| 20,000+ Fresh Resumes Monthly | |
|
|
| Related Resumes Senior Product Development Engineer Caledonia, MI Process Engineer with 10+ years experience East Lansing, MI Industrial Engineer, MBA, Trainer, Recruiter, Six Sigma Black Be Midland, MI Senior IT Leader East Lansing, MI Azure DevOps Engineer Mount Pleasant, MI Devops Engineer Software Development Midland, MI Maintenance Engineer Life Safety Bay City, MI |
| Click here or scroll down to respond to this candidateCandidate's Name
Sr. Network EngineerC: PHONE NUMBER AVAILABLE E: EMAIL AVAILABLEProfessional Summary:A dedicated Professional with around 7+ years of expertise in Implementation, Administration, Operations and Troubleshooting of enterprise data networks as a Network Engineer.Extensive work experiences on Cisco Switches, Cisco Routers, Load Balancers & Cisco FirewallsProficient experience in the configuration of Cisco Catalyst 2900,2960, 3560, 3750, 3650, 4500, 4900, Legacy Cat 6500 series, Nexus 7010, 5548 and 2248 switches and deep understanding of architecture.Experience working with 2600, 2900, 3600, 3900, 4300, 4400, 7200, 7600,1000 series Cisco RoutersExperience working on changes, demands, tasks and tickets.Experience with Firewalls - Fortinet/FortiGate, & Palo Alto and/or other next generation firewall solutionsExpertise in group management, presentations, and SLA management.Expertise in Cisco IWAN, DMVPN, Site to Site VPN design, deployment, and troubleshootingExpertise in Cisco Meraki, WAPs management, SolarWinds, PRTG Network Monitors, Cradle pointsSpecific Technologies handled include but not limited to Cisco Routers, Cisco Catalyst/Nexus Switches, Cisco ASAs, Juniper, F5 Big IP, Cisco Unified Communications Manager, Cisco Unity, Cisco Wireless LAN Controller, Cisco Aironet Access Point, Palo Alto Firewall, Nagios, Solar Winds Orion, Cacti, Wireshark.Expertise in Site-to-Site VPNS using Checkpoint, Cisco ASAs, Palo Alto, DMVPN tunnels and GRE tunnels.Experience in setting up Cisco ASA firewalls Cisco ASA 5510, Cisco ASA 5512 & Cisco ASA 5505 with restricted security policies, NAT implantation, configured DMZ interfaces to restrict traffic flow.Experience working on Cisco Catalyst Series 9200,9300,3750, 3500, 4500, 4900, 6500, 2950; Nexus 2K, 5K, 7K and 9K series switches.Experience with Network design, deployment and establishing a site with full-fletched network access.Hands on experience in troubleshooting of inter-VLAN routing and VLAN Trunking using 802.1Q.Expertise in the implementation of Layer 2 technologies including VLANs, VTP, STP, RSTP, Trunking and Port-security, expertise in working with Ether channel technologies (LACP, PAGP).Expertise in configuration and deployment of routing protocols like OSPF, EIGRP, BGP, Policy-based routing over Cisco Routers, configuration and troubleshooting of route redistribution.Experience in risk analysis, security policy, rules creation and modification of Checkpoint, Cisco ASA, Palo Alto Firewall.Managed enterprise grade server/application load balancing using F5 LTM/GTM.Expertise in monitoring all network hardware inventory by the use of SSH, Syslog, SNMP and NTP.Experience with Active Directory, Disaster Recovery, Print Server, DHCP, DNS, Remote Desktop and Terminal Services.Certifications:Cisco Certified Network Associate (CCNA)Education:Technical Skills:RoutersCisco 7600, 7200, 4321, 4331, 4431, 3800, 3900, 3600, 2900, 2800RoutingOSPF, EIGRP, BGP, RIP v1/v2, PBR, DMVPN, Route Filtering, Redistribution, Summarization and Static RoutingSwitchesNexus 2K/5K/7K,9k Catalyst 9200,9300,6500, 4500, 3850, 3650, 3560, 3750, 2960SwitchingLAN, VTP, STP, PVST+, RPVST+, Ether Channels, L3 SwitchesNetwork SecurityCisco ASA, Checkpoint, SonicWall, Sophos, FortiGate, Palo Alto, Cisco FMC, FTDLoad BalancerF5 Networks (Big-IP) LTM 8950LANEthernet (IEEE 802.3), Fast Ethernet, Gigabit EthernetWANPPP, HDLC, Channelized links(T1/T3), Fiber Optics, Frame Relay, MPLSGateway RedundancyHSRP and GLBPFeatures & ServicesIOS and Features, SNMP, SYSLOG, DHCP, CDP, TFTP, FTPNetwork ManagementSolarWinds, PRTG, Wireshark, Netflow Analyzer, Cisco Prime, Cisco Works, HPNA, IBM Remedy, OpenNms.OthersCisco Meraki WAPs, Cradle points ECM, ACM, ACS, Callrex, Cisco UCSProgramming SkillsPythonProfessional Experience:MGM Grand, Detroit, MI Nov 2022 Till DateSenior Network EngineerResponsibilities:Providing level-3 network administration including Installation, configuration and troubleshooting of network devices (Routers, Switches, and Firewalls).Configuration of VPC, VDC on Nexus 2k/3k/5k/7k,9k.Experience with replacing the existing Cisco 6500 switches with Cisco Nexus 9K in the data center environment.Maintenance and management of Nexus 7010 core switches and installation of new Nexus 5548UP and 2248 as Fabric extender for server access.Configuring and overseeing around 500+ Network gadgets that incorporate Juniper SRX Firewalls, F5 BigIP Load balancers and Nexus Devices.Configured 7010s with multiple VDCs running EIGRP for route propagation between them. Installed dual router/dual MPLS.Experience working with MPLS Layer 3 VPN on ASR 1006 with IOS-XRMaintenance and upgrades on Cisco 9200,9300,6500, 4500 and 3700 series switches to provide redundant network.Installation and upgrading of network infrastructure that reached End of LifeSite to Site VPN, DMVPN configurations in coordination with ISP AT&T and Sprint.Implementation of IOS & Bandwidth upgrades.Designing and implementing new server silos in DMZ for Web servers, Mail servers & FTP Servers and configuration of security policies using Cisco ASA 5500 Firewalls.Deployment and administration of Fortinet FortiGate 3000, 1500D, 200D FirewallsDeployment, Administration with Of Firewalls with tools such as Forti Analyzer, Forti Manager.Migration of sites from frame relay to EIGRP routing.Implementing F5 load balancer using Cisco UCS director.Implementation of F5 includes configuration/creation of Network Element, Pool, pool members and virtual server.Maintain the day to day activates on APIC for Cisco ACI fabric.Worked on configuring EPG, application profile, BD, leaf switch interface profile, VPC policy on Cisco ACI.Implementation of OSPF with BGP during migrations and new connectivity.CSU/DSU loop testing in examining WAN link issues by implementing hardware and software loops.Knowledge on configuration of iApps (BIG-IP) application service in implementing F5 load balancer.Performing Incident Management responsibilities which includes troubleshooting and restoration of services by joining in SRT and working with vendors and documenting troubleshoot steps and RFO.Working and opening trouble tickets (TAC) and Smartnet with Cisco for new product orders, device diagnostics and hardware/insurance.Cisco proactive device diagnostics with Smartnet service.Working with ISPs like AT&T, Sprint, Ignisis for new circuit installations and provisioning and outages.Proficiently provisioned APs/RAPs and demonstrated expertise in troubleshooting and resolving wireless connectivity issues, 802.1x authentication-related problems, and Guest WiFi challenges in Cisco ISE.Managed successful delivery of massive security response portfolio including Cisco ISE.Network security involves web filtering on internet sites (User's restriction) using Palo Alto and checkpoint Firewalls.Configured and deployed the NGFW Firewall Features in Palo Alto like SSL Decryption, User ID, Proxy, and DNS, IPS/IDS.Implemented IPSEC Site-to-Site in Palo Alto Firewall.Performed code upgrades to the Palo Alto Firewall from Panorama.Configure access control policies, network discovery policies, network analysis policies, intrusion policies, file policies on Cisco FMC and applying them on the devices based on various groups.Writing exceptions on Cisco FMC in some cases to avoid the downtime.Analyzing traffic behaviors using Wireshark and Solar winds.Diagnosing layer-2 and layer-3 loop back tests in coordination with SP's and filed technician.Implementing routing, ACLs with ISP using OSPF and BGP.Performing migrations and implemented many projects which gave Best Technical expert certificate.Using F5 load balancer for traffic filtering and network optimization.Documenting F5 logs and sending weekly reports to management.Implementation of Network and Devices for Network SDWAN environment.Configuration of MAC address, VLANs on switches and registers as per clients request.Configuring Cisco WLC for the sake of customer mobility.Checking the WAN performance and utilization in SOLAR WINDS and packet path using wire shark.Participating in network migrations with change management teams.Monitoring of all clients N/w Infrastructure using tool SMARTS.Participating in daily service review (DSR) and Root cause analysis (RCA) calls to resolve the n/w outages.Advising clients to improve their network performance.Designing and maintenance of clients network architecture using VISIO and in asset center data management.Credit one Bank, Vegas, NV Feb 2021 Nov 2022Network Security EngineerResponsibilities:Primary responsibilities include performing changes to network, security following standard ITIL ticketing process, design and implementation, troubleshooting of networks.Responsible for Management and documentation of Checkpoint, Fortinet and Cisco ASA FirewallsConfiguring, Monitoring and Troubleshooting Cisco's PIX firewall, ASA 5500 security appliance and Checkpoint NG Firewall. Designing and Implementation experience in building DMZ, and integration of firewalls with Gateway Anti-Virus and web Filtering applications from TrendMicro and WebsenseWorked on F5 Enterprise Manager 3.1 version to manage multiple F5 LTM devices from single-pane view, Implemented Changes on Existing configurations for the applications on F5 load balancer.Configured different load balancing methods on F5 LTM & GTM and worked on one-connect profiles and HTTP compression and several persistence profiles Experience with Network Automation using Python and Rest API.Configure all Fortinet Networks Firewall models (100E, 200E, 600D, 900D, 1500D, 3980E, 5001E etc.) as well as a Forti Manager to manage large scale firewall deployments and Forti Analyzer to collect logs from all FortiGate firewalls.Responsible for configuration & troubleshooting of protocols like OSPF, BGP, EIGRP, DMVPN, IWAN, MPLS, QoS.Deployment, configuration, and management of 802.1x solutions to include Cisco Identity Services Engine (ISE).Experience with creating profiles for end devices such as printers, cameras, phones etc.in ISE NAC deployment.Worked on Checkpoint Firewalls to monitor traffic drops, implemented NAT rules and monitored logs for traffic.Worked on configuring failover to secondary firewalls, troubleshooted various bugs and obtained fixes.Taken care of the Logging issues of the F5 load balancer and how it works with the syslog servers, making sure the communications through the switches and routers.Built Site-to-Site VPN tunnels between Cisco ASAs at spokes and hubs at datacenters, routers and firewalls.Server load-balancing utilizing F5 LTM-Big IP, including APM, ASM and viprion device modules.Worked on ASA Firewall rule management as part of network operations to take care of Firewall ACL requests.Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.Deployed mobile setups called warehouse in the box with a Cradle point, an ASA and a Meraki AP to provide internet access and Wi-Fi over secure VPN. Worked with Cradle point models AER2100, IBR650, MBR1400 etc.Implemented Cisco IWAN at 35 sites until date. Worked on provisioning of MPLS & Internet circuits, Circuit Activations, DMVPN over MPLS & DMVPN over Internet.Experience with F5 load balancers (6400, 6800, and 8800) and Cisco load balancers (CSM, ACE and GSS), also migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancersWorked with Verizon, ATT and other ISPs on MPLS and Internet Circuit activations, BGP, MPLSBuilt, deployed & maintained Cisco Meraki WAPs. Created Networks, Implemented Firewall Policies for various SSIDs, Access Lists, maintained all devices on Meraki Cloud in separate networksConfiguration, deployment of cloud services like AWS, monitoring, metrics, and logging systems on AWSInvolved in switching such as creation & management of VLANS, Port security, trunking, RPVST+, LAN securityPort aggregation, link negotiation using LACP & PAGP, Port-security, Private-VLANS to be secure and loop-free.Built, configured PRTG Network monitoring probes. Deployed probes with VMWARE-ESXi OS & established communications with main PRTG servers at Datacenters. Uploaded sensors to monitor traffic utilizationManaged devices using Cisco Prime, Cisco Works, ServiceNow, HPNA, IBM Remedy, SolarWinds, PRTGBuilt network from scratch, cabling for User desks, MPOE to MDF & IDF, POTS lines for security alarms, fire, faxWorked on Full Stack reconfigurations, Core, Down-level Switch Upgrades and Migrations, AP migrations.DFW airport, Dallas, TX May 2020 Feb 2021Sr. Network Implementation EngineerResponsibilities:Involved in migration from Cisco Catalyst 6513 switches with Sup 720 to Nexus 7009 with Nexus 7000 Supervisor 2E, F&M line cards in data center with features like VPC and VDCs.Installed and Configured Cisco Routers ASR, ISR, (3600, 2600, 2500), Catalyst Switches (6500, 5500, 3550, and 2900series) and Nexus switches (7K, 5K and 2K series).Performed Nexus In-Line Service upgrades and deployed advanced nexus features VPC and VDC.Deployed Nexus 2248 Fabric Extenders, 5596 series Fabric Interconnect and 7010 with f3 modules, with features like VPC, VDC, and Fabric Path for high availability and redundant server farm environment.Configured F5 GTM Wide IP, Pool Load Balancing methods and involved in migration of pools and authorized F5 devices for web acceleration & caching.Successfully deployed VMware NSX SD-WAN, leveraging its capabilities to optimize Wide Area Network (WAN) performance, ensuring efficient and secure connectivity across distributed environments.Configured, management of and monitored Silver Peak SD-WAN product.Experience in risk analysis, security policy, rules creation and modification of Checkpoint, Cisco ASA, Palo Alto Firewall.Worked on frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NATING, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP.Set up VSS cluster, ether channel, VTP and inter VLAN routing on Catalyst 6509 and 6513 switches.Created ACL policies for Cisco 5580 ASA firewall with access control to NAT & object grouping functions.Worked extensively on Cisco Firewalls, SANS SIFT, Cisco (506E/515E/525/) & ASA 5500(5510/5540) Series.Focused on working with Cisco Channel partners to build practices around Cisco ACI.Deployment ACI fabric to ensure each tenant is secured and has separation from other tenants. Use L3/L2 outs via common tenant.Worked in an Cisco ACI environment with Border leaf, Spine and Leaf architecture.Configured IPSEC Site-to-Site VPNs to provide secure remote access using SPA modules on Cisco 6500Performed Route Filtering, Manipulation using distribute-lists, route-maps, AD and offset-lists.Built the Datacenter right from scratch until turning up devices and getting into Production.Worked with both the Catalyst switches like 6800 and Nexus Switches like 7710, 5596 and 56128.Designed, constructed, implemented, tested and launched various network nodes featuring BGP, OSPF, MPLS and VLANS using RSTP, gateway redundancy protocols HSRP, GLBP and VRRPDeployed new data centers with Cisco 6506s, F5 load balancers.Experience in working with F5 BIG-IP LTM and Cisco CSM load balancing technologies.Performed load balancing and application-level redundancy by deploying F5 BIG-IP LTM, GTM series like 3900, 6900, 8900 and cisco CSMConfiguring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools Editing and