Kalyan
OBJECTIVE:
Seeking a challenging position of network engineer which will give me an opportunity to prove potential in me and educate me more in the field of networking and to help reach the goal of the organization and its growth.
SUMMARY:
9 years of professional experience in Planning, Implementing, Configuring, Troubleshooting of networking system on Cisco, Palo Alto and Juniper devices.
Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing systems like remedy and Magic.
Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches. Advanced knowledge in design, installation and configuration of Juniper Net Screen Firewall, SSG series and NSM Administration
Strong knowledge of VMware vSphere administration within Cisco Unified Computing System environment.
Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.
Experience working on CISCO NEXUS data center infrastructure with 2000, 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2148, 2248).
Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.
Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks.
Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.
Experience in Network Management Tools and sniffers like SNMP, Wireshark and Cisco works.
Hands-on experience using Cisco Virtual Switching System (VSS).
Configuring cisco switches with NX-OS and IOS-XE& implementing VLANs
Extensive hands-on experience with complex routed LAN and WAN networks, routers and switches.
Design, configure, troubleshoot and implement wireless and/or data networking(LAN/WAN) solutions for mid-sized to enterprise-level clients
Work as Layer 3 IP Network Engineer on ASR9k Edge router with IOS-XE Platform in a network lab environment.
Experience with DNS/DFS/DHCP/WINS Standardizations and Implementation
Experience in Network LAN/WAN deployment,
Responsible for the build out of Volo Data Center with emphasis on Fabric Path and OTV implementation
Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/ GRE to GetVPN
Good knowledge on VLAN Trunk Protocol (VTP).
Team member of Configuration of cisco 7206 routers with VPN and Configuration of Catalyst switches.
Cisco ASA series, Juniper SRX and SSG series, Check Point VSX series, Cisco PIX and Palo Alto Firewalls Administration
Create and test cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs
Worked extensively on Cisco ASA 5500 (5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution
Configuration of IPSEC, DMVPN and GRE tunneling technologies in cisco ASA’s
Implementation and administration of Juniper WX/WXC devices for WAN Traffic acceleration
Worked on MX-80, MX-480, SRX-100, SRX-110, SRX-550 and EX-4200 Juniper devices.
Installed and configured 8 Juniper MX 960 routers for WAN edge sites
Converted 5 Juniper SRX1400 to 5 Cisco ASA 5525 using converter tool (PX2SX) for 2 Sites
Palo Alto Firewall Management-Panorama
Palo Alto Firewall-ACE Certified
Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol based services
Troubleshooting of protocol based policies on Palo Alto Firewalls and changing the policies as per the requirement and as per traffic flow
Experience deploying BIG-IP F5 LTM, GTM Load Balancers for load balancing and traffic management of business application.
Good knowledge on Riverbed Virtual Services Platform (VSP) and Big-IP F5 Load balancers.
Profiled python code for optimization and memory management
Developed entire frontend and backend modules using python on Django Web Framework
Developed widgets for GUI using PyGtk modules of python.
Developed tools using python and Shell Scripting to automate some of menial tasks
Knowledge of methodology and architecture of private cloud (Open stack) and public cloud (AWS & Microsoft Azure).
Experienced in AWS Cloud services including EC2, VPC, S3, Route53 and monitoring using Cloud Watch
Worked with Java libraries to access AWS facilities as Simple Storage Service
In-depth understanding in implementing and configuring F5 Big-IP LTM 3600, 4200, 6950 and 8950 Load Balancers
Designed and implemented the F5 LTM's (3600, 4500, 6900, 8950 etc.)
Implemented F5 in both Active/Active & Active/Standby mode.
Managed SSL offloading on the F5 LTM
•Bluecoat Troubleshoot for Root Cause Analysis to ensure limited downtime
• Some PAC file analysis to resolve issues connecting to various web sites and network resourcesusingbluecoat.
• Bluecoat Configuration modification for updates to rule sets
Designed and implement citrix farm XenApp and Virtual Desktops for all over United States.
Installed and configured citrix NetScaler, Access Gateway and Load Balance Web Interface/CSF.
Provisioning citrix PVS stream servers with VMware vSphere, HP Moonshot, XenServer.
Hands-on experience in using network stimulator tools like OPNET, Solarwinds Orion.
Strong knowledge in HSRP, VRRP redundancy Protocols.
Access control server configuration for RADIUS & TACACS+.
Knowledge of advanced technologies like Multicasting, MPLS and MPLS-VPN.
Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS, encryption techniques including virtual systems.
CERTIFICATIONS: CCNA - Cisco Certified Network Associate
CCNP - Cisco Certified Network Professional
Palo Alto ACE
EDUCATION:
Bachelor of Technology in Computer Science Engineering
TECHNICAL SKILLS:
Firewalls & Load Balancers
Cisco ASA 5585, 5550, 5540, Juniper SRX 5400, 5600, 5800, Juniper Netscreen 6500, 6000, 5400. Juniper SSG Firewalls, Check point, Palo Alto PA-3060/2050, F-5 BIG-IP LTM (3900 and 8900), Blue Coat SG8100, AV 510, AV810, A10 Load Balancers.
Routers
Cisco routers (1900, 2600, 2800, 2900, 3600, 3800, 3900, 7200, 7600), Cisco L2 & L3, Juniper routers (M7i, M10i, M320).
Switches
Cisco switches (3560, 3750, 4500, 4900 & 6500), Nexus (2248, 5548 &7010)
Routing
RIP, EIGRP, OSPF & BGP, Route Filtering, Redistribution, Summarization, Static routing.
Routing Protocols
RIP, OSPF, EIGRP, and BGP.
Switching Protocols
VTP, STP, RSTP, MSTP, VLANs, PAgP, and LACP.
LAN Technologies
Ethernet, Fast Ethernet, Gigabit Ethernet, NAT/PAT, FDDI.
WAN Technologies
FRAME RELAY, ISDN T1/E1, PPP, ATM, MPLS, leased lines, DSL modems.
Secure Access Control Server
TACACS+/Radius.
VOIP Devices & Wireless Technologies
Cisco IP phones, QOS, Avaya, CUCM, UCCX, CIPC and UCS.
Wireless: LWAPP, WLC, WCS, Standalone APs, Client Roaming, Wireless Security Basics, AP groups, WLANS, Cisco Prime Site Maps.
Network management
SNMP, Cisco Works LMS, HP Open View, Solar winds, ACI, Ethereal.
Layer 3 Switching
CEF, Multi-Layer Switching, Ether Channel.
Carrier Technologies
MPLS, MPLS-VPN.
Redundancy protocols
HSRP, VRRP, GLBP
Security Protocols
IKE, IPsec, SSL, AAA, Access-lists, prefix-lists.
QOS
CBWFQ, LLQ, WRED, Policing/Shaping.
Monitoring Tools
Voyence, packet tracer, Wireshark, Opnet, GNS3, Info Blox and Solar winds.
Security Technologies
Cisco FWSM/PIX/ASDM, Nokia Checkpoint NG, Juniper SRX, McAfee proxy servers, Fortinet, Bluecoat.
Operating Systems
Microsoft XP/Vista/7, 10, UNIX, LINUX, Redhat.
PROFESSIONAL EXPERIENCE
HCA, Nashville August 2017 to Present
Sr. Security Engineer
Environment:
Cisco Switches: 3500, 4500, 5000, 7000
Firewalls: Cisco ASA, Palo Alto
Load balancers: F5 (BigIP, LTM, GTM)
Expert in F5 Networks configuration of devices such as LTMs, GTMs, Load Balancers, DNS/DHCP services
Complete Devices installations, maintenance and perform regular upgrades and patch work on F5load balancer devices
Creating Virtual Servers, Nodes, Pools, Iapps and Irules on BIG-IP F5in LTM module.
Configuring and troubleshooting F5BIGIP LTM load balancing and implementing, Creating irules, Virtual servers, Pools, Nodes with health, Profiles, SNAT, SSL, NAT, Traffic Policies and QoS.
Configured High availability and implemented it on F5Load balancer.
Performed various inter platform migrations among numerous F5s such as 1500, 1600, 2000, i2600, 4500, viprion, etc.
oWorked on monitoring tools such as SOLARWINDS, WIRESHARK, NetQos.
oDesign and Architecture of F5LTM, GTM and application delivery network.
Experience in configuring all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.)
Support Panorama Centralized Management for Palo Alto firewalls to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration
Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
Successfully installed Palo Alto PA 5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls
Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol based services
Network security including NAT/PAT, ACL, and ASA Firewalls.
Experience in migration with both Checkpoint and Cisco ASA VPN.
Hands-on experience with converting Checkpoint VPN rules over to the Cisco ASA solution.
Configured, Monitored and Troubleshot Cisco's ASA Security appliances
Configured Access lists (ACL) on ASA firewall for the proper network routing and experience with convert PIX rules over to the Cisco ASA solution.
Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0
Configured networks using routing protocols such as OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure
Hands on experience in performing cisco device code upgrades
Experience with configuring Nexus 5000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000.
Good knowledge with the technologies VPN, WLAN and Multicast.
Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
Followed the change process as per IT policy It also includes the configuration of port channel between core devices and connected hardware
Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port \ Security, STP and RSTP.
Experience in installing and configuring DNS (BT Diamond), DHCP servers.
Replace branch hardware with new 3900 routers and 2960 switches.
Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links
Broadcom, Allentown PA Apr 2016 to July 2017
Sr. Security Engineer
Environment:
Cisco Switches: 2000, 3500, 4500, 5000, 7000, 7010, 9000
Cisco Routers: 7613, 7201, 3945E
Juniper routers: MX, EX, ASR
Firewalls: Juniper (SRX, SSG), Cisco ASA, Palo Alto
Load balancers: F5 (BigIP, LTM, GTM)
Responsibilities:
Experience in Auditing, Archiving and performance tuning of Remedy and service now Setups.
Strong skill set in the service now suite development including SOAP/REST integration, Web services, Discovery, Workflow, and CMDB.
Hands on experience on various IT services of service now tool like services Catalog Requests, Asset Management, Configuration Management, service now Administration, Incident and Problem Management, Knowledge Management, Reporting, Integration with Web services
Good knowledge of CMDB and Asset Management services: Business services and Configuration item relationships.
Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route-feedback, BGP attributes) on Cisco Routers 7613, 7201, and 3945E.
Experience working on CISCO NEXUS data center infrastructure with 2000, 5000 and 7000 series switches by enabling networked devices to communicate effectively
Hands-on knowledge in configuring cisco 3500, 4500 series switches to implement information sharing and resource allocation for increased productivity.
Helped in setting up P2P OSPF connection on the Cisco and juniper routers like MX, EX, ASR series devices with their current network
Incorporate Cisco Nexus 9000 NXOS to ACI fabric to work in concert with existing Nexus 7000s and ASRs for Multi-Protocol Label Switching(MPLS)
Tested JUNOS images on juniper MX router platforms covering various protocols and technologies like OSPF, BGP, LDP, MPLS, Layer3 VPNs
Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NATing, sub-netting, also including DNS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, WISM, STP (Spanning tree Protocol), RTSP & Multicasting protocols
Configured networks using routing protocols such as RIP, OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure
Working on troubleshooting, implementing and configuring new devices and helping them to build new data center and moving devices from one data center to another by moving all devices.
Deployed VXLAN on the Nexus 9000 to map the physical VLANs to the Virtual Overlay VLANs.
Supporting EIGRP and BGP based on the network by resolving level 2 & 3 problems of internal teams & external customers of all locations
Working on to set up OSPF dynamic routing on Cisco ASA Firewalls by using and following their current network structure.
