Quantcast

Sr Network Engineer Resume Chicago, IL
Resumes | Register

Candidate Information
Title Sr Network Engineer
Target Location US-IL-Chicago
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes
Click here or scroll down to respond to this candidate
JamesSenior Network EngineerEMAIL AVAILABLEContact Number: PHONE NUMBER AVAILABLECurrent location: Chicago, ILSUMMARY10 Years of experience in networking, security, installing, configuring and maintaining network devices.I have knowledge of Cisco Meraki and pretty much knowledge of Cisco ISE.Hands-on experience in configuring Meraki devices and creating device and feature templates required for SD-WAN implementation.Mature background in network design, installation, configuration, maintenance, support, administration and monitoring of all aspects of IT devices and networks with emphasis on Cisco and Meraki SD WAN. Continuous professional development in technical knowledge, management technologies and customer satisfaction skills. Strong Network Management Skills. Excels under pressure, accustomed to working long hours in pursuit of company goals. Team Leader or Player as required.Experience with Cisco Meraki wireless managed network infrastructure.I can be debugging and designing or supporting AAA identity-based access solutions for WLAN deploymentsExpertise in Configuration of VLANS, using Cisco Multilayer switches and supporting STP, RSTP, PVST, RPVST along with troubleshooting of inter-VLAN routing and VLAN trunking using 802.1Q.Strong hands on experience on Cisco Catalyst (3550, 3750, 6500) series switches, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers, PIX Firewall (506, 515, 525, 535), ASA (5505/5510), Load Balancers using Cisco ACE, F5 LTM/GTM, Security Device Manager (SDM), Cisco Works, HP Open View, Solar Winds, Sniffer, Palo Alto Networks Firewall models (PA-2k, PA-3K and PA-5K).Proficient in using firewall technologies including general configuration, security policy, rules creation and modification of cisco ASA and checkpoint.Configured Cisco Unified Communications Manager (CUCM) and unity connections to support Call transfer, Conferencing and Voice mail.Strong experience in creating firewall policies as per the requirements on Checkpoint, Palo Alto, Cisco ASA.Responsible for all components of Office 365 including one drive, Skype for business, yammer and SharePoint.Experience on F5 Local Traffic managers (LTM), Global traffic manager (GTM) of series 6400, 6800, 3400, 5100, 3600 and 3DNS migration to GTM.Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.Strong understanding of current and future technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, ACL, VPN, Wireless LAN and configuration of VLANs.Expert level knowledge in IP Routing and WAN protocols (BGP, EIGRP, OSPF, ISIS).Proficiently implemented traffic filters using Standard and Extended access-lists, Distribution lists, Route-maps and Route Manipulation using offset-list.Great knowledge and good hands-on experience in CISCO source fire and its products.Experience with converting Cisco 6500 IOS to Cisco Nexus NX-OS in the data center environment.Handled administration and troubleshooting of Riverbed CX 7055L, CX 5055M, CX 1555M, CMC 8150Network security including NAT/PAT, ACL, VPN and IPSEC on DMVPN (GRE Mode).Expert level internetworking troubleshooting in a large-scale network environment. Undertake support as designated Advanced Services engineer for large-scale networks.Extensively worked on Cisco catalyst 6509 and implemented VSS along with VDC and VPC on Nexus 5505, 7009 switches.Experience in configuring and Troubleshooting BIG-IP F-5 load balancer LTM.Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.Designed 10 gigabit networks using Cisco Nexus 7000 series switches, Checkpoint NGX firewall and Cisco 3800 series routersGood understanding of VoIP implementation and protocols such as H.323, RTP, and SIP.Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.Experience in Designing and assisting in deploying enterprise-wide Network Security and High Availability Solutions for ASA.Access control server configuration for RADIUS and TACACS+.Responsible for check point and Cisco ASA firewall administration across global networks.Worked on ASR 1000 series routers.Worked on Load balancer F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.Excellent understanding of TCP/IP fundamentals, OSI reference model and networking protocols. Docker container configuration.Established relationships and network connectivity with vendors via site-to-site VPN.Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.Technical skills:Network Design Tools : OPNET, GNS3 and Packet TracerNetwork Monitoring Software : Cisco-Works, Wireshark, Packet Analyzer,Experience in configuration and troubleshooting of the following network protocols:oRouting Protocols : RIP, RIP-2, EIGRP, OSPF, HSRP, VRRP and GLBP.oLayer 2 Protocols : VTP, STP, RSTP, MST, VLANs, 802.1Q, ISL.oInfrastructure Services : DHCP, DNS, SMTP, FTP, TFTP, ICMP, SNMP.Experience in configuring the following networking devices:oRouters: 2600, 2800, 2900, 3600, 3700, 3800, 3900, 7200, 7600,10k,12k.oSwitches: 2900, 2950, 3500, 3550, 3560, 3750, 3850, 4000, 4500, 4900, 6509, 75009.AAA Architecture : TACACS+, RADIUS, Cisco ACSFeatures and Services : IOS and Features, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP, FTPWAN : PPP, HDLC, Channelized links (T1/T3), Fiber Optic Circuits, Frame Relay, MPLS, VPNIP Services : L2VPN, L3VPN, VPLS, VPRNLAN : Ethernet (IEEE 802.3), Fast Ethernet, Gigabit EthernetNetwork Security : Cisco ASA 5505, ASA 5510, ACL, IPSEC, CheckpointCertifications:Cisco Certified Network Professional (CCNP)Cisco Certified Network Associate (CCNA)Professional Experience:Client: Vesper Financials Jan 2023 PresentLocation: Chicago, ILDesignation: Senior Network EngineerAssisted in the migration from DMVPN to Cisco Meraki SDWAN.Integrated Meraki SD-WAN into the infrastructure during the design process.Developed a roadmap and migration plan for SD-WAN solution deployment globally in conjunction with internal support teams.Management of Checkpoint and Cisco ASA Firewalls.Experience on Multiple Contexts in ASA firewalls and implemented different failover mechanisms among ASA firewalls.Installed Meraki SD-WAN solution at remote branches to better utilize carrier circuits and mitigate packet loss and latency.Deployed and Manage SD-WAN network (Cisco Meraki Solution) for WAN connectivity.Rolled out 40 sites in a hub-spoke setup with migration from DMVPN to Meraki SDWAN.Responsible for developing traffic engineering in Meraki SDWAN to support intelligent traffic flow across the networks Involved in deployment of Meraki SDWAN solution across the Corporate offices.Provide 24*7 supports for day-to-day operational activities including Change Implementation, Handling Work order access Request, High Priority incident handling/troubleshooting for Security Devices (Firewalls, Proxies, IPS, SSL, VPN Devices etc.)Worked on Application Delivery Controllers that include F5 LTM, GTM and ASM, Citrix Netscalers, Cisco ACE, GSS load balancers. Worked on Configuring virtual servers, one arm and two arm LB Architecture, iRules, Monitors, DNS based topology load balancing, Persistence Profiles, SNAT etc.Worked on the management platform of Riverbed Steelhead WAN optimizer.Provided support for 2Tier and 3Tier firewall, which includes various Checkpoint, Cisco ASA firewalls and Fortinet Firewalls.Work with Fortinet FortiGate Appliances like 60D, 100D, 200D, 1500D and 3500E Forti Analyzer.Firewall policy provisioning on Fortinet FortiGate appliances using Forti Manager with multiple ADOMs and Forti Gates running multiple VDOMsConfigured gateway to support calls using different call control and signaling protocolsImplemented a Cisco Unified Border Element (CUBE) gateway to connect to an Internet Telephony Service ProviderWorked on setting up pulse secure SSL VPN in DMZ for remote user connectivity and authentication of directory services in pulse secure, end point host checker, deploying Pulse connect client to end points, VPN tunneling etcConfigured Session Initiation Protocol (SIP) and Media Gateway Control Protocol (MGCP)Configured phones for Class of Service using the line, device approachConfigured phones for voice mail.Configured Cisco Unity Connection users.Coordination of building transition during the Juniper/Pulse Secure acquisition.Configuration of Palo Alto Next-Generation Firewall mainly creating security profiles and VSYS according to client topology.Troubleshoot and Worked with Security issues related to Cisco ASA, Checkpoint, Fortinet, IDS/IPS.Configured and Administered Cisco ASA 5500 firewalls which includes setting up the different zones.Configuring and implementing Remote Access Solution: IPsec VPN, any connect VPN, SSL VPN.Primary responsibility is to maintain, monitor and make production changes on R77.30 checkpoint firewalls.Adding rules and monitoring checkpoint firewall traffic through Smart Dashboard and Smart View Tracker applicationsClosely works with the team to develop and maintain a comprehensive firewall engineer program, including policies, processes and standards for administration and engineering of firewalls.Configure and administer Cisco ASA Firewalls (5585, 5550 and 5540) and use command line CLI, Cisco CSM, ASDM for day-to-day administration.Monitor and maintain health of all firewalls.Worked with different project teams to provide firewall solutions to meet security requirements and business needs.Configured CUCM and unity connections to support Call transfer, Conferencing and Voice mail.Hands-on experience configuring and deploying Gateways, CUBEs, Quality of Service, and troubleshooting VoIP networks.Ensure Firewall Policy compliance as per client required standards including PCI, SAS 70 Auditing.Configure gateway interconnections to support VoIP and PSTN callsDevelop and maintain the documentation of firewall procedures and standards.Worked on firewall tickets and provided support with production outages, assisting with product migrations/installations as per business requirement.Key functions include Configuring and maintaining services, Access control lists, System Access, Authentication, and Authorization, Key Security tools installed, Auditing and reporting by Log reviews.Experience on checkpoint firewall upgrade from R75 to checkpoint GAIA R 77Experience on Smart update, user Management and Authentication in checkpoint.Experience on troubleshooting rules and user-based authentication issues.Experience on checkpoint Identity collector serverConfigured ACLs in Cisco 5500 ASA firewall for Internet Access requests for servers, Protocol Handling, Object Grouping and NAT Control using Object NAT.Managed a TACACS server for VPN user authentication and network devices authentication.Upgrading the network by translating protocols like EIGRP to OSPF.Follow ITIL based Service Delivery and Management process.Performed VSS on cisco catalyst 6500 series switches.Configured and managed Cisco access layer routers, switches carried out route redistribution and manipulated route updates using distribute lists, route-maps, administrative distance, offset-lists.Extensive experience in configuring Layer3 routing and layer2/3 switching Cisco based series routers and Switches.Configured routing protocols like RIP, MPLS, EIGRP, OSPF& BGP and troubleshooting layer3 issues.Implemented redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.Worked on Cisco IOS for configuration & troubleshooting of routing protocols: OSPF, EIGRP, RIP, BGP, BGPv4.Troubleshoot issues related to connectivity, STP, VLANs, Trunking, VTP, Layer 2/3switching, Ether Channels, Inter-VLAN routing, log messages, high CPU utilization and parameters that can degrade Performance of the network.Tested BGP features such as as-override, Local pre, EBGP and load balancingMaintained complex LAN/WAN networks with several VLANS and provided support for routing protocols and provided secure sessions over network using IPSec, SSL encryption.Worked on Remedy Ticketing system, Change Management, Incident Management and solving issues.Client: Trace 3 Jan 2020  Dec 2022Location: RemoteDesignation: . Network EngineerResponsibilities:Information security skills: Network Security (IDS/IPS, Firewall, Wireless Security, Nessus Scanner,Metasploit, Wireshark, Nmap), Network Traffic Analysis, IPsec VPNImplementing security Solutions using Cisco ASA, Checkpoint firewalls R75, R76, R77.30 Technologies: Cisco ASA firewalls, IDS/IPS, Symantec HIDSInstalled and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series.Created progressive new strategy proposals, resulting in two acquisitions for SSL-VPN secure remote access (Net6) and web optimization (NetScaler).Involved in migrating applications from NetScaler to F5 Big -IP environment.Worked on disaster recovery, Perform On prem VM migration to Azure using Azure Site Recovery, database restore and recovery, database mirroring.Used OpenStack to simulate the test case to test virtual machines and also troubleshoot OpenStack.Implementation of Tenant Office 365 with Azure AD connect and ADFS for single Sign ON.Working and Deployed with upgraded Microsoft Exchange 2013 to Office 365 Environment.Monitoring, alerting, preventive action framework for Brocade SAN switches.Experience in Cisco Routing and Switching using 3600, 3700, 3800, 5300, 6500, 7200, 7600Nexus 7k, Nexus 5k, Nexus 2k& ASR 9000, 1000 series routers, Meraki products.Implemented single-sign ON Authentication method with Office 365 and configured DirSync and ADFS for Active Directory Synchronization.Worked on the SD-WAN implementations at all Greenfield and Brownfield medical facilities/hospitals by deploying Meraki hardware.Migrated and implemented new solutions with Cisco ASA Firewall (5500) series.Experience configuring VPC, VDC and ISSU Software upgrades on Cisco Nexus 7010.Troubleshooting of protocol-based policies on Palo Alto firewalls and changing the policies as per the requirement and as per traffic flow.Create ACI migration plans (brownfield) create L2/L3 transitions. Map traffic flows for EPGs and BDs. Handle drivers for ML2 and GBP OpenStack integrations.Migration from 2007 to 2013 as well 2013 to Office 365.Implemented Quality of Service (QoS), Policy Maps, ACI, Class-maps, and Policy Routing in the network infrastructure throughout all the different sites.VLAN configuration, Troubleshooting and Firewall ACLs and Object-Groups configuration and support.Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for stateful replication of traffic between active and standby member.Worked as Cloud Security Consultant in Information and Cloud Security domain across verticals like Banking and Finance, Healthcare, Retail and Manufacturing.Migration of ASA firewalls to PA next gen Firewalls using migration tool in PA. Migrated all IPSEC tunnels, ACLs, NAT rules and policies.Involved in deployment of Meraki SDWAN solution across the Corporate offices.Provide second/third level technical support for ACI (Application Centric Infrastructure), APIC technologiesConfiguring/Managing Intrusion Prevention System (IPS): Cisco IPS/Fortinet& Checkpoint UTM.Configuration and maintenance of PIX and ASA firewall systems.Cisco WebEx Meeting Server /Cisco Meeting Rooms (CMR) Cloud Based (SAAS) Integration /Support/Rollouts (WBS30).Configured Cisco VOIP sets; 7975, 7940, 7941, 7960, 7937/8831 Polycom and 8841 SIP Devices.Configuring, maintaining and troubleshooting with Fortinet firewall and security.Conversions to BGP WAN routing, which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.Configure/upgrade wireless access points and am familiar with Cisco wireless controllers.Worked with Cisco Layer 3 switches 3750, 4500, 6500; Cisco Nexus 2248, 5548, 6001 and 7018 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, ether channel.Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.Configuring the F5 LTM both by the GUI and Tmsh scripts. Composition of Virtual Servers, Pools, and Nodes in accordance to the application.Adding security rules and pushing the security policy on Checkpoint and Fortinet consolidated.Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.Demystifying Terraform modules creating custom IAM policies with JASON. Worked on EC2 instances, remote backend using S3 storage.Experience parsing the CLI, semi structured text with Ansible. Network debug and troubleshooting socket path issues.Implemented Contracts, Multi-tenants between Endpoint groups using SDWAN in ACI.Working with leading cloud providers like AWS, Azure to align solutions as per RFPs, RFI.Experience with converting Cisco 6500 IOS to Cisco Nexus NX-OS in the data center environment.Redistribution of OSPF and EIGRP into BGP with the correct tagging parameters from the old legacy network to route and to utilize the correct MPLS VRF VPNs provided from the bearers.Checkpoint, Cisco ASA, Fortinet and Palo Alto installation, upgrade, Monitoring and patch management.Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.Deployed and Manage SD-WAN network (Cisco Meraki Solution) for WAN connectivity.Participated in data center upgrade from Cisco IOS platforms to NX-OS platforms.Configure Cisco ASR PHONE NUMBER AVAILABLE and Catalyst 6509 routers for L3 VLans with HSRP and advertise network in BGP and OSPF in complex DC environment.Involved in Configuring and implementing of Composite Network models consists of Cisco7600, 7200, 3800 series and ASR 9k, GSR 12K routers and Cisco 2950, 3500, 5000, 6500 Series switches.Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.Managed the F5 BigIP GTM/LTM appliances to include writing i-Rules, SSL offload and everyday task of creating WIP and VIPs.Responsible for service request tickets generated by helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.Experience with converting checkpoints VPN rules over to the Cisco ASA Solution. Migration with Cisco ASA VPN experience.Advanced proficiency with Cisco Wireless (APs, Controllers, Entuity, Cisco ISE, Cisco Prime).Client: Michaels Nov 2018  Jan 2020Location: Dallas, TXDesignation: Network Security EngineerResponsibilities:Configure, implement, maintain, and administer Cisco LAN and WAN switches, routers, firewalls.Configure of IGP Dynamic Routing Protocols Like as RIP, IS-IS, EIGRP and OSPF.Experience with Cisco ASA firewalls (5510, 5520 and ).Experience on F5 BIG-IP Local Traffic Management (LTM) Module. (3900, and 6900 Load balancers).Configured Client-to-Site and Site to Site VPN using SSL Client on Cisco ASA 5520 ver8.2.Configuring the Access lists (ACL) on Cisco firewalls for proper network routing for the B2B network connectivity.Switching technologies like VLAN, Inter-VLAN Routing, Ether-channel, VTP, HSRP, VRRP, GLBP, Spanning Tree Protocol 802.1d, 802.1s and 802.1w.Re-assigned the Riverbed Steelhead environment, Corrected various configuration issues and synced all devices to the Riverbed SCC (CMC).Knowledge and experience with Citrix NetScaler Access Gateway and policy configurations.Installation and configuration Cisco router IOS 12.x, CatOS 12.x, Nexus NX-OS 6.x.Configure of EGP Border Gateway Protocol (BGP).Configure and implementation of BGP Confederation and BGP Route Reflector.Configure and implementation of BGP Attributes Like as Weight, Local Preference and MED for traffic direction.Configure Of MPLS-VPN, VRF and BGP Tunneling.Dynamic Multipoint Virtual Private Network (DMVPN).Coordinated with Vendors for creating and modifying firewall and NAT rules and Maintaining Site to Site IPSEC VPN and SSL VPN.Working as Cloud Administrator on Microsoft Azure, involved in configuring virtual machines, storage accounts, resource groups.Design/Create/Implement Cisco Telepresence Management Suite (TMS 15.5) w/ Cisco Cloud Connect Audio (CCA) cloud.Cisco WebEx (WBS31/SaaS) Cloud Based Collaboration Meeting Server / Collaboration Meeting Room (CMR) provisioning, administration and enterprise rollout.Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.Experience with AWS and Azure Security Architecture.Worked with Netmiko for SSH connections to routers and switches. Configuration of network devices with Python, NAPALM for network automation.Backup and restore of Check Point and Cisco ASA Firewall policiesExperience on Administration and Troubleshooting of Microsoft Azure Networking (VM, Storage, VNET, OMS, NSG, Site to Site VPN, Point to Site VPN, ExpressRoute, Load Balancers, Application Gateway, Availability Sets).Experience with Microsoft Azures web Deployment and SQL Database Deployment.Migrated Sites from EIGRP to OSPF.Configuring switch ports (VLAN tagging, switch port mode, Port Channel) at distribution and Access layers for new server builds and critical server movement as per requirement.Good understanding of OSI Model, TCP/IP col suite (IP, ARP, ICMP, TCP, UDP, SMTP, FTP, TFTP)Infrastructure trouble shooting and TCP/IP Protocols Experience.Troubleshot complex issues with Wireshark at source and destination which cant be resolved by the basic troubleshooting like ARP, firewall logs, switch logs and TCP dump.Performs regular maintenance and support of workstations, servers, and virtual machines. Includes maintaining the health and performance of databases.Cisco WebEx Meeting Server /Cisco Meeting Rooms (CMR) Cloud Based (SAAS) Integration /Support/Rollouts (WBS30).Experience working with Azure Cloud based services a plus.In corporate Cisco Nexus 9000 NXOS to ACI fabric to work in concert with existing Nexus 7000s and ASRs for MPLS.Regular upgrades and maintenance of Infrastructure, Installations, configurations of Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800).Troubleshoot network connectivity and performance problems.Communicate to all levels of the organization on project status.Basic Configuration of Juniper Routers, Nexus 7k, 5k & 2k.Client: Alignment Healthcare Nov 2016  Oct 2018Location: California, USADesignation: Network EngineerResponsibilities:Designed Configured, Installed, and Maintained and provided T-Shoot the network infrastructure for Cisco platform for more than 300 devices i.e. 2800, 3600 series Routers and switches for office and for various Customers.Troubleshoot traffic passing managed firewalls via logs and packet captures.Configured RSTP, LACP and VTP on Cisco devises.Created VLAN and Inter-VLAN routing with Multilayer Switching.Palo Alto IPS change control mgmt.Migration of RIPv2 to OSPF, BGP routing protocols.Provide technical support in the implementation, testing and configuration of various network protocols to include: OSPF, EIGRP, Spanning-Tree, VRRP/HSRP, VPN, VRF, IPSEC and GRE TunnelsResponsible for adding Policies to the Juniper SRX 3600, 240, ISG firewalls and Checkpoint Firewalls and monitoring the logsExperience working with Nexus 7010, 5020, 2148, 2248 devicesExperience in deploying EIGRP/BGP redistribution and the changing the metrics for the primary and back up.Performed RIP and OSPF Routing Protocol Administration.Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.Troubleshoot problems on a day to day basis and providing solutions that would fix the problems within their network.Configured EIGRP for Lab Environment.Experience with devices Palo Alto Network firewalls such as security NAT, Threat prevention & URL filteringInstalling, Configuring Cisco Catalyst switches 6500, 3750 and 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control Lists implemented as per Network Design.Maintained Redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.Other responsibilities included documentation and support other teams.IPsec VPN Solutions, Advanced Cisco AnyConnect Full-Tunnel SSL VPN Solution, Cisco ASA BasicConfigured RIP, OSPF and Static routing on Juniper M and MX series Routers.Administer and implement firewall policies in Palo Alto Networks, Cisco ASA's and other vendor specific appliances.Designing Solutions for frozen requirements using Cisco Routers and Switches.Migration from Cisco to Palo Alto firewall & Cisco to Checkpoint firewall.Client: Genome Technologies July 2014- May 2016Location: Dubai, UAEDesignation: Network EngineerResponsibilities:Work with the following routing/switching protocols: BGP, OSPF, EIGRP, LDP, HSRP, VRRP, GLBP, VTP, 802.1d, 802.1q, ISL, VLAN's and Port-Channels.Verify the UDP ports are enabled on the customer firewall in case of shared backhaul connectivity for the internet traffic.Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.Upgraded Cisco 7200, 3600 Router IOS Software, backup Routers and Catalyst 3560, 4500 switch configurations.Configured Remote Access Servers with Frame Relay, Leased Line circuits.Configuring and Implementing VLANS over the core Switch.Provisioning of different kind of SONET, SDH and PDH circuits using NGN tools.The broadband services are provided over ADSL2+ and SDSL technologies with various combinations of uplink and downlink speeds and PSTN services for single or bulk order customersWorked on various Nexus Products Nexus 7010, Nexus 7009 along with vPC and Fiber extender Module, and Nexus 2248Maintain & prepare Network drawings of all major Data Centers & operational sitesExperienced in designing, implementing LAN/WAN configurations on Cisco 5K, catalyst 6500 switches.Experience with installation, configuration and reload of Nexus 7K, 5K, 2K devices in data center topology for core network.Configurations of SSL/VPN connections, troubleshooting CISCO ASA firewalls, and related network security measures.Configure switch ports connecting to the WAN and LAN networks with separate subnets and VLANs.Configure the Static IP routes.Installation and configuration of Cisco 6509, Cisco 2960, Alcatel 7210 and 7450 SwitchesInvolved in SNMP Network management. Worked on various scanning and Sniffing tools like Ethereal.Experience in Network Management Tools and sniffers like SNMP, Wire shark and Cisco works to support 24 x 7 Network Operation Center.

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise