Post Job Free

Resume

Sign in

Network Engineer Technical Support

Location:
Irving, TX
Posted:
September 20, 2017

Contact this candidate

Resume:

Prashanth B

Sr. Network Engineer

Ph No: 908-***-****

Email id: ac2ecx@r.postjobfree.com

Professional Summary:

Around 8 years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and Testing of networking system on both Cisco and Juniper Networks.

Experience of routing protocols like EIGRP, OSPF, RIP, and BGP, Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches. Extensive hands-on experience with complex routed LAN and WAN networks, routers and switches.

Experience with BIG-IP F5 load balancers, version 9.x, 10.x, 11.x, Citrix NetScaler’s and Web Accelerators. Experience in the setup of Access-Lists, and RIP, EIGRP, and tunnel installations. Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.

Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments. Network monitoring and debugging tools: SevOneNetscout, Wireshark.

Wrote server scripts using Perl to work with IPv6 instead of IPv4, Experienced with VSS, VPC, Nexus7000. Good understanding of NAT & Firewall on Aruba Controllers.

Wireless design for over a total of 100 million square feet. Along with other Network Engineers participated in the management and configuration of Cisco ASA, Juniper and Palo Alto Firewalls, ACL’s, and Packet Shaping devices and rules.

Worked on various network projects involving Cisco Routers- ASR 1000/9000, Switches-Nexus 7K/5K/2K. Enhanced level of experience with OSPF, BGP, and TCP/IP. Hands-on experience in using network monitoring tool Solar winds Orion.

Worked extensively on Juniper MX Series Routers and EX series Switches. Great team player and able to work under pressure 24x7 duty rotation.

Strong knowledge in HSRP, VRRP redundancy Protocols. Strong experience on Juniper SSG series Firewalls and Checkpoint R75, 76 Firewalls Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.

Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies. Access control server configuration for RADIUS & TACAS+. Hands-on experience using Cisco Virtual Switching System (VSS).

Good knowledge on Bluecoat proxy server SG• Knowledge of advanced technologies like VOIP, H.323, SIP, QOS, Multicasting, MPLS and MPLS-VPN. Experience with 802.11x wireless technology. Experience with Juniper SRX 240 Firewalls.

Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments. Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248). Hands-on Experience with CISCO Nexus 9000, Nexus 7000, Nexus 5000, and Nexus 2000 platforms. Also, worked with the physical server migration to AWS data center.

Involved in designing and implementation of AWS network and connectivity b/w physical and AWS DC. Worked with the Python 2 & 3 version. Worked with Automation script with Python module like Chef & Ansible.

Managed relational database applications with UI designing services and Python languages. Experience with configuring Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000.

Technical Skills:

Cisco Platforms

Nexus 7K, 5K, 2K & 1K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 6807 series),

Juniper Platforms

SRX, MX, EX Series Routers and Switches

Networking Concepts

Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall

ASA Firewall, Checkpoint, Cisco ASA, Palo Alto, Cisco ISE,Cisco IDS/IPS, Fortinet

Network Tools

Solar Winds, SNMP, Cisco Works, Wireshark

Load Balancers

Cisco CSM, F5 Networks (Big-IP)

WAN technologies

Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

LAN technologies

Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Security Protocols

IKE, IPSEC, SSL-VPN

Networking Protocols

RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System

Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

Professional Experience:

ATOS, Irving, TX Mar 16 - Present

Sr. Network Engineer

Responsibilities:

Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco 1600, 2600, 2800, 3600, 7300 series Routers. Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.

Configured VLAN’s, Private VLAN’s. Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls Subject Matter Expert for juniper Routing, Switching, Security, and VPN Systems. Responsible for entire company network infrastructure that includes Cisco Switches, Routers, Firewalls, Access Points, Servers and PBX.

Implementation of Site-to-Site VPNs over the internet using 3DES, AES/AES-256 with ASA Firewalls. Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as Cisco 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.

Designed and Implemented Firewalls, F5Viprion deployments to Front end and DMZ customers. Measure the application performances across the MPLS cloud through various routing and switching methods. Configured inside ACL, outside ACL, inside, outside interfaces.

Configuration and troubleshooting of EIGRP, OSPF, BGP, CSM, integration with ASA devices. Experience in migration of VLANS & Configured VLANs with 802.1q tagging, Ether channels, and Spanning tree for creating Access/distribution and core layer switching.

Strong experience in creating firewall policies as per the requirements on Checkpoint, Palo Alto, Cisco ASA, Juniper and Fortinet firewalls. Solid understanding of OSI and TCP/IP model.

Experience in Physical cabling, IP addressing and Sub netting with VLSM using QIP configuring and supporting TCP/IP, DNS, installing and configuring proxies.

Cisco Nexus 7000, 5000 series installation and configuration, implementation with Port channel and troubleshooting in a TCP/IP OSPF environment.

Worked on Web Security, Security Services, configuring and accessing the Bluecoat ProxySG, troubleshoot the ProxySG. Involved in Network Designing, Routing, DNS and IP Subnetting, TCP/IP Protocol. Configured RIP, OSPF, EIGRP, BGP, MPLS, QOS, ATM and Frame Relay. Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corporate Network.

Extensively worked on various cloud environments like AWS. Created highly available and scalable infrastructure in AWS cloud by using various AWS services like EC2, VPC, RDS, Route53. Configuring VLANs/ACLs/Ether channel/RADIUS/QoS/Storm Control on the new switches.

Deployed Cisco ISE 1.2/1.3 for Enterprise RADIUS Authentication with Active Directory, RSA Secure ID, Proxy Radius Services to Cisco ACS.

Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x authentication for Wireless users.

Experienced with deploying Juniper SRX 240, SRS 220 Firewalls with zone based security, URL filtering and IDS/IPS. Implemented security policies using ASA 55XX Firewall as well as Fortinet firewall IPS/IDS, AAA Security (TACACS+, RADIUS) on different series of routers

Redesign current security network and implement Cisco IDS/IPS and Network Access Control (NAC) to insure the maximum security.

Experienced with designing Virtual Environment for L4 and L7 application Load balancing Local LB architecture, optimization profiles, SSL offload and extended security profiles for applications

Configure and implementing Fortinet Security systems Firewall. Assisted in managing global Fortinet Fortigate firewall infrastructure.

Responsible for maintaining multi-vendor network environment including Cisco ASA, Juniper JUNOS, Fortinet firewall. Aided in troubleshooting potential network issues in rolling out ISE

Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE. Strong hands on and exposure to Checkpoint & Palo Alto on a regular basis.

Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.

Installed and configured DNS, DHCP. Responsible for creating and configuring FORWARD LOOKUP ZONE AND REVERSE LOOKUP ZONE. Redistributed required routes from OSPF in to BGP. OSPF cloud is present in US and is connected to all our customers over Sprint’s Frame Relay backbone.

Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.

Efficiently utilized Cisco Nexus 7K, 5K, and 2K in managing and deploying data center switch upgrade to a 10GB infrastructure, resulting to a new virtual port channel technology.

Migrated from Cisco ASA 5540 firewall to Palo Alto 5250 Firewall. Used Palo Alto 5250 Firewall for Enterprise Security, configured ACL's for Internet requests to Server Farm in LAN and DMZ.

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools. Managed multiple Palo Alto firewall HA clusters utilizing Panorama.

Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series. Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Worked on Blue Coat Proxy SG to safeguard web applications in extremely untrusted environments such as guest Wi-Fi zones. Worked on Configuring Bluecoat Split DNS Support, Changing the Order of DNS Servers, Unresolved Host Names.

Configured VPN, clustering and ISP redundancy in Checkpoint firewall. Configured, maintained and troubleshooting IPS and IPS-1 in Checkpoint

Configured EBGP load balancing and ensured stability of BGP peering interfaces. Implemented site to site VPN in Juniper SRX as per customer Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.

Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Netscreen devices for easier management and common configurations. Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series for higher.

Involved in Bluecoat Configuring Attack-Detection Mode for the Client, Configuring Attack-Detection Mode for a Server or Server Group also involved in Managing the HTTP, SSH, Telnet Consoles.

Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0. Implemented F5 hardware refresh of older 3600 hardware to Viprion. Design and Implement DMZ for FTP, Web and Mail Servers with CISCO PIX 506, PIX515.

Building the VPN tunnel and VPN encryption. Preformed IOS upgrades on cisco routers and switches. Worked with engineering team to resolve tickets and troubleshoot L3/L2 problems efficiently. Configured Cisco 2800, 3800 routers and 3750, 4500, 6500 switches as part of the implementation plan.

Environment: Cisco 2948 / 3560 / 4500 / 3560 / 3750 / 3550 / 3500 / 2960 6500 switches and Cisco 3640 / 1200 / 7200 / 3845 / 3600 / 2800 routers, Cisco ASA 500, Checkpoint, Bluecoat, AWS, Cisco ISE, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

Expedia, Bellevue, WA Oct 14 – Feb 16

Sr. Network Engineer

Responsibilities:

Experience working with Nexus 7018/7010, 5020, 5548, 2148, 2248 devices. Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000. Involved in upgrading switches from 6500 E to 4500-X.

Implementation of BGP to optimize WAN routing on the core and edge routers. Mutual redistribution of OSPF and BGP routes using route maps. Involved in upgrades to the WAN network from existing 7200vxr with ASR1004 and 3845/3945 routers.

Worked on Bluecoat Proxy CG in restricting Management Console Access Through the Console Access Control List(ACL) and in Administrative Authentication and Authorization Policy.

Networking Experience- Cisco IOS, racking and cabling of servers, experienced with TCP/IP, Ethernet (802.3), Wireless networking motoring, firewall implementation. Palo Alto design and installation.

Design and configuration of Cisco security platforms specifically ACS, ISE and ASA. Apply Cisco ISE configuration to switches. Worked on project like deploying Cisco prime Infrastructure, and Cisco Identity Service Engine (ISE) for port security.

Implementation, maintenance and monitoring of IDS/IPS, WAF, antivirus and Syslog Servers. Configure and maintain Cisco IDS/IPS, ASA firewalls, and Bluecoat web proxies.

Troubleshoot and Worked with Security issues related to Cisco ASA, and IDS/IPS firewalls. Large scale Deployment and installation of Juniper SSG5, Cisco ASA, and Fortinet firewalls.

Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA 5500 Firewalls, Fortinet. Troubleshoot and hands on experience on security related issues on checkpoint, IDS/IPS, Palo Alto and Juniper Net screen firewalls. Monitored the security and VPN for multiple sites with Cisco Pix 501, 506e, 515R and Fortinet fire walls.

Deploy ISE technology in infrastructure to establish secure and authenticated network and ISE development with profiling and certificate based authentication. Configured and performed software upgrades on Cisco Wireless LAN Controllers 2504, 4404,5508 for Wireless Network Access Control integration with Cisco ISE.

Configuring rules and Maintaining Palo Alto & Analysis of firewall logs using various tools. Build Cisco UCS 6200 series fabric interconnect. Recommend and design equipment configurations for LAN/WAN/VOIP deployment on Cisco, Adtran, Fortinet, F5, Redware and Bluecoat.

Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls. Configured Easy VPN server and SSL VPN to facilitate various employees' access internal servers and resources.

Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, Cisco ASA, Firewalls, VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall. Successfully installed Palo Alto Next-Generation PA-3060, PA-5060 firewalls to protect Data Center with the use of IPS feature

Provided technical support for Juniper VPN-Bluecoat Proxy Server administration, Juniper SRX/ EX appliances, F5 APM/LTM VPN, F5 APM/LTM Reverse Proxy, Palo Alto FW, and Palo Alto Panorama.

Build servers using AWS: Importing volumes, launching EC2, RDS, creating security groups, auto-scaling, load balancers (ELBs) in the defined virtual private connection.

AWS Cloud management and Puppet automation. Imported and managed multiple applications using GIT. Using Jenkins AWS Code Deploy plug-in to deploy into AWS. Implemented AWS solutions using E2C, S3, RDS and EBS. Migrated applications to the AWS cloud Environment.

In-depth knowledge of Cisco ASA and Juniper Netscreen Firewall security, spanning-tree, Vlan’s, TCP/IP, RIP, OSPF, QOS, VRRP and VPN technologies.

Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.Worked with Cisco Nexus/NX-OS and Cisco Catalyst Switches. Worked with vendors and Engineering team to test new hardware and procedures.

Worked on F5 and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance. Troubleshooting connectivity issues through Bluecoat as well writing and editing web policies.

Configuration and maintenance of routers, firewalls, and load-balancers. Included configuration of Juniper ISG 2000, Juniper EX4200, F5 BIG-IP 3600, and Cisco 6500. Includes protocols such as MPLS, BGP, OSPF, and VRRP. Also, worked with Cisco ASA's 5505 and 5520, 5512X, 5515X.

Configuring and troubleshooting Bluecoat SG9000 WAN acceleration appliances including WCCP, CIFS and creating/updating overlays. Created labs for F5 APM, ASM, and LTM implementations of Microsoft Exchange, Microsoft SQL, Microsoft IIS services, LAMP servers,

Expert in troubleshooting F5 software modules, including BIG-IP LTM, ASM, APM, and iRules (Tcl-based script). Designed OPNET labs for the switching and QOS management in IP Networks course. Put together Cisco BoM in preparation for IP Telephony migrations.

Handling Checkpoint and Checkpoint firewalls appliances, Checkpoint Provider-1/Multi-Domain-Mgmt. platform, Check point Smart Console R70.20 & R75.40, R77.10, R77.20.

Hands on Experience testing iRules using Browser (IE), HTTP watch on f5 load balancers. Designs and implement the security appliance ASA and SonicWALL for the Site to Site; any connect, SSL and Remote access VPN of many clients.

Upgraded Roger Management Network security appliances with Cisco Firewall ASA 5580, IDS, network management tools Cisco works (VMS, LMS, CSM), IDS/IPS. Managed F5 BigIP LTM appliances to load balance server traffic in critical serval access silos. Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.

Convert Campus WAN links from point to point to MPLS and to convert encryption from IPSec/GRE to Get VPN. Handles different networking platforms such as Cisco ASA firewall, ASR routers, Cisco Catalyst switches and routers, Bluecoat Packet shaper, Cisco WSA.

Environment: Nexus 7k, 5k, 2k, Cisco ASA 5505,5520, Palo Alto firewall, Checkpoint, Cisco UCS, Fortinet, F5 (LTM, GTM), Redware, bluecoat, IPS/IDS, ASR 9k, IPSEC, SSL VPN's, Juniper Netscreen, AWS, Spanning Tree, Cisco ISE, QOS, HSRP, VRRP, GLBP, RSTP, MST, Fabric path, OTV, MPLS, BGP, VOIP.

DOHMH, New York Jan 13 – Oct 14

Sr. Network Engineer

Responsibilities:

Maintain and track the status of device supplied to the client. Coordinating with JTAC for faulty part replacement and configuring standby device to support customer with minimal downtime. Implemented Juniper firewall &switches.

Installation & Maintenance of Juniper switches routers &firewalls. Implementing and maintaining WAN/LAN and WLAN networks in different diagrams. Implemented various EX, SRX & J series Juniper devices.

Identified opportunities for implementation of network best practices, particularly F5 load balancer implementations. Monitor performance of network appliances and WAN utilizing using network analyzer like Wireshark. Study of migration of the old WAF infrastructure from Deny All to F5 BIG IP ASM technologies.

Experienced on Cisco ISE and advanced technologies like QOS, Multicasting, MPLS and MPLS-VPN and Bluecoat proxy server SG. Working experience on tools and devices like Source Fire, Cisco ASA, Cisco ISE. Implemented Cisco ISE 1.2 for Wireless 802.1x Authentication and Authorization with Flex Connect

Responsible to providing support for IT infrastructure in the laboratory. Surveillance activities for physical and virtual switches. Open flow, 802.1x and MAC authentication test. Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Netscreen devices for easier management and common configurations.

Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series for higher. BigIP ASM Positive and Negative Policy Reinforcement, iRules, Full proxy for HTTP, Server Performance Anomaly Detection. Design and integration of Juniper SSG series firewalls, SA VPN Appliances, J series Routers, and EX series switches.

Help in building Cisco UCS servers to simplify data center architecture; reduce the number of devices to purchase, deploy, and maintain; and improve speed and agility. Knowledge in implementing and configuring F5 Big-IP LTM-6400 load balancers.

Security systems and appliances Cisco ASA 5520, Fortinet, Bluecoat, Packet Shaper 7500). Extensive experience in using T-SQL (DML, DDL, DCL) in SQL Server platforms. Configuring and managing FC zones on Cisco 9K/7K/5K.

Firewall worked upon include Checkpoint (R77 GAiA GUI) and Cisco ASA's (ASDM GUI). Focused on building new content and functionality for several F5 ecommerce sites. Created and resolved Palo Alto and Checkpoint Firewalls Rules, Routing, Pushed Policy.

Created and resolved Checkpoint, Palo Alto Customer Orders, and Request Orders. Configuration of Fabric path and connectivity between Nexus 7K and Nexus 5K

Experience in CSM& Waterfall Methodologies Expert in designing reports using SQL Server Reporting Services (SSRS) and Excel Power Pivot table based on OLAP cubes. Configuring Routing protocols like BGP, OSPF, MPLS, multicast and L2 protocols in ASA to check it is passing through via ASA in customer deployments.

Installed controller and light weight access point coordination with JTAC. Managed all project work related to F5.com development. Drove development of new API's related to F5 product trials that focused on verifying and capturing.

Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multi-Layer Switching. Perform Packet Shaper Bluecoat 75000 OS upgrade, maintenance and configurations. Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers. Optimizing and monitoring the performance of a WLAN, LAN, WAN and user's segments

Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers, Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches. Maintain connectivity for approximately 300 switches and routers in a 500+ node network.

Experience with deploying Fabric Path using Nexus 7000 Devices, Experience with configuring OTV between the data centers as a layer 2 extension. Experience with configuring FCOE using Cisco Nexus 5548. Implemented cluster and configuration of SRX-100 Juniper firewall.

Implemented cluster and configuration of SRX-110 Juniper firewall. Installed Trapeze-MX 2800 wireless controller and light weight access points. Working with MPLS Designs from the PE to CE. Maintain, monitor, and troubleshoot network devices, wireless.

Experience with designing and deployment of MPLS Traffic Engineering. Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks. Design and deployment of MPLS QOS, MPLS Multicasting per company standards.

Environment: F5 - LTM 5100, 6800, GTM, ASM, APM, IRules, Juniper EX, SRX, J, MX series, UTM - Antivirus, Bluecoat proxy servers, Cisco ISE, Packet shaper, Checkpoint -R77, IPV4, IPV6, VSS, VPC, VRF, VDC, SNMP, SIP, Trunking, Trapeze-MX 2800, IOS-XR, FCOE, 802.1X, OSPF, RIP, EIGRP.

TCS, India Apr 11 – Dec 12

Network Engineer

Responsibilities:

Actively participated and completed many projects based on MPLS VPN, Internet Solutions for corporate customers Backbone. Actively participated Implementation and customization of customer network.

Hands on experience working on Cisco 7600, 12K, ASR routers & Juniper MX series and Juniper BRAS. Currently working on wireless upgrade project for Allegheny Health network and their EPIC roll out. Designing, Provisioning and Installation of the Customer Sites in Oracle IPSA for MPLS Backbone.

Verifying IPv4/IPv6 Addressing Architecture. Verifying Dynamic Host Configuration Protocol for IPv6 (DHCPv6) and DNSv6 options. Performed wireless network design, site surveys, as well as Troubleshooting and repairing any issues that occurred on site.

Managing proxy server for branches and head office for internet access through Bluecoat Proxy SG600 for URL Filtering, traffic acceleration and visibility reporting with Bluecoat reporter. Configuration and troubleshooting of many link types i.e. SONET Controllers for sub E1/T1, E3/T3 and POS controllers for STM1 links.

Provided tier 3 support for Checkpoint Firewall-1 software to support customers. Work on Checkpoint Platform including Provider Smart Domain Manager. Worked on configuring, managing and supporting Checkpoint Gateways.

DNS Zone administration for 13 countries across EU for COLT customers. Implementation and testing of ISDN BRI/PRI circuits. Migrated Vlan’s from ASA (perimeter firewalls) to FWSM’s for better security management

Responsible to troubleshoot the connectivity between CPE router and the COLT's edge router (SAR). Worked closely with RIR (Regional Internet Registry) to procure PI (Provider Independent) and PA. Responsible for troubleshooting complex networking issues in service provider MPLS & internet.

Aggregately) IP addresses and AS numbers for COLT and customers. Set up DNS Reverse Delegation according to RIPE rules in RIPE Database.

Environment: IPV4, IPV6, DHCPv6, DNS, SONET, E1/T1, E3/T3, MPLS, VPN, Checkpoint, Smart Domain Manager, ISDN, FWSM, URL filtering.

Birla Soft, India Aug 09 – Mar 11

Network Engineer

Responsibilities:

Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route. Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications.

Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access.

Configured the Cisco router as IP Firewall and for NATing. Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.

Installing new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations. Installing and maintaining local as well as network printers. Validating existing infrastructure and suggesting new network designs.

Working on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path, and Community, MED.

Providing technical support to LAN & WAN systems. Configuring all the required devices and equipment for remote vendors at various sites and plants. Installation and maintenance of new network connections for the customers.

Installing and maintaining Windows NT Workstations and Windows NT Server. Monitor performance of network and servers to identify potential problems and bottleneck.

Real time monitoring and network management using Cisco Works LMS. Monitoring Memory/CPU on various low-end routers in a network. Configuring routers and send it to Technical Consultants for new site activations and gives online support at the time of activation.

Provided technical support on hardware and software related issues to remote production sites.

Performed administrative support for RIP, OSPF routing protocol. Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.

Environment: OSPF, RIPv2, BGP, IGRP, LAN, WAN, RADIUS, TACACS, VLAN, Cisco Works, HSRP, CISCO 2600, 2800, 3600, NAT, Static route, Switching.



Contact this candidate