following Layer 2 security best practices.
  • Administrated Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trunking using PAgP for layer 2 forwarding. Utilize VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays. Modify spanning-tree parameters for manual root bridge assignment. Implement ether-channels between each switch using PAgP for negotiation. Modify ether-channel load balancing method.
  • Integrated WAN links between sites using frame-relay point-to-point and multipoint connections to establish connectivity between each of the four sites as required. Establish two frame-relay point-to-point connections between a central site and two remote sites. Configured multipoint connections between three of the sites forming a full-mesh.
  • Configured EIGRP MD5 Message Authentication between sites to prevent unauthorized insertion of routes into the domain. Integrate manual EIGRP route summarization to reduce routing protocol demand on CPU resources, memory, and bandwidth used to maintain the routing table.
  • Configure and administrated OSPF routing with multiple areas for networks between sites. Implement OSPF MD5 Authentication between each OSPF enabled subnet to prevent unauthorized insertion of routes into the domain.
  • Integrated static NAT/PAT to provide access to services located on a server in the private network to the public network. Implement standard and extended access-lists to filter network traffic.
  • Configured backup and recovery of Cisco IOS Images. Perform password recovery on Cisco IOS routers/switches and a Juniper EX2200 Series switch to restore administrative access. Backup and Restore startup-configuration file for disaster recovery.

Security:

  • Configured and administrated an IPSec Site-to-Site VPN between the Cisco ASA5505 at small office location and Cisco 1841 ISR with a security IOS image at the main office. Implementation of the VPN includes the following configurations: Internet Key Exchange Policy using DES and SHA for encryption and authentication, access-lists to define VPN traffic, transform set using esp-des esp-sha-hmac to define how the traffic is protected, crypto-map to associate the previously configured elements to a peer, and application of the crypto map to appropriate interface or VPN endpoint.
  • Configured and administrated Zone-Based Policy Firewall on the Cisco 1841 ISR with the following components: three zones, class-maps specifying traffic that must have policy applied as it crosses a zone-pair, policy maps to apply action to the class-maps’ traffic, zone-pairs, and application of policy to zone pairs.

Voice:

  • Installed Cisco 2811 ISR (VoIP) with a Cisco Unity Express Network Module (NM-CUE) installed, Cisco Communications Manager Express, a standard Cisco 3550 Switch, and a Cisco 3550 switch with Power-over-Ethernet. Create and manage Data and Voice VLANs, and configure ports with static VLAN assignment and 802.1Q trunks for layer 2 forwarding. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.
  • Configure Fast Ethernet main and sub-interface assignments as required for intervlan routing. Implement static routes for local connectivity. Configured NTP server, DHCP server, and TFTP server for support of the VoIP network. Modification of system level parameters including max phones, max directory numbers, display format for date and time, and setting the Time-Zone.
  • Integrate Unity Voicemail on the Cisco Unity Express Network Module. Configure a dial-peer on the Cisco 2811 ISR to define the attributes of the packet voice network connection to the Cisco Unity Express Network Module. Enable call forwarding on busy or no answer. Implement Message Waiting Indicators and Voicemail access via SMTP. Daisy-chain PCs to VoIP phones to reduce network cabling costs. Utilize PoE ports for VoIP phones to reduce power infrastructure costs.

Wireless:

  • Administrated a wireless network infrastructure providing access to wired LANs to increase mobility and productivity utilizing the following network elements: Cisco Wireless LAN Controller (WLC) 2106, a Cisco 3550 switch, a Cisco 1130AG series Access Point, and a Cisco 1121G series Access Point. Create wireless LANs and configure interface association, security parameters, and radios used. Utilize the Wireless LAN Controllers web GUI to configure and manage the wireless network. Configure internal DHCP scopes for WLANs.
  • Prepare configuration for AP registration on same subnet as management VLAN and for AP registration on different subnet. Implement option 43 for DHCP where necessary. Configure AAA AP policies to allow Self Signed Certifications for APs shipped without a Manufacturer Installed Certificate. Implement AP Grouping to ensure WLAN SSIDs are only broadcast by the APs desired.

PROFESSIONAL EXPERIENCE:

Confidential

Network Service Engineer 1

Responsibilities:

  • One of three network engineers governed by the Information Technology Infrastructure Library or Service Management guidelines of service strategy, design, transition, operation and continual service improvement to provide SLA or OLA for telecom tier 2 network support for all branch offices throughout the Canada and United States, including the corporate datacenter and headquarter locations in San Ramon CA.
  • Primary escalation point for approximately 50% of tier 1 support, assisting levels 1-3 desktop support and field support technician groups with telecom network issues for resolution.
  • Tracked 65% of incidents and requests compiled of MAC Requests, Hunt group creations and revisions, provisioned user extensions, reset voicemail, and assisted with mobility softphone device setup for cellphones and desktop devices from creation to resolution via the CRM software called, “Service NOW” incident tracking system with 87% closure and completion rate.
  • Reset branch switches remotely for issues of office communications and software not performing to optimal standards after verification and requested Tier 3 telecom support for AERS activation to forward lines when PRI circuits are down with field offices.
  • Project - 1 Tasked and developed a trend analysis procedure with minimal oversight from supervision and management to identify new and reoccurring telecom network issues and their most efficient procedure of resolution for all tier 2 Network Service Engineers, which resulted a 19% productivity i Confidential ease and a 92% closure rate of Service Now incidents and request completed within the given 4 week deadline.
  • Project - 2 Tasked and created a 1 hour PowerPoint Training presentation based on newly created Knowledge Based articles from all Tier 2 Network Engineers (self-included) for orientation of new and current Tier 1 and 2 personnel technical support groups and field support technicians, providing a unified structured approached to technical operations and procedures while documenting all support incidents into CRM database Service NOW. Delivered live presentations once a week for a 5 week period via classroom setting and Cisco WebEx conferencing. Final recorded conference broadcast became the model used for all future orientations and refresh on procedures. This had a 40% reduction in 1 on 1 mentored training time needed for new candidate go live starts in technical support operations with a 94% competence effectiveness. Completed within the given one month deadline.

Confidential

Windows System Administrator

Responsibilities:

  • Provided onsite administration and support, scheduled installations, configuration of groups, users and machines within active directory via System Center Configuration Manager (SCCM) and System Center Virtual Machine Manager (SCVMM) for over 5000 onsite and remote end users.
  • Installed and maintained a Microsoft Windows 2008 Deployment Server for desktop migration environment from Windows Vista to Windows 7 desktop environment in compliance with corporate policies.
  • Provided Tier 2 Tracking service request via Remedy SMC database to Senior Desktop Support Technician personnel on issues of client machine imaging and reimaging support.
  • Project - Migrated a hybrid environment of virtual and physical servers running Windows Server 2003 to Microsoft Windows Server 2008, Exchange servers 2007 to Exchange 2010 and migration of approximately 500+ HP laptops and 300+ Dell desktops to Microsoft Windows 7.

Confidential

Technology Support Analyst

Responsibilities:

  • Performed depot level administration and support, scheduled installations, configurations, of software and hardware updates and troubleshoot activities for more than 500 end users technologies within LAN/WAN infrastructure.
  • Assisted in a large-scale hardware and software upgrade from Windows XP and Office 2003 to Microsoft Vista and Office 2007 for 500+ HP Pavilion and Lenovo laptops.
  • Swapped out laptop shells due to damage and end of lifecycle contracts with vendors. Performed reimaging of client machines according to company policy of data use and e Confidential yption by means of machines within active directory via System Center Configuration Manager (SCCM).

We'd love your feedback!