Monitor, operate and support network security devices such as cisco ASA, juniper and checkpoint VSX firewalls
Working on as security devices Cisco ASA series, checkpoint VSX, juniper SRX & SSG series, Palo Alto firewalls.
Worked extensively on Cisco ASA 5500 (5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution
Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing
Implemented Juniper SRX 1400 /3600 firewall change requests while managing multiple customer firewall equipment
Implemented juniper SRX firewall change requests while managing multiple customer firewall equipment in the GETS-H
Installed and configured juniper firewall for local corporate office
Performed the juniper SRX 5800 deployment to replace the Net Screen 5200/5400 firewalls in the Los Angeles Data Center
Assisted with the design, maintenance, and troubleshooting of juniper firewalls on DirecTV customer's backbone. Provided support for complications experienced with BGP and OSPF processes on juniper-series (1000) firewalls
Set up point to point OSPF connection on juniper SRX and SSG firewalls
Configured IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
Implemented Zone Based firewall and Security Rules on the Palo Alto firewall
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs
Successfully installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls
Security policy review and configuration in Palo Alto and Junipers firewall in US offices and Datacenter
Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
Configuring rules and Maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools
Managing data center and network by using solar winds, NPM, NTA, NCM and F5 load balancer and citrix load balancer
Hands on experience in F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs
Designed and implemented the F5 LTM's (3600, 4500, 6900, 8950 etc.)
Implemented F5 in both Active/Active & Active/Standby mode
Managed SSL offloading on the F5 LTM (Certificates being pushed from Venafi)
Performing Bluecoat and F5 Overview training to various network team personnel for proper knowledge transfer
Bluecoat Policy optimization for Citrix User policy
Analyze and Interpret Sun/Solaris policy and translating into Bluecoat ProxySG format for seamless transition for the customer
Giving recommendations to upper-level management on Bluecoat setup throughout the Bank of America enterprise
Python development experience which include 1+ years of experience in DJango Framework.
Hands-on experience to design and coding in technologies such as Python and SQL
Experience in building frameworks and automating complex workflows using Python
Generate Python Django Forms to record data of online users
Knowledge of methodology and architecture of private cloud (Open stack) and public cloud (AWS & Microsoft Azure).
Experienced in AWS Cloud services including EC2, VPC, S3, Route53 and monitoring using Cloud Watch
Worked with Java libraries to access AWS facilities as Simple Storage Service
Created AWS Route53 to route traffic between different regions.
Created AWS Cloud Formation templates to create/modify multiple stacks
Knowledge of methodology and architecture of private cloud (Open stack) and public cloud (AWS & Microsoft Azure).
Experienced in AWS Cloud services including EC2, VPC, S3, Route53 and monitoring using Cloud Watch
Worked with Java libraries to access AWS facilities as Simple Storage Service
Documenting workflow process, managing and implementing standard policy and procedures.
Worked in AWS technologies that support automation using cloud formation to create EC2 instances
Configured and managed tool that auto discovers auto scaling EC2 instances in VPC
Worked with automation tools such as puppet, implementing cookbooks in chef, Jenkins, etc.
Worked on In-Service Software Upgrade Infrastructure which enables user to upgrade between two different Junos OS releases with no disruption on the control plane and with minimal disruption of traffic
Automated network implementations and tasks and designed monitoring tools using python scripting
Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010
Deployed the Nexus 9000 Application Virtual switch to support network telemetry applications and 9000 Core with VPC and 3172 TOR.
EMC, Santa Clara, CA Jan 2015 to March 2016
Sr. security Engineer
Environment:
Cisco Switches: 1900, 2900, 4500, 6500, 3750, 3550, 5000, 7000, ASR1k
Juniper Switches: EX4200, EX3200
Juniper routers: MX, EX, ASR
Firewalls: cisco (ASR, ASA 8.4)
Load balancers: F5 (BigIP, LTM, GTM)
Responsibilities:
Implementation and Troubleshooting Cisco Routers such as Cisco 1900, 2900, Cisco ASR 1k and Cisco 9k.
