Candidate Information | Title | Data Center Network Security | Target Location | US-OH-Cleveland | | 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateSkill PROFESSIONAL SUMMARY:9+ years of experience in Designing, Implementing and Troubleshooting Service Provider Networks and Enterprise Networks. High level understanding of LAN, WAN, ISP circuits, Network Security, Application Delivery Controllers, SSL VPN and Wireless LAN.Worked on projects that include deployment of new devices, life cycle projects, migration from legacy to new solutions, Engineering, Operations, Software upgrade procedures in various client environments.Thorough Understanding of Switching and Routing protocols in Campus and Data Centers environments with multi-vendor equipment.Configured and managed Mellanox Infiniband solutions to achieve low-latency, high-throughput network performance in High-Performance Computing (HPC) environments.Expertise in installing, configuring, and maintaining Cisco Catalyst 2960, 3560X,3750X, 3850, Cat 9K, 4500-X, 6509, Nexus 2k, 5K, 7K and 9K. Juniper Switches that include EX and QFX series. Aruba Campus Switches.Good understanding of Network Protocols that include STP, RSTP, MST, PVST+, ARP, VLAN, VTP, 802.1Q, EtherChannel, HSRP, VRRP, GLBP, DNS, DHCP.Expertise in installing, configuring, and troubleshooting of Cisco Routers (ASR1K, 7200vxr, 3900, 3800, 3600, 2900, 2800, 1800, 800 series), Juniper MX series routers, Arista 7000 Series Routers.Design, troubleshooting and configuration experience with OSPF, IS-IS, EIGRP and BGP protocols on multi-vendor routers. Worked on Traffic path manipulation using various attributes, redistribution of routes, ISP peering, WAN connections, MPLS and DMVPN.Maintained high availability and reliability of the load-balanced farm through effective load balancing and health monitoring configurations.Led and executed multiple data center migration projects to AWS, ensuring minimal downtime and seamless transition.Successfully integrated Bluecoat SSP appliances into the existing ASG web proxy farm, enhancing the security and performance of the web proxy infrastructure.Worked extensively on Access, Distribution and Core layers in Data center, IDF and MDF environments. Experience with Spine and Leaf Architecture using Cisco ACI and Arista Cloud Vision.Thorough understanding of redundant features in different layers which include VPC, VSS, MEC, M-LAG, Port-Channels (LACP, PAGP), VDC.Advanced proficiency in designing, deploying, and maintaining perimeter security devices such as IPS, IDS, Radware, etc. Utilized ACI to automate network provisioning and orchestration, reducing deployment time and increasing operational efficiency.Updated SSP appliances to the latest firmware versions to ensure compatibility and security.Performed routine audits and evaluations of ZIA setups to guarantee adherence to regulations and safety measuresExperience with legacy and Next Gen Firewalls that include Cisco ASA (5500 Series), Palo Alto (5000 Series), Check Point and FortiGate Firewalls. Worked on Installation of firewalls from scratch, migration, and configuration of policies end to end.Maintain Aruba equipment and perform system upgrades including code and hardware upgrades and equipment moves.Build out and manage centralized management platform (Airwave) and add all sites and equipment. Strong experience with Aruba wireless design, configuration, implementation, and testing.Thorough experience with Aruba Airwave, Aruba Clear Pass architecture, Aruba Airwave architecture. Configuring and installing client and server network software for upgrading and maintaining network and telecommunication systems.Experience with Interior and Exterior routing protocols that includes RIP, OSPF, EIGRP, IS-IS and BGP. Worked on Cisco, Juniper, and Arista routers.Experience in Cisco Routing and Switching using 3600, 3700, 3800, 5300, 6500, 7200, 7600Nexus 7k, Nexus 5k, Nexus 2k& ASR 9000, 1000 series routers, Meraki products.Detailed-oriented team player with problem solving skills and the ability to convey technical information in a clear, concise, and logical manner Perimeter Security.Exposure to Centralized management (Panorama, Forti-Manger, Smart Console) of firewalls in the environment, Log monitoring, generating reports, config backups, Perimeter firewalls, Server Farm firewalls.Worked on Security Policies, NAT Policies, URL Filtering, SSL forward Proxy, APP ID, Threat ID, User ID, Wildfire, Signatures, Zones, Virtual Systems, IDS and IPS features in perimeter and Cloud firewalls.Experience with IronPort, Bluecoat and Zscaler cloud Proxies for Internet Web Security. Worked on migration project from IronPorts to Zscaler Internet Security. Experience with ZAPP, Blacklist and Whitelist policies based on location, AD groups. Integration with Azure AD for SAML Authentication.Worked on Zscaler Private Access- ZPA for app based per user VPN. Experience with APP connectors, access policies, APP segments, LSS connectors in ZPA.Worked on Application Delivery Controllers that include F5 LTM, GTM and ASM, Citrix Netscalers, Cisco ACE, GSS load balancers. Worked on Configuring virtual servers, one arm and two arm LB Architecture, iRules, Monitors, DNS based topology load balancing, Persistence Profiles, SNAT etc.Worked on AWS and Azure cloud configurations with respect to network connectivity and Security. Worked on configuring VNETs, Security Groups, Direct Connect, Express Routes, troubleshooting EC2 instances, Installation of Infoblox, Palo alto firewalls in different AZs.Conduct regular security audits and vulnerability assessments on EC2 environments.Configured AWS WAF with Application Load Balancers (ALB) to protect web applications from common web exploits and DDoS attacks.Applied best practices for securing Kubernetes clusters, including RBAC (Role-Based Access Control), network policies, and secret management.Experience working on Spine Leaf Architecture with VXLAN overlay, BGP or OSPF underlay. Implementation of VTEPS, VNI, Bridge Domains, Tenants, EPG, EVPN, Symmetric IRB. Configuration experience in Cisco ACI and Arista Cloud Vision.Experience migrating from DMVPN to SD-WAN solution using Versa and Viptella solution. Worked on Versa Director and Cisco Viptella.Worked on PoE Deployment and Management for Spearheaded the deployment and configuration of PoE-enabled switches, ensuring efficient power delivery to IP phones, wireless access points, and security cameras across various locations. Conducted regular audits and assessments of ACI configurations to ensure compliance with security policies and industry regulations.Oversaw the design, implementation, and management of DNS infrastructure within a large-scale enterprise network.Have experience in PoE Budget Calculation and Optimization and Troubleshooting and Monitoring.Experience with Aruba and Cisco Wireless LAN controller. Worked. Worked on integration of WLAN with RADIUS servers like ISE and ClearPass. Worked on configuring AP profiles, SSID, Authentication roles, RF parameters on WLAN controllers. Experience with Master, local controllers, Anchor controllers, Instant AP, Remote access points.Worked on monitoring tools that include Solarwinds, Netcool, Whatsupgold. Experience with SNMP V2C and V3. Worked on Log Collectors that include Splunk and ArcSight.Basic understanding and implementation experience with Python and Ansible for network automation tasks that include automatic backups, config templates, tasks automation like software upgrades etc.EDUCATION:Bachelor of Sciences in Computer ScienceCERTIFICATION:CCNA Certified Cisco Network AssociateCCNP Certified Cisco Network ProfessionalTECHNICAL SKILLS:Router and VoIP PlatformsCisco Routers series 9k, 7300, 4000, 3800, 2000, 1900; Avaya products, cisco IP phones.Routing Fundamentals and ProtocolsRouted and Routing protocols RIP, EIGRP, IS-IS, OSPF, BGP, IPX; MPLS, IPv4, and IPv6 addressing, subnetting, VLSM, Static routing, ICMP, ARP, HSRP, VRRP, Route Filtering, Multicast, 802.11, Policy-Based Routing, Redistribution, Port forwarding.Switch PlatformsCisco Catalyst series 2960, series 3560, 3850, 4500, 6500, 7000; Nexus series 2K, 5K, 7K; Nortel/Avaya 5510, 5520.Switching Fundamentals and ProtocolsEthernet technologies, LAN networks, MAC, VLAN and VTP, STP, PVST+, Multicast, RSTP, Multi-Layer Switching, 802.1Q, EtherChannel, PAgP, LACP, CDP, HDLC, RARP.Firewall PlatformsCheckpoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo Alto Networks (PA series 2K, 3K and 5K) with panorama 8.0, WAFSecurity ProtocolsStandard and Extended ACLs, IPsec, VPN, Port-security, SSH, SSL, IKE, AAA, Prefix-lists, Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress Firewall Design, Content Filtering, Load Balancing, IDS/IPS, URL Filtering, L2F, IDS, TCP Intercept, Router Security, SNMP trap.Network Management and MonitoringWireshark, Infoblox, HP NView, Cisco Prime, Splunk, Security Device Manager (SDM), Cisco Works, TCP Dump and Sniffer, SolarWinds Net Flow Traffic Analyzer, NetScout, Network Performance Monitor (NPM), Network Configuration Manager (NCM), SAM, IP Address Manager, Additional Polling Engine.Load BalancersF5 (BIG-IP) LTM 2000, 3900Viprion, Cisco ACE, Citrix NetScalerWAN technologiesISDN, ATM, MPLS, DS1, DS3, OC3, T1 /T3 lines, SONET OC3-OC192, SDH, POS, PDH.Other Networking Protocols and FundamentalsDHCP and DNS server, Active Directory Management, NTP, NDP, TCP, UDP, FCP, Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP, TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, SMTP, RADIUS and TACAS+, PBX servers, SDN, SAN.Operating SystemsWindows 10/7/XP, MAC OS, Windows Server, Nexus OS, Cisco IOS XR, Linux, UNIX, Cumulus.Wireless TechnologiesCanopy Wireless Devices, D-Link Point-to-point Wireless, D-Link APs, CISCO 1200 series APs, Aruba wireless and APs, Cisco Meraki, Linksys Wireless/Wi-Fi Routers, Prime Infrastructure, Ekahau, Air Magnet, AirWatch and WLCs (8510, 5508, 5706), Cisco AironetAPs (2600, 3600, 3700), ISE, MSE, Aruba 225, Aruba 3000 controller & Airwave, ISE, Clear Pass 6.0,6.2,6.5ScriptingPython and AnsiblePROFESSIONAL EXPERIENCE:Client: Compass GroupLocation: Charlotte, NC Sep 22 PresentRole: Senior Network Security EngineerResponsibilities:Deployment and operations team to support multiple migrations in switching, routing, firewalls, LB and Proxies.Palo Alto design and installation (Application and URL filtering, SSL decryption, SSL Forward Proxy). Configured and maintained IPSEC and SSL VPNs on Palo Altos. Successfully installed PA-5000 series firewalls in Data Center as perimeter Firewalls.Extensive experience in NetApp-NAS storage and Isilon-EMC, with a focus on large enterprise infrastructure design and architecture.Migrated complex network infrastructures, including firewalls, load balancers, and VPNs, to AWS, optimizing for performance and cost-efficiency.Deployed CloudFront with SSL/ACP for secure content delivery, ensuring encryption and high performance.Migration of ASA firewalls to PA next gen Firewalls using migration tool in PA. Migrated all IPSEC tunnels, ACLs, NAT rules and policies.Experience working on Cisco ASR 9K, Nexus 7k and 9K. Configured and designed OSPF, EIGRP and BGP at Distribution and Core layers. Configured OTV layer 2 connection between Data centers on Nexus.Worked on Juniper devices like M, MX, T routers on advanced technologies like MPLS VPNs, TE and other service provider technologies.Designed and implemented Amazon Virtual Private Cloud (VPC) to provide secure and scalable network architecture for hosting applications.Configured VPC components including subnets, route tables, internet gateways, and NAT gateways to ensure reliable connectivity for internal and external traffic.Extensive experience in configuring and deploying AWS WAF for protecting web applications from common web exploits.Collaborated with security teams to monitor and respond to DNS-related security incidents.Worked on Zscaler SWG to complete web traffic security by fusing web proxy and cloud firewall features.Worked on setting up pulse secure SSL VPN in Dmz for remote user connectivity and authentication of directory services in pulse secure, end point host checker, deploying Pusle connect client to end points, VPN tunneling etcExperience with configuring BGP, OSPF in Juniper M and MX series routers. Worked on several BGP attributes like MED, AS-PATH, Local Preference for route optimization. Worked on Route-Reflector, Route-Redistribution among routing protocols.Deploy and manage EC2 instances, ensuring high availability and scalability of applications.Implement security best practices for EC2 instances, including IAM roles, security groups, and VPC configurations.Conducted detailed xDSL and PON troubleshooting for reparation and break/fix activities, rapidly diagnosing and resolving network issues to minimize downtime and ensure uninterrupted service delivery.Demonstrated ability to automate manual tasks using programming languages like Python and scripting languages such as bash and PowerShell.Experienced in utilizing JSON and YAML for configuration and data serialization in various automation and integration tasks.Skilled in configuring and managing Kubernetes clusters, including setting up multi-node clusters, managing namespaces, and configuring networking for Kubernetes services.Developed and managed comprehensive WAF rulesets, including IP match conditions, SQL injection and XSS match conditions, and geographic match conditions.Used AWS CloudTrail for logging and auditing API calls, providing transparency and traceability of network changes and operations.Configured network settings on Bluecoat SSP appliances, including IP addresses, subnet masks, gateways, and DNS.Conducted regular system maintenance and updates to maintain optimal performance.Implemented Cloud Firewall to secure internet-bound traffic without the need for on-premises hardware thanks to Zscaler Cloud Firewall's next-generation firewall capabilities in the cloud.Implemented Mellanox Ethernet switches and Network Interface Cards (NICs) to build and optimize scalable, high-speed data center networks, ensuring efficient data flow and high availability.Work directly with the DoS Perimeter Security customer to build, design, test, and deploy perimeter security solutions.Deploying and decommissioning Cisco switches/Firewalls and their respective software upgrades. Hands on experience in Installing and Configuring Palo Alto PA-3060 Firewalls to protect Data Center.Designing and providing support of Routers, Switches, Security Solutions, VPNs, L4-7 Load Balancers, SD-WAN and Network Management Solutions across LAN/WAN.Automated infrastructure deployment with CloudFormation, tracked changes with CloudTrail, and designed secure network architectures within VPCs.Configured WAN connections with Meraki and FortiGate SD-WAN.Employed Zscaler Private Access (ZPA) for secure access to internal applications, eliminating the need for a VPN.Executed ZPA policies to control access and segment applications.Implemented Palo Alto solution for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.Optical RF Theory and Propagation, applied exceptional knowledge of optical RF theory and propagation to optimize network performance and signal integrity, ensuring robust and reliable connectivity for diverse applications.Provided technical support and training to users for effective utilization of recording systems.Analyzed recorded data to improve service delivery and operational efficiency.Work with Load Balancing to build connectivity to production & disaster recovery servers through Citrix NetScaler.Experienced in infrastructure technology troubleshooted public and private cloud concepts such as Software as a Service (SaaS), Platform as a Service (PaaS), Desktop as a Service (DaaS), and Infrastructure as a Service (IaaS).Experience wif deployments of various systems to Azure wif Azure CLI, PowerShell, ARM Templates and Terraform.Hands-on experience writing TEMP effective terraform scripts, Resource Templates based on Azure policies and migrating Apps to the cloud.Supports the compilation of records and reports concerning perimeter operations and maintenance to analyze the performance of perimeter security systems.Experience in configuring and using PaaS offerings (like WebApp, Azure Database services, Azure Kubernetes, Azure DataLake, etc)Performed site refreshes on Cisco switching and Aruba wireless infrastructure at several locations.Strong experience with Aruba wireless design, configuration, implementation, and testing. Thorough experience with Aruba Airwave.Design and maintain Document, configure, and implement Aruba WLAN infrastructure.Assisted in the migration from DMVPN to Cisco Meraki SDWAN.Integrated Meraki SD-WAN into the infrastructure during the design process. Developed a roadmap and migration plan for SD-WAN solution deployment globally in conjunction with internal support teams.Management of Checkpoint and Cisco ASA Firewalls. Experience on Multiple Contexts in ASA firewalls and implemented different failover mechanisms among ASA firewalls.Installed Meraki SD-WAN solution Confidential remote branches to better utilize carrier circuits and mitigate packet loss and latency.Supports the transition to operations of perimeter security devices.Collaborate with Cross-Bureaus and Agencies to implement network changes as it relates to perimeter security.Supports the configuration testing of replacement perimeter devices.Deployed and Manage SD-WAN network (Cisco Meraki Solution) for WAN connectivity.Experience in Configuring VPN, routing, NAT, access-list, security contexts, and failover in ASA firewalls.Performing troubleshooting on slow network connectivity issues, and Performance on F5 and Cisco ASA Firewalls. To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.Monitor and optimize EC2 performance, addressing issues related to CPU, memory, and network utilization.Skilled in creating rate-based rules to throttle traffic and prevent DDoS attacks.Worked on Arista Cloud Vision (CVP) & Cloud Vision Exchange (CVX) Deployed on VMs.Worked on Routing protocols Eigrp and BGP. Working on Infoblox for IPA, DHCP and DNS. Working on Linksys, SG500, Cisco, Arista, switches, and Cisco routers.Design expertise for the SD-WAN (Versa & Viptela), SD-LAN and WAN optimization technologies for efficient delivery of the application data across LAN and WAN.Maintained TACACS+/RADIUS Servers for AAA authentication and User authentication. Provided VPN services to site-to-site and, Remote access VPNs using IPSec tunneling. Work with IP for any vulnerabilities /ACLS and remediate as needed.Automated network deployment and configuration management using tools like AWS CloudFormation and Terraform.Worked on Multiple AWS instances, set the security groups, Elastic Load Balancer and AMIs, Auto scaling to design cost effective, fault tolerant and highly available systems.Maintenance and troubleshooting of LAN, WAN, IP Routing, Multilayer Switching.Designed & Deployed Cisco ISE and Provided comprehensive guest access management for Cisco ISE administrators. Configured Cisco ISE for Domain Integration and Active Directory Integration.Implemented SSL offloading on Netscaler load balancer by uploading certificates and binding them to the virtual servers along with configuring proper SSL policies & cipher suites.Defined and applied security policies on SSP appliances to handle threat detection, content filtering, and other security functions.Created templates for AWS infrastructure as a code using Terraform to build staging and production environments.Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.Configured network settings (IP address, subnet mask, gateway, DNS) on SSP appliances.Extensive Knowledge in configuring and troubleshooting as well as creating Virtual Servers, Nodes, Pools and iRules on BIG-IP F5 load balancer LTM for load balancing and traffic management in DC environment.Tests security measures to reduce and mitigate risk. Actively probes the network for new threats and risks.Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls. Active/Standby and Active/Active HA configuration on Cisco ASA Firewalls.Design and implement global Active Directory migration in support of confidential divestiture.Renovate, design and implement Microsoft Active Directory (Access Controls, Group Policy, Kerberos Authentication, naming standards, trust relationships, best practices, security policies and standards)Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 5000 and 2000.Policy Reviewing, Audit and cleanup of the un-used rule on the Firewalls using Tufin and Splunk. Rule and URL filtering remediation for Palo Alto devices. Maintain and manage Splunk related issues.Design expertise for the SD-WAN (Versa & Viptela), SD-LAN and WAN optimization technologies for efficient delivery of the application data across LAN and WAN.Managed containerized applications using ECS, running on optimized EC2 instances for scalable compute capacity.Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers. Worked on Catalyst 4506E, 4507, 6503E and 6506E series switches along with Nexus 5020 switches in change of configurations and maintenance. VSS on 6506E switches maintenance to provide dual homing for the consumers as well redundancy.Proficient in Configuring VPC between the Cisco Nexus 7k, 5k. Scheduled maintenance of Nexus 2248, 5548 and 7010 switches so that there are no Orphan ports in the network.Environment: Cisco Cat 2960, 3750, 3850, Cat 9300, 9500, 6500, 4500X, Nexus 2k,3k,5k,7k,9k, F5 Viprion, BIG IP 5000, PA 5000 series, Panorama, Cisco Versa, Cisco Wireless LAN 5508, Cisco ACI, Juniper EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240, Zscaler proxies, SolarWinds, Cisco VOIP, Cisco ASR 9k, 1K, Checkpoint SSP, Citrix ADC, Amazon EC2Client: Publix Super MarketLocation: Lakeland, FL Apr20 Aug22Role: Sr Network EngineerResponsibilities:Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.). Design of DMZ in primary and redundant data centers with Next Gen Firewalls, IPS/IDS sensors, Switching and routing.Utilized AWS services such as VPC, Direct Connect, Transit Gateway, and Route 53 to build and maintain robust cloud networks.Experience in deployment of Nexus 7010, 5548, 2148T, 2248 devices.Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.Configured and troubleshot Arista 7050, 7060, and 7280 series switches.Designed OSPF implementation from EIGRP utilizing Cisco, Brocade, and Arista network equipment.Experience configuring Virtual Device Context in Nexus 7010Implemented monitoring and logging solutions for Kubernetes clusters using tools such as Prometheus, Grafana, and ELK stack (Elasticsearch, Logstash, and Kibana) to ensure high availability and performance of applications.Installation and maintenance of Cisco Layer 3 switches 3750, 4500X, 6500 in multi VLAN environment.Maintenance and configuration of Cisco ASR1000 series and 7200VXR routers at data center and deployment of 3900, 3800, 2951 and 2821 for branch connectivity.Planned and executed network infrastructure upgrades, including DNS hardware and software updates, to maintain optimal performance and security.Updated SSP appliances to the latest firmware versions to ensure compatibility and security.Maintained Network and Perimeter Security - e.g., firewalls, IDS/IPS, secure remote access and secure file transfer.Hands-on experience on Azure IaaS (Design and Implementation). Hands-on experience on large scale migration from on premises environments into Azure using 6R techniques such as Rehosting, Re-platforming, Refactoring, etc. depending on the customer's needs.Expertise in performance tuning and optimization of ONTAP systems, including monitoring system performance, identifying bottlenecks, and implementing solutions to enhance storage efficiency.Utilized Mellanoxs NVMe over Fabrics (NVMe-oF) technology to provide high-speed connectivity for storage systems, ensuring rapid data access and transfer.Successfully designed and deployed xDSL and PON network access solutions for multiple high-profile clients, resulting in improved connectivity and customer satisfaction.Led troubleshooting efforts that reduced network downtime by [percentage] through efficient resolution of xDSL and PON issues.Configure and manage AWS VPC Flow Logs for network traffic monitoring and analysis. Analyze VPC logs to identify and resolve security incidents, network bottlenecks, and unauthorized access attempts.Collaborated with cross-functional teams, including application developers and systems administrators, to ensure comprehensive migration plans and successful project execution.Proven expertise in File Storage Engineering products, including Dell Isilon, NetApp ONTAP, and Lustre, with comprehensive knowledge of NAS protocols CIFS/SMB and NFS.Familiarity with Zscaler Digital Experience (ZDX) for monitoring network and application performance.Responsible for design, development, and architecture of Cloud solutions.Responsible for design and build Azure foundation setup.Experience in configuring and managing ONTAP data protection features such as SnapMirror, SnapVault, and MetroCluster for high availability and disaster recovery.Updated firewall rules to allow traffic between ASG load balancers and SSP appliances.Good to have experience on Designing & building Azure Kubernetes platform. Good to have experience of Designing & building Azure Service mesh (ex. Istio) on top of Kubernetes platform.Involved in migration from Site-to-sire GRE tunnels network to MPLS-based VPN for customers WAN infrastructure.Implementing security Solutions using Palo Alto PA-5000/3000, Cisco PHONE NUMBER AVAILABLEMigration experience from Cisco ASA 5500 to PA. Experience with migration tool in PA for Policies from ASA to PA. Experience with SSL forward proxy and URL filtering.Skilled in managing datacenter stack components, including storage, compute, and networking, across Linux/Unix and Windows operating systems.Provided mentorship and training to junior staff on troubleshooting best practices.Configuration and administration of firewalls, which includes Checkpoint, Juniper, and Cisco ASA firewalls.Experience with RIVERBED Steelhead appliance for WAN optimization.Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for tasteful replication of traffic between active and standby member.Monitored and optimized telecommunication infrastructure for maximum reliability and performance.Acquitted with Cisco Meraki for Cisco Wireless Devices Monitoring, managing, and troubleshooting Cisco Wireless devices using Cisco Meraki.Continually upgraded Meraki security devices as all store locations and kept current firmware, verified Meraki was upgraded, both circuits were functioning through the Meraki and wireless clients were using the Meraki appliances.Configure / Troubleshoot Juniper: EX-3300, EX-4300, and EX-4500, EX 6200 series switch for LAN /WAN connectivity.Conduct in-depth packet capture analysis (PCAP) to diagnose and troubleshoot complex network issues.Utilize tools such as Wireshark and tcpdump for traffic inspection and protocol analysis.Implement and maintain network monitoring systems to capture and analyze traffic patterns and anomalies.Conducted comprehensive connectivity tests to verify communication between SSP appliances, ASG load balancers, and other network components.Implemented advanced IP MPLS solutions that enhanced network performance and scalability, supporting the growth and expansion of enterprise networks.Performed site refreshes on Cisco switching and Aruba wireless infrastructure at several locations.Strong experience with Aruba wireless design, configuration, implementation, and testing. Thorough experience with Aruba Airwave.Utilized advanced diagnostic tools and techniques to identify root causes and implement solutions.Design and maintain Document, configure, and implement Aruba WLAN infrastructure.Developing and Experience in Aruba Clear Pass architecture and Aruba Airwave architecture.Worked extensively with multiple wireless hardware vendors including Cisco, Cisco Meraki.Researched, designed, and replaced Checkpoint firewall architecture with new next generation Palo Alto PA3000 and PA5000 appliances serving as firewalls and URL and application inspection.Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.Successfully installed Palo Alto PA-3000/PA-5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.Set up and oversaw Zscaler policies for threat protection, SSL inspection, web filtering, and data loss prevention (DLP).Can be able to troubleshoot and implement network designs using Avaya products.Involved in originating VoIP telephone calls are like traditional digital telephony, Call manager Express v4.x and involve signaling, channel setup. |