Quantcast

Network Engineer Resume North bergen, NJ
Resumes | Register

Candidate Information
Title Network Engineer
Target Location US-NJ-North Bergen
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes
Click here or scroll down to respond to this candidate
Name: Sasank ReddySr. Network EngineerEmail: EMAIL AVAILABLEPhone: PHONE NUMBER AVAILABLEPROFESSIONAL SUMMARY9+ years of experience in designing, deployment and operations of complex enterprise and service provider networks supporting their Network, Security, Data Centre Infrastructure.Expert in implementation, configuration and troubleshooting various Routing Protocols like RIP, EIGRP, OSPF and BGP.Experienced in firewall architecture and configuration for enterprise class firewalls, Palo Alto, Checkpoint etc.Experience working on Cisco Catalyst switches 6500, 4500, 3750, 2900 series, involve in deployment for Cisco ASA (5505, 5520, 5585). Experience on site-to-site VPN, SSL & DMVPN.Proficient with Cisco Routers and Switches such IOS, IOS-XR, NX-OS, and IOS-XE. Experience on Code Upgrade for Cisco Routers including 7200, 3900, 2900 and Switches including 6500, 4500, Nexus 9K, Nexus 7k, Nexus 5k, Nexus 2k, ASR 9K, ASR 1K.Hands-on experience in the areas of Wi-Fi portfolio, Switching and Troubleshooting.Strong experience with Cisco ASA firewalls, ISE, Aruba Clear Pass, Extensive knowledge and hands-on experience with Brocade DSX and VDX. Strong experience with F5 and Brocade ADX series load-balancer and Nexus series switchesExperience with Network Automation using Python, shell scripting. Strong experience with Linux scripting  Python, Shell for Unit/Load/Performance/Regression/Integration testingExperience in creating execution of automation frameworks using Python, Shell, Deep knowledge and hands on experience with CyberArk- Privilege Identity Management. Experience in layer-3 Routing with, ASR 9K, ASR 1K, Cisco 7600, 7200, 3810, and 3925 series.Experience working on Amazon AWS Cloud Services. Experience in Cisco Wireless Access points Cisco 3500s, 3600s, 5508. Experience in VPC, VDC, Fabric path and OTV configurations.Responsible for defending the network against malware, viruses and all threats that negatively impact confidentiality, integrity and availability. Experience in Configuring and Maintaining Fore Scout Counteract NAC and Cisco ISE Identity Service Engine (ISE).Experience in design, installation, configuration, maintenance, migration and administration of Check Point Firewall R55 up to R77. Experience in Brocade SLX and MLX Ethernet router (CLI, RESTful, NETCONF, RESTCONF), Infoblox DNS IPAM for Microsoft DNS/DHCP setup and management.Security policy configuration including NAT, PAT, VPN, SSL-VPN, Route-maps and Access Control Lists.Extensive work experience in designing with Cisco Routers, Cisco Switches, F5 LTM/GTM and A10 SLB/GSLB Load Balancers, Cisco ASA, Checkpoint Firewalls and Bluecoat Proxy Servers.Expert in migrating and converting all traffic from end-of-life proxy platforms Solaris/Checkpoint, Solaris/Sun proxy and Net Cache to multiple Bluecoat Proxy SG units separating the traffic to point to specific lines of business designated proxies. This is also known as One-to- Many proxy migration.Experience in utilizing Access-lists, Prefix-lists, Route Policies, and Route Filtering. Extensive working experience of various Switching Technologies STP, RSTP, MST, VLAN& VLAN Trunking Protocol (VTP) along with Failover Mechanisms such as HSRP, VRRP&GLBP on Layer 2 Setup, Inter-VLAN routing, Ether channel using LACP, PAGP.Experience in installation and configuration of the VMware NSX Appliance for setup including VMware vSphere. Worked on Nexus FEX-2K (2248, 2232), 3K (3064), 5K (5548, 5020, 5010), 7K (7018, 7010) and NX-9K (9300) series switches.Worked extensively on Juniper MX Series Routers and EX series switches. Worked on Configuration and support of Juniper QFX3500, QFX3600, QFX5100, QFX5200 series switches and SRX3400, SRX3600 series firewalls.Hands on experience in configuring and supporting site-to-site and remote access Cisco, IPsec, VPN solutions using ASA/PIX firewalls, Cisco, VPN client in addition to providing TACACS+ and RADIUS services.Proficient in designing, deploying, and troubleshooting IP and wireless networks, including enterprise IP networking, Aruba ClearPass, Aruba Airwave, and RF analysis.Implemented Terraform configurations to automatically scale network infrastructure based on demand using auto-scaling groups and load balancers, ensuring high availability and elasticity of network resources.Integrated Ansible with network monitoring and security tools SolarWinds and Splunk to automate responses to network incidents, reducing mean time to resolution and enhancing overall network security posture.Experience in implementation of Cisco ACS Servers & configuration of TACACS protocols. Enabled Authentications such asWPA2, PAP/CHAP, and AAA. Extensively used Route Reflectors, Route Influence by Attributes, Local Preference, Multi homing and Optimization of BGP.Utilized Terraform to provision virtual networks, subnets, route tables, and other network components across cloud providers AWS and Azure.Configured SNMP on various network devices, including routers, switches, firewalls, and servers, enabling centralized monitoring and management.Created real-time dashboards to visualize network health metrics, enabling quick identification and response to network issues.Experienced in administering Aruba Wireless Controllers and Access Points, including designing and configuring guest wireless using Aruba ClearPass.Utilized Python scripting to automate the provisioning and configuration of network services such as VLANs, VRFs, QoS policies, and VPN tunnels.Experience in T1/E1/T3 technologies and different LAN&WAN technologies. Experience on Infoblox and windows server for DNS/DHCP IP management.Experienced in dealing with the Enterprise level architecture for all network related issues.Experience on creating Visio diagrams, LLD, HLD and runbooks for datacenter and branch networks.Implementation, working analysis, troubleshooting and documentation of LAN, WAN & WLAN architecture with excellent work experience on IP series.Expert in maintaining and updating inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, NTP. Implementation of HA-JSRP in JUNOS devices, SRX Series Router/Firewall in both A/A and A/P mod.Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analyses results and implement and delivering solutions as an individual and as part of a team.TECHNICAL SKILLSIP Routing ProtocolsRIPV1, RIPV2, IGRP, EGIRP, OSPF, BGP, Route Filtering, Redistribution, Summarization, and Static RoutingSwitchingVLANs, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Ether channels, Transparent Bridging, CEF, DECF, Port Security, VSS Cisco 2960, 3560, 4500, 6500, 4900, 2900, 3750, Nexus 5000, Nexus 7000, 9000, WS-C4948, Juniper EX, QFX and Alcatel 7705 SARoutersCisco 7600, 7606, 7609, 7613, 7200, 4400, 3900, 3800, 2900, 1900, ASR-901, ASR-903, ASR 5500, ASR-9010, And 7206 VX, Switches: Cisco Catalyst 6500, 4500, 3560, 3750, 2960, Nexus 7000, Nexus 6000, And Nexus 5000Network SecurityCisco ASA5550/ 5540, Net Screen, Juniper SRX, Palo Alto, Checkpoints, AAA, Firemon, FREE RADIUS, CADA, LDAP, IPsec VPN, SSL VPN, IDS, IPS, Source Fire, Fire Eye, Cisco NAC (4.9.3), Cisco ISE, ArubaNetwork ManagementWireshark, SNMP, Ethereal, SolarWinds, Net cool, Science Logic, Log Logic, PRTG, Blue Coat, Websense, Cisco NAC, ISE, Active DirectoryCloud InfrastructureMicrosoft Azure, Amazon Web Services (AWS)Operating SystemsWindows (98, ME, 2000, XP, Sv2003, Sv2008, Sv2012, Vista, 7, 8, 10, 12), Ubuntu, Linux, Kali LinuxSoftwareVMware ESX 5.x, VMware Workstation, vCenter Server, System Center 2012 R2, MS SharePoint, C++PROFESSIONAL EXPERIENCEFannie Mae - Plano, Tx. Aug 2022 - PresentSr. Network EngineerResponsibilities:Configured, managed and monitored panorama - Palo Alto firewall models (Specifically the M-7000 and the PA-5260).Performed migrations from Check Point firewalls to Palo Alto using the PAN Migration Tool MT3.3.Implemented advanced Palo Alto Firewall features like URL filtering, User-ID, App-ID, Content-ID on both inbound and outbound traffic.Deployed Palo Alto firewalls using Confidential NSX through L2 and L3 interfaces on models such as VM-300, VM-500, and VM-1000-HV.Enabled file forwarding to Wildfire cloud through Content-ID implementation to identify new threats.Leveraged Palo Alto Networks Wildfire inspection engine to prevent Zero-Day attacks.Managed multiple Palo Alto firewalls centrally through the Palo Alto Panorama M-500 centralized Management appliance.Deployed Active/Standby modes of High Availability (HA) with Session and Configuration synchronization on multiple Palo Alto firewall pairs. Knowledge on the application of Active/Active HA mode.Enforced policy checks on north-south and east-west datacenter traffic through Panorama M-600. Provided escalated technical support in troubleshooting firewall and network issues.Installed, configured, administered, monitored Azure, IAAS, PAAS, and Azure ADWorked on