Changing Palo Alto Polices and Monitoring threats on firewalls.Worked on commissioning WAN links and troubleshooting WAN outages.Designed WAN structure to prevent single point of failure in case of link failure.Configured STP, RSTP in the Access Layer Switches (2950, 2960, 3750 and 3550) as a loop prevention mechanism. Configured Port-security, Private-VLANS for maintaining loop free and secure environment.Expertise in deploying BGP multi-homed network using AS-Path, MED, etc.IBM, Hyderabad, India Jan 2018 April 2020Network EngineerResponsibilities:Design branch network and implementing Traffic shaping, QOS, Bandwidth Limits and policies for application traffic, security for LAN and WAN.Configuring static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation.Dealt with the escalation problems from Level1, Level 2 & Level 3 for routing, switching and WAN connectivity issues using ticketing system Remedy.Managed end to end delivery of services for clients.Establishing VPN Tunnels using IPsec encryption standards, configuring and implementing site-to-site VPN, Remote VPN.Worked on configuring, deploying and deployment of Cisco Security Manager (CSM) for management of ASA Firewall series.Troubleshooting latency and throughput issues on MPLS and Dedicated Internet Access circuits.Configuring the Access-List rules, network object service group based on well-known port i.e. FTP/SFTP, SSH, HTTPS/HTTPS (SSL).Troubleshooting issues and outages on Trunks and Router interfaces extensively.Coordinated and managed events and trouble tickets related to network failures and thus followed by technical support which included problem determination.Technical assistance for LAN/WAN management and complex customer issues.Planning and Implementation of IP Sub netting, VLSM to conserve IP addresses.Performed route redistribution & manipulated route updates using distribute lists, route-maps & administrative distance.Dealt with Cisco Router and switch hardware and software upgrades.Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.Upgraded layer 3 device versions using TFTP server, Flash drive and USB.Configured object grouping, protocol handling and code upgradation on ASA firewalls.Maintenance and troubleshooting of connectivity problems using Ping, Trace route.Involved in Troubleshooting and implementing NAT and DHCP related issues.Implementing and Maintaining Network Management tools (Fluke Network, Nortel ENMS, JFFNMS, SNMP, MRTG, and NMIS).Intent Infotech Pvt. Ltd, Hyderabad, India July 2016 May 2018Network AdministratorResponsibilities:Configuration and troubleshooting of RIP and EIGRP on 2600, 2900 and 3600series Cisco routersConfigured and troubleshooted various CSU/DSU devicesConfiguration and troubleshooting of OSPF, BGP and EIGRP. Tested authentication in OSPF and BGP. Tested BGP features such as override, local preference, EBGP load balancing.Involved in troubleshooting of DNS, DHCP and other IP conflict problemsPerformed Route Filtering, Manipulation using distribute-lists, route-maps, administrative distance, offset-listsConfigured WAN Infrastructure running OSPF as a core routing protocol.Streamlined OSPF costs in the network to account for network delay.Implemented VTP, trunking protocols (802.1q, ISL) on 3560, 3750 and 4500series Cisco Catalyst switchesImplemented Site-to-Site VPNs over the internet using 3DES, AES/AES-256 with ASA FirewallsConfigured & maintained IPSEC &SSL VPN's on Palo Alto, configured Palo Alto Wildfire, URL filtering PAN DBConfigured Standard, Extended, and Named Access Lists to allow users all over the company to access different applications and blocking othersPlanned and implemented Subnetting, VLSM to conserve IP addressesConfiguration of STP for loop prevention and VTP for Inter-VLAN RoutingProvided Technical support for improvement, upgradation, and expansion of the existing network architectureTroubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment |