Aditya
*****@*************.***
Professional Summary:
Around 8+ years of professional experience in Network and Security, including hands-on experience in providing network support, installation and analysis for a broad range of LAN / WAN communication systems.
Experience with designing, deploying and troubleshooting LAN, WAN, Frame-Relay, and Ether-channel.
Experience in Configuring & implementing VLAN, VTP, LAN switching, STP and 802.x authentication in access layer switches.
Switching tasks include VTP, ISL/802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
Experience securing and managing remote access using various VPN technologies like IPsec, SSL, and GRE.
Utilizing management tools cisco works, solar winds, HP, IMC, Riverbed/mazu, Visio, Sniffer and Network Analyzer.
Implementation, Configuration and Support of Checkpoint NGX R65, R70 and R71, Cisco Firewalls ASA 5505, 5506-X, 5585, Palo Alto Networks Firewall models PA-2k, PA-3k, and PA-5k and Juniper SRX100,110 and Juniper ISG1000, ISG2000 Series Firewall.
Configuration and troubleshooting L3 switches with VLAN, STP, SPAN, ETHERCHANNEL, HSRP, VRRP and GLBP.
Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA, VPN experience.
Practical experience in Active directory, OU, DNS, DHCP, Group policy, Replication, Active directory domain trust relationship.
Expertise in IP subnetting and worked on various designing and allocating various classes of IP address to the domain.
Knowledge on security attacks like DoS, DDoS, Spoofing, Nessus & Cisco IOS, Cisco Works.
Having knowledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
Knowledge on Aruba Networks.
Having knowledge on Virtualization, VM ware and bluecoat proxy.
Hands on experience with Cisco, Brocade, Bluecoat, Juniper, Checkpoint and Palo Alto devices
Understanding the JUNOS platform and worked with IOS upgrade of Juniper devices
Installing and configuring F5 Load balancers and firewalls with LAN/WAN configuration.
Designed and implement security strategies with Cisco and Palo Alto firewalls.
In-depth understanding of IPV4, IP Sub netting, VLSM and ARP, Ping Concepts.
Have Extensive knowledge of OSI and various network protocols (DNS, DHCP, TCP/IP, FTP, TFTP, UDP, ICMP, IPv4/IPv6, NFS, HTTP, SMTP etc.).
Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
Configuring Checkpoint Firewall in IPSO, Secure Platform and GAIA platforms.
Expertise in maintenance of layer2 switching tasks which advocate VLAN, VTP, STP, RSTP, PVST, RPVST, configuring of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.
Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
Experienced on different network monitoring and administrative tools like HP node manager, Cacti, Net flow, Netscout, splunk and wireshark.
Troubleshoot network and application performance with tcpdump, Wireshark, Gigamon and netflow.
Expert level hands on experience in configuration & troubleshooting of routing protocols and deployment of OSPF, EIGRP, BGP, HSRP and Pbr, Pfr on Cisco Routers.
Using Smart Update, User Management and Authentication in Checkpoint Firewall.
Experience deploying BIG-IP F5LTM Load Balancers for load balancing and traffic management of business application.
Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
Experience with IP Address Management (IPAM) systems such as InfoBlox, Solarwinds.
Check point UTM series, Check point IP series, Application layer firewall PA-4000 & 2000 series, Sidewinder McAfee, Fortinet 3240c, Cyberoam, SGS 5440 Symantec Gateway security.
Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200) series.
Expertise in installing, configuring and troubleshooting Juniper Routers (E,J,M and T-series)
Implementation of Juniper Router and Switches SRX, J, MX, EX Series
Implementation of Juniper Firewall, SSG Series, Net screen Series ISG 1000, SRX Series
Implementation of HA-JSRP in JUNOS devices, SRX Series Router/Firewall in both A/A and A/P mod
Working experience with REMEDY for ticket change management process
Experienced in developing Web Services with Python programming language
Experienced with Python frameworks like Webapp2 and Flask
Good Knowledge of Python and Python Web Framework Django
Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.
TECHNICAL SKILLS:
Routing Protocols: RIP v1/v2, EIGRP, OSPF, BGP, Static route.
Cisco Routers: 7600, 7200, 3800, 3600, 2800, 2600, 2500, 1800 series.
Cisco Switches: Nexus 5548, 5596, 6000, 7009, 7018;
Cisco Catalyst: 6506, 6509-V-E, 4928, 4948, 4507, 4510, 3750, 3560, and 2960.
LAN Technologies: Ethernet, Fast and Gigabit Ethernet, LWAPs.
WAN Technologies: HDLC, PPP, ISDN Frame Relay, VPN.
F5 load balancers: (LTM & GTM) configuration, administration and troubleshooting.
GTM 5, F5 3DNS Load balancer GTM.
Juniper: EX 2200, EX 4200, EX 4500, MX-480, M Series, SRX210,
SRX240.
Switching Technologies: VLANs, Inter VLAN routing and Port Channels, VTP, Spanning Tree Protocols like PVST+, RSTP+, Ether-Channel
Network Security: Cisco ASA and PIX 525 Firewalls, ACL, IPsec.
Load Balancers: F5 Network (Big-IP) LTM 8900 and 6400.
Redundancy Protocols: HSRP, GLBP, VRRP.
VPN Technologies: GRE Tunneling, Remote Access VPN, Site-to- Site VPN.
Servers: FTP, DHCP, AAA, SMTP, DNS, HTTP, Syslog, TFTP.
Network Management: Wireshark, Cisco works, solar winds, Cisco ACS, Cisco NCS.
AAA Architecture: TACACS+, RADIUS, Cisco ACS
Applications: Wireshark, Netmon, Microsoft Service Enterprise, Secure CRT,
Putty, Alarm Monitoring Console, MS Ticketing, MS Azure,
VPN migration, Multipoint Ethernet, SNMP, Genesis Suite 6.5
Router Configuration, SDN, and Genesys Suite 7.x
VMware: VMware ESX & VCenter Server, VMware Workstation
Palo Alto Firewalls: PA-2K, PA-3K and PA-5K
Check Point Firewalls: NGX R65, R70 AND R71
QOS: CBWFQ, LLQ, WRED, Policing/Shaping.
Network Tools: IXIA, Bugzilla, Wireshark, Ethereal.
Switches: Catalyst 6500, MSFC, MSFC2, 7600, 3700, 3500
Routing Protocols: IGRP, EIGRP, OSPF, BGPv4, MP-BGP, RIP
WAN Protocols: HDLC, PPP, MLPPP
Circuit switched WAN: T1/E1 – T3/E3/OCX (Channelized, Fractional & full).
Packet Switched WAN: ATM, FRAME RELAY, MPLS VPNs
Load Balancer: F5 Networks (Big-IP) LTM 8900 and 6400
Security Technologies: Cisco FWSM/PIX/ASDM, Juniper SRX, Cisco ASA, Checkpoint, Palo Alto.
Tunneling Protocols: L2TP, IPsec, PPPoE, GRE, MPLS, IEEE 802.1Q
Authentication Protocols: PAP, CHAP
CERTIFICATIONS:
Cisco Certified Network Associate (CCNA)
Cisco Certified Network Professional (CCNP)
Solar Winds Certified Professional (SCP)
Palo Alto Accredited Configuration Engineer (ACE)
Check point Certified Security Administrator RS 77.30 (CCSA)
All Certifications are active and current will be provided upon request
EDUCATION:
Bachelor’s in Electronics and Communications Engineering, Osmania University, 2009
PROFESSIONAL EXPERIENCE:
CATHOLIC HEALTH INITIATIVES
Denver, CO JAN 2016 – Present
Network Consulting Engineer
About CHI:
Catholic Health Initiatives (CHI), it is a hospital chain headquartered in Denver, Colorado, USA. It has multiple hospitals all over USA.
Role Description:
I am a part of Cisco LAN team. Cisco Systems was the implementation partner for this project. The project is that of the LAN refresh project. The project is Life Cycle Implementation. The client wants to go for complete upgrade of devices. My role is of network / field engineer which includes upgrading and replacing the old Cisco Routers and switches with new devices according to Cisco- CHI LAN standard.
Responsibilities:
Designed, installed, and maintained various WAN technologies and applications connecting remote sites to corporate headquarters.
Configured, implemented, and troubleshoot routers and switches with various account settings, permissions, and parameters including security firewalls.
Primary responsibility is to design and deploy various network security & High Availability products like Checkpoint NGX, Provider-I, Nokia appliance, Cisco ASA other security products
Installed various network hardware including concentrators, bridges, and hubs to establish communication connections with remote locations.
Configured multiple domain name services (DNS), email services (Exchange Server), web, and file transfer protocol services (FTP) for various platforms including line leasing through DHCP servers.
Maintains and troubleshoot problems with high speed internet access, DSL, T1 lines and DS0, long-distance telephone service and local telephone services.
Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
Experience with creating VIP (virtual servers), pools, nodes and applying iRules for the virtual servers like cookie Persistency, redirection of the URL.
Design, procure parts and implement networks for LAN & WAN (IPSec, MPLS, Frame Relay, ISDN, and T1/ E1/T3/E3 Lease Line)
Data center migration was involved in Access, Distribution and Core layers
Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
Experience with configuring Virtual Server and Configuring Load balancing methods in F5 LTM
Experience with design and implementation of Data center migration.
Expert in configuring Cisco Routers, Catalyst Switches, Nexus Switches.
Upgrade Cisco 6500, 3750, 2960s, Nexus 5000, Nexus 2000, Nexus 7000 switch IOS software
Worked extensively with Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches
Identify, design and implement flexible, responsive, and secure technology services
Implemented Positive Enforcement Model with the help of Palo Alto Networks.
Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
Establish AWS technical credibility with customers and external parties
Help customers build scalable, resilient, and high-performance applications and services on AWS
Develop/capture/document architectural best practices for building systems on AWS
Networking protocols worked with included but not limited to TCP/IP, DNS, WINS, DHCP, VPN, Terminal Services, Routing and Remote Access, Network Design, wiring and cabling.
Cisco IOS experience on 3600/7200 class hardware in complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data centre environment
Hands on experience installing Sup720 for Cisco 6509-E series and its Gigabit Ethernet port deployment in the core network
Delivered and lead projects at various verticals/customers enabling technologies for SDN, OpenStack cloud Based initiative and NFV.
Configuring IP, RIP, EIGRP, OSPF and BGP in routers.
Experience in deploying EIGRP/BGP redistribution and the changing the metrics for the primary and backup
paths for the packet prioritization and EIGRP tuning
Experience on a mesh 6500 and 5500 series routes and switches to support the core trading system. Involved
Experience working with Nexus 7010, 7018, 5020, 2148, 2248 devices
Experience working with High performance data center switch like nexus 7000 series
Configuring IPSEC VPN on SRX series firewalls
Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path.
Configured IPSec site-to-site VPN connection between Cisco VPN 3000 Concentrator and Cisco 3800
Environment: Juniper firewalls 5GT, 208, SSG 5, 140, 550, 550M, NSM, IDS/IPS, 6500/3750/3550/3500/2950 switches, Juniper (M320, T640), Load balancing, Cisco 7200/3845/3600/2800 routers, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, Ether Channels.
BCBS
Fargo, ND July 2014 – Dec 2015
Data Network Engineer
Role Description:
As a Network Engineer, my job role is working on Cisco routers, switches and Nexus devices, LAN/WAN, implementing access rules on Cisco ASA and Palo Alto Firewalls, creating new Vlans, performing maintenance on both Cisco ASA and Palo Alto firewalls and attending troubleshooting calls with customers if they have any issues on access and also managing incident tickets and monitoring network devices.
Responsibilities:
Responsible for installation, troubleshooting of firewalls (Cisco firewalls, Checkpoint R70.50-75.50 firewalls) and related software, and LAN/WAN protocols.
Supported Tomcat server clustering, load balancing, failover and performance tuning
Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
Provided proactive threat defense with Checkpoint firewall that stops attacks before they spread through the network.
Extensive Packet level debugging and troubleshooting on Palo Alto Firewalls to resolve numerous network issues.
Rewrite existing Python/Django modules to convey certain format of data.
Install network backbone, wireless controllers and wireless access points (Cisco, Aruba, Ruckus)
Deployed Active Directory domain controllers to Microsoft Azure using Azure VPN gateway.
Building configurations for Juniper MX 2010 and MX 2020 routers with features like port security, VLANS, VTP, PVST+.
Optimizing Citrix HDX Protocols for remote agents located across the globe.
Deployed Citrix UPM solution to reduce profile load time and corruptions.
Maintained Aruba Network, in two different data centers, for over 1500 remote home users (VPN)
Selected as the one person hired from the contractor to maintain the wireless network
Reengineered the LAN to provide more reliable services and to reduce the latency, analyzed the NT domain in the Austin office to determine all the problems
Configured and maintained the networks consisting of Cisco 2800 and 3800 routers, and catalyst 2950, 3560, and 3750 switches.
Configuration of Juniper SRX series firewalls for outbound traffic via blue coat proxy server.
Configure and troubleshooting HA Cluster on Checkpoint and Palo Alto Firewalls.
Analyze logs and make necessary network report using panorama, Palo Alto firewall and smart reporter console application.
Worked on Checkpoint 41K Series to manage network traffic flows using dedicated processing and memory for networking, security, threat prevention and management
Created subnets (on these switches) from the given Class B and Class C addresses to support the VLANs.
Experienced working with various services in Azure like Data to store and analuze the data.
Responsible for developing and deploying Solar Winds which includes WAN/LAN and server monitoring, reporting, and alerting and Configure Orion alerts.
Implemented inter-VLAN routing (on Juniper EX 3300 and EX 3400 switches) among the VLANs to allow communication on larger internetworks.
Implemented extended ACLs on Juniper SRX and 3750 to allow communication between the required networks, and to restrict other communications.
Configuration of security policies for security infrastructure using proper change management process.
Maintaining corporate firewalls and Analysis of firewall logs using Security Analytics.
Knowledge of McAfee web gateways and other web filtering technologies and giving access to personal email accounts based on Organization's security policy standard.
Providing technical support for service request issues, customer engagement and internal projects.
Monitoring performance of network devices using Spectrum.
Implementing Proxy requests, maintaining Proxy incidents and troubleshooting proxy issues using McAfee web gateway.
Adding external websites to the McAfee Web gateway and blocking them when they categorized as an uncategorized URL.
Checking Internet F5 VIP's security policy using AppviewX.
Documentation and reporting of security policies, process and procedures.
Involving troubleshooting network problems using Cisco ASA packet-capture, tracert and Syslog.
Environment: Cisco ASA firewalls 5505, 5540 and 5580; Palo Alto Firewalls 3000 and 5000 series; Cisco router 7200 and 3600; Catalyst switches 6500, 3750 and 3550; Nexus 7010, 5020 and 2148 switches; Proxy McAfee Web Gateway, Security Analytics, AppviewX, Spectrum
Atlanta Gas Light
Atlanta –GA Nov 2012 – June 2014
Network Security Engineer
Responsibilities:
Design and develop infrastructure software for network management system and monitoring for one of the largest networks, containing SDN, traditional routed and traditional optical mode.
Created script in Python for automatizing logs.
Juniper: EX-2200, EX-4200, EX-4500, MX-480, M series, SRX210, SRX240.
Part of the team that manages the IP MPLS VPN and Clients Enterprise Network to ensure all services and
SLA's are met for all internal and external customers. Third level of escalation incident management to support post sale solution during the live cycle of the services.
Design and implemented Cisco VoIP infrastructure for a large enterprise and multi-unit office environment.
Lead design and implementation engineer for VoIP projects consisting from 100 to 15,000 IP Phones and Analog devices.
Expertise to orchestrate the data to and from Data Lake Store using Azure Data factory.
Designing, Implementing LAN/WAN configurations on Cisco Nexus 5k, Catalyst 6500 switch.
Assist customers with Certificate Updates, Load balancing through Citrix Netscalar.
Configuring and resolving various OSPF issues in an OSPF multi area environment.
Configured and designed Access layer switches such as Cisco 4510, 4948, 4507 switches.
PCO (Provisioning Control Office) function in support of Mobility Network Provisioning.
Responsibilities are including managing the order process which encompasses order tracking, validating engineering, documenting and publishing daily reports. This is involving all aspects of the provisioning process CISCO/Juniper including, Ethernet, PPP and others duties involve (SRX, Q Fabric and J series).
Configured IPSEC VPN (site to site remote access) on Checkpoint series firewall.
Install and configured S-JRSS Stack to include Juniper, Cisco, Palo Alto, Gagman and Dell 380 series server equipment
Configuration and maintenance of PIX and ASA firewall systems.
Configured DHCP scopes for voice and data VLAN segments.
Manage and implement solution on Telephonic Global MPLS Network
Extensive knowledge and hands-on experience with the latest version 13.3 of JunOS-Space
Implemented site-to-site VPN in Juniper SRX as per customer.
Implementation of Dynamic VPN via Checkpoint Firewalls and Pulse Secure Clients.
Installation, Configuration, upgradation, Monitoring, Troubleshooting and Testing activities performed on Checkpoint and Juniper Firewalls
Responsible for all Juniper SRX firewalls consisting of SRX3600, 1400, 550. Using CLI and/or Junos Space Security Director for management. Install, upgrade, troubleshoot, design, etc.
Implemented various EX, SRX and EXseries Juniper Devices.
Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
Redistribution of OSPF and EIGRP into BGP with the correct tagging parameters from the old legacy network to route and to utilize the correct MPLS VRF VPN's provided from the bearers.
Implemented, Configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).
Expertise in maintenance of layer 2 switching tasks- VLAN, VTP, RSTP, configuration of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.
Implemented Ciscot Security Management Appliance and Ironport ESA in DR site to provide redundancy across data centers for email flow.
Conducted site surveys and installation of wireless Area network.
Guided a team of 15 junior Network Engineers for deployment of Cisco LAN/WAN/WLAN infrastructure.
Responsible for service request tickets generated by helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
Supporting EIGRP and BGP based PwC network by resolving level 2 and 3 problems of internal teams and external customers of all locations.
Estimated project cost and created documentation for project funding approvals.
Created and delivered internal training on BGP.
Administering multiple Firewall of Juniper/ Net Screen, in a managed distributed environment.
Experience with Cisco LAN controllers (8500, 5760, 5500) Cisco Access Points (3700, 2700, 1600, 700W), Cisco Mobility Platform.
Planning, deploying LANs/WANs voice interconnection using protocols VoIP, H.323, SIP, ISDN, L1-L3.
Experience with converting checkpoints VPN rules over to the Cisco ASA Solution. Migration with Cisco ASA VPN experience.
Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes and route filtering using Route-maps.
Have applied ACLs for Internet access to servers using Cisco 5550 ASA firewall and performed NAT.
Worked on WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing protocols (BGP/OSPF) and IP addressing.
Environment: EX-2200, EX-4200, EX-4500, M series MX-480 SRX210, SRX240, 8500, 5760, 5500, Cisco 5550 ASA, Cisco LAN controllers (8500, 5760, 5500) Ciscot Access Points (3700, 2700, 1600, 700W), Solarwinds, Checkpoint R77.30 41 K series.
Etios Tech Pvt Ltd,
Hyderabad, India Aug 2009 – Oct 2012
Role: System/Network Administrator
Responsibilities:
Enhanced abilities to install and maintain Microsoft Exchange and worked extensively on different applications.
Created network diagram under senior Network Engineers using the Microsoft Visio.
Preparing Client Machines for users with Operating Systems, Software, antivirus and required utilities and mailing clients etc.
Perform daily maintenance, troubleshooting TCP/IP problems, configuration, and installation of all network components and connectivity Issues.
Configuration of CISCO Routers (3600, 4000, 7200, 7600 Series) and 3550, 4500, 2800 3700 series switches.
Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay and ATM).
TCP/IP network planning, Implementation and Management with subnets.
Enabled SNMP traps for our Cacti Monitoring tool to monitor traffic and check the regular health of Servers and Network Devices
Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.
Providing support for advanced level and on-call support for large variety of networks, systems, and infrastructures.
Configured Site-to-Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.
Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
Troubleshooting network systems and performance, and remediating issues professionally and concisely.
Implemented and Configured IP Routing Protocols such as RIP, EIGRP.
Implemented and configured LAN Protocols: Ethernet, VLANs, VTP and STP.
Worked with Remedy Ticketing tool in maintaining and keep a track of logs/monitor.
Designed and implemented IP Addressing, Sub netting, Route Summarization and Route Distributions.
Monitoring the Servers and Networks.
Environment: LAN, WAN, Sub netting, VLAN, VTP, VPN, NAT, OSPF, BGP, EIGRP, Cisco 3600,
4500.
Cyber Net Solutions Ltd, Hyderabad, India Dec 2008 – July 2009
Jr. Network Engineer
Responsibilities:
Implementing new/changing existing data networks for various projects as per the requirement.
Troubleshooting complex networks layer 1, 2(frame relay, ATM, Point to Point, ISDN) to layer 3 (routing with BGP, EIGRP, OSPF and RIP protocols) technical issues.
Working on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path, and Community, MED.
Implemented VTP and Trunking protocols (802.1q and ISL) on 3560, 3750 and 4500 series Cisco Catalyst switches.
Performed IOS upgrades on 2900, 3500 series Cisco Catalyst switches and 1800, 2600, 3600 series Cisco routers using TFTP.
Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, Frame relay, NAT, DHCP, TCP/IP).
Installing and maintaining Windows NT Workstations and Windows NT Server.
Providing technical support to LAN & WAN systems.
Monitoring performance of network and servers to identify potential problems.
Involved in network monitoring, alarm notification and acknowledgement.
Performing RIP, OSPF, BGP, EIGRP routing protocol administration.
Preparing feasibility report for various upgrades and installations.
Other responsibilities included documentation and support other teams.
ENVIRONMENT: Windows NT Workstations, NT servers, RIP, OSPF, BGP, and EIGRP.