Post Job Free
Sign in

Engineer Network

Location:
Manassas, VA
Posted:
August 10, 2017

Contact this candidate

Resume:

Harish S

Senior Network Engineer

Email id: ac1rnt@r.postjobfree.com

Ph No: 908-***-****

Professional Summary:

Eight years of hands on experience as a Network Engineer, designing, integrating, deploying, maintaining and supporting broad range of communication systems.

Experience in configuring Virtual Local Area Network (VLAN), spanning tree protocol (STP), VLAN Trunking Protocol (VTP), Dynamic Trunking Protocol (DTP), Per VLAN spanning Tree (PVST) and 802.1x authentication in access layer switches.

Implemented MPLS/VPN services for various customers.

Experience in Layer 3 Routing Protocol configurations: RIP, OSPF, BGP, EIGRP and MPLS.

Experience in Layer 2 routing Protocol Configurations: ARP, RARP, ATM/FRAME RELAY and VPN technologies: IP Sec & SSL.

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.

Experience in designing, implementing and Managing LAN, WAN solutions for different client setups.

Checkpoint – R60/R65/R70/R75 software version with hardware Checkpoint 11000, 21000 series with VSX environment.

Checkpoint software Blades (IPS, Anti-Bot, Anti-Virus, Identity Awareness and DLP) with managed by Checkpoint Checkpoint smart dashboard in smart domain manager/Provider-1 environment & separate Syslog servers.

Supporting and troubleshooting Checkpoint/Cisco site-to-site VPN/IP Sec functionality.

Experience on working, implementing, configuration and managing Juniper SA 2500/4500/6500 SA devices with secure access services 7.1/8.0.

Checkpoint VPN-1/ Firewall-1, IPSO, SPLAT and GAIA initial setup on open servers, Nokia devices, Crossbeam/Checkpoint hardware devices.

Implemented traffic filters on CISCO routes using Standard Access List and Extended Access list.

Familiarity with WAAS, VoIP, wireless, security, next-gen datacenter networking (SDN, Cisco ACI).

Experience with installing and managing IT services such as Active directory, site replication, DNS, SSH, DHCP, DNS, NAT and Terminal service.

Configured and maintained Palo Alto Network firewalls

Handled Load Balancing using F5 Networks.

Hands on experience with Citrix load balancers.

Strong knowledge in HSRP, VRRP redundancy Protocols.

Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.

Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.

Access control server configuration for RADIUS & TACAS+. Experience with 802.11x wireless technology.

Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.

Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248)

Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.

Excellent communication skills with ability to interact effectively with employees at all level of the organization.

Technical Skills:

Hardware

Cisco Switches (2900, 2924, 2950, 3550, 5500, 6500, 6509, 6513), Cisco routers (2600, 2800, 3640, 3700, 3825, 7200, 7204, 7206), Cisco PIX 500 series, CSU’s/DSU’s, Catalyst 6500, 7600, 4500, Juniper M320 and T640 routers.

Firewalls and Sniffers

Cisco PIX, FWSM, ASA, Juniper firewall NS50, mSSG 550M, Check Point, OPNET, WIRESHARK

Protocols

RIP, RIP2, PPP, OSPF, EIGRP, IS-IS, BGP, SNMP, HTTP, FTP, TFTP, HTTP, DHCP, SMTP, ICMP

WAN Protocols and Technologies

HDLC, PPP, ATM, FRAME RELAY, IDSN, Metro Ethernet

LAN Technologies

Ethernet, TCP/IP, CDP, STP, RSTP, VTP, VLAN, Trunks, Ethernet channel, MPLS.

Redundancy Protocols

HSRP, VRRP, GLBP, RPR, RPR+, NSF-SSO.

Servers

Domain servers, DNS servers, WINS servers, Mail Servers, Proxy Servers, Print Servers, Application servers, FTP Servers

Operating Systems

Windows 2000/2003/2008, windows XP/7, LINUX, Redhat, UNIX, Macintosh

Anti-Virus & Internet Security

MacAfee, Symantec, Trend-Micro & e-Trust.

Client: FAA (Federal Aviation Administration), Arlington, VA Jan 2016 – Present

Sr. Network Engineer

Responsibilities:

Worked on Converting the Partner IPSEC VPN from one Data Center to Another Data Center.

Experience working with Nexus 7010, 5020, 2148, 2248 devices

Worked on Juniper J series j230, M 320 routers and EX 3200 series switch.

Responsible for entire LAN and WAN maintenance and troubleshooting of the company network. Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements.

Coordinated precise scheduling for all migration events including all equipment and resources for the data center migration on an extremely accelerated schedule with for a high-profile client.

Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.

Working experience on upgrading Checkpoint old devices/Software to new platforms like R70 to R75.20.

Troubleshooting application and network traffic on Checkpoint smart view tracker along with FW monitor and TCP dumps on CLI based.

Involved in Network Designing, Routing, DNS, IP Subnetting, TCP/IP protocol.

Worked with Routing Protocols of EIGRP and BGP.

Work with application developers and systems engineer to migrate applications and systems to a new Border Gateway network.

Experience managing Datacenter technologies such as Nexus switches or ACI.

Experience configuring, installing and supporting SDN technologies like Cisco ACI a plus.

Working on smart view monitor get statistics for the checkpoint hardware/software CPU’s, memories and overall health of the devices.

Lead the IWAN (Intelligent WAN - Cisco SD-WAN) and VPN (Secure Transport) for enterprise networks.

Secure Process Networks from business LAN for facilities utilizing Palo alto and Cisco ASA firewalls as well as performed 'special projects' as needed.

Assisted in managing global Fortinet Fortigate firewall infrastructure.

Installation, Administration and support of F5 load balancers, Big IP 3600 LTM with APM and 5200v with APM and VCMP.

Troubleshooting the Juniper SRX100 and 110 series, Juniper Network routers with Site-Site VPN, and firewalls for Supervalu Retail sites.

Through experience in handling modules like LTM, GTM, ASM, AFM and APM on F5.

Worked on F5 LTM series like 6400, 6800, 8800 for the corporate applications and their availability.

Troubleshoot and resolved many VOIP related issues.

Proficient in deploying and troubleshooting mission-critical environments using proactive suite of support services - Wireshark and Solar Winds N-able Technology & NPM.

Migrating Cisco ASA firewalls policy to new Checkpoint appliance with support of vendor specific tool.

Managing URL Content Filtering on Websense Proxy.

Experienced with the installation, configuration and troubleshooting of DOCSIS CMTS'

Monitor global customers' networks for connectivity and server health using solarwind Orion and SCOM.

Responsible for designing and configuring application aware firewall policies.

Configure and maintain Cisco IDS/IPS, ASA firewalls, and Bluecoat web proxies.

Adding exemption, editing policy groups on Websense Management Server.

Adding/removing ARM bypass rules on Websense appliances.

Perform Firewall OS upgrades using CLI, Splat and Voyager GUI.

Backup and restore of checkpoint Firewall policies.

Install and Configure F5-BIGIP-LTM.

Experience on designing and troubleshooting of complex BGP and OSPF routing problems,

Convert Branch WAN links from TDM circuits to MPLS

Experience with Network Redesign of branch and Campus Networks. This includes changes to both the voice and data environment.

Responsible for maintaining multi-vendor network environment including Cisco ASA, Juniper JUNOS, Fortinet firewall.

Deployed Palo Alto/Cisco ASA firewalls and IDS thereby securing up to the application layer on the network.

Configured application load balancing using F5 LTM.

Experience with configuring VIP, Pools on F5 LTM and working with irule management on LTM

Assisted campus for VOIP network management and troubleshoot

Set up network connectivity for Cisco training. This involved connecting the routers, switches and firewall physically and loading them with a base configuration. It also involved connecting the PCs to the network and providing Internet connectivity.

Experienced with the installation, configuration and troubleshooting of various DOCSIS CMTS such as Arris 6000, Cisco 10016 and Casa 100G.

Envision and drove Cisco's SD-WAN (IWAN) and VPN for Enterprise and MSP networks.

Worked on Data, VoIP, security as well as wireless installations and technologies

Complete understanding of feature testing of switches (RFC 2889 and RFC 2554) using IXIA's IP testing system.

Install Brocade ICX 7450 switches to replace Cisco 4510 Core.

Cisco ACS / Cisco Prime - adding and editing devices, alarm and event modifications, wireless traffic inspection, archiving and restorations, version upgrades.

Configured and maintained Secure Shell(SSH) on routers using RSA

Configure and implementing Fortinet Security systems Firewall.

Design and Architecture of F5, LTM, GTM, APM, ASM and application delivery network.

Designed and installed new VPN solution utilizing F5 APM.

Replace branch hardware with new 2851 routers and 2960 switches.

Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000

Wide experience in implementing and managing F5 BIG-IP load balancing, including GTM, APM, ASM and custom iRules development.

Reproduce and automate customer bugs using Perl

Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture

Experience configuring Virtual Device Context in Nexus 7010.

Integrating Configuring RSA SecurID with ISE for Token based authentications using RSA Native method RSA RADIUS method for user's remote VPN users.

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.

Experience in Configuring, upgrading and verifying the NX-OS operation system.

Experience in design and implementation of new branch test and turn up.

Upgraded Corporate ACS servers and implemented them in Distributed Deployment.

Implementing & Troubleshooting of T1, MUXES, CSU/DSU and data circuits.

Involved in designing and implementing QOS and policy map to 2800 series routers for all the branches

Experience Branch Relocation: Connect workstation, servers, etc. Rack and stack Pre-configured new hardware and connect the circuits. Work with Carrier to test and turn-up circuits.

Manage and provide guidance to junior members of the team.

Experience with Project documentation tools & implementing and maintaining network monitoring systems and experience with developing network design documentation and presentations using VISIO.

Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Implemented IWAN functionality.

Extensive Knowledge on the implementation of Cisco ASA 5500 series firewalls.

Strong hands on experience on PIX Firewalls, ASA Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)

Developing and testing the Customer Network Management System (CNMS) R6.0/7.0 as network performance FCAPS utility.

Worked on Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).

Maintain Network of brocade Switches and Fortinet Firewalls.

Experience with Using GTM, APM & LTM F5 component to provide 24"7 access to applications.

Hands on experience in LINUX shell scripts, C, C++, Bash, Perl, and Python.

Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment

Involved in configuring IP Quality of service (QoS)

Involved in Datacenter build and support, Implementation, migrations network support, Interconnectivity between an old Datacenter and new Datacenter.

Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.

Installed new purchased Hardware to the new DC, migrate data over WAN connection, also greatly involved in virtualization of physical servers.

Contact determining a list of applications for the migration, Stakeholder management, vendor management, and change management.

Environment: Router 2900, 3900; Cisco Catalyst Switch 3550, 2960. T1 Controllers, Juniper J series, Checkpoint R70 to R75.20, Cisco ASA, DS3 Lines (T3 Lines), Fiber and Ethernet cabling.

Client: Spectrum Health Jul 2014 – Dec 2015

Sr. Network Engineer

Responsibilities:

Implemented LAN/WAN utilizing CISCO 7200, 7204, 7206.

Configured Routing Protocols such as OSPF and policy based routing.

Design OSPF Areas for reliable Access Distribution and for Core IP Routing.

Fine-tuned OSPF metrics to avoid routing loops and ensure redundancy in case of link failures.

Redistribution of routing protocols and Frame-Relay configurations

Implement and manage all the firewalls in smart domain manager/Provider-1 with CMA to organize enterprise and remote locations.

Involved in L2/L3 Switching technology administration including creating and maintaining VLANs, Port security, Trunking, STP, Inter Vlan Routing, LAN security.

Migrating off cisco 3750 switch to cisco 3850 Switch and upgrading the Switch IOS to most stable version.

Involved in L2/L3 Switching technology administration including creating and maintaining VLANs, Port security, Trunking, STP, Inter Vlan Routing, LAN security.

Migrating off cisco 3750 switch to cisco 3850 Switch and upgrading the Switch IOS to most stable version.

Managing URL Content Filtering on Websense Proxy.

Adding exemption, editing policy groups on Websense Management Server.

Adding/removing ARM bypass rules on Websense appliances.

Perform Firewall OS upgrades using CLI, Splat and Voyager GUI.

Backup and restore of checkpoint Firewall policies.

Applied new Firewall(ASA) rules as required by business and Managed Cisco ACS boxes.

Monitoring, maintaining, and implementing security policies on Cisco firewalls.

Change Management: Need to make sure that all the change designs and implementations are completed and tested as per the schedule required by the customers.

Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.

Working on the project of F5LTM, GTM and ASM code upgrade project, doing couple of them every week. Work with HP, Cisco, RSA and Juniper in a Datacenter environment.

Configured layer 2 and layer 3 switching and routing protocols such as MPLS VPN, OSPF, BGP, MP-BGP, MPLS, on juniper 4200 routers.

Primarily worked on Checkpoint Security Gateways running R77, R76, and R75 Gaia and Fortinet Firewall running Forti OS 5.2

Implementing security policies using ASA 55XX Firewall as well as Fortinet firewall PS/IDS, AAA Security (TACACS+, RADIUS) on different series of routers

Strong experience in creating firewall policies as per the requirements on Palo Alto, Cisco ASA, ASM, Juniper and Fortinet firewalls.

Experienced in implementing and managing F5 BIG-IP load balancing, including APM, ASM, and custom iRules development.

Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.

Successfully installed Palo Alto PA 3060 firewalls to protects Data Center.

Migrated to R75.xx in various Checkpoint 4k/11k/21k appliances from R65, R62, R60, etc., and building the new Smart Center server.

Configured various F5 modules including APM, ASM and AFM for added performance and Security.

PBX and VOIP installation, troubleshooting and programming.

Manage and maintain the solar operational environment.

Implemented SNMP on Cisco routes to allow for network management

Implementing NAT solutions on CISCO IOS routers.

Network Migration from RIP to OSPF

Configure ACLs on Core Switch, Radius Server for Wireless authentication, and RSA Manager for tokens for SSL VPN.

Work with multi-vendor devices including Juniper, Cisco, Arista, Brocade Force10, F5, & A10.

Implementation and configuration of VPN Tunnels. Configuring VLAN trunking Protocol (VTP) on core switches.

Configuring and deployment of Juniper ERX310 router.

Configured HSRP and VLAN trunking 802.1Q, VLAN routing on catalyst 6500 switches.

Maintained a Network with more than 600 Network devices, some 20,000-end hosts, and the other Network devices like DHCP, DNS Servers, and Firewall Servers.

Implementation of TCP/IP and related services – DHCP/DNS

Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.

Study single point failures & design WAN structure in such a way that there are no failures in network in case of any device or link failure

Cisco IPT Migration Projects from legacy PBXs with Nortel.

Monitor, operate, and maintains intrusion detection systems, ASA firewalls, and Bluecoat web proxies' servers.

Cisco ASA and FWSM, Fortinet FortiGate; F5 AFM, A10 WAF, IDS/IPS systems, and general knowledge of security features and protocols.

Configured F5 GTM Wide IP, Pool Load Balancing Methods, probers and monitors recreating Http and https redirect VIP's to client from data servers.

Troubleshoot Juniper equipment, network problems and work with Juniper ATAC through problem resolution.

Radius server installation/configuration for proxy to RSA server for Two Factor Authentication.

Rebuilding data centers and redundant sites for failover, F5 load balancers.

VTC, Layer 2 and Layer 3 Technology, and VOIP.

Deployed F5 VIPRION B2150 blades to Exchange and recommended to turn on ASM module when web mail goes live to protect against L7 attacks.

Identified goals for WAN acceleration, DMVPN connectivity, and IWAN functionality.

The design, implementation and daily administration of Solarwinds IT Help Desk environment.

Designed and implement security strategies with Cisco and Palo Alto firewalls.

Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between switches

Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.

Load Balancing using F5 Networks Big IP

Responsible for build and support load balancing related infrastructure systems, with an intermediate to advanced knowledge of F5 LTM.

Setup simplified and traditional VPN communities and CISCO Anyconnect.

Installed and configured Routers, Bridges, Terminal Servers and CSU/DSU’s to support WAN links

Work with application developers and systems engineer to migrate applications and systems to a new Border Gateway network.

Responsible to evaluate, test, configure, propose and implement network, firewall and security solution with Palo Alto networks.

Working experience with Load Balancers F5 LTM like 3900, 6900, 4200V over various environments.

Good knowledge on Perl scripts, Python scripting.

Installed and configured CISCO ASA and Checkpoint firewall.

Leveraged two Nexus 2232 Fabric Extenders and two 2248 Fabric Extenders, making them ‘dual-homed’ to both N5Ks and implementing Enhanced Virtual Port-Channel (EvPC).

Involved smart view tracker to check the firewall traffic.

Documented all the work done by using MOPS, Visio, Excel and MS word.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 12000/7200/3845/3600 routers, Cisco ASA5510, Checkpoint.

Client: State of MO, Jefferson City, MO Oct 2012 – Jun 2014

Sr Network Engineer

Responsibilities:

Responsible for the implementation and maintenance of firewall based security zones (DMZ*s).

Provide support to internal project teams by adding firewalls, switches and routers to managed DMZs.

Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.

Implementing & Troubleshooting of T1, MUXES, CSU/DSU and data circuits.

Experience on designing and troubleshooting of complex BGP and OSPF routing problems,

Have sound knowledge of Firewall architecture, routing and VPN.

Responsible for IWAN Network Refresh for over 250 offices.

Configure new routes for new endpoints into Palo Alto Firewalls.

Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.

Supported a F5 application delivery (LTM, GTM, ASM, APM) infrastructure of about one hundred nodes.

Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).

Have experience working on HP Open view Network Node Manager.

Upgrade firewalls in accordance with change management & Document changes to firewalls.

Monitor traffic and access logs in order to troubleshoot network access issues.

Have experience with CiscoWorks LAN Management Solution.

Experience in migration of Frame-relay based branches to MPLS based technology using multi layer stackable switch like 6500 series and 2800 series router.

Configuration of Tacacs plus in juniper Router and Switches.

Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.

Configuring and implementing F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic.

Experienced in handling and installing Palo Alto Firewalls.

Monitoring the network devices status using Solarwind tool.

Monitored bandwidth and network activity by analyzing information provided by Solarwind to ensure both efficient and effective network operations.

Hands on experience with Cisco 3500, 3750, 4500, 6500 series equipment and configuring and deploying and fixing them with various modules like Gig card, VPN SPA card, WIC card.

Cisco IOS experience on 3600/7200 class hardware in complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data centre environment.

Involved in configuring IP Quality of service (QoS).

Configuring Fortinet FortiGate firewall appliance, as well as Cisco IOS, Layer2 &3 switches and routers.

Worked on F5 BIG-IP Load balancer LTM/GTM for application redundancy and high availability.

Working with F5 BIG-IP LTM 3900, configured profiles and ensured high availability.

Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.

Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.

Experience in designing, installing & configuring of Cisco PIX, ASA & FWSM (Firewall service module).

Evaluate, Analyze & Implement firewall policies to meet business requirements

Experience in creating and maintaining firewall configurations, updating documentation and log analysis.

Familiar with Cisco firewalls PIX 515, ASA 5500 series, Juniper SRX and Net Screen Firewalls. Knowledge of Palo Alto and Checkpoint Firewalls, Firemon.

Engineered traffic management solutions, including designing, low level engineering for F5LTM, GTM, ASM, APM environment.

Design and deployed F5 LTM and GTM load balancer infrastructure per business needs from the ground up approach.

Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.

Solutions oriented VoIP Network Engineer with noted accomplishments in implementation and support of complex corporate networks and VoIP networks

Configuring, maintaining and troubleshooting with Fortinet firewall and security.

Working on the project of F5 LTM, GTM and ASM code upgrade.

Applying crypto maps and security keys for the branches, ISAKMP (Internet security association key management protocol) for establishing Security associations (SA) cryptographic keys.

Experience in configuring routing protocols like EIGRP, RIP v2, OSPF & BGP and Cisco ACS protocols like RADIUS and TACACS.

F5 VIPRION hardware products like LTM, GTM series like 6400, 6800, 8800.

Experienced in WAN environments, installing and troubleshooting data circuit problems (MPLS, T1).

Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment.

Involved in designing and applying QOS and policy map to 2800 series routers for all the branches.

Involved in designing GRE tunnels for encryption of data flow from source to destination.

Implementing VoIP solutions using SIP & H.323, also have sound knowledge of Avaya VoIP products.

Experience in configuring VLAN’s STP (Spanning tree Protocol) & RTSP (Rapid Spanning Tree Protocol).

Experience with Project documentation tools & implementing and maintaining network monitoring systems (Cisco works & Netinfo, Infoman Virtual Change) and experience with developing network design documentation and presentations using VISIO.

Understanding & Implementation of IPSEC & GRE tunnels in VPN technology.

Environment: Router 2800, 3800, 7200, 7600; Cisco Catalyst Switch 6500, 6509, 3550.

Client: HSBC, Elmhurst, IL Apr 2011 – Sep 2012

Network Engineer

Responsibilities:

Maintaining the Network Infrastructure, Installation, migration and configuration of routers and switches for clients.

Provide alternative means from dial-up connection to bring down the damage or loss that occurs for the client.

Performed F5 appliance (LTM, GTM, APM, and ASM) maintenance and system upgrades including hot fixes and Security configurations.

Configured Routing protocols such as OSPF and policy based routing.

Team member of Configuration of CISCO 7206 router and Configuration of Catalyst switches.

Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.

Create and test Cisco router and switching operations using OSPF routing protocol.

Configuration and troubleshooting link state protocols like OSPF in multiple areas.

Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.

Optimized performance of the WAN network consisting of CISCO 3550/4500/6500 switches by configuring VLANs.

Worked on F5 issues using packet capture like TCP dump, Wireshark and SolarWinds and curl commands.

Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.

Responsible to evaluate, test, configure, propose and implement Network, firewall and security solution with Palo alto Networks.

Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.

Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.

Configured IP access filter policies.

Providing Technical Support and solutions for Network Problems.

Implementing NAT solutions on Cisco IOS routers.

Upgrading IOS, troubleshooting network outages.

Worked on Cisco Routers, Active /Passive Hubs, Switches.

Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network infrastructure and configured all the network Infrastructure devices including Network Printers and Registers.

Environment: Cisco 3550/4500/6500 switches and Cisco 2500, 2600, 3000, 6500, 7500, 7200 routers, Checkpoint.

Computer Science Corporation, India Aug 2008 – Mar 2011

Network Engineer

Responsibilities:

Worked as part of a team for Cisco Product Support. Troubleshooting by providing relevant knowledge base articles and other information.

Network solutions for complex networks for VAR (Value added resellers) users of Cisco.

Configured & maintained LAN, WAN, VPN, WLAN, and Firewalls on Cisco Routers for end users.

Configuring MPLS, VPN (IPSEC, GRE) in VPN concentrators and QOS in integrated networks (Data, Voice, and Video).

Configured application load balancing using F5 LTM.

Installed and configured of Juniper J-Series (J2350) and M-Series (M10) routers.

Installed and configured the ACE and CSM for firewall/Server Load balancing for Cisco Catalyst switches.

Configuring IPS, IDS, VLAN, STP, Port security, SPAN, Ether channel in Cisco Composite Networks.

Configured routers and modems, troubleshot issues related to broadband technologies for Residential and Business Customers.

Working on the project of F5 LTM and GTM code upgrade project.

Apache Web Server & MRTG, BIND DNS Server configuration and optimization over UNIX and Active directory implementation of Windows 2003 Server.

Configured & Maintained Cisco 2600, 2800, 3200 series routers including IOS upgrades.

Prompt technical support to customers on routers and switches.

Remote management of large networks.

Environment: Cisco Routers - 1700, Cisco GSR 12416. Cisco Switches - 1900, 6509, and 6513.



Contact this candidate