Windows Azure portal to manage Virtual Network and Traffic ManagerConfigured VMs availability sets using the Azure portal to provide resiliency for IaaS based solution and scale sets using Azure Resource Manager to manage network traffic.Implemented a hybrid AWS to Azure DR strategy leveraging DirectConnect and ExpressRoute with Cisco CSRs to backup exported non-AMI machine images from AWS GovCloud to Microsoft Azure.Provided connectivity to On-premises devices to Azure VNET by using Azure VPN, Express Routes and Virtual Network peeringWorked with Aruba Clear pass in providing network access security and NAC, based on user roles and device types.Worked with Bluecoat Proxy Secure Web Gateways for content filtering, Data loss prevention and prevent Zero-Day exploits.Implemented security measures to resolve data loss vulnerabilities, mitigate risk and recommend security changes or system components as needed.Implemented automated network configuration management using Ansible, reducing manual configuration errors and decreasing network device setup time.Worked with Cisco ISE for 802.1X authentication and migrated policies from ACS and ClearPass to ISE.Successfully configured and deployed DLP and IoT functionalities on Palo Alto Networks (PAN) devices running, ensuring seamless integration and optimal performance.Deployed Dynatrace to monitor network performance across multiple data centers, ensuring optimal data flow and minimal latency.Successfully deployed and managed Infoblox DNS, DHCP, and IPAM solutions to streamline network management and enhance operational efficiency.Employed advanced features such as App-ID, User-ID, and device profiling to enhance visibility and control over network traffic, while Panorama facilitated centralized policy enforcement and monitoringDeveloped and maintained Network Infrastructure as Code (IaC) using Ansible playbooks, ensuring consistent and repeatable deployments across multiple data centers and cloud environments.Configured Authorization rules in Cisco ISE for wireless by enforcing 802.1x Authentication to allow user access to proper Data, based on user Security group in the Active Directory.Deployed and configured Palo Alto Networks Prisma Access to secure remote workforce and branch office connections, ensuring seamless integration with existing network infrastructure.Designed and executed Ansible playbooks for network device compliance auditing and remediation, improving compliance with security standards and regulatory requirements.Deployed and decommissioned VLANs on core ASR 9K, Nexus 7K, 5K, 2k and its downstream devices.Deployed BIG-IP F5LTM Load Balancers for load balancing and traffic management of business application.Collaborated with Application owners, Network Team, DNS Team, and Firewall Team, to migrate applications from Legacy NetScaler Load Balancer to New F5 BIG-IP Local Traffic Manager.Developed and enforced network policies using Terraform for network segmentation, traffic control and enhancing security and scalability.Centralized the management of IP addresses using Infoblox IPAM, improving accuracy, and reducing the risk of IP address conflicts.Configured and maintained IPSEC and SSL VPNs on Palo Alto firewalls, and managed firewall rules and log analysis using Panorama.Utilized Prisma Access to gain deep visibility into user activity and application usage, implementing application-aware policies to optimize network performance.Leveraged Dynatrace to perform root cause analysis of network-related performance issues.Optimized bandwidth utilization across the network by analyzing Dynatrace data.Integrated Terraform with network monitoring and management tools such as Prometheus, Grafana, and Nagios to automate network infrastructure monitoring and alerting.Engineered and configured Virtual Server, Pools, iRules, Profiles, Persistence, and monitor on F5 LTM to match the configuration the Application had on NetScaler.Leveraged Infoblox reporting tools to gain insights into network utilization, trends, and potential issues, leading to proactive network management and troubleshooting.Developed Terraform modules and templates to automate common networking tasks such as VLAN provisioning, IP address management, and DNS configuration.Implemented Ansible scripts to collect and analyse network device metrics and status information for generating reports and dashboards for network monitoring and troubleshooting.Integrated Global Protect with Prisma Access to provide secure VPN connectivity for remote users.Worked on IP traffic flow, protocol analysis, capturing and monitoring of live traffic streams. ACI Operations support and tasks, ACI change types, deploying Leaf Fabrics, Micro segmentations and Troubleshooting.Utilized Ansible as part of Infrastructure as Code (IaC) to define and manage network infrastructure configurations.Trouble Ticket management, Outage/LOD notification management, processing escalations. Generate, drive, and update problem-tracking tickets via multiple systems and continually improve business practicesEnvironment: Cisco ACI, VDCs, Nexus, Palo Alto M-7000, PA-5260, Microsoft Azure (Azure Active Directory, Virtual Network, Traffic Manager, DirectConnect, ExpressRoute, Azure VNET, Azure VPN), PAN Migration Tool MT3.3, F5 Load Balancers, VM-300, VM-500, and VM-1000-HV, CSM, ASA, Microsoft Azure, Bluecoat Proxy Secure Web Gateways, ASR 9K, Nexus 7K, 5K, 2k, Linux, BIG-IP F5LTM Load Balancers, Active Directory, DNS, NetScaler, Aruba, WindowsTinuiti - San Diego, CA May 2019  Jul 2022Network EngineerResponsibilities:Designed and implemented 802.1x Wired/Wireless User Authentication using Cisco ISE Radius ServerIoT & Wireless Wireless LAN Controllers, Network connectivity i.e., Ciscos Ruggedized Industrial router and switches configuration and functionalityReview Networking designs, project plans and implementation plan to offer guidance based on best-practices and Cisco Validated Designs. Supported online tools for system sizing, compatibility and design.IPv4/IPv6 routing (BGP/OSPF/EIGRP/RIP) as well as MPLS networking (VPN/VRF and VRF-Lite)Worked with Cisco partners to design and present Security Solutions, including BOM and SOW generation that satisfy customer requirementsWorked with Cisco Partners with APIC-EM implementation, Prime infrastructure and understand the features like Discovery, Path TraceConfiguration and management of network routers (Cisco 6500, 7K; Juniper MX) and switches (Cisco 3850, 3750X, 3750, 3550; Juniper EX).Set up high availability and load balancing for DHCP services to ensure continuous availability and optimal performance of IP address allocation.Configured groups, policy-options, firewall filters and Aggregated Ethernet interfaces to protect the devices and maximize the throughput between devices on the Juniper EX and MX series switches and routers.Configuring RIP, OSPF and Static routing on Juniper M and MX series RoutersConfigured OSPF, BGP routing protocol between datacenters and between Virtual routing instances on the Juniper EX and MX series as required.Transitioned from legacy network access control systems to ClearPass, enhancing network security and enabling advanced access control policies for thousands of users and devices.Designed, configured, and administered Juniper MX routers, SRX Firewalls, Cisco routers & switches.Deployed Intelligent WAN (IWAN) in both Hybrid and Dual-ISP branches to provide an increase in bandwidth capacity, security and reliability.Provided advanced troubleshooting and incident response for DNS, DHCP, and IPAM issues, ensuring minimal downtime and quick resolution.Utilized Infobloxs GSLB features to distribute traffic across multiple data centers, enhancing application availability and performance.Implemented Infrastructure as Code (IaC) using Terraform to automate the provisioning and management of network resources ensuring reduction in deployment time and consistency across multiple environments.Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.Designed and implemented Cisco/Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings.Implemented automated configuration deployment scripts using Python to push configuration changes to network devices in bulk.Deployed Cisco infrastructure based on Cisco DNAC, Cisco ISE, switches, routers, and access points.Developed and maintained Terraform scripts to automate the setup of cloud networking components, including VPCs, subnets, security groups, and VPN connections, resulting in an increase in network configuration efficiency.Utilized Terraform to design and implement scalable network architectures, enabling automated scaling of network resources based on demand and optimizing network performance, leading to enhancement in resource utilization.Configured, troubleshoot and managed secure web content gateways and filters like Blue Coat and Web sense.Handled various trouble tickets, firewall rule changes, assisted other teams to bring the device to production, making DNS changes in Infoblox and routing changes. Automated and maintained Network appliances with Python scripts.Integrated Terraform with configuration management systems Ansible to automate the provisioning and configuration of network devices, ensuring seamless orchestration of infrastructure.Deployed, configured, and managed Cisco Nexus 9K, 7K, Catalyst 9300, 3850, and 3560 switchesImplemented Cisco ACI utilizing APIC and Nexus 9k to create private cloud facilitiesSupported follow on project that will provide our customers with a single user experience when deploying and operating different Cisco controllers (APIC, APIC-EM) as well as workflow simplification.Assisted partners with plans and executions of highly complex system upgrade and migration activities.Responsible for planning, installing, configuring and troubleshooting of networking infrastructure including routers, switches, and configuring all necessary LAN / WAN protocols in support of wireless infrastructure.Environment: Cisco ISE Radius Server 802.1x, Meraki, Bluecoat, Cisco Intelligent WAN (IWAN), Microsoft Azure, Azure VNET, Azure VPN, Express Routes, Virtual Network, Active Directory, Cisco 6500, 7K; Juniper MX, Cisco 3850, 3750X, 3750, 3550; Juniper EX, VPN/VRF, VRF-Lite, BGP/OSPF/EIGRP/RIP, Cisco Nexus 9K, 7K, Catalyst 9300, 3850, and 3560 switches, Python, Cisco ACI, Wireshark, APIC, APIC-EM, LAN, WAN, Linux, WindowsUnited Health Group Sep 2016  Apr 2019Network EngineerResponsibilities:Worked on design, installation and configuration on Checkpoint, ASA, Net Screen and Juniper Firewalls.Improved the overall performance of applications by decreasing the burden on servers associated with managing and maintaining application and network sessions, as well as by performing application-specific tasks using F-5 load balancer.Worked on Active Directory to add users to new groups and change user's policiesAssisted in the designing, implementation and configuring new objects for existing and new applications on F5 LTM and GTM guests.Delivered best practices guidance for managing Palo Alto Networks firewalls.Performed data migration from on premises environments into AWS along with DB migrations from legacy Datacenter promises to AWS clouds.Managed F5 BIG-IP APM, ASM, AFM and LTM. Performed the Application Failover test between regions of AWS West and East by disabling the Pools on F5 GTMs.Used SNMP to monitor compliance with network policies and regulatory standards, ensuring adherence to security and operational guidelines.Served as the customers go-to resource for all matters related to the Palo Alto next-generation firewall.Added new SNAT pools, Virtual IPs (VIP), Pool members, Server groups on A10 and F5 load balancers.Created and validated migration plan to move Legacy datacenter env to AWS Cloud environmentDesigned and implemented Virtual Routing instances with and without leaking on the Juniper EX9214, EX9208 and MX80, MX240. Worked on Juniper MX 480, MX960 and Juniper M120i Installation and configuration.Designed and implemented troubleshooting of Juniper switches, routers and Firewalls Juniper: EX-2200, EX-4500, MX-480, M Series, and SRX210 & SRX240.Implemented cybersecurity measures for SCADA systems, including network segmentation, firewalls, and intrusion detection/prevention systems, protecting critical infrastructure from cyber threats.Experienced working with security issues related to Cisco ASR 9K, Checkpoint and Juniper Netscreen firewalls.Created dedicated life cycle polices and management framework for AWS AMI and Cloud formation templates.Created and tested Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNsWorked on Cisco NAC & ISE to authorize users based on protocols PEAP and EAP-TLS, also manage and monitor user's access privileges.Developed and maintained Python scripts for automating routine network tasks configuration management, device provisioning, and network monitoring, reducing manual intervention.Defined and designed enhanced monitoring system for VPN end points. Used AWS CloudWatch VPN tunnel end point monitoring. Configuration, installation and troubleshooting of Juniper routers like PTX5000, PTX3000, T4000 and MX960.Created dedicated VPG/VPN/CGW for static continent push from private origination to AWS CDN.Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.Implemented Cisco DNA Center to automate network provisioning and configuration, reducing manual tasks and accelerating deployment across the enterprise network.Utilized Cisco DNA Center's advanced analytics and assurance capabilities to monitor network health and performance, resulting in improvement in proactive issue detection and resolution.Worked with routing/switching protocols: BGP, OSPF, EIGRP, HSRP, VTP, 802.1d, 802.1q, VLAN's and Port-Channels.Supported OSPF and BGP based network by resolving level two and level three problems of internal teams & external customers of different locationsDesigned and implemented Wi-Fi (Wireless Networks) Infrastructure using 802.1x Authentication using CISCO ACS and ISE ServersWorked on multiple projects related to Branch networks, Campus networks, external clients and Datacenter Environments involving datacenter migrations.Leveraged Cisco DNA Center to enforce consistent security policies and access controls across the network.Worked extensively on device profiling, authentication and authorization mechanisms using AAA, RADIUS, 802.1X, Policy buildups for Posture Compliance Policies and Rules for checking the devices coming onto Network, Remediation Process, Access and Controls, and Segmenting the Global Networks for NAC Solutions for both Cisco and Fore scout NAC Appliances.Worked on design, installation and configuration of MPLS circuits, VPN and SSL VPN connections on checkpoint Firewalls, Juniper & Net Screen VPN Boxes.Configured and troubleshot CISCO 12000, 7500, Juniper MX 480, MX960 series routers and EX4200 & EX3200, 3560 series switch for LAN/WAN connectivity.Environment: CISCO 12000, 7500, Checkpoint, ASA, Net Screen, Juniper Firewalls, F5 Load Balancers, Active Directory, Amazon Web Services (AWS), F5 BIG-IP APM, ASM, AFM, LTM, Juniper EX9214, EX9208 and MX80, MX240, OSPF routing protocol, ASA Firewalls, MPLS, EX-2200, EX-4500, MX-480, M Series, SRX210, SRX240, BGP, OSPF, EIGRP, HSRP, VTP, 802.1d, 802.1q, VLAN's and Port-Channels, MPLS circuits, Wireshark, VPN, SSL VPN, LAN, WAN, Linux, WindowsITC Infotech  Hyderabad, India Oct 2014  Mar 2016Network AdministratorResponsibilities:Installed and configured Cisco 7200 series router and Cisco 2950, 4500, 6500 Series switches.Configured network using routing protocols such as RIP, OSPF, and BGP and troubleshooting L2/L3 issues.Worked on multiple projects related to Branch networks, Campus networks, extranet clients and Data Center Environments involving in data center migrations from one data center to another.Created data migration strategies to help with completion of migration of data center from one point to another.Worked extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.Used F-5Load balancers to increase capacity (concurrent users) and reliability of applications.Designed and implemented Cisco/Meraki Enterprise Wireless solutions for corporate infrastructuresDesigned and implemented Splunk - based best practice solutions. Used Splunk Search Processing Language (SPL) and Regular expressions. Implemented F5 LTM ASM APM 12.x 13.x changes using TMSH configurationsResponsible for creating, updating and troubleshooting on F5 ASM policies.Implemented and managed F5 BIG-IP load balancing, including APM, ASM, and custom iRule development.Enforcement Readiness period, trusted and Untrusted traffic, Loosening and tightening restrictions in ASM.Planned, built, deployed, and maintained ACI data center lab utilized by internal partiesInstalled and managed Sophos firewall, VPN connectivity, Web application filtering.Worked on configuration of Port Channels and VPC on Nexus 9K, 7K, and 5K.Migrated resources done in batches of a specific number of resources everyday using Active Directory Migration Tool.Worked on device profiling, authentication and authorization mechanisms using AAA, RADIUS, 802.1X, Policy buildups for Posture Compliance Policies and Rules for checking the devices coming onto Network, Remediation Process, Access and Controls, and Segmenting the Global Networks for NAC Solutions for both Cisco and Fore scout NAC Appliances.Configured user's roles and policies for authentication using Cisco NAC and monitoring the status of logged users in network using Cisco ISELive VIP's cutover from NetScaler to F5 LTM, migrating Citrix NetScaler devices to F5 LTM 8900 Series devicesWorked on design, installation and configuration of MPLS circuits, VPN and SSL VPN connections on checkpoint Firewalls, Juniper & Net Screen VPN Boxes.Configured Network Virtual Appliances, Network Security Group to enhance security for usersResponsible for configuring and deploying Cisco NAC & Cisco ISEWorked extensively with Cisco Catalyst 9K, ASR 1K, ISR 4K series switches and router on setting up DNA lab infrastructure.Troubleshoot backup and restore problems and performing day-to-day trouble shooting for the end users and Linux based servers.

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise