We provide IT Staff Augmentation Services!

Network Engineer Resume Profile

3.00/5 (Submit Your Rating)

TX

Work Experience:

Confidential

Senior security analyst, Lead security engineer, Lead network engineer.

  • Lead security and network engineer support for large PCI compliant data center and disaster recovery center mirror for transaction credit card processing. Core of Cisco Nexus and 4900-10G, switches and routers. HP virtual connect 10G switches in an A/B failover design. Assist operations staff to support smaller third data center.
  • Lead on project to design and integrate network and security infrastructure for new disaster recovery data center, Nexus switches and ASA firewalls. Assisted operations staff with integration of Nimble and EMC storage, Citrix load balancers, VMWare infrastructure.
  • Lead on network IP traffic analysis for customers' performance and security issues related to Paymetric's product line of PCI credit card transaction WEB applications and secure card data transfer sites.
  • Help operations support Citrix load balancers, HP400 storage for ISCSI, HP a5120 switches, Netapp storage, Brocade switches, EMC storage.
  • Help operations maintain VMWare infrastructure for about 400 VM's, Linux and Windows OS.
  • Daily security log analysis for various compliance policies related to PCI.
  • Forensics and investigative work applied from correlation of log data to technology at the data centers, clearing any detected security issues. Detection of compromise to WEB servers and applications. Detection of OS malware, viruses, zero day attacks, advanced persistent threat. Network and firewall related compromises.
  • Various projects to design and implement security infrastructure - NAC, IDS-IPS, Access Control Appliances, Jump boxes, Duo certificate secondary authentication, SIEM, Vulnerability scanners, intelligent IP traffic tapping.
  • Member of security team. Attended all weekly security meetings. Via research documented a comprehensive outline of all company security policies, PCI compliance, network and security infrastructure.

Confidential

Contract project work though third party as senior network and security engineer.

  • Project to integrate security and infrastructure for wireless coverage at 180 remote sites.
  • Large data center and disaster recovery data center mirror for 180 remote apartment complexes and corporate head quarters. Core comprising Cisco Nexus 7000, Nexus 5000, Catalyst 4800, 3700's switches. Cisco 2940, 1600, remote site routers. Aruba and Cisco wireless controllers and access points. Riverbed Steelhead load balancers.
  • Various projects to upgrade and introduce more robust security technologies for network and wireless infrastructure at data centers and remote sites.
  • Responsible for helping support Network infrastructure uptime, performance, maintenance-upgrade, break-fix. Support for wireless infrastructure. Assist telco staff with support of Avaya VOIP system. Lead security engineer supporting security infrastructure, wireless security via AirTight, IDS/ IPS with Tipping Point, Cisco ASA firewalls/VPN.
  • Project to design and implement cost effective
  • secure global VPN POP's between remote sites and data center for all company network traffic.

Confidential

Contract project work as security Network Engineer

  • Lead engineer and project manager responsible for connecting Champion network
  • router and switch core to newly acquired company in Baton Rouge.
  • Design and configuration of Cisco ASA VPN firewalls between two companies.
  • Champion cloud and new company.
  • Worked on team designing and installing BGP/MPLS connections between
  • Tear down of new company analog PBX and migration to Champion
  • Cisco Call Manager clusters. Set up for new company of Cisco VOIP phone network.
  • Worked with about eight other engineers and managers with expertise in application development, VMWare virtualization, SAN storage systems, routers and switches, Microsoft OS and Exchange, and firewalls. We were on a project doing the
  • design work and specification analysis to migrate Champion core eighty or so
  • rack mount servers to blade servers and virtualizing companies'
  • core custom applications written in SAP. Migrating Champion core
  • of aged disparate fibre channel SAN storage systems to new SAN one vendor solution.
  • Brought to the group my experience on Cisco Unified Communications Server
  • blade platform UCS , VMWare ESXi 4.0, Call Manager 8.0, MSSQL, and NetApp
  • SAN storage platforms.

Confidential

Nexus Health Systems

  • Integration and support of company data center firewalls. Review and correlation of various security logs. Analysis of security compromise of servers and applications. Responsible for network and security infrastructure HIPPA compliance and related risk mitigation.
  • Engineer lead on one year project designing plan and integrating remote site facilities and core data center from EIGRP/GRE network to MPLS-VPN/BGP, T1/Multilink/PPP network. Upgrade of all router and switch hardware and IOS. Configuring BGP and peer routing on core and perimeter edge routers.
  • Redesign of QOS and COS marking, shaping for VOIP and other traffic for new MPLS
  • backbone.
  • Engineer lead on one year project for design, purchase and configuration of Cisco UCS blade server systems and NetApp SAN data storage systems at data center core. This new infrastructure was used to move Call Manager and Unity version 4.0 clusters on MC7800 servers to Call Manager version 8.0 and move thirty five non-blade application and database servers. I worked on virtualizing these systems using VMWare ESXi 4.0.
  • Lead network engineer on these UCS integrations installing fiber channel over Ethernet FCOE backbone consisting of Cisco XP6124 fiber switches and Cisco MDS 9126 controllers connecting to NetApp SANs.
  • Roll of Windows Server OS and MSSQL databases to VMWare vm's on new Cisco UCS blade server systems. Upgrade of core medical applications and MSSQL to work with VMWare.
  • Installation and configuration of Cisco ASA firewalls for the data center. Installation of new Cisco routers and switches. Installation of Cisco wireless solutions, controllers and AP's at remote hospital sites. Configuration and support of site-to-site and client VPN connections.
  • Lead engineer responsible for design, configuration, and level three support for company wide network infrastructure. Support of Call Managers and Unity, VOIP systems, wireless systems, firewalls, email spam and virus filter appliances, WebSense.
  • Setup and support of blades, hosts, virtual machines, hba's, guests, VCenter, snapshots, VMotion, VStorage, data backups on UCS blade servers.

