| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
CCNA Certified Network EngineerPhone: PHONE NUMBER AVAILABLEEmail: EMAIL AVAILABLEProfessional Summary:CCNA Certified Network Engineer with 7+ Years of Experience as a Network/Network Security/ Wireless Engineer.Experience with various Network Topologies, LAN, WAN, Campus, Data Center, ISP Connectivity, WLAN, VOIP environments.Worked on Next generation Network Engineering trends and have hands on experience in migration projects from legacy to latest technologies and equipment. Very flexible and enthusiastic to learn new technologies and work on any new vendor equipment.Thorough with Documentation Skills from end-to-end Project implementation, VISIO Diagramming, MS Project, MS word and Presentations wherever necessary.Switching experience which includes campus and Data Center Switching, Worked on Cisco, Juniper, Arista, Aruba and Dell Switching gear.Experience with IDF/MDF Architecture, remote sites switching with access and Distribution layers, Data Center Top of the Rack switching, Distribution and core in DC.Campus Switching and Routing Hardware includes Cisco 3750, 3850, Cat 9K, 4500, cisco ISR routers, 2300, 7200 series routers Juniper EX 4300, 3400 in access and EX 4600 in Distribution. Aruba 2530, 2540, 3810 and 5400R switches.Data Center Switching and Routing Hardware Includes Cisco Nexus 2K, 5K, 3K and 7K modules. ASR 1K, 9K, Cisco Juniper QFX Series, MX series routers, Arista 7000 series.High Level understanding and implementation experience in VLAN, STP, RSTP, MST, 802.1X, DHCP, DNS, HSRP, VRRP, GLBP, IPv4, IPv6, OSPF, EIGRP, IS-IS, BGP, RIP, Static Routing, VSS, MLAG- VPC, MEC, VDC, VXLAN, EVPN Protocols.Extensive experience working with Network Firewalls. Worked on Cisco ASA, Cisco Firepower, Palo Alto Next Gen Firewalls, Checkpoint, Fortigate and Sonic Firewalls.Experience with Perimeter Firewalls, VPN firewalls, Server Farm Firewalls using Standard and Extended ACL, All types of NAT, URL Filtering, SSL Forward Proxy, SSL Decryption, Threat ID, User ID and APP ID based Security policies.Implementation of Firewalls from Scratch and migration from Legacy to Next Generation firewalls with Layer 7 security features.Worked on Internet Web Security Proxies which includes Cisco Iron Ports, Bluecoat Proxies, Zscaler Cloud Proxies. Worked on PAC files, Whitelist and Blacklist policies, AD group-based policies, User based, location-based Policies on proxies.Experience with Application delivery controllers which include Cisco ACE, F5 LTM, GTM, APM, ASM modules, Citrix Netscalers. Worked on Virtual servers, Pools, SNAT, persistence, Profiles, iRule Scripting, DNS, Topology based load balancing on F5. Migration experience from ACE to F5.Worked on all major vendor-based application load balancing which includes Microsoft Office 365, Secure email Gateways, Citrix VDI, ICA proxy, tenant restrictions etc.Experience with Overlay and Underlay networks which includes VXLAN tunneling, OTV. Software defined networks using Cisco ACI and Arista Cloud Vision. Experience configuring Bridge Domains, Application templates, VNI, VTEPS, Symmetric and Asymmetric IRB in Spine and Leaf Architecture. Worked on Nexus 9K in ACI and non ACI modes.Experience with remote site connectivity to Data centers using SD-WAN in MPLS WAN. Worked on Versa, Viptella and Meraki SD-WAN solutions. Experience with vSmart, vBond, vEdge and vManage components in SD-WAN.Worked on Cisco, Meraki, and Aruba Wireless solutions. Worked on configuration of WLAN controllers, AP groups, SSID, RF parameters, Anchor controllers, BYOD policies, Integration with RADIUS servers for Authentication. Experience with Cisco Prime, Aruba Airwave.Worked on Cisco ISE, Aruba ClearPass for RADIUS and TACACS Authentication. Integration with WLAN controllers. Wired and Wireless Authentication using Cert based and MAB. I have a very good understanding of 802.1X.Experience with Public Cloud Networking, including but not limited to Hub and Spoke, VNET, Peering, VPN Gateways, AWS Direct Connect and Azure Express Route.Expertise in the following fundamental AWS Services (VPC, Subnet, Elastic Network interface, Internet.Gateway, Route table, NAT Gateway, Network ACL, Direct Connect, VPC Peering, VPN, EC2).Enhanced level of knowledge with PPP, PAP, CHAP, ATM, T1 /T3 Frame-Relay, MPLS.Experience with DNS and DHCP servers which Include Infoblox, Windows DNS and DHCP, BlueCat DNS. DHCP scopes, IPAM, DNS Zones, Forwarders, Delegations to F5 GTM for Wide IP, sub-Domains, External, Internal and Cache grids for DNS.Experienced working Azure Automation including Runbooks and Terraform scripts.Worked on SNMP for network monitoring which includes SolarWinds, Netbrain, Whatsup Gold.Experience with Cisco and Avaya VOIP environment. Worked on Configuration of Call Managers, H.323, SIP trunks, QOS policies, VOICE VLANS, CUCM, VOIP gateways etc.Basic Knowledge in Network Automation using Ansible and Python Scripting.Education:Bachelors in Computer Applications, Osmania University INDIA.Masters in Computer and Information Sciences Saint Leo University, Saint Leo, FL.Certifications:CCNA Cisco Certified Network AssociateCCNP (Routing & Switching) Cisco Certified Network Professional.Technical Skills:Networking TechnologiesLAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTPNetworking HardwareCisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls.Routing ProtocolsOSPF, ISIS, EIGRP, RIP, MPLS, IS-IS, BGP, MulticastingSecurity TechnologiesPAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, CheckpointNetwork MonitoringSolarWinds, Wireshark, HRping, Whatsupgold, InfobloxOperating SystemsWindows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR, IOS-XE, NX-OSRoutersCISCO 4300, 4400, 4500,2600, 2800,3800,7200, Juniper M & T Series, ASR 1000Load BalancersF5 Networks (BIG-IP), NetScaler (Citrix)Capacity & performanceCascade Riverbed (Flow Monitor), WAN KillerSwitchesCISCO 2960,3750,3850, CAT 9300, CAT9400, CAT 9500,4500,6500,6800 Nexus 7k,5k,2kProgramming LanguagesC, C++, Perl, Power Shell, PythonSimulation ToolsGNS3, VMware, OPNET IT GURU, OPNET Modeler, CadenceFirewallsJuniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580), McAfee Web Gateway, Checkpoint, Palo Alto firewalls.AAA ArchitectureTACACS+, RADIUS, Cisco ACSFeatures & ServicesIOS and Features, HSRP, GLBP, VRRP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVRs, HLD and LLD documents, Dell equal logicsProfessional Experience:Verizon, Tampa, FL Jan 2023 - PresentRole: Sr. Network Security EngineerResponsibilities:Configuration and Administration of Cisco and Juniper Routers, Switches and mixed vendor Firewalls.Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices. Worked on 40 gig and 100 gig switching chassis with QSFP. Worked on Cumulus Switching POC on Mellanox devices.Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices also configure 2k, 3k, 7k series RoutersExperience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018Experience with configuring FCOE using Cisco nexus 5548Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network.Installation and Configuration of Cisco Catalyst switches 6500, 3850 & 2960, 9300 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy it also includes the configuration of port channel between core switches and server distribution switches.Experienced working Azure Automation including Runbooks and Terraform scripts.Migrated to Juniper EX series switches from Cisco 3500 series and 6500 series switchesExperience with moving data centers from one location to another location, from 6500 based data centers to Nexus based data center.Designing Public Cloud environments like AWS and Azure for large scale enterprise environments; experience with Microsoft Cloud based services.Worked on Zscaler Cloud proxies, Implementation of Policies, PZen Configuration, GRE tunnels to Cloud, PAC file configuration, DLP policies.Worked with HP switches, Extra hop, F5 Load Balancer.Implement changes on switches, routers, load balancers (F5 and CSS), wireless devices per engineers instructions and troubleshooting any related issues.Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer.Experience with configuring Cisco 6500, 6800, 4500 VSS in Distribution layer. Configuring and managing F5 LTM (Local Traffic manager) in large scale environment.Configure and troubleshoot Juniper EX/SRX series switches.Network security including NAT/PAT, ACL, and ASA/SRX/Palo Alto/Fortinet Firewalls.I have good knowledge with the technologies Site to Site VPN, DMVPN, SSL VPN, WLAN and Multicast.Well Experienced in configuring protocols HSRP, GLBP, PPP, PAP, CHAP, and SNMP.Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancersInstall, manage and monitor large scale Palo Alto Firewalls through Panorama.Experience with communicating with different customers, IT teams in gathering the details for the projectExperience in installing and configuring DNS, DHCP servers.Convert WAN links from TDM circuits to MPLS and convert encryption from IP Sec/GRE to Get VPN.Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.Adding and removing checkpoint firewall policies based on the requirements of various project requirements.Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experienceWorked on Python scripting for generation the firewall security policy through web visualization tool in checkpoint firewall.Strong hands-on experience on ASA Firewalls, Palo Alto Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).Implemented Zone Based Firewalls and Security Rules on the Palo Alto Firewall. Exposure to wildfire is a feature of Palo Alto. Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPNs on Palo Alto Firewalls.Worked with the Python 2 & 3 version.Dealt with Aruba wireless access points 200,300 series supporting 802.11 ac.Setting Aruba Access to link distribution switch system and then to WLAN controller.Installed and configured Meraki (MX80, MX60) Appliance via Meraki MX400 Cloud.Installed and configured Cisco Meraki (MR66, MR74, MR84) wireless Access points in the warehouses.Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, prevention where needed.Environment: Cisco ASA Firewalls, F5 ADC, Cisco 3900,4300,4400,4500 Routers, Cisco Catalyst switches 6500, 3750, 3550, 2960,4500,6500,6800,9300,9400 Switches, Juniper SSG-140, Palo Alto Wildfire, Juniper EX series switches, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k, Nexus 2000 FEX, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting, ACL Configuration.Digit 7, Richardson, TX Sep 2021- Dec 2022Role: Sr. Network EngineerKey Responsibilities:Installed and configured LAN/WAN Networks, Hardware, Software, and Telecommunication services- Cisco Routers and Switches. Implemented IPv4 and IPv6 on PTX platforms.Worked on Cisco wireless LAN technologies, Integration with Cisco ISE. Worked on WLAN AP profiles, Authentication roles, RF properties, AP configuration, WLAN upgrades, Anchor controllers, Cisco prime.Implementation and administration of PKI to include Enterprise Root CA and Subordinate CA design.Worked on SD-WAN implementation for remote site connectivity using Viptella. Configuration of Application policies, vEdge, vManage, vSmart and vBond in Viptella.Supporting connectivity to MS-Azure, AWS, and other Outsourced Hosting services.Routing protocol configuration such as OSPF, IS-IS, EIGRP and BGP, Router redundancy configuration (HSRP, VRRP and GLBP) and Wireless LAN (Access point, LWAPP).Experience with network management protocols/tools (TACACS, NTP, SNMP, SYSLOG, etc.)Working experience on complex Checkpoint, Cisco ASA & Palo Alto Firewalls Environment.Experienced in working with Palo Alto Next Generation firewall with security, networking, and management features such as URL filtering, Anti-virus, IPsec VPN, SSL VPN, IPS, Log Management.Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 and Juniper J series j230, M 320 and MX960 routers.Resolved Customers request to create firewall policies for Cisco ASA, juniper SRX, Fortinet and NX-OS.Infrastructure configuration and troubleshooting for Windows Azure environments.Monitoring and troubleshooting traffic on Palo Alto firewall through Panorama. Creating and modifying rules and objects on Palo Alto firewall through Panorama.Riverbed Steelhead 550H WAN optimization installation and configurationStrong experience in Networking, including hands-on experience in providing network support, installation, and analysis for a broad range of LAN/WAN communication systems.Involved in the Team of Data Center Operations to perform duties like administration and monitoring of Cisco Routers and Switches according to the organization requirements.Configuring and implementing Remote Access Solution: IPsec VPN, AnyConnect, SSL VPN.Provided technical support services for DNS and IPAM services.Implemented Quality of Service throughout the network infrastructure, was responsible for policy routing and provided SDN architecture.Integrate services appliances to Cisco ACI deployments to include Application Delivery Controllers and FirewallsInvolved in Network Designing, Routing, DNS, IP Subnetting, TCP/IP protocol.Worked with Cisco Catalyst 6500, 4500, 3750, 3500, 2960 switches and Cisco 2800, 3600, 3800, 7200, 7600 and ASR 1000,2000.3000,7000,9000 series Routers.Installed and maintained routers and switches in various network configurations supported VLANs, QoS, VoIP, Call Manager, and advanced access-lists.Designed and implemented a set of tools to provide fully automated configuration of F5 Networks BIG-IP load balancing systems.Strong hands-on experience on PIX Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL.Configured & maintained IPSEC Site-to-Site VPN using cisco IOS.Experienced in Configuring/Troubleshooting Routing Protocols EIGRP/OSPF/BGP/RIP.Installed and Configured A10 (AX2500) load balancer as SLB for various application in backend.Troubleshoot layer1, layer2 and layer3 technologies for customer escalations.IP Allocation & Maintenance for users and other needs throughout the company.Designed perimeter security policy, Implemented Firewall ACL's, allowed access to specified services, Configured Client VPN technologies including Cisco's VPN client via IPSEC.Experience with converting Cisco 6500 IOS to Cisco Nexus NX-OS in the data center environment.Install and maintain the wireless infrastructure (Aruba, HP controllers) Configuration of SSID, VLAN binding, security management.Assigning RADIUS and TACACS for new deployments in production environment. AAA for users to implement changes on production devices. Most of these devices are cisco propriety.Developed/Modified/Enhanced existing and new Perl Packages, Perl frameworks and tools.Built alert & monitoring scripts for applications & servers using Python & Shell ScriptEnvironment: Cisco 12000, 7500, 3800 series routers and Cisco 3560 series switches, Juniper EX4200, EX3200 Switches, Juniper MX80, MX480, MX960 Routers, F5 ADC, FHRP: HSRP, GLBP, ASR 9000, Juniper SSG-140, Cisco Nexus Switches 2232, 5596, 7009, Checkpoint Firewall, VLAN, 802.1Q Trunking.Wells Fargo, INDIA Nov 2019 June 2021Role: Network EngineerResponsibilities:Installing and configuring juniper M series router along with juniper switches QFX seriesWorking Knowledge of frame relay, MPLS services, IPSec VPN's, OSPF, BGP and EIGRP routing protocols, NATing, sub-netting, also including DNS, WINS, LDAP, DHCP, TCP/IP, UDP, SNMP, OSPF, IPSEC, PPP, VLAN, VTP, STP (Spanning tree Protocol), RSTP & Multicasting protocols.Installed, configured and maintained several Cisco DMVPN routers servicing smaller sites, several Edge routers running BGP and MPLS to Internet service providers.Experience on F5 load balancer to maintain balance in the network system with application specific usage. Experience with Firewall administration, Rule analysis, Rule modification.Troubleshoot traffic passing managed via logs and packet captures!Responsible for reviewing current and planned network designs, particularly F5 load balancer implementations. Identified opportunities for implementation of network best practices.Implemented Quality of Service (QOS), Policy Maps, Class-maps, Policy Routing in the network infrastructure throughout all the different sites.Played responsible role for implementing engineering, & level 2 support of existing network technologies / services & integration of new network technologies / servicesWorked with Cisco Layer 3 switches 3560, 3750, 4500, 6500; Cisco Nexus 5000 and 7000 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, ether channel.Key contributions include troubleshooting of complex LAN /WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.established peering relationships with external ISPs, transit providers and partner networks at national Internet exchanges.Performed route filtering and route manipulation by applying distribute-lists, route-maps & offset lists respectively.Installed redundant Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.Configured and deployed BIG-IP LTM 8900 for providing application redundancy and load balancing.Involved in design, implementation, and configuration of HSRP for load balancing on L3 switches on different location of office on the switched network.Identify opportunities and solutions for improving efficiency with emerging technologies, including Cisco routers/switches and wireless systems.Deployed 7613 as PE and CE router and configured and troubleshoot the edge routers.Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problemsEnvironment: Cisco 3925, 2620, 1900 routers, Cisco 3750, 2950 Switches, Routing protocols: EIGRP, RIP, OSPF, BGP, FHRP: HSRP, Sniffing Tools: Ethereal, Wireshark, Port Security, SRX Firewall, VLAN, 802.1Q Trunking, Cisco ASA 5500.Orange Communications, INDIA June 2017 Oct 2019Role: L1/L2 Network EngineerKey Responsibilities:Configuring/Troubleshoot issues with the following types of routers Cisco (7200, 6500, 4500, 1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, DNS, DNAT, NTP, IPAM, DHCP and SNMP, as well as assisting with customer LAN /WANHands-on experience with WAN (ATM/Frame Relay), routers, switches, TCP/IP, routing Protocols (BGP/OSPF), and IP addressing.Firewall policy administration and support on Checkpoint as well as Cisco ASA Firewalls.Configured firewall logging, DMZs, related security policies and monitoring.Creating private VLANs & preventing VLAN hopping attacks and mitigating spoofing with snooping & IP source guard.Performed network administration tasks such as creation and management of VLANS, Port security, Trunking, RPVST+, Inter-VLAN routing, and LAN security.Worked with Cisco Catalyst 6500, 4500, 3500, 4900 switches and Cisco 2800, 3600, 3800, 7200, 7600 series and ASR 5k/9k series Routers.Responsible for entire LAN and WAN maintenance and troubleshooting of the company network. Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements.Involved in Network Designing, Routing, DNS, IP Subnetting, TCP/IP protocol.Worked with Routing Protocols of EIGRP and BGP.Verified IDS platform coverage using multiple testing suites.Performed extensive traffic engineering to best utilize upstream transit providers and peering relationships.Developed scripts for migration or config push for Maintenances using Python and ShellDeveloping scripts for automating the deployment process/ config push in to cisco devices using python.Provided port binding, port security and router redundancy through HSRP.Hands on experience working with security issues like applying ACLs, configuring NAT and VPN.Involved in troubleshooting of DNS, DHCP and other IP conflict problems.Responsible for the installation, configuration, maintenance and troubleshooting of the company network. Duties included monitoring network performance using various network tools to ensure the availability, integrity and confidentiality of application and equipment.Experience in Cisco switches and routers, Physical cabling, IP addressing, WAN configurations.Involved in configuration & troubleshooting of routing protocols: MP-BGP, OSPF, EIGRP, RIP, BGP v4.Switching related tasks included implementing VLANS, VTP, STP & Trunking protocols (802.1q and ISL) and configuring on the Fast Ethernet channel between switches.Performed troubleshooting of connectivity problems using PING, and Trace route.Done troubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment.IOS upgrade 1900, 2900, 3500 series Cisco Catalyst switches and 2500, 2600, 3600 series Cisco routers using TFTP. |