Worked on various integrations and created Data sources for importing data into service now.
Configured service manager to service now integrations
Good understanding of Service Now Helpdesk / service Desk, Change Management, Asset Management, Change Tasking, service Level Agreement processes
Working with process owners and business stakeholders to translate business requirements into functional requirements within Service now
Experience working with ASR 9000 series switches with IOS-XR
Experience with migrating from Cisco ASA 8.2 version to Cisco ASA 8.4 Version
Configuring Cisco Switches Such as 4500, 6500, stack switches 3750
Configured LDP, OSPF, and BGP for new deployments of core/edge routers (Cisco and juniper).
Migrated Juniper EX series switches to Cisco 3500 series and 6500 series switches
Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing
Serve as part of a team of network engineers responsible for network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches across multiple offices.
DesigningF5 solutions/support for migration work of applications and websites from Cisco CSS Load
Worked on Network Layer technologies including Routing & Signaling protocols, Layer3 VPN and Multicast
supported by juniper core and edge, MX series routers
Configure and Juniper EX and MX series switches and routers
Experience working with JUNOS OS on juniper routers and Switches
Design, implement and administer enterprise network infrastructure utilizing Juniper routers across locations.
Network security including NAT/PAT, ACL, and ASA Firewalls.
Experience in migration with both Checkpoint and Cisco ASA VPN.
Hands-on experience with converting Checkpoint VPN rules over to the Cisco ASA solution.
Configured, Monitored and Troubleshot Cisco's ASA Security appliances
Provided proactive threat defense with ASA that stops attacks before they spread through the network.
Added websites to the URL filtering blocklist in bluecoat proxies
Involved in the TACACS+ implementation.
Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to Get VPN.
Migrated juniper firewalls to Palo Alto network firewalls and carried out troubleshooting and configuration of the same.
Creating and provisioning Juniper SRX firewall policies.
Implemented antivirus and web filtering on Juniper SRX 240 firewalls at the web server
Involved in configuring Juniper SSG-140 and Check point firewall
Working to fulfill the implementation of the Juniper SRX infrastructure, troubleshoot the JUNOS operating system running on the firewalls
Manage administration of Juniper firewalls, connecting offices in different locations through VPN tunnels
Deployment of Palo Alto Firewall into the network. Configured and wrote Access-list policies on protocol based services
Troubleshooting of protocol based policies on Palo Alto Firewalls and changing the policies as per the requirement and as per traffic flow
Security policy review and configuration in Palo Alto and Junipers firewall in US offices and Datacenter
Configured VLAN trunking with Palo Alto interface
Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as Firewalls and URL and application inspection
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
Hands on Experience testing I Rules using Browser (IE), HTTP watch for f5 load balancers.
Balancers to the F5 Big-IP Load Balancers.
Installed and Configured the F5 BIG-IP LTM, configured virtual servers and associate them with pools for Internal web servers.
Configuring Virtual Server, Service Groups and Load balancing methods in new A10 LTM.
Worked on fixing various custom health monitors and templates like LDAP in A10 Load Balancers.
Configuring WIDE IP and WIDE IP pool on F5 GTM's to support Load balancing between data centers.
Written firewall rules in support of application migration from F5 to A10 Load balancing.
Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256
Traffic analysis for Bluecoat Proxy SG to ensure proper flow over the network
Migrating Data from Netcache Proxy device and translating to Bluecoat Policy Language
Gathering data from Sun/Solaris Proxy devices utilizing Linux commands to aid in building policy for new Bluecoat Proxy SG units
Modification of Hardware Inventory to ensure all databases are accurate and correct according to Bank of America standards-5 years enterprise experience working with Bluecoat Proxy SG
Utilizing Bluecoat Director for updates and configuration changes to Bluecoat Proxy SG
Rule optimization and configuration for VPM in Bluecoat Proxy SG
Generated property list for every application dynamically using python
Used Django framework to develop frontend modules in python
Rewrite existing python / Django module to deliver certain data format of data
Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer
Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data Environment
Created documents for various platforms including Nexus 7k, ASR1k enabling successful deployment of new devices on the network
Experience with configuring Nexus 5000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 7000.
Good knowledge with the technologies VPN, WLAN and Multicast.
Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
Followed the change process as per IT policy It also includes the configuration of port channel between core devices and connected hardware
Installed dual DS-3 SAN replication WAN with Riverbed Interceptors and 6050 Steelhead appliances to
optimize the traffic
Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port \ Security, STP and RSTP.
Experience in installing and configuring DNS (BT Diamond), DHCP servers.
Replace branch hardware with new 3900 routers and 2960 switches.
Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is usedfor local routing only) which involves new wan links.
Worked on configuration commissioning and upgradation of the MPLS circuits for various branch offices.
Knowledge of modifying and maintaining bluecoat proxy Pac files
Managed LAN, WAN and bluecoat proxy servers
Lowes Mooresville, NC Nov 2013 to Dec 2014
Network Engineer
Environment:
Cisco Switches: 6500, ASR 9K,
Firewalls: Cisco (5585, 5510)
Load balancers: F5 Big-IP LTM-3600
Responsibilities:
Experience with converting cisco catalyst 6500 switches to Cisco Nexus in the data Center environment
Associate. Responsible for design, installation, configuration, administration and troubleshooting of LAN/WAN network infrastructure and security using Cisco and juniper routers
Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5585 Security appliance
Configured cisco ASA 5510 firewall to establish logical separation between Legacy network & lab environment.
Migrating the policy from cisco ASA firewalls into Palo-Alto & vice versa.
Experience in migration with both Checkpoint and Cisco ASA VPN.
Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing
Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access
Implemented antivirus and web filtering on Juniper SRX 240 at the web server
Performed network monitoring, implementation and maintenance of juniper and checkpoint firewalls
Performed in-depth troubleshooting of juniper firewalls and network issues to resolve issues affecting vital information transfer
Security firewall products SRX1400/3400/110/210/series, SSG-Secure Services Gateways, IDP-Intrusion Detection and Prevention Appliances
Implemented Zone Based firewall and Security Rules on the Palo Alto Firewalls
Extensive hands-on experience in Palo Alto, Juniper and Cisco network design, deployment and troubleshooting
Experience with Palo Alto Firewall Administration, Rule Analysis, Rule Modification
Designed and implemented dual layer high availability Palo Alto Firewall network with multiple layer 2 DMZs with virtual port channels
Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-3600 load balancers
Routine Administration (Design, Implementation & Operations support) of Citrix, BIG-IP and F5 load balancers
Dealt with creating VIP (virtual servers), pools, nodes and applying I Rules for the virtual servers
Regularly performed firewall audits around Checkpoint firewall solutions for customers.
Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
Modified internal infrastructure by adding switches to support server farms and added servers to existing
DMZ environments to support new and existing application platforms.
Provided Layer-3 redundancy by implementing HSRP and GLBP for High availability
Experience configuring VPC, VDC and ISSU software upgrade in Nexus 7010
Experience in Configuring, upgrading and verifying NX-OS operation system with OSPF, BGP
Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP, MPLS
Implemented Access lists and policy mapping on Juniper routers installed in each branch across all the locations.
Worked on external customer wireless network infrastructure
Utilizing SSH and Putty to perform diagnostics on F5 devices and Proxy Devices
Performed implementation for USMC WebFilter Project to ensure deadlines are meet by creating tickets
performing installs, working with SFOCs in Bluecoat Proxy setup and configuration
Performing troubleshooting on Windows Server 2003/2008, to limit downtime for users.
Installing various patches on Windows Server 2003/2008 to ensure the stability of the server OS
F5 configuration for newly setup web sites and Bluecoat ProxySGs
Performed F5 configuration for Technical Refresh Project
Created policy for Bluecoat ProxySG network appliances for the enterprises
Leverage understanding of LAN/WAN technologies to support, design, and integrate complex wireless LANs
Worked with a team on planning, designing, configurations, deployments and support of LAN/WAN/WLAN infrastructure
Worked with VMware hypervisor and virtualization monitoring tools.
Participated in the evaluation of vendor hardware, software, and wireless communications products
Operational support and troubleshooting of production wireless network issues
Provided technical support case escalation for customer wireless infrastructure
Documentation of advanced enterprise wireless solutions and designs
Wireless design and validation, including RF site surveys of complex indoor and outdoor deployments
Experience working with ASR 9000 series switches and routers with IOS-XR
Experience with deploying PIM Sparse-mode/Dense-mode multicasting in Campus locations.
Bipsum Software Solutions Pvt Ltd, Hyderabad, India Feb 2011 to Oct 2013
Network Engineer
Responsibilities:
Actively participated and completed many projects based on MPLS VPN, Internet Solutions for corporate customers Backbone.
Actively participated Implementation and customization of customer network.
Hands on experience working on Cisco 7600, 12K, ASR routers & Juniper MX series and Juniper BRAS.
Currently working on wireless upgrade project for Allegheny Health network and their EPIC roll out.
Designing, Provisioning and Installation of the Customer Sites in Oracle IPSA for MPLS Backbone.
Verifying IPv4/IPv6 Addressing Architecture.
Verifying Dynamic Host Configuration Protocol for IPv6 (DHCPv6) and DNSv6 options.
Performed wireless network design, site surveys, as well as Troubleshooting and repairing any issues that occurred on site.
Managing proxy server for branches and head office for internet access through Bluecoat Proxy SG600 for URL Filtering, traffic acceleration and visibility reporting with Bluecoat reporter.
Configuration and troubleshooting of many link types i.e. SONET Controllers for sub E1/T1, E3/T3 and POS controllers for STM1 links.
Provided tier 3 support for Checkpoint Firewall-1 software to support customers.
Work on Checkpoint Platform including Provider Smart Domain Manager. Worked on configuring, managing and supporting Checkpoint Gateways.
DNS Zone administration for 13 countries across EU for COLT customers.
Implementation and testing of ISDN BRI/PRI circuits.
Migrated Vlans from ASA (perimeter firewalls) to FWSM’s for better security management
Responsible to troubleshoot the connectivity between CPE router and the COLT's edge router (SAR).
Worked closely with RIR(Regional Internet Registry) to procure PI(Provider Independent) and PA
Responsible for troubleshooting complex networking issues in service provider MPLS & internet
Aggregately) IP addresses and AS numbers for COLT and customers.
Set up DNS Reverse Delegation according to RIPE rules in RIPE Database.
Suvisan Info Technologies (p) Ltd, Hyderabad, India Sep 2008 to Jan 2011
Network Technical Support
Responsibilities:
Managed network connectivity and network security, between Head offices and Branch office
Worked on Cisco routers 7200, 3800, 2800 and Cisco switches 4900, 2900
Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols OSPF, RIP & BGP
Configured BGP for CE to PE route advertisement inside the lab environment
Spearheaded meetings & discussions with team members regarding network optimization and regarding BGP issues
Implemented the concept of Route Redistribution between different routing protocols
Switching related tasks included implementing VLANS, VTP, STP and configuring on Fast Ethernet channel between switches
Responsible for configuring GLBP between multilayered switch networks
Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series
Responsible for Configuring SITE-TO_SITE VPN on Cisco ASA 5500 series firewall between Head office and Branch office
Hands on Experience working with security issue like applying ACL's, configuring NAT and VPN
Documented and Log analyzed the Cisco ASA 5500 series firewall
Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security
•Responsible for Validate existing infrastructure and recommend new network designs.
•Implementation of TCP/IP Networking & related services HCP/DNS/WINS
•Network Monitoring and Network Efficiency Analysis.
•Configure and maintain Site-to-site VPN and VPN concentrators solution for Remote users