Post Job Free

Resume

Sign in

Engineer Cisco

Location:
Vijayawada, AP, India
Posted:
April 03, 2018

Contact this candidate

Resume:

Kalyan

732-***-****

OBJECTIVE:

Seeking a challenging position of network engineer which will give me an opportunity to prove potential in me and educate me more in the field of networking and to help reach the goal of the organization and its growth.

SUMMARY:

9 years of professional experience in Planning, Implementing, Configuring, Troubleshooting of networking system on Cisco, Palo Alto and Juniper devices.

Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing systems like remedy and Magic.

Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches. Advanced knowledge in design, installation and configuration of Juniper Net Screen Firewall, SSG series and NSM Administration

Strong knowledge of VMware vSphere administration within Cisco Unified Computing System environment.

Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.

Experience working on CISCO NEXUS data center infrastructure with 2000, 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2148, 2248).

Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.

Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.

Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.

Experience in Network Management Tools and sniffers like SNMP, Wireshark and Cisco works.

Hands-on experience using Cisco Virtual Switching System (VSS).

Configuring cisco switches with NX-OS and IOS-XE& implementing VLANs

Extensive hands-on experience with complex routed LAN and WAN networks, routers and switches.

Design, configure, troubleshoot and implement wireless and/or data networking(LAN/WAN) solutions for mid-sized to enterprise-level clients

Work as Layer 3 IP Network Engineer on ASR9k Edge router with IOS-XE Platform in a network lab environment.

Experience with DNS/DFS/DHCP/WINS Standardizations and Implementation

Experience in Network LAN/WAN deployment,

Responsible for the build out of Volo Data Center with emphasis on Fabric Path and OTV implementation

Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/ GRE to GetVPN

Good knowledge on VLAN Trunk Protocol (VTP).

Team member of Configuration of cisco 7206 routers with VPN and Configuration of Catalyst switches.

Cisco ASA series, Juniper SRX and SSG series, Check Point VSX series, Cisco PIX and Palo Alto Firewalls Administration

Create and test cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs

Worked extensively on Cisco ASA 5500 (5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution

Configuration of IPSEC, DMVPN and GRE tunneling technologies in cisco ASA’s

Implementation and administration of Juniper WX/WXC devices for WAN Traffic acceleration

Worked on MX-80, MX-480, SRX-100, SRX-110, SRX-550 and EX-4200 Juniper devices.

Installed and configured 8 Juniper MX 960 routers for WAN edge sites

Converted 5 Juniper SRX1400 to 5 Cisco ASA 5525 using converter tool (PX2SX) for 2 Sites

Palo Alto Firewall Management-Panorama

Palo Alto Firewall-ACE Certified

Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol based services

Troubleshooting of protocol based policies on Palo Alto Firewalls and changing the policies as per the requirement and as per traffic flow

Experience deploying BIG-IP F5 LTM, GTM Load Balancers for load balancing and traffic management of business application.

Good knowledge on Riverbed Virtual Services Platform (VSP) and Big-IP F5 Load balancers.

Profiled python code for optimization and memory management

Developed entire frontend and backend modules using python on Django Web Framework

Developed widgets for GUI using PyGtk modules of python.

Developed tools using python and Shell Scripting to automate some of menial tasks

Knowledge of methodology and architecture of private cloud (Open stack) and public cloud (AWS & Microsoft Azure).

Experienced in AWS Cloud services including EC2, VPC, S3, Route53 and monitoring using Cloud Watch

Worked with Java libraries to access AWS facilities as Simple Storage Service

In-depth understanding in implementing and configuring F5 Big-IP LTM 3600, 4200, 6950 and 8950 Load Balancers

Designed and implemented the F5 LTM's (3600, 4500, 6900, 8950 etc.)

Implemented F5 in both Active/Active & Active/Standby mode.

Managed SSL offloading on the F5 LTM

•Bluecoat Troubleshoot for Root Cause Analysis to ensure limited downtime

• Some PAC file analysis to resolve issues connecting to various web sites and network resourcesusingbluecoat.

• Bluecoat Configuration modification for updates to rule sets

Designed and implement citrix farm XenApp and Virtual Desktops for all over United States.

Installed and configured citrix NetScaler, Access Gateway and Load Balance Web Interface/CSF.

Provisioning citrix PVS stream servers with VMware vSphere, HP Moonshot, XenServer.

Hands-on experience in using network stimulator tools like OPNET, Solarwinds Orion.

Strong knowledge in HSRP, VRRP redundancy Protocols.

Access control server configuration for RADIUS & TACACS+.

Knowledge of advanced technologies like Multicasting, MPLS and MPLS-VPN.

Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS, encryption techniques including virtual systems.

CERTIFICATIONS: CCNA - Cisco Certified Network Associate

CCNP - Cisco Certified Network Professional

Palo Alto ACE

EDUCATION:

Bachelor of Technology in Computer Science Engineering

TECHNICAL SKILLS:

Firewalls & Load Balancers

Cisco ASA 5585, 5550, 5540, Juniper SRX 5400, 5600, 5800, Juniper Netscreen 6500, 6000, 5400. Juniper SSG Firewalls, Check point, Palo Alto PA-3060/2050, F-5 BIG-IP LTM (3900 and 8900), Blue Coat SG8100, AV 510, AV810, A10 Load Balancers.

Routers

Cisco routers (1900, 2600, 2800, 2900, 3600, 3800, 3900, 7200, 7600), Cisco L2 & L3, Juniper routers (M7i, M10i, M320).

Switches

Cisco switches (3560, 3750, 4500, 4900 & 6500), Nexus (2248, 5548 &7010)

Routing

RIP, EIGRP, OSPF & BGP, Route Filtering, Redistribution, Summarization, Static routing.

Routing Protocols

RIP, OSPF, EIGRP, and BGP.

Switching Protocols

VTP, STP, RSTP, MSTP, VLANs, PAgP, and LACP.

LAN Technologies

Ethernet, Fast Ethernet, Gigabit Ethernet, NAT/PAT, FDDI.

WAN Technologies

FRAME RELAY, ISDN T1/E1, PPP, ATM, MPLS, leased lines, DSL modems.

Secure Access Control Server

TACACS+/Radius.

VOIP Devices & Wireless Technologies

Cisco IP phones, QOS, Avaya, CUCM, UCCX, CIPC and UCS.

Wireless: LWAPP, WLC, WCS, Standalone APs, Client Roaming, Wireless Security Basics, AP groups, WLANS, Cisco Prime Site Maps.

Network management

SNMP, Cisco Works LMS, HP Open View, Solar winds, ACI, Ethereal.

Layer 3 Switching

CEF, Multi-Layer Switching, Ether Channel.

Carrier Technologies

MPLS, MPLS-VPN.

Redundancy protocols

HSRP, VRRP, GLBP

Security Protocols

IKE, IPsec, SSL, AAA, Access-lists, prefix-lists.

QOS

CBWFQ, LLQ, WRED, Policing/Shaping.

Monitoring Tools

Voyence, packet tracer, Wireshark, Opnet, GNS3, Info Blox and Solar winds.

Security Technologies

Cisco FWSM/PIX/ASDM, Nokia Checkpoint NG, Juniper SRX, McAfee proxy servers, Fortinet, Bluecoat.

Operating Systems

Microsoft XP/Vista/7, 10, UNIX, LINUX, Redhat.

PROFESSIONAL EXPERIENCE

HCA, Nashville August 2017 to Present

Sr. Security Engineer

Environment:

Cisco Switches: 3500, 4500, 5000, 7000

Firewalls: Cisco ASA, Palo Alto

Load balancers: F5 (BigIP, LTM, GTM)

Expert in F5 Networks configuration of devices such as LTMs, GTMs, Load Balancers, DNS/DHCP services

Complete Devices installations, maintenance and perform regular upgrades and patch work on F5load balancer devices

Creating Virtual Servers, Nodes, Pools, Iapps and Irules on BIG-IP F5in LTM module.

Configuring and troubleshooting F5BIGIP LTM load balancing and implementing, Creating irules, Virtual servers, Pools, Nodes with health, Profiles, SNAT, SSL, NAT, Traffic Policies and QoS.

Configured High availability and implemented it on F5Load balancer.

Performed various inter platform migrations among numerous F5s such as 1500, 1600, 2000, i2600, 4500, viprion, etc.

oWorked on monitoring tools such as SOLARWINDS, WIRESHARK, NetQos.

oDesign and Architecture of F5LTM, GTM and application delivery network.

Experience in configuring all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.)

Support Panorama Centralized Management for Palo Alto firewalls to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration

Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs

Successfully installed Palo Alto PA 5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls

Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol based services

Network security including NAT/PAT, ACL, and ASA Firewalls.

Experience in migration with both Checkpoint and Cisco ASA VPN.

Hands-on experience with converting Checkpoint VPN rules over to the Cisco ASA solution.

Configured, Monitored and Troubleshot Cisco's ASA Security appliances

Configured Access lists (ACL) on ASA firewall for the proper network routing and experience with convert PIX rules over to the Cisco ASA solution.

Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0

Configured networks using routing protocols such as OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure

Hands on experience in performing cisco device code upgrades

Experience with configuring Nexus 5000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000.

Good knowledge with the technologies VPN, WLAN and Multicast.

Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.

Followed the change process as per IT policy It also includes the configuration of port channel between core devices and connected hardware

Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port \ Security, STP and RSTP.

Experience in installing and configuring DNS (BT Diamond), DHCP servers.

Replace branch hardware with new 3900 routers and 2960 switches.

Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links

Broadcom, Allentown PA Apr 2016 to July 2017

Sr. Security Engineer

Environment:

Cisco Switches: 2000, 3500, 4500, 5000, 7000, 7010, 9000

Cisco Routers: 7613, 7201, 3945E

Juniper routers: MX, EX, ASR

Firewalls: Juniper (SRX, SSG), Cisco ASA, Palo Alto

Load balancers: F5 (BigIP, LTM, GTM)

Responsibilities:

Experience in Auditing, Archiving and performance tuning of Remedy and service now Setups.

Strong skill set in the service now suite development including SOAP/REST integration, Web services, Discovery, Workflow, and CMDB.

Hands on experience on various IT services of service now tool like services Catalog Requests, Asset Management, Configuration Management, service now Administration, Incident and Problem Management, Knowledge Management, Reporting, Integration with Web services

Good knowledge of CMDB and Asset Management services: Business services and Configuration item relationships.

Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route-feedback, BGP attributes) on Cisco Routers 7613, 7201, and 3945E.

Experience working on CISCO NEXUS data center infrastructure with 2000, 5000 and 7000 series switches by enabling networked devices to communicate effectively

Hands-on knowledge in configuring cisco 3500, 4500 series switches to implement information sharing and resource allocation for increased productivity.

Helped in setting up P2P OSPF connection on the Cisco and juniper routers like MX, EX, ASR series devices with their current network

Incorporate Cisco Nexus 9000 NXOS to ACI fabric to work in concert with existing Nexus 7000s and ASRs for Multi-Protocol Label Switching(MPLS)

Tested JUNOS images on juniper MX router platforms covering various protocols and technologies like OSPF, BGP, LDP, MPLS, Layer3 VPNs

Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NATing, sub-netting, also including DNS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, WISM, STP (Spanning tree Protocol), RTSP & Multicasting protocols

Configured networks using routing protocols such as RIP, OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure

Working on troubleshooting, implementing and configuring new devices and helping them to build new data center and moving devices from one data center to another by moving all devices.

Deployed VXLAN on the Nexus 9000 to map the physical VLANs to the Virtual Overlay VLANs.

Supporting EIGRP and BGP based on the network by resolving level 2 & 3 problems of internal teams & external customers of all locations

Working on to set up OSPF dynamic routing on Cisco ASA Firewalls by using and following their current network structure.

Monitor, operate and support network security devices such as cisco ASA, juniper and checkpoint VSX firewalls

Working on as security devices Cisco ASA series, checkpoint VSX, juniper SRX & SSG series, Palo Alto firewalls.

Worked extensively on Cisco ASA 5500 (5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution

Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing

Implemented Juniper SRX 1400 /3600 firewall change requests while managing multiple customer firewall equipment

Implemented juniper SRX firewall change requests while managing multiple customer firewall equipment in the GETS-H

Installed and configured juniper firewall for local corporate office

Performed the juniper SRX 5800 deployment to replace the Net Screen 5200/5400 firewalls in the Los Angeles Data Center

Assisted with the design, maintenance, and troubleshooting of juniper firewalls on DirecTV customer's backbone. Provided support for complications experienced with BGP and OSPF processes on juniper-series (1000) firewalls

Set up point to point OSPF connection on juniper SRX and SSG firewalls

Configured IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.

Implemented Zone Based firewall and Security Rules on the Palo Alto firewall

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs

Successfully installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls

Security policy review and configuration in Palo Alto and Junipers firewall in US offices and Datacenter

Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.

Configuring rules and Maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools

Managing data center and network by using solar winds, NPM, NTA, NCM and F5 load balancer and citrix load balancer

Hands on experience in F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs

Designed and implemented the F5 LTM's (3600, 4500, 6900, 8950 etc.)

Implemented F5 in both Active/Active & Active/Standby mode

Managed SSL offloading on the F5 LTM (Certificates being pushed from Venafi)

Performing Bluecoat and F5 Overview training to various network team personnel for proper knowledge transfer

Bluecoat Policy optimization for Citrix User policy

Analyze and Interpret Sun/Solaris policy and translating into Bluecoat ProxySG format for seamless transition for the customer

Giving recommendations to upper-level management on Bluecoat setup throughout the Bank of America enterprise

Python development experience which include 1+ years of experience in DJango Framework.

Hands-on experience to design and coding in technologies such as Python and SQL

Experience in building frameworks and automating complex workflows using Python

Generate Python Django Forms to record data of online users

Knowledge of methodology and architecture of private cloud (Open stack) and public cloud (AWS & Microsoft Azure).

Experienced in AWS Cloud services including EC2, VPC, S3, Route53 and monitoring using Cloud Watch

Worked with Java libraries to access AWS facilities as Simple Storage Service

Created AWS Route53 to route traffic between different regions.

Created AWS Cloud Formation templates to create/modify multiple stacks

Knowledge of methodology and architecture of private cloud (Open stack) and public cloud (AWS & Microsoft Azure).

Experienced in AWS Cloud services including EC2, VPC, S3, Route53 and monitoring using Cloud Watch

Worked with Java libraries to access AWS facilities as Simple Storage Service

Documenting workflow process, managing and implementing standard policy and procedures.

Worked in AWS technologies that support automation using cloud formation to create EC2 instances

Configured and managed tool that auto discovers auto scaling EC2 instances in VPC

Worked with automation tools such as puppet, implementing cookbooks in chef, Jenkins, etc.

Worked on In-Service Software Upgrade Infrastructure which enables user to upgrade between two different Junos OS releases with no disruption on the control plane and with minimal disruption of traffic

Automated network implementations and tasks and designed monitoring tools using python scripting

Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010

Deployed the Nexus 9000 Application Virtual switch to support network telemetry applications and 9000 Core with VPC and 3172 TOR.

EMC, Santa Clara, CA Jan 2015 to March 2016

Sr. security Engineer

Environment:

Cisco Switches: 1900, 2900, 4500, 6500, 3750, 3550, 5000, 7000, ASR1k

Juniper Switches: EX4200, EX3200

Juniper routers: MX, EX, ASR

Firewalls: cisco (ASR, ASA 8.4)

Load balancers: F5 (BigIP, LTM, GTM)

Responsibilities:

Implementation and Troubleshooting Cisco Routers such as Cisco 1900, 2900, Cisco ASR 1k and Cisco 9k.

Worked on various integrations and created Data sources for importing data into service now.

Configured service manager to service now integrations

Good understanding of Service Now Helpdesk / service Desk, Change Management, Asset Management, Change Tasking, service Level Agreement processes

Working with process owners and business stakeholders to translate business requirements into functional requirements within Service now

Experience working with ASR 9000 series switches with IOS-XR

Experience with migrating from Cisco ASA 8.2 version to Cisco ASA 8.4 Version

Configuring Cisco Switches Such as 4500, 6500, stack switches 3750

Configured LDP, OSPF, and BGP for new deployments of core/edge routers (Cisco and juniper).

Migrated Juniper EX series switches to Cisco 3500 series and 6500 series switches

Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing

Serve as part of a team of network engineers responsible for network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches across multiple offices.

DesigningF5 solutions/support for migration work of applications and websites from Cisco CSS Load

Worked on Network Layer technologies including Routing & Signaling protocols, Layer3 VPN and Multicast

supported by juniper core and edge, MX series routers

Configure and Juniper EX and MX series switches and routers

Experience working with JUNOS OS on juniper routers and Switches

Design, implement and administer enterprise network infrastructure utilizing Juniper routers across locations.

Network security including NAT/PAT, ACL, and ASA Firewalls.

Experience in migration with both Checkpoint and Cisco ASA VPN.

Hands-on experience with converting Checkpoint VPN rules over to the Cisco ASA solution.

Configured, Monitored and Troubleshot Cisco's ASA Security appliances

Provided proactive threat defense with ASA that stops attacks before they spread through the network.

Added websites to the URL filtering blocklist in bluecoat proxies

Involved in the TACACS+ implementation.

Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to Get VPN.

Migrated juniper firewalls to Palo Alto network firewalls and carried out troubleshooting and configuration of the same.

Creating and provisioning Juniper SRX firewall policies.

Implemented antivirus and web filtering on Juniper SRX 240 firewalls at the web server

Involved in configuring Juniper SSG-140 and Check point firewall

Working to fulfill the implementation of the Juniper SRX infrastructure, troubleshoot the JUNOS operating system running on the firewalls

Manage administration of Juniper firewalls, connecting offices in different locations through VPN tunnels

Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol based services

Troubleshooting of protocol based policies on Palo Alto Firewalls and changing the policies as per the requirement and as per traffic flow

Security policy review and configuration in Palo Alto and Junipers firewall in US offices and Datacenter

Configured VLAN trunking with Palo Alto interface

Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as Firewalls and URL and application inspection

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools

Hands on Experience testing I Rules using Browser (IE), HTTP watch for f5 load balancers.

Balancers to the F5 Big-IP Load Balancers.

Installed and Configured the F5 BIG-IP LTM, configured virtual servers and associate them with pools for Internal web servers.

Configuring Virtual Server, Service Groups and Load balancing methods in new A10 LTM.

Worked on fixing various custom health monitors and templates like LDAP in A10 Load Balancers.

Configuring WIDE IP and WIDE IP pool on F5 GTM's to support Load balancing between data centers.

Written firewall rules in support of application migration from F5 to A10 Load balancing.

Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256

Traffic analysis for Bluecoat Proxy SG to ensure proper flow over the network

Migrating Data from Netcache Proxy device and translating to Bluecoat Policy Language

Gathering data from Sun/Solaris Proxy devices utilizing Linux commands to aid in building policy for new Bluecoat Proxy SG units

Modification of Hardware Inventory to ensure all databases are accurate and correct according to Bank of America standards-5 years enterprise experience working with Bluecoat Proxy SG

Utilizing Bluecoat Director for updates and configuration changes to Bluecoat Proxy SG

Rule optimization and configuration for VPM in Bluecoat Proxy SG

Generated property list for every application dynamically using python

Used Django framework to develop frontend modules in python

Rewrite existing python / Django module to deliver certain data format of data

Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer

Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data Environment

Created documents for various platforms including Nexus 7k, ASR1k enabling successful deployment of new devices on the network

Experience with configuring Nexus 5000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000.

Good knowledge with the technologies VPN, WLAN and Multicast.

Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.

Followed the change process as per IT policy It also includes the configuration of port channel between core devices and connected hardware

Installed dual DS-3 SAN replication WAN with Riverbed Interceptors and 6050 Steelhead appliances to

optimize the traffic

Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port \ Security, STP and RSTP.

Experience in installing and configuring DNS (BT Diamond), DHCP servers.

Replace branch hardware with new 3900 routers and 2960 switches.

Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is usedfor local routing only) which involves new wan links.

Worked on configuration commissioning and upgradation of the MPLS circuits for various branch offices.

Knowledge of modifying and maintaining bluecoat proxy Pac files

Managed LAN, WAN and bluecoat proxy servers

Lowes Mooresville, NC Nov 2013 to Dec 2014

Network Engineer

Environment:

Cisco Switches: 6500, ASR 9K,

Firewalls: Cisco (5585, 5510)

Load balancers: F5 Big-IP LTM-3600

Responsibilities:

Experience with converting cisco catalyst 6500 switches to Cisco Nexus in the data Center environment

Associate. Responsible for design, installation, configuration, administration and troubleshooting of LAN/WAN network infrastructure and security using Cisco and juniper routers

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5585 Security appliance

Configured cisco ASA 5510 firewall to establish logical separation between Legacy network & lab environment.

Migrating the policy from cisco ASA firewalls into Palo-Alto & vice versa.

Experience in migration with both Checkpoint and Cisco ASA VPN.

Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing

Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access

Implemented antivirus and web filtering on Juniper SRX 240 at the web server

Performed network monitoring, implementation and maintenance of juniper and checkpoint firewalls

Performed in-depth troubleshooting of juniper firewalls and network issues to resolve issues affecting vital information transfer

Security firewall products SRX1400/3400/110/210/series, SSG-Secure Services Gateways, IDP-Intrusion Detection and Prevention Appliances

Implemented Zone Based firewall and Security Rules on the Palo Alto Firewalls

Extensive hands-on experience in Palo Alto, Juniper and Cisco network design, deployment and troubleshooting

Experience with Palo Alto Firewall Administration, Rule Analysis, Rule Modification

Designed and implemented dual layer high availability Palo Alto Firewall network with multiple layer 2 DMZs with virtual port channels

Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-3600 load balancers

Routine Administration (Design, Implementation & Operations support) of Citrix, BIG-IP and F5 load balancers

Dealt with creating VIP (virtual servers), pools, nodes and applying I Rules for the virtual servers

Regularly performed firewall audits around Checkpoint firewall solutions for customers.

Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.

Modified internal infrastructure by adding switches to support server farms and added servers to existing

DMZ environments to support new and existing application platforms.

Provided Layer-3 redundancy by implementing HSRP and GLBP for High availability

Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010

Experience in Configuring, upgrading and verifying NX-OS operation system with OSPF, BGP

Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP, MPLS

Implemented Access lists and policy mapping on Juniper routers installed in each branch across all the locations.

Worked on external customer wireless network infrastructure

Utilizing SSH and Putty to perform diagnostics on F5 devices and Proxy Devices

Performed implementation for USMC WebFilter Project to ensure deadlines are meet by creating tickets

performing installs, working with SFOCs in Bluecoat Proxy setup and configuration

Performing troubleshooting on Windows Server 2003/2008, to limit downtime for users.

Installing various patches on Windows Server 2003/2008 to ensure the stability of the server OS

F5 configuration for newly setup web sites and Bluecoat ProxySGs

Performed F5 configuration for Technical Refresh Project

Created policy for Bluecoat ProxySG network appliances for the enterprises

Leverage understanding of LAN/WAN technologies to support, design, and integrate complex wireless LANs

Worked with a team on planning, designing, configurations, deployments and support of LAN/WAN/WLAN infrastructure

Worked with VMware hypervisor and virtualization monitoring tools.

Participated in the evaluation of vendor hardware, software, and wireless communications products

Operational support and troubleshooting of production wireless network issues

Provided technical support case escalation for customer wireless infrastructure

Documentation of advanced enterprise wireless solutions and designs

Wireless design and validation, including RF site surveys of complex indoor and outdoor deployments

Experience working with ASR 9000 series switches and routers with IOS-XR

Experience with deploying PIM Sparse-mode/Dense-mode multicasting in Campus locations.

Bipsum Software Solutions Pvt Ltd, Hyderabad, India Feb 2011 to Oct 2013

Network Engineer

Responsibilities:

Actively participated and completed many projects based on MPLS VPN, Internet Solutions for corporate customers Backbone.

Actively participated Implementation and customization of customer network.

Hands on experience working on Cisco 7600, 12K, ASR routers & Juniper MX series and Juniper BRAS.

Currently working on wireless upgrade project for Allegheny Health network and their EPIC roll out.

Designing, Provisioning and Installation of the Customer Sites in Oracle IPSA for MPLS Backbone.

Verifying IPv4/IPv6 Addressing Architecture.

Verifying Dynamic Host Configuration Protocol for IPv6 (DHCPv6) and DNSv6 options.

Performed wireless network design, site surveys, as well as Troubleshooting and repairing any issues that occurred on site.

Managing proxy server for branches and head office for internet access through Bluecoat Proxy SG600 for URL Filtering, traffic acceleration and visibility reporting with Bluecoat reporter.

Configuration and troubleshooting of many link types i.e. SONET Controllers for sub E1/T1, E3/T3 and POS controllers for STM1 links.

Provided tier 3 support for Checkpoint Firewall-1 software to support customers.

Work on Checkpoint Platform including Provider Smart Domain Manager. Worked on configuring, managing and supporting Checkpoint Gateways.

DNS Zone administration for 13 countries across EU for COLT customers.

Implementation and testing of ISDN BRI/PRI circuits.

Migrated Vlans from ASA (perimeter firewalls) to FWSM’s for better security management

Responsible to troubleshoot the connectivity between CPE router and the COLT's edge router (SAR).

Worked closely with RIR(Regional Internet Registry) to procure PI(Provider Independent) and PA

Responsible for troubleshooting complex networking issues in service provider MPLS & internet

Aggregately) IP addresses and AS numbers for COLT and customers.

Set up DNS Reverse Delegation according to RIPE rules in RIPE Database.

Suvisan Info Technologies (p) Ltd, Hyderabad, India Sep 2008 to Jan 2011

Network Technical Support

Responsibilities:

Managed network connectivity and network security, between Head offices and Branch office

Worked on Cisco routers 7200, 3800, 2800 and Cisco switches 4900, 2900

Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols OSPF, RIP & BGP

Configured BGP for CE to PE route advertisement inside the lab environment

Spearheaded meetings & discussions with team members regarding network optimization and regarding BGP issues

Implemented the concept of Route Redistribution between different routing protocols

Switching related tasks included implementing VLANS, VTP, STP and configuring on Fast Ethernet channel between switches

Responsible for configuring GLBP between multilayered switch networks

Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series

Responsible for Configuring SITE-TO_SITE VPN on Cisco ASA 5500 series firewall between Head office and Branch office

Hands on Experience working with security issue like applying ACL's, configuring NAT and VPN

Documented and Log analyzed the Cisco ASA 5500 series firewall

Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security

•Responsible for Validate existing infrastructure and recommend new network designs.

•Implementation of TCP/IP Networking & related services HCP/DNS/WINS

•Network Monitoring and Network Efficiency Analysis.

•Configure and maintain Site-to-site VPN and VPN concentrators solution for Remote users



Contact this candidate