Lead network administrator, lead network and security engineer

Confidential

  • Lead engineer responsible for design, configuration, and level three support for company wide network infrastructure. Routers, switches, firewalls, security appliances.
  • Responsible for network and security infrastructure HIPPA compliance and related security compromise mitigation.
  • Support for Windows servers, Exchange, SQL databases. Server build out and OS deployment.
  • Supported, installed, worked with vendors and University analysts on McKesson Medical applications and hospital's custom applications.
  • Maintained Active Directory, DNS, IIS, Apache, Group Policy, WSUS, Red Hat.
  • Worked with Hospital network and security engineering staff on network and security projects for data center core BGP network backbone.
  • Lead engineer on project to purchase and configure upgrades of company Cisco PIX firewalls to ASA firewalls.
  • Lead engineer on project to upgrade a Hospital sub-division's core from Cisco 4800 switches and related routers to a dual Cisco 7600 router and switch backbone.
  • Voice engineer on project design to roll analog voice system to Cisco VOIP system with new Call Manager and Unity software and Cisco MCS servers for about 800 phones.
  • Worked with telecom staff to plan above and purchase of an IVR system, interactive voice.
  • Supported IDS/IPS security appliances like Fortigate.

Network engineer and network administrator

Confidential

  • Support of corporate wireless backbone.
  • Support of corporate firewalls.
  • Responsible for all core and perimeter routers and switches.
  • Network Administrator of Microsoft servers.
  • Support of company applications on servers.
  • Support of IIS, WEB portals, Sharepoint, Active Directory, Group Policy.
  • Exchange email administrator.
  • Responsible for data backups.

Network engineer, network administrator, programmer.

Confidential

  • Network engineer and network administrator helping to support a corporate data center
  • consisting of multiple IBM mainframes and Dell rack mount servers.
  • Level three support for all routers, switches, and firewalls on an EIGRP backbone.
  • Configuration and daily support of firewalls between HOV Services data center and Fortune 500 customer data centers.
  • Supported Windows servers, Exchange, and MSSQL databases.
  • Supported vendor supplied and custom programmed applications.
  • Maintained Active Directory, DNS, DHCP, user authentication and access.
  • Designed and maintained customer WEB platform portals
  • for companies like Ford Motor Company and The International Petroleum Institute.
  • Designed WEB sites and IIS in Visual Basic, HTML, and VBA.

Manager Network Sales and Network Integration.

Manager Programming Sales and programming

Confidential

  • Lead network engineer for customer network projects.
  • Manager of networking and programming departments.
  • Lead programmer for customer programming projects.
  • Design and installation of large networks at company sites for companies like Houston Lighting and Power, Halliburton, Schlumberger, and Sysco.
  • Custom SQL programming for Credit Card processors, banks, and hospitals.

Knowledge in:

  • SAN technology integration and design. Some exposure to NetApp, EMC, Nimble.
  • Cisco Unified Communications Server UCS blade server platforms.
  • VMWare ESXi version 5.x, virtualization software technologies.
  • Knowledge in Cisco Router hardware 2800, 3000, and 7600 series Cisco switches 3700 series, 3500X series, 4600 . Nexus 7000, 5000, 2000, 1000. Cisco wireless controllers and APs. Juniper Netscreen, Fortigate.
  • Routing and switching technologies: MPLS, MPLS-VPN, BGP, IGP's, Multicast, Multilink, PPP, Ether Channel, Catalyst switch OS L3/L2, QOS, COS, Frame Relay.
  • Cisco router and switch IOS/NXOS, UCS Manager Cisco security appliances/firewalls ASA 5000 series . Cisco 1100 and 1240 series Wireless APs, Cisco 4000/5000 series Wireless controllers, Cisco wireless VOIP phones.
  • Experience with Citrix and RiverBeg/Steelhead load balancers data compression, some exposure to F5.
  • Experience with security appliances and programs: Symantec Enterprise, BigFix, QRadar, Splunk, Nessus, Snort, Tipping Point, Imperva WAF's, CACE, Forescout NAC, Qualys, Cyberark, Squid, Netwrix, Bit-9, Assembly language, IDA-Pro, OllyDBG, and other security programs and devices.
  • Cisco VOIP and wireless VOIP, Cisco Call Manager and Unity versions 4.x, 7.x, 8.5, dialing plans. VOIP gateways H.323 and MGCP , trunking, ISDN-Pri, Q.931, router debug.
  • VOIP and gateway debug/tracing, VOIP failure analysis related to SCCP, RTP, Call Manager or switch/phone hardware.
  • T1 serial controllers - VWIC's. Fiber Channel, Fiber Channel over Ethernet FCOE .
  • Security access devices like Cisco ASA, Fortigate, Barracuda, WebSense, and CheckPoint.
  • Enterprise tape backup technologies, enterprise virus control systems.
  • Oracle, SQLite.
  • Linux - Red Hat, Ubuntu, Centos.
  • Microsoft Enterprise Server 2012, Exchange 2007. Active Directory, DNS, Group Policy, WSUS.
  • Microsoft SQL 2008 and SQL Server Reporting Services SSRS . Microsoft Visual Basic,
  • Java, C, C , C , Python, Assembly Language.
  • Large HP, Dell, IBM rack mount servers, disk subsystems, blade servers.

We'd love your feedback!