Post Job Free

Resume

Sign in

Engineer Security

Location:
Bellevue, WA, 98005
Posted:
October 18, 2017

Contact this candidate

Resume:

Sai Sumanth

Sr. Firewall Engineer

Ph No: 908-***-****

Email id: ac2tr7@r.postjobfree.com

Professional Summary:

Around 8 years of Experience with in designing, deploying and troubleshooting Network & Security infrastructure on Routers, Switches, Firewalls of various vendor equipment.

Extensive work experience on Load Balancers and Firewalls.

Worked on F5 BIG-IP LTM 8900, Citrix NetScaler configured profiles, provided and ensured high availability.

Worked on Load Balancer F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.

Experience working on Palo Alto Firewalls.

Responsible for Check Point and Cisco ASA &Palo Alto Firewalls environment.

Experienced with Juniper: EX-2200, EX-4200, EX-4500, MX-480, and M Series, SRX210, SRX240.

Strong hands on experience on PIX Firewalls, ASA (5540/5550) Firewalls.

Implemented Security Policies using ACL, IPSEC, SSL, VPN, IPS/IDS.

Configured ASA 5520 Firewall to support Cisco VPN Client on Windows 7/XP/Vista.

Configured Client-to-Site VPN using SSL Client on Cisco ASA 5520 ver8.2

Experience in adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications.

Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, and MPLSQOS.

Configured Security policies including NAT, PAT, VPN's and Access Control Lists. Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology (LACP, PAGP) etc. Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments

Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus 7K, 5K, 2K series Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches

Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and policy routing over Cisco routers.

Experience with designing, deploying and troubleshooting LAN, WAN, Frame-Relay, Ether-channel, IP Routing Protocols - (RIPV2, OSPF, EIGRP & BGP), ACL's, NAT, VLAN, STP, VTP

Excellent technical and project management skills combined with strong communication skills.

Technical skills:

Cisco Platforms

Nexus 7K, 5K, 2K & 1K

Juniper Platforms

SRX, MX, EX Series Routers and Switches

Networking Concepts

Access-lists, Routing, Switching, Subnetting, Designing, IPsec, VLAN, VPN, WEP, WAP, MPLS.

Firewall

PIX Firewall (506/515/525/535), ASA Firewall (5505/5510), Palo Alto (PA-2k, 3k, 5k), Checkpoint R75/77, Juniper SRX.

Network Tools

Solar Winds, SNMP, Cisco Works, Wire shark

WAN technologies

Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, T1 /T3 & SONET

LAN technologies

Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Security Protocols

IKE, IPSEC, SSL-VPN

Router

Cisco 7600, 7606, 7609, 7613, 7200, 4400, 3900, 3800, 2900, 1900, ASR-901, ASR-903, ASR 5500, ASR-9010, 7206 VX, MWR 2941, Alcatel 7705 SAR, Juniper ACX, E, M, MX960 and SRX 240 series

Networking Protocols

RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA

Software’s

VMware ESX 5.x, VMware Workstation, vCenter Server, System Center 2012 R2, MS SharePoint, C &C++.

Operating System

Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux

Professional Experience:

Client: EXPEDIA INC, Bellevue, WA Feb 17 - Present

Firewall Security Analyst / Firewall Engineer

Responsibilities:

Use Firewall Analysis Tool (Tufin) to find and document vulnerabilities in infrastructure. Combine data from other analysts and format to present to team leader.

Submit tickets to Security and Network teams for remediation through ServiceNow. Search for hit counts for the rule using Splunk with source, destination and Rule UID’s. Firewalls include Palo Alto, Checkpoint, ASA and Juniper.

Policy Reviewing, Audit and cleanup of the un-used rule on the Firewall using Tufin and Splunk. Rule and URL filtering remediation for Palo Alto devices. Maintain and manage Splunk related issues.

Incident logging, change and problem management using Service Now tool. Experienced with Splunk Monitoring and Reporting.

Conduct regularly scheduled reviews of the organizations firewalls (rule sets, VPN). Using Splunk to extract useful data from syslog events and using this to formulate permit rules.

Advanced knowledge of Checkpoint, Juniper, Cisco, Unix, and Linux platforms. Day to day activity includes Change Implementation on firewalls, log analysis and troubleshooting of network access issues.

Extensive experience with the Palo Alto Panorama management console. Packet analysis with Wireshark. Configuration of Palo Alto firewalls, access policies, Application & URL filtering, Security Profiles, Global Protect VPN, Data filtering and file blocking.

Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall. Executed changes on various Firewalls proxies and scripts over entire network infrastructure using Service Now ticketing tool.

Troubleshooting the VPN tunnels by analyzing the debug logs and packet captures. Advanced knowledge in Design, Installation & configuration of Palo Alto and Checkpoint Provide Environment.

Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls and Checkpoint. Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewalls. Integrated Panaroma with Palo Alto firewalls, for managing multiple Palo Alto firewalls with single tool.

Configured SNMP on Palo Alto firewalls 3060, 5060, 7050 for receiving incident alerts and notification and wrote SSL decryption policies for decryption of traffic to provide Anti-virus, Malware protection.

Configuration of policies, objects and applying NAT & Web Filtering on firewalls like Checkpoint, Palo Alto. Troubleshooting of protocol based policies on Palo Alto firewalls and changing the policies as per the requirement and as per traffic flow.

Active/Standby and Active/Active HA configuration on Cisco ASA Firewalls. Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 5000 and 2000.

Extensive Knowledge in configuring and troubleshooting as well as creating Virtual Servers, Nodes, Pools and iRules on BIG-IP F5 load balancer LTM for load balancing and traffic management in DC environment. Tests security measures to reduce and mitigate risk. Actively probes the network for new threats and risks.

Configuring failover for redundancy purposes for the security devices. Implemented the stateful & serial failover for PIX/ASA firewalls, Clustering and load balancing features. Using Smart Update, User Management and Authentication in Checkpoint Firewall.

Environment: Palo alto (2k,5k series), Checkpoint, ASA, Tufin, Splunk, F5 LTM, GTM, ServiceNow, Panorama, SNMP, SSL, Wireshark, VPN, URL filtering, Log monitoring, Splunk hit count, NAT, Data filtering, Juniper, IPSEC.

Client: St. Joseph Health System, Anaheim, CA Sep’16 – Feb 17

Senior Firewall Engineer

Responsibilities:

Firewall technologies including general configuration, optimization, security policy, rules creation and modification of Palo Alto. Experience with working on Palo Alto centralized management GUI PANORAMA.

Experience with working on Palo Alto Next-Generation firewalls security profiles and Cisco ASA VPN. Exposure to wild fire advance malware detection using IPS feature of Palo Alto.

Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments. Palo Alto design and installation, which includes Application and URL filtering Threat Prevention and Data Filtering.

Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (40+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series, PA5000. Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs. Installing and Configuring Palo Alto Pa-500 series firewalls using Panorama.

Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments. Hands On experience in push Policy from Panorama to Firewall in Palo Alto.

Worked with Palo Alto Firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the Firewall.

Integrating Panorama with Palo Alto Firewalls, managing multiple Palo Alto Firewall using Panorama. Provides updates and upgrades to the Palo Alto Firewall and Panorama devices. Involved in upgrade of Panorama to version 7.1.5.

Configuring, administering and troubleshooting the Check Point, Palo Alto and ASA Firewall. Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.

Implemented zone based firewalling and security rules on the Palo Alto Firewall. Experience with convert Palo Alto VPN rules over to the Cisco ASA solution. Migration with both Palo Alto and Cisco ASA VPN experience.

Successfully installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls. Reviewing & creating the FW rules and monitoring the logs as per the security standards in Palo Alto Firewalls.

Monitoring Traffic and Connections in Palo Alto and ASA Firewall. Backup and restore of Palo Alto and Cisco ASA Firewall policies. Installed, configured and set security policies on cisco and Palo Alto firewalls, VPN.

Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as Firewalls and URL and application inspection. Knowledge of Firewall (Cisco ASA), for multiple contexts, failover with redundancy.

Experience with working on Palo Alto Next-Generation firewalls security profiles and Cisco ASA VPN. Configuration and troubleshooting of Site to Site as well as Remote Access VPN on Cisco ASA and Check Point firewalls. Managing of CISCO ASA 5550 Firewall in Active/stand-by mode.

Convert Checkpoint VPN rules over to the Cisco ASA solution, Migration with both Checkpoint and Cisco ASA VPN.

Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500. Implemented and troubleshooting the Virtual firewalls solutions in ASA.

Troubleshoot and hands on experience on security related issues on Cisco ASA, Checkpoint, IDS/IPS, Palo Alto firewalls. Experience in installing, configuring and troubleshooting of Palo Alto, Checkpoint & Cisco ASA/Pix firewall.

Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience. Drafted, installed, and provisioned ASA and Checkpoint firewall rules and policies. Implemented Site to Site connections for third party connectivity using Cisco ASA firewalls.

IPSEC VPN design connection and protocols, IPSEC tunnel configuration, encryption and integrity protocols. Intrusion Detection, DMZ, encryption, IPsec, proxy services, Site to Site VPN tunnels, MPLS/VPN, SSL/VPN.

Deploying site to site IPsec VPN, managing Certificate Authority server for PKI based authentications, Configuring Remote Access IPSEC VPN using cisco VPN client.

Configuring IPSEC VPN (Site-Site to Remote Access), Negotiated VPN tunnels using IPSEC encryption standards and also configured and implemented site-to-site VPN, Remote VPN.

Set up networks at remote sales locations and conferences/meetings using Cisco VPN to connect to our secure office network. Management of each firewall is done remotely and onsite at client sites.

Working experience with Load Balancers F5 LTM like 3900, 6900, 4200V over various environments. Worked on F5 GTM, configuring Wide IPs and pools to load balance the client traffic between the two datacenters.

Environment: Cisco ASA 500, Checkpoint, F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, Palo alto (3k,5k,7k series), ASA, Panorama, VPN, URL filtering, Sonic Wall Firewall, Wild fire Blocking,

Client: Avaya, Thornton CO Jul’15 – Aug’16

Sr. Firewall Engineer

Responsibilities:

Installation, advanced configuration and troubleshooting of Cisco and F5's load balancing devices. Worked on F5 BIG-IP LTM 8900, Citrix NetScaler configured profiles, provided and ensured high availability.

Configuration of Virtual Servers, Nodes, and load balancing Pools. Provided F5 LTM/GTM Tier three support for new innovations, project designs and standards development.

Responsible for supporting the Citrix NetScaler F5 platform, configuring, implementing and troubleshooting Citrix NetScaler VIP configuration with health check, policy configurations Access Gateway, and content switching configuration solutions.

Implemented ADC on F5 LTM and GTM hardware platforms design and deployment implementation guidelines, DMZ Network infrastructure policies, LTM Inbound SNAT configurations and outbound NAT server to IP mapping processes.

Hands on Experience configuring and testing F5 iRules using Browser(IE), HTTP watch. Experience in configuring and troubleshooting BIG-IP F5 load balancer LTM creating virtual servers, nodes, pools and iRules on BIG-IP F5in LTM module.

Have expertise level of knowledge on using ATM tool lookup for checking and quick config review of F5 LTM devices. Worked on F5 Local Traffic managers (LTM), Global traffic manager (GTM) of series 8900, 6400, 6800, 3400, 5100, 3600 and 3DNS migration to GTM

Configuring F5 LTM VIPs, pools, monitors and assign the SSL cert using Venafi certification application. Configure and Manage site-to-site IPSEC VPN with different partners. Configured IPsec tunnels with Palo Alto to enable secure transport and cloud based/site-site VPN to AWS.

Troubleshoot remote access services like Citrix NetScaler, Cisco VPN clients and for the users to access their enterprise network. Monitoring and analyzing traffic on Check-Point and Fortigate Firewall.

Experience in installation and troubleshooting Fortinet Firewall. Worked extensively on Palo Alto, Juniper Net screen, Fortinet. Responsible for planning, documenting and implementation of complex Firewall and VPN solutions, VMware, Fortinet

Hands on Experience with blocking of IP's on Checkpoint that are suspicious. Responsible for Checkpoint firewall management and operations across our global networks. Implementing security Solutions using Palo Alto PA-5000 and Checkpoint Firewalls R75, R77.

Implemented Positive Enforcement Model with the help of Palo Alto Networks. Configured ASA 5520 Firewall to support Cisco VPN Client on Windows 7/XP/Vista. Configured Client-to-Site VPN using SSL Client on Cisco ASA 5520 ver8.2

Expertise in installing, configuring and troubleshooting Juniper EX switches (EX2200, EX2500, EX 3200, EX 4200, EX 4500 series). Configuring IPSEC VPN on SRX series firewalls

Deployed Palo Alto Networks PAN-5050 designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K. Experience working with Nexus 7018/7010, 5020, 5548, 2148, 2248 devices.

Implementation of Data center migration from 6500 based data centers to Nexus based data center with 9k-7k- 5k dual home design with multiple VDC's, VPC, OTV and FEX. Configured VPC, VDC and ISSU Software upgrades on Cisco Nexus 7010.

Planning, Designing, Installing, Configuring of Cisco 6500, 4500, 2900, 3500, 3750 XL series and Arista switches, Cisco CRS, ASR 9K, GSR12K, 1800, 2500, 2600, 2800, 3600, 3800, 7200 series, Juniper MX, J, T Series and Brocade Virtual Routers.

Configuring and troubleshooting Layer 2 Ethernet switch and router interfaces for Arista, Cisco, and Juniper. Handled tickets within BMC Remedy and the ITIL environment

Worked extensively with multiple wireless hardware vendors including Cisco, Cisco Meraki. Worked on multiple projects related to Branch networks, Campus networks, extranet clients and Data Center Environments involving in data center migrations from one data center to another.

Involved in migration from Site-to-sire GRE tunnels network to MPLS-based VPN for customer’s WAN infrastructure. Configuring and troubleshooting Layer 4 VPN on Cisco, Juniper, and Arista. Implementation of BGP to optimize WAN routing on the core and edge routers.

Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems. Mutual redistribution of OSPF and BGP routes using route maps. Troubleshoot connectivity issues involving VLAN's, OSPF, QoS etc.

Implemented various OSPF scenarios on networks consisting of 7600 routers. Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.

Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs. Cisco CLI, Cisco works, Network Security, Network Analysis Tools.

Involved in upgrades to the WAN network from existing 7200vxr with ASR1004, ASR9000 and 3845/3945 routers. Upgrading branch network connectivity with total refresh of the network infrastructure with new 3845 routers and 2960 switches.

Configuration and troubleshooting on HSRP, VRRP, GLBP, RSTP, MST related issues coming in network environment. Configuration of OSPF, BGP on Juniper Routers and SRX Firewalls.

Continually upgraded Meraki security devices as all store locations and kept current firmware, verified Meraki was upgraded, both circuits were functioning through the Meraki and wireless clients were using the Meraki appliances.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960 6500 switches and Cisco 3640/12000/7200/ 3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Checkpoint, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

Client: Johnson Controls, Milwaukee, WI Oct’13-Jun’15

Sr. Network Engineer

Responsibilities:

Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network. Worked on configuration of BIG IP (F5) Load balancers, also monitored the Packet Flow in the load balancers

Handled Citrix NetScaler Load Balancing using F5 Networks. Configure and Manage site-to-site IPSEC VPN with different partners. Troubleshoot remote access services like Citrix NetScaler, Cisco VPN clients and for the users to access their enterprise network

Upgraded load balancers from Redware to F5 BigIP that improved functionality and scalability in the enterprise. Managed the F5 Big IP LTM, GTM appliances to include writing I Rules, SSL offload and everyday task of creating WIP and VIPs.

Creating Virtual IP address, Pools and Persistence profiles on F5 LTMs. Configured F5 GTM solutions, which includes WideIP’s, Pool Load Balancing Methods, probers and monitors recreating Http and https redirect VIP's to provide secure resources to client from data servers.

Working with Checkpoint Support for resolving escalated issues. Involved in configuring Juniper SSG-140 and Check point firewalls Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliances.

Administration of ASA firewalls in the DMZ and FWSM in the Server Farm to provide security and controlled/restricted access. Involved in the redistribution into OSPF on the core ASA firewall.

Configuring rules and Maintaining Palo Alto Firewalls & analysis of firewall logs using various tools. Experience in installing and configuring DNS, DHCP servers

Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches.

Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair. Configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)

Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems. Configured networks using routing protocols such as RIP, OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure.

Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices. Experience with moving data center from one location to another location. Optimizing and monitoring the performance of a WLAN, LAN, WAN and user's segments

Experience with setting up MPLS Layer 3 VPN cloud in data centers, also working with BGP WAN towards customer. Commissioning and Decommissioning of the MPLS circuits for various field offices.

Configure and troubleshoot Juniper EX series switches and routers. Migrated Juniper EX series switches to Cisco 3500 series and 6500 series switches. Maintenance and configuration of Cisco ASR series routers at data center and deployment of 3900, 3800, 2951 and 2821 for branch connectivity.

Configured, deployed and managed network storage appliances for multiple client sites. Monitored and maintained local and cloud client backups both disk to tape, disk to disk. Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices. Diagnose MPLS protocol problems including VRF and COS issues to full resolution.

Responsible to build configurations for various connectivity types, which involves port configuration on Cisco ASR for MPLS circuit termination. Good knowledge with the technologies VPN, WLAN and Multicast. Configure and Support Hub and Spoke Cisco routers within DMVPN IWAN solutions.

Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP. Worked on Customer applications like IWAN (Intelligent WAN), PnP (Plug and Play). create the BoM for Hubs&Branches and provide lead time, considering the future move to IWAN solution.

Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP. Convert Branch WAN links from TDM circuits to MPLS and convert encryption from IPsec/GRE to Get VPN.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960/6500 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco Nexus 7K/5K/2K, Cisco ASA5510, Checkpoint, windows server 2003/2008: F5 BIGIP, LTM, OSPF, EIGRP, RIP, BGP, VLAN, VPN, Checkpoint, Juniper SRX

Client: Wolters Kluwer, Tampa FL Mar’11 – Oct’13

Network Engineer

Responsibilities:

Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-6400 load balancer. Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.

Managed F5 BigIP LTM appliances to load balance server traffic in critical serval access silos. Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Netscreen devices for easier management and common configurations.

Involved in conversion of PIX firewall to ASA firewall. Implemented load balancing in various environments using NetScaler also used NIC bonding.

Experience in adding firewall rules, Network address Translation and in creating multiple security contexts (virtual firewalls). Worked with F5 Balancers and their Implementation in various Networks

Involved in setting up IP sec VPN between ASA firewalls. Experience with implementing Cisco 6500 VSS on the User distribution switches. Upgraded IOS on the ASA 555*-****-**** firewalls

Performed basic security audit of perimeter routers, identifying missing ACL’s, writing and applying ACL’s. Network security including NAT/PAT, ACL, and ASA Firewalls.

Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection. Experience configuring VPC, VDC and ISSU software upgrade in Nexus 701.

Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256. Working with MPLS Designs from the PE to CE and also configuring VRF on PE routers. Experience with designing and deployment of MPLS Traffic Engineering. Configuring RIP, OSPF, EIGRP BGP, MPLS, QOS, ATM and Frame Relay

Design and deployment of MPLS QOS, MPLS Multicasting per company standards. Implemented site to site VPN in Juniper SRX as per customer. Installed controller and access point coordination with JTAC.

Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multilayer Switching. Configured iWAN utilizing PFR (Performance Routing).

WAN Pilot project to convert branch from dual T1 circuits to iWAN only broadband circuit. To Enable Internet WAN connectivity for the Lab in Hauppauge. Test and turn-up IWAN link and disable the 2 existing T1 circuits, running branch on IWAN only.

After testing was completed site will be placed back on either dual TDM circuits or TDM with IWAN backup circuit.

Worked on different phases of testing such as Sanity Testing, Functionality Testing, Smoke Testing, System Testing, Installation Testing, Compatibility Testing, Regression Testing, Stress Testing and UAT Testing.

Testing routers and modems, troubleshot issues related to broadband technologies for Residential and Business Customers. Deployment and maintenance of Arista Networks using 7100 and 7150 switches

Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers. Configuring VLAN, spanning tree, VSTP, SNMP on EX series switches. Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wire shark

Configured Client VPN Technologies such as Cisco’s VPN Client via IPSEC. Configured Cisco ASR, ISR 2800 & 3800 series routers with OSPF as an enterprise.

Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed

Maintained a Network with more than 600 Network devices, some 25,000 end hosts, and the other Network devices like DHCP, DNS servers, Firewall servers.

Co-ordination with Hardware vendors, software vendors and service Providers. Upgraded, installed and supported Cisco Wireless controllers (Cisco 7500, 8500). Maintaining the health of 250+ wireless Access points in two locations.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K, Checkpoint, Cisco ASA

Client: Hexaware Technologies, India Jul’09 – Feb’11

Network Engineer

Responsibilities:

Used TFTP server to backup Cisco configuration files. Provided technical support for expansion of the existing network architecture to incorporate new users.

Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company.

Configured STP for loop prevention on Cisco Catalyst Switches. Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.

Worked in setting up inter-vlan routing, redistribution, access-lists and dynamic routing. Involved in configuring and implementing of Composite Network models consists of Cisco 3750, 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.

Implemented various Switch Port Security features as per the company’s policy. Configured OSPF, and EIGRP on 2901 and 3925 Cisco routers.

Configured VLANS to isolate different departments, troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.

Configured IPSEC VPN on SRX series firewalls, Design, installation and troubleshooting networks with hand-on experience with OSPF, BGP, VPLS, Multicast, VPN, MPLS, & Traffic engineering.

Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches. Worked with snipping tools like Ethereal (Wireshark) to analyze the network problems.

Maintenance and troubleshooting of network connectivity problems using PING, Trace Route. Performed replacements of failed hardware and upgraded software. Performed scheduled Virus Checks & Updates on all Servers & Desktops.

Implementing Routing and Switching using the following protocols; OSPF, BGP on Juniper M series routers.

Involved in Local Area Network (LAN) implementation, troubleshooting, and maintenance as per company’s requirements.

Environment: Cisco 3750/2620/1900 routers, Cisco 2950/3500, VLAN, HSRP, SRX, OSPF, BGP.



Contact this candidate