Post Job Free

Resume

Sign in

Engineer Network

Location:
Bolingbrook, IL, 60440
Salary:
$60
Posted:
January 17, 2018

Contact this candidate

Resume:

Arun kumar

609-***-****

ac32nu@r.postjobfree.com

Sr. Network Engineer

CCNA CCNP CERTIFIED professional with over 8+ years of experience in routing, switching, firewall technologies, systems design, administration and troubleshooting.

In-depth knowledge of deploying and troubleshooting LAN, WAN, Ether-channel, IP Routing Protocols - (OSPF, EIGRP & BGP), Switching - VLAN, STP, VTP, HSRP & GLBP.

Strong hands on experience of Routing and Switching-Cisco router (series 7300, 3800, 3600, 2800, 2600, 2500, 1800), Cisco catalyst 6500, 4500, 3850 series switches, Juniper routers, M & MX-Series and Juniper EX switches (series EX8200, EX4500, EX4200, EX3200, EX2500, EX2200).

Experience in setting up and maintaining perimeter security by using Cisco ASA/PIX, Fortinet 3340.

Experience Configuring OSPF, EIGRP, BGP, MPLS, QOS on Multivendor Platform.

F5 Load Balancer LTM & GTM.

Proficient in configuration & troubleshooting of routing protocols: MP-BGP, OSPF, EIGRP, OSPF, BGP and MPLS.

Involved in configuration setup and troubleshooting of Cisco IOS, IOS-XE and juniper devices to perform functions at the Access, Distribution, and Core layers.

Experienced working with Nexus 7010, 5548, 2248 devices.

Worked on Arista Switch and EOS Cloud Version.

Experienced working with Cisco Nexus 2248 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture.

Experience configuring VPC, VDC and ISSU Software upgrades on Cisco Nexus 7010.

Experienced in configuring, implementing and troubleshooting F5 BIG-IP LTM ADC and Cisco ACE in contract enterprise networks.

Deployed F5 Enterprise manager of 4000 series for the all cluster devices over the network for easier management of configurations like SSL certificates, disable and enable of nodes states.

Experienced on Check Point Firewalls NG, NGX, NG R55, NGX 60, NGX R65, R70, R75, UTM.

Migration with both Juniper SRX and Cisco ASA VPN experience.

Capable of planning and implementing WAN technologies including E3, E1, T1, T3, ISDN, HDLC, PPP, Frame Relay, ATM and MPLS VPN.

Experienced in working on Palo Alto Firewalls.

Responsible for Check Point and Cisco ASA &Palo Alto Firewalls environment.

Configured Client-to-Site VPN using SSL Client on Cisco ASA 5520 ver9.1

Implemented RADIUS/TACACS+ servers to administer user accounts.

Worked on Juniper SRX Firewalls like SRX 110, SRX210, SRX240, SRX 550 etc.

Involved in troubleshooting network traffic and its diagnosis using tools like ping, trace route, Wireshark, TCP dump and Linux operating system servers.

Worked on PBX in creating the conferences, XML-RPC, PSTN, VOIP.

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA and Juniper SRX devices.

Experienced on CUCM (environment), Unity connection and SIP gateways.

Worked on RSA authentication- RSA Secure ID environment.

Provided routing and switching troubleshooting and support – Tier II / III support role.

Ability to manage all phases of network installation and administration.

Excellent customer management/resolution, problem solving and debugging skills with good verbal/written communications and presentation skills.

Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark, Netflow/Jflow and Cisco works to support troubleshooting issues.

Adept in preparing Technical Documentation, MOPS and presentations using Microsoft VISIO/Office.

Additional Information

Network Protocols

VRF, Policy Based Routing, Route Redistribution,

Static Routing, WCCP, VDC, MPLS, LDP, ISDN, PPP, VoIP, SIP, VTP, STP, RSTP, VLANs, 802.1q/ISL, CDP, LACP, OSPF, BGPv4, EIGRP, HSRP, VRRP, RIPv2, VPC, VDC.

Cisco Router platforms

2621, 2800, 3600, 3845, 3900, 7206VXR, ISR 4k & 3k, ASR 9k

Cisco Switch Platforms

Catalyst 6500, 4500, 3850, 3650, 2900

Nexus 9k 7k, 5k & 2k.

Firewalls

Juniper (Net screen 5200,5400) & SRX, Cisco ASA (5510,5520,5540,5550,5580), Fortinet (3040B, 900D)

FWSM, Checkpoint NGX R-55, R-60, R-65, Palo alto- 3020, 30507500, 7050

LAN Technologies

Ethernet, Fast Ethernet, Gigabit Ethernet, Port Channel, TCP/IP, Ether channel, VLSM, Cisco/Catalyst L2/L3 Switches, Wireless (802.11 a/b/g/n), Checkpoint, Juniper/Net screen/Cisco Firewalls, Token Rings

WAN Equipment

Cisco/Juniper Routers, Silver Peak NX-7xxx WAN Accelerators,

OC-48, FRAME RELAY, PPP, T1/E1, HDLC, MPLS, DS3, Leased Lines, DSL Modems, ISDN(PRI/BRI)

Network Management & Tools

Cisco Works, Silver peak GMS, RSA Security and operations

Console, VMware vSphere, ESXi Client, TFTP, FTP, SSH. SNMP, Solar winds, CA spectrum, Ethereal, Cisco works, Whatsup Gold.

Security Access Control/Policy

Cisco Secure ACS for Windows, RSA, AAA, TACACS+, Radius, MD5, IPsec, GRE, NAT/PAT, ACLs, Juniper SA SSLVPN w/DUO, SSLVPN

Operating Systems

Windows 2003, 2008 & 2010, Linux, Unix, Windows server 2012

Network Operating Systems

Cisco IOS and IOS-XE, NX-OS, CATOS, Aruba, JUNOS.

Documentation Tools

Microsoft Office, Visio, Project, SharePoint.

Load Balancing

F5 LTM & GTM, Citrix, Cisco ACE 4700 Series

IP Telephony

H.323, MGCP, SCC, Cisco SRST

VoIP Devices

Cisco IP phones, Avaya

Ticketing tools

JIRA, CA Service Desk

Carrier Tech:

MPLS, MPLS-VPN

Skills

BGP (3 years), catalyst (8 years), Cisco (8 years), firewalls. (6 years), LAN (7 years)

Certifications:

Cisco Certified Network Associate CCNA

Cisco Certified Network Professional CCNP

Palo Alto Firewall Accredited Configuration Engineer (ACE)

Education: Bachelor of Technology in Electronics and Communication Engineering.

Professional Experience

Client: Wi-Tronix, Bolingbrook, IL Oct 2017- Present

Role: Firewall Security Analyst / Firewall Engineer

Responsibilities:

Working with Network Design and implementation teams on various projects for Comcast, Amtrak and various corporations.

Experienced in maintaining of network devices such as (ISR 2900, 2800, 4400, Nexus 6001, Netgear switches 5300 & 4100, FEX) and Firewall.

Troubleshooted the complex situations in the Network environment.

Troubleshooting routing protocols as OSPF, BGP, Port-channel, IPSEC VPN switching (VLAN, trunk, LAG), Cisco ASA firewall 5505, 5506, 5512 and 5516.

Key contributions include troubleshooting of complex LAN /WAN infrastructure that includes routing protocols EIGRP, OSPF & BGP.

Responsibilities included installation, configuration, maintenance and troubleshooting of the corporate network, monitoring network performance using various network tools to ensure the availability, integrity and confidentiality of application and equipment and to provide support for Cisco network.

Created documents for various platforms including Nexus 6k, ASR1k enabling successful deployment of new devices on the network.

Maintained and managed the Network Hardware as Cisco Routers, switches, Nexus and ASA Firewalls, Sophos UTM, Netgear Switches and Aruba access points and controllers.

Involved in providing the on-call support for 24 hours on operations of Wi-Tronix.

Maintained and Monitored the Whole Network using Whatsup Gold monitoring software.

Configuration and troubleshooting link state protocols like OSPF in single area and multiple areas.

Redesign of Internet connectivity infrastructure for meeting bandwidth requirements.

Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.

Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.

Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.

Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.

Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.

Providing Technical Support and solutions for Network Problems.

Implementing NAT solutions on wan applications.

Expertise in handling Cisco ASA firewall management using ASDM.

Configuring and maintaining Site-to-Site VPN's, DMZ's, Remote access VPN's (SSL), ACL's, Security Zones and SSL Certificates.

Worked on configuring and troubleshooting Nodes, Pools, Profiles, Virtual Servers, SSL Certificates, and SNATs on the F5 Big IP using the Web GUI and CLI.

Installed high availability Big-IP F5 on LTM and GTM load balancers to provide uninterrupted service to customers.

Experienced in Automating core network actions across data centers, virtualized environments, and the cloud with Infoblox DNS, DHCP, and IPAM (DDI).

Planned, tested and evaluated various equipment's, systems, IOSs and procedures for use within the Network / security infrastructure.

Upgrading IOS, troubleshooting network outages.

Continually monitor, assess and improve network security, test and implement new security technologies.

Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long-term planning, implementation, project management and operations support as required.

Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, Cisco ASA, Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall.

Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network infrastructure and configured the entire network Infrastructure devices including Network Printers and Register.

Maintained TACACS+/RADIUS Servers for AAA authentication and User authentication.

Provided VPN services to site-to-site and, Remote access VPNs using IPSec tunneling.

Documented migration of data center from Netgear switches to Cisco switches.

Provided hands-on support for environment including on-call support for switches, routers and servers. Used Solar winds & Silver Peak, DHCP, DNS to troubleshoot issues.

To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting Cisco ASA firewalls, and related network security measures.

Provided proactive threat defense with ASA that stops attacks before they spread through the network.

Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.

Client: United Airlines Chicago, IL Apr 2016 – Sept 2017

Role: Network Engineer/Firewall Engineer

Responsibilities:

Responsible for the implementation and level 2/3 support of existing network technologies services and the integration of new network technologies / services.

Designed and implemented F5 ASM layer 7 web application firewalls for DMZ network.

Implemented and configured F5 Big-IP LTM-6400 load balancers.

Worked on F5 BIG-IP LTM 6400 configured profiles, provided and ensured high availability.

Implemented ADC on F5 LTM hardware platform design and deployment implementation guidelines, DMZ Network infrastructure policies, LTM Inbound SNAT configurations and outbound NAT server to IP mapping processes.

Hands on Experience configuring and testing F5 iRules written using TCL.

Have expertise level of knowledge on using ATM tool lookup for checking and quick config review of F5 LTM devices.

Created documents for various platforms including Nexus 7K, ASR1k enabling successful deployment of new devices on the network.

Experience configuring Virtual Device Context in Nexus 7k series switch.

Experience with configuring Nexus 5548 with nexus 2248 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7010.

Configured Nexus 7010 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links.

Designed 10 gigabit networks using Cisco Nexus 7000 series switches, and Cisco 3800 series routers.

Perform ISSU upgrades on nexus devices with nexus OS 6.2 on nexus 7010 devices with SUP2E line card.

Experienced in RSA secure ID environment including users, applications, authentication methods.

Worked on oversee RSA secure ID token inventory reviewing accurate data.

Experienced with working on Palo Alto centralized management GUI PANORAMA.

Configured all Palo Alto Networks Firewall models (PA-3060 & PA-5250) as well as a centralized management system (Panorama) to manage large scale firewall deployments, which includes Application and URL filtering Threat Prevention and Data Filtering.

Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.

Integrated Panorama with Palo Alto Firewalls along with managing multiple Palo Alto Firewall using Panorama.

Provided updates and upgrades to the Palo Alto Firewall and Panorama devices.

Expertise in installing, configuring and troubleshooting Juniper EX switches (EX2200, EX2500, EX 3200, EX 4200, EX 4500 series).

Experience in working with Network automation tools and testing for network change and configuration management.

Responsible for Assigning and Reclaiming IP address using tools like IPAM as per customer request in Infoblox Grid Manager.

Implemented various OSPF scenarios on networks consisting of MX Routers.

Configured policy based routing for BGP for complex network systems.

Worked with Nagios for monitoring of network services (SMTP, POP3, HTTP, NNTP, ICMP, SNMP, FTP, SSH)

Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LANs of network.

Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark tool.

Environment: Cisco ACE, Cisco Nexus, Cisco Switches, F5 Load-balancer, Cisco Sourcefire, Juniper Switches, Palo Alto Firewalls, Checkpoint Firewall, Wireshark

Client: Security Benefit Group, Topeka, KS Jul 2015 – Mar 2016

Role: Network Engineer

Responsibilities:

Hands on experience with Catalyst L3 switches and Cisco Nexus switches: 2232, 2248, 5548, 6001 and 7018(Sup 2E).

Hands on experience in the Arista Switches, firewall, LAN to Lan and SSL VPN and proxy servers.

Operated in Administration of L2 technologies like VLANs, VTP, Trunking, RPVST, Inter-VLAN routing, Ether channeling, and Switch Port Security on Access Layer switches.

In the process of Data center fabric migration from legacy Catalyst to Nexus switches, deployed, configured and maintained 5548, 7018 switches.

Installed Catalyst 6509E switches with 40GE and 10GE line cards containing MSFC and PFC cards and configured, maintained VSS on it.

Operated with Sup 2E for 7018 switches. And F cards for L2 switching and few M cards for L3 proxy routing purposes for F cards.

Functioned in upgrading system images on 5k and 7k Nexus switches using kick start and FTP server.

Performed Break Fix support through driving to different buildings, identifying the root cause of the hardware issues with switches, network devices.

Provided L2/L3 tech support for Enterprise voice technologies like CUCM (environment), UCCX, Unity connections.

Configured and maintained OSPF, EIGRP, and BGP on Cisco routers.

Creating BGP multi-homed network using BGP attributes like AS-PATH, MED and local-preference as per the environment.

Experience with Firewall Administration, Rule Analysis, Rule Modification.

Configured the policies, objects and applying NAT & Web filtering on Palo Alto and Checkpoint. Protocol based policies troubleshooting on Palo Alto and changing the policies according to the requirements and as per traffic flow.

IPSEC and SSN VPV’s configured and maintained on Palo Alto and Checkpoint Firewalls. Zone based Firewall and security Rules are implemented on Palo Alto Firewalls. Managed multiple Palo Alto Firewalls by integrating with Panorama.

Worked on, groups, and updating access-lists and responsible on Checkpoint Firewall, apply static, hide NAT using smart dashboard.

• Managing and administering Juniper SRX and Checkpoint Firewalls at various zones including DMZ, Extranet (Various Business Partners) and ASZ and internal.

Performed upgrades for all IP series firewalls from previous Checkpoint versions (R75.40, R75.40VS, R75.45, R75.46, R75.47, R76, R77) to R77.10

Troubleshoot and resolve firewall software and hardware issues including VPNs, connectivity issues, logging, cluster configurations, hardware installations.

Experience in converting Juniper VPN rules over to the Cisco ASA solution. Migration with both Check point and Cisco ASA VPN experience.

Setting up MPLS Layer 3 VPN cloud in data center.

Implemented all standard and non-standard ISDN and IP-VPN changes to company customer support connections.

Responsible for administrating coat and dealing with policies for user access like Blocking/Unblocking URL’s.

Exposed to Bluecoat Proxy devices located in various locations companywide, with problem tickets, requests and projects requesting proxy application troubleshooting with customers

Creating Virtual IP address, Pools and Persistence profiles on F5 LTMs.

Configuring policies on ASM using manual policy enforcement and auto policy enforcement with F5 ASM, LTM, APM.

Knowledge in implementing and configuring F5 Big-IP LTM load balancers.

Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.

Monitoring the entire network service management appliances using Infoblox Trinzic IPAM.

Defined IP conflicts and unauthorized devices with the IP use monitoring.

Tracking of changes in the configuration with Audit logs and provided ways in identifying the rollback.

Prepare test plans for checking the configuration on the CLI, and GUI. writing iRules, scripts

Determining the functionality with the DNS naming conventions and migrations from old load balancing environments to the F5 environment both 10.x and 11.x

Environment: Nexus devices, F5 Load balancer, Cisco devices (Router series 7300, 3800 & catalyst 6500, 4900), Checkpoint Firewall, QOS, IPSEC VPN, MPLS WAN, ASA, BGP, OSPF, VISIO

Client: Cablevision, Long Island, NY Nov 2013 – Jun 2015

Role: Network Engineer

Responsibilities:

Deployment of Palo Alto firewall into the network. Configured and wrote Access-list policies on protocol based services.

Troubleshooting of protocol based policies on Palo Alto firewalls and changing the policies as per the requirement and as per traffic flow.

Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.

Implemented Zone Based Firewall and Security Rules on the Palo Alto Firewall.

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.

Configured Multiprotocol Label Switching (MPLS) VPN with Routing Information Protocol (RIP) on the customer’s site.

Negotiate VPN tunnels using IPsec encryption standards and configured and implemented site-to-site VPN, Remote VPN.

Plan, design and test the application migration from F5 load balancer to new A10 load balancers.

Implemented iRules on LTMs for http traffic redirection on LTM device.

Configured pools, Snats, health monitors on LTM device.

Troubleshooting application connectivity issues on LTM level

Tuned BGP internal and external peers with manipulation of attributes such as metric, origin and local preference.

Experienced in VMware ESXi servers- installing, configuring and maintaining and administrating across the DC.

Hands on experience in configuring and managing Virtual Networks.

Deploy and support Checkpoint Provider 1.

Drafted and installed Checkpoint rules and policies.

Migrated Juniper EX series switches to Cisco 3500 series and 6500 series switches.

Strong hands on experience in installing, configuring, and maintaining Cisco Switches 2960, 3560X, 3750X, 4500-X, 4948, 4510, 6509, Nexus 2k, 5K and 7K.

Knowledge in Arista EOS, Cisco IOS and Nexus-OS.

Enabling the TCP, UDP, SMTP ports to allow the traffic between the servers.

Troubleshooting the issues by coordinating with Tier-2 deployment team and with customers.

Performing NAT for the traffic flows going from internal network to external network.

Working with IP address management tools to reserve and decommission IP’s.

Environment: Juniper EX switches, Cisco Switches, Checkpoint, NAT, Palo Alto firewalls, F5 & A10 Load balancer, NAT, Firewall IPS, Wireshark.

Client: Hospira, Lake Forest, IL Feb 2013 – Oct 2013

Role: Network Engineer

Responsibilities:

Handling network devices such as Switches (Cisco Catalyst 2900 and 3500 series), Routers (Cisco 2600, 2800 and 7300 series), Firewalls, Load balancers etc.

Experienced in configuring Virtual Device Context in Nexus 7010.

Experienced in Configuring, upgrading and verifying the NX-OS operation system.

Configuring IP, RIP, EIGRP, OSPF and BGP in routers.

Implemented Voice VLANS, UDP, SIP, and RTP and provide QOS by DSCP and IP Precedence

Used DHCP to automatically assign reusable IP addresses to DHCP clients.

Implementation and configuration of F5 Big-IP LTM-6400 load balancers.

Configuration and extension of VLAN from one network segment to other network segment between different vendor switches (Cisco, Juniper).

Experienced in working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a flexible Access Solution for datacenter access architecture.

Design and implement campus switch network with Cisco Layer 3 switches (3750, 4500, and 6500) in multi VLANs environment and inter-VLAN routing, HSRP, ISL trunk, ether channel.

Designed MPLS VPN and QoS for the architecture using Cisco multilayer switches.

Maintained Security policy by monitoring PIX firewalls (515 and 520).

Worked on Extensively on Palo Alto Firewalls, Cisco Firewalls, Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series.

Environment: Cisco Catalyst switches, Juniper switches, Cisco PIX, Routing Protocols

Client: NetSoft, Chennai, INDIA May 2010 – Dec 2012

Role: Network Operations Engineer

Responsibilities:

Troubleshot and monitored routing protocols such OSPF, EIGRP & BGP.

Responsible for troubleshooting guidelines for MPLS VPN and in customer escalations and troubleshooting issues related to connectivity, STP, VLAN, Trunking, VTP, Layer 2/3 switching, Ether channels, Inter-VLAN routing, log messages, high CPU utilization and parameters that can degrade performance of network.

Worked on VMware environment- installation, configuring and maintaining ESX server. And updated the ESX hosts using the VMware update manager.

Experienced on VMware clustering like HA and DRS clusters using vC server.

Worked in managing the VMware ESX hosts from vC server. And experienced in creating the virtual switch.

Administered networks and assisted in configuring ACL & NAT through CLI.

Technical support and problem solution for the LAN and its environment.

Experience with protocols such as IEEE 802.11 and VLAN, OSPF and BGP, DNS, DHCP, FTP, NTP, SNMP, SMTP and TELNET.

Installed configured (through CLI & SDM) and managed CISCO routers and Catalyst switches

Set up Internet, implementing Networking products like Servers, Proxy servers, Switches, Firewalls, Routers.

Ensure standard Router and Switch Configurations are maintained and Responsible for Capacity planning, Contingency planning & disaster recovery.

LAN Segments monitoring/Troubleshooting LAN related issues and periodic backup of Router/ Switch Configurations.

Monitoring the NMS system for different Network Alerts.

Performed switching technology administration including VLANs, inter-VLAN routing, Trunking, STP, RSTP, Port Aggregation & link negotiation.

Environment: VLAN, TRUNKING, VTP, STP, RSTP, TELNET, SIFY TAC, VMware ESX.



Contact this candidate