Resume

Sign in

Network Engineer Cisco

Location:
Chantilly, Virginia, 20151, United States
Salary:
60$
Posted:
April 20, 2018

Contact this candidate

Resume:

Prashanth B

Sr. Security Network Engineer

Ph No: 908-***-****

Email id: ac468x@r.postjobfree.com

Professional Summary:

Around 7+ years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and Testing of networking system on both Cisco and Juniper Networks.

Experience of routing protocols like EIGRP, OSPF, RIP, and BGP, Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches. Extensive hands-on experience with complex routed LAN and WAN networks, routers and switches.

Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments. Network monitoring and debugging tools: SevOneNetscout, Wireshark.

Wrote server scripts using Perl to work with IPv6 instead of IPv4, Experienced with VSS, VPC, Nexus7000. Good understanding of NAT & Firewall on Aruba Controllers.

Wireless design for over a total of 100 million square feet. Along with other Network Engineers participated in the management and configuration of Cisco ASA, Juniper and Palo Alto Firewalls, ACL’s, and Packet Shaping devices and rules.

Worked on various network projects involving Cisco Routers- ASR 1000/9000, Switches-Nexus 7K/5K/2K. Enhanced level of experience with OSPF, BGP, and TCP/IP. Hands-on experience in using network monitoring tool Solar winds Orion.

Strong knowledge in HSRP, VRRP redundancy Protocols. Strong experience on Checkpoint R75, 76 Firewalls Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.

Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies. Access control server configuration for RADIUS & TACAS+. Hands-on experience using Cisco Virtual Switching System (VSS).

Good knowledge on Bluecoat proxy server SG• Knowledge of advanced technologies like VOIP, H.323, SIP, QOS, Multicasting, MPLS and MPLS-VPN. Experience with 802.11x wireless technology. Experience with Juniper SRX 240 Firewalls.

Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments. Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248). Hands-on Experience with CISCO Nexus 9000, Nexus 7000, Nexus 5000, and Nexus 2000 platforms. Also, worked with the physical server migration to AWS data center.

Involved in designing and implementation of AWS network and connectivity b/w physical and AWS DC. Worked with the Python 2 & 3 version. Worked with Automation script with Python module like Chef & Ansible.

Managed relational database applications with UI designing services and Python languages.

Experience with configuring Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000.

Technical Skills:

Cisco Platforms

Nexus 7K, 5K, 2K & 1K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 6807 series),

Juniper Platforms

SRX, MX, EX Series Routers and Switches

Networking Concepts

Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall

ASA Firewall, Checkpoint, Cisco ASA, Palo Alto, Cisco ISE, Cisco IDS/IPS, Fortinet

Network Tools

Solar Winds, SNMP, Cisco Works, Wireshark

Load Balancers

Cisco CSM, F5 Networks (Big-IP)

WAN technologies

Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

LAN technologies

Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Security Protocols

IKE, IPSEC, SSL-VPN

Networking Protocols

RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, IPv4 and IPv6

Operating System

Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

Professional Experience:

Imprivata, Lexington, MA Jul 17 - Present

Sr. Security Network Engineer

Responsibilities:

Improved troubleshooting skills while working with many network devices such as Cisco, Arista switches, Routers and Check Point, Cisco ASA firewalls technologies, system design, implementation and troubleshooting of complex network systems.

Troubleshooting of network related issues including routing, switching, and security

Worked on Cisco ASA 5505 and 5510, site-to-site VPN tunneling issue from Lexington to various sites. Also worked on Checkpoint IP Spoofing issues.

Worked with other team in solving VPN and FTP connection issues from customer side to access Imprivata resources. Worked on troubleshooting and routing issues related to Arista Switches, Cisco Core Nexus 3k and 5k switches.

Rack/ stack servers and network equipment.

Mount and install backboards, cross connects, racks, patch panels, fiber optic and hardware). Install grounding for racks, equipment and cable as required.

Configured CISCO IE2000 (layer 3) switches; 1921 Routers; DIGI Routers

Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.

Worked extensively with Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco2960s series switches and Cisco 3560/3750s switches.

Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.

In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP services.

Implementation of advanced routing configuration using BGP, EIGRP, and OSPF protocols as well as static routing, policy-based routing, VRFs, access lists, prefix lists, route maps, redistribution, and quality of service.

Configuration of Cisco 3750 and 6509 multilayer switches for secure network access using tools such as VLANs and port security.

Maintenance of server applications and services, such as RDS, Active Directory. Restructure site to VPN. Troubleshoot active directory problems.

Worked for change management procedure and implementation of configuration changes during non-production window

Design and configuration of Cisco 5505, 5510 and 5520 ASA devices for firewall and VPN services

Design and configuration of Cisco integrated services routers for LAN extension to remote sites.

Environment: Cisco Catalyst 2960/3750/4500/6500 Series Switches, Cisco2800/2900/3000/4000/4451 Series ISR's and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco ASR 1K Cisco Nexus 3k,5K, Cisco ASA 5505 & 5510, Checkpoint, OSPF, BGP, EIGRP, LAN, WAN, VPN.

ATOS, Irving, TX Mar 16 – Jun 17

Sr. Network Engineer

Responsibilities:

Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco 1600, 2600, 2800, 3600, 7300 series Routers. Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.

Troubleshooting for Layer 2 LAN technologies including but not limited to Ethernet (Switched, Fast E, GigE), Spanning-Tree, VLANs, VTP, and Trunking (802.1q) and Aruba Wireless platform.

Build out and administer entire Cisco networks and Aruba Wi-Fi networks for sites in accordance with Network Engineering's specifications. Including Cisco routing, switching, and wireless bridges along with Aruba Wi-Fi Controllers, access points and wireless bridges.

Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate

Applications and their availability. Deployment and support of F5 LTM/GTM 1600, 3600, 6900 and Viprion.

To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.

Able to configured and installed F5 VIPRION 4800, BIG-IP 11000, BIG-IP 11000, BIG-IP 5000

Designed and Implemented Firewalls, F5Viprion deployments to Front end and DMZ customers. Measure the application performances across the MPLS cloud through various routing and switching methods. Configured inside ACL, outside ACL, inside, outside interfaces.

Configuration and troubleshooting of EIGRP, OSPF, BGP, CSM, integration with ASA devices. Experience in migration of VLANS & Configured VLANs with 802.1q tagging, Ether channels, and Spanning tree for creating Access/distribution and core layer switching.

Strong experience in creating firewall policies as per the requirements on Checkpoint, Palo Alto, Cisco ASA, and Fortinet firewalls. Solid understanding of OSI and TCP/IP model.

Implemented security policies using ASA 55XX Firewall as well as Fortinet firewall IPS/IDS, AAA Security (TACACS+, RADIUS) on different series of routers

Redesign current security network and implement Cisco IDS/IPS and Network Access Control (NAC) to insure the maximum security.

Rack and Stack, Installed and configured new routers and switches.

Managing order of new devices, rack and stack and decommissioning old devices.

Troubleshooting/configuring/upgrading Cisco Switches (IE2000, IE3000, IE4000, 2960S, 2960XR, 3750, 3750g, 3750X, 4500E)

Experienced with designing Virtual Environment for L4 and L7 application Load Balancing Local LB architecture, optimization profiles, SSL offload and extended security profiles for applications

Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.

Strong hands on and exposure to Checkpoint & Palo Alto on a regular basis.

Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.

Installed and configured DNS, DHCP. responsible for creating and configuring forward lookup zone and reverse lookup zone. redistributed required routes from OSPF in to BGP.

Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.

Efficiently utilized Cisco Nexus 7K, 5K, and 2K in managing and deploying data center switch upgrade to a 10GB infrastructure, resulting to a new virtual port channel technology.

Migrated from Cisco ASA 5540 firewall to Palo Alto 5250 Firewall. Used Palo Alto 5250 Firewall for Enterprise Security, configured ACL's for Internet requests to Server Farm in LAN and DMZ.

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools. Managed multiple Palo Alto firewall HA clusters utilizing Panorama.

Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series. Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Experience in Network Management Tools and sniffers like SNMP, Wire shark and Cisco works to support 24x7 Network Operation Center.

Coordinated server operations, including Active Directory, user account management, security, disk space allocation, and data backup processes.

Installed new networks, VoIP systems, managed Active Directory and Exchange systems. Provided prompt escalation of issues to both management and clients.

Tracked and coordinated Return Management Authorization (RMA) procedures for network equipment

Configured VPN, clustering and ISP redundancy in Checkpoint firewall. Configured, maintained and troubleshooting IPS and IPS-1 in Checkpoint

Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Netscreen devices for easier management and common configurations. Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series for higher.

Involved in Bluecoat Configuring Attack-Detection Mode for the Client, Configuring Attack-Detection Mode for a Server or Server Group also involved in Managing the HTTP, SSH, Telnet Consoles.

Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0. Implemented F5 hardware refresh of older 3600 hardware to Viprion. Design and Implement DMZ for FTP, Web and Mail Servers with CISCO PIX 506, PIX515.

Environment: Cisco 2948 / 3560 / 4500 / 3560 / 3750 / 3550 / 3500 / 2960 6500 switches and Cisco 3640 / 1200 / 7200 / 3845 / 3600 / 2800 routers, Cisco ASA 500, Checkpoint, Bluecoat, AWS, Cisco ISE, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP.

Expedia, Bellevue, WA Oct 14 – Feb 16

Sr. Network Engineer

Responsibilities:

Experience working with Nexus 7018/7010, 5020, 5548, 2148, 2248 devices. Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000. Involved in upgrading switches from 6500 E to 4500-X.

Worked on Bluecoat Proxy CG in restricting Management Console Access Through the Console Access Control List(ACL) and in Administrative Authentication and Authorization Policy.

Networking Experience- Cisco IOS, racking and cabling of servers, experienced with TCP/IP, Ethernet (802.3), Wireless networking motoring, firewall implementation. Palo Alto design and installation.

Design and configuration of Cisco security platforms specifically ACS, ISE and ASA. Apply Cisco ISE configuration to switches. Worked on project like deploying Cisco prime Infrastructure, and Cisco Identity Service Engine (ISE) for port security.

Installed, configured, and troubleshot Aruba 7212 and 7010 series wireless LAN controllers, Aruba224 series access points, and Blue Coat SG900, S200, and S400.

Implementation, maintenance and monitoring of IDS/IPS, WAF, antivirus and Syslog Servers. Configure and maintain Cisco IDS/IPS, ASA firewalls, and Bluecoat web proxies.

Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Netscreen devices for easier management and common configurations. Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series for higher.

Troubleshoot and Worked with Security issues related to Cisco ASA, and IDS/IPS firewalls. Large scale Deployment and installation of Cisco ASA.

Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA 5500 Firewalls, Fortinet. Troubleshoot and hands on experience on security related issues on checkpoint, IDS/IPS, Palo Alto.

Monitored the security and VPN for multiple sites with Cisco Pix 501, 506e, 515R and Fortinet fire walls.

Deploy ISE technology in infrastructure to establish secure and authenticated network and ISE development with profiling and certificate-based authentication.

Configured and performed software upgrades on Cisco Wireless LAN Controllers 2504, 4404,5508 for Wireless Network Access Control integration with Cisco ISE.

Configuring rules and Maintaining Palo Alto & Analysis of firewall logs using various tools. Build Cisco UCS 6200 series fabric interconnect. Recommend and design equipment configurations for LAN/WAN/VOIP deployment on Cisco, Adtran, Fortinet, F5, Redware and Bluecoat.

Experience in configuring and installing Brocade routers and switches. Experienced in Troubleshooting layer 2 and 3 issues on Brocade Campus routers and switches.

Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls. Configured Easy VPN server and SSL VPN to facilitate various employees' access internal servers and resources.

Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, Cisco ASA, Firewalls, VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall. Successfully installed Palo Alto Next-Generation PA-3060, PA-5060 firewalls to protect Data Center with the use of IPS feature

In-depth knowledge of Cisco ASA Firewall security, spanning-tree, Vlan’s, TCP/IP, RIP, OSPF, QOS, VRRP and VPN technologies.

Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.Worked with Cisco Nexus/NX-OS and Cisco Catalyst Switches. Worked with vendors and Engineering team to test new hardware and procedures.

Worked on F5 and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance.

Troubleshooting connectivity issues through Bluecoat as well writing and editing web policies.

Configuration and maintenance of routers, firewalls, and load-balancers. Included configuration of F5 BIG-IP 3600, and Cisco 6500. Includes protocols such as MPLS, BGP, OSPF, and VRRP. Also, worked with Cisco ASA's 5505 and 5520, 5512X, 5515X.

Configuring and troubleshooting Bluecoat SG9000 WAN acceleration appliances including WCCP, CIFS and creating/updating overlays. Created labs for F5 APM, ASM, and LTM implementations of Microsoft Exchange, Microsoft SQL, Microsoft IIS services, LAMP servers,

Handling Checkpoint and Checkpoint firewalls appliances, Checkpoint Provider-1/Multi-Domain-Mgmt. platform, Check point Smart Console R70.20 & R75.40, R77.10, R77.20.

Hands on Experience testing iRules using Browser (IE), HTTP watch on f5 load balancers. Designs and implement the security appliance ASA and SonicWALL for the Site to Site; any connect, SSL and Remote access VPN of many clients.

Managing Active Directory and Exchange Server, maintaining SharePoint documentation and ticketing system.

Responsible for technical evaluation, troubleshooting, overall project management, problem solving and turn-up of the service with the ISP.

Experience with Change management process and Project documentation tools like Excel and VISIO.

Upgraded Roger Management Network security appliances with Cisco Firewall ASA 5580, IDS, network management tools Cisco works (VMS, LMS, CSM), IDS/IPS. Managed F5 BigIP LTM appliances to load balance server traffic in critical serval access silos. Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.

Convert Campus WAN links from point to point to MPLS and to convert encryption from IPSec/GRE to Get VPN. Handles different networking platforms such as Cisco ASA firewall, ASR routers, Cisco Catalyst switches and routers, Bluecoat Packet shaper, Cisco WSA.

Environment: Nexus 7k, 5k, 2k, Cisco ASA 5505,5520, Palo Alto firewall, Checkpoint, Cisco UCS, Fortinet, F5 (LTM, GTM), Redware, bluecoat, IPS/IDS, ASR 9k, IPSEC, SSl VPN's, AWS, Spanning Tree, Cisco ISE, QOS, HSRP, VRRP, GLBP, RSTP, MST, Fabric path, OTV, MPLS, BGP, VOIP.

DOHMH, New York Mar 13 – Oct 14

Sr. Network Engineer

Responsibilities:

Maintain and track the status of device supplied to the client. Coordinating with JTAC for faulty part replacement and configuring standby device to support customer with minimal downtime.

Installation & Maintenance of Juniper switches routers &firewalls. Implementing and maintaining WAN/LAN and WLAN networks in different diagrams. Implemented various EX, SRX & J series Juniper devices.

Identified opportunities for implementation of network best practices, particularly F5 load balancer implementations. Monitor performance of network appliances and WAN utilizing using network analyzer like Wireshark. Study of migration of the old WAF infrastructure from Deny All to F5 BIG IP ASM technologies.

Experienced on Cisco ISE and advanced technologies like QOS, Multicasting, MPLS and MPLS-VPN and Bluecoat proxy server SG.

Working experience on tools and devices like Source Fire, Cisco ASA, Cisco ISE. Implemented Cisco ISE 1.2 for Wireless 802.1x Authentication and Authorization with FlexConnect

Responsible to providing support for IT infrastructure in the laboratory. Surveillance activities for physical and virtual switches. Open flow, 802.1x and MAC authentication test. Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Netscreen devices for easier management and common configurations.

Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series for higher. BigIP ASM Positive and Negative Policy Reinforcement, iRules, Full proxy for HTTP, Server Performance Anomaly Detection. Design and integration of Juniper SSG series firewalls, SA VPN Appliances, J series Routers, and EX series switches.

Help in building Cisco UCS servers to simplify data center architecture; reduce the number of devices to purchase, deploy, and maintain; and improve speed and agility. Knowledge in implementing and configuring F5 Big-IP LTM-6400 load balancers.

Security systems and appliances Cisco ASA 5520, Fortinet, Bluecoat, Packet Shaper 7500). Extensive experience in using T-SQL (DML, DDL, DCL) in SQL Server platforms. Configuring and managing FC zones on Cisco 9K/7K/5K.

Firewall worked upon include Checkpoint (R77 GAiA GUI) and Cisco ASA's (ASDM GUI). Focused on building new content and functionality for several F5 ecommerce sites. Created and resolved Palo Alto and Checkpoint Firewalls Rules, Routing, Pushed Policy.

Created and resolved Checkpoint, Palo Alto Customer Orders, and Request Orders. Configuration of Fabric path and connectivity between Nexus 7K and Nexus 5K

Installed controller and light weight access point coordination with JTAC. Managed all project work related to F5.com development. Drove development of new API's related to F5 product trials that focused on verifying and capturing.

Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multi-Layer Switching. Perform Packet Shaper Bluecoat 75000 OS upgrade, maintenance and configurations

Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers. Optimizing and monitoring the performance of a WLAN, LAN, WAN and user's segments

Experience with deploying Fabric Path using Nexus 7000 Devices, Experience with configuring OTV between the data centers as a layer 2 extension. Experience with configuring FCOE using Cisco Nexus 5548. Implemented cluster and configuration of SRX-100 Juniper firewall.

Implemented cluster and configuration of SRX-110 Juniper firewall. Installed Trapeze-MX 2800 wireless controller and light weight access points. Working with MPLS Designs from the PE to CE. Maintain, monitor, and troubleshoot network devices, wireless.

Experience with designing and deployment of MPLS Traffic Engineering. Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks. Design and deployment of MPLS QOS, MPLS Multicasting per company standards.

Environment: F5 - LTM 5100, 6800, GTM, ASM, APM, IRules, Juniper EX, SRX, J, MX series, UTM - Antivirus, Bluecoat proxy servers, Cisco ISE, Packet shaper, Checkpoint -R77, IPV4, IPV6, VSS, VPC, VRF, VDC, SNMP, SIP, Trunking, Trapeze-MX 2800, IOS-XR, FCOE, 802.1X, OSPF, RIP, EIGRP.

Birla Soft, India Aug 10 – Dec 12

Network Engineer

Responsibilities:

Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route. Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications.

Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access.

Configured the Cisco router as IP Firewall and for NATing. Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.

Installing new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations. Installing and maintaining local as well as network printers. Validating existing infrastructure and suggesting new network designs.

Providing technical support to LAN & WAN systems. Configuring all the required devices and equipment for remote vendors at various sites and plants. Installation and maintenance of new network connections for the customers.

Installing and maintaining Windows NT Workstations and Windows NT Server. Monitor performance of network and servers to identify potential problems and bottleneck.

Real time monitoring and network management using Cisco Works LMS. Monitoring Memory/CPU on various low-end routers in a network. Configuring routers and send it to Technical Consultants for new site activations and gives online support at the time of activation.

Provided technical support on hardware and software related issues to remote production sites.

Performed administrative support for RIP, OSPF routing protocol. Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.

Environment: OSPF, RIPv2, BGP, IGRP, LAN, WAN, RADIUS, TACACS, VLAN, Cisco Works, HSRP, CISCO 2600, 2800, 3600, NAT, Static route, Switching.



Contact this candidate