Post Job Free

Resume

Sign in

Engineer Cisco

Location:
New York, NY
Salary:
65$
Posted:
April 18, 2018

Contact this candidate

Resume:

VAMSI

Sr. Network Engineer

ac46ik@r.postjobfree.com

732-***-****

Professional Summary:

Around 8+ years of professional experience in designing, deploying and troubleshooting Network and Security, including hands-on experience in providing network support, installation and analysis for a broad range of LAN / WAN communication systems.

Strong knowledge in Cisco Routing, Switching and Security with Cisco hardware/software (heavy Cisco shop) experience.

Experience in layer-3 Routing and layer-2 Switching.

Expertise in solving problems for Routing, Switching and WAN connectivity issues using ticketing system like Remedy Ticketing System.

Strong knowledge in configuring and implementing VLAN, VTP, LAN switching, STP and 802.x authentication in access layer switches.

Efficient experience in configuration & troubleshooting of routing protocols and deployment of OSPF, EIGRP, BGP, HSRP.

Expertise in switching tasks such as VTP, ISL/802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.

Experience in adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications.

Hands on experience in PIX Firewalls, ASA Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).

Expert level hands in implementation and O&M of Palo Alto Firewalls, DMVPN solutions, O&M of sidewinder firewalls, ASA firewalls and Bluecoat content appliances.

Experienced in managing CISCO Routers, Switches, Fortigate Firewalls and Sonic WALL Firewalls.

Hands on experience with Virtualization, VM ware and Bluecoat proxy.

Efficient experience on Blue Coat ProxySG Web Application Reverse Proxy.

Expert level hands on deploying BIG-IP F5LTM Load Balancers for load balancing and traffic management of business application.

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.

Hands on experience in implementing and managing F5 BIG-IP load balancing, including GTM, ASM, APM, and custom iRules development.

Experience with IP Address Management (IPAM) systems such as Infoblox, Solarwinds.

Expert level hands in Administer Infoblox DNS/DHCP/IPAM environment.

Efficient at design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550).

Took active part in implementing Virtual Device context and virtual port channels. Configured Juniper EX switches and QFX switches. Used QFX switches in satellite mode (Fusion) on MX 960 routers.

Efficient experience on integrated VMware virtual machines for testing the lab environment.

Expertise in supporting LAN, WAN, Aruba Wireless & CPPM and Palo Alto with HA environment.

Install network backbone, wireless controllers and wireless access points (Cisco, Aruba, Ruckus).

In depth understanding of WAN - CISCO WAAS and RIVERBED STEELHEAD.

Experience in supporting Riverbed Steelhead WAN Optimization products.

Hands on experience to provide secure access and guess access throw Cisco Identity Service (ISE).

Experience with Software Defined Network (SDN) and specifically Cisco’s Application Centric Infrastructure (ACI), Cisco Nexus 1000V.

Experience in configuring various Fortinet firewalls Fortigate-620C,60B, 60D, Forti WI-FI 60D.

Efficient in Cisco IOS for configuration & troubleshooting of routing protocols.

Cisco IOS experience on 3600/7200 class hardware in complex WAN environment.

Check point UTM series, Check point IP series, Application layer firewall PA-4000 & 2000 series, Sidewinder McAfee, Fortinet 3240c, Cyberoam, SGS 5440 Symantec Gateway security.

Efficient in design and implementation of Citrix Netscaler and Storefront solutions for internal and external access.

Experience in A10 AX series, F5 BIG-IP & Cisco ACE 4710 Load balancers.

Expert level hands in Configuration, administration and maintenance of Wireless Access Points (Meraki and Fortinet devices).

Experience in conducting online product demonstrations using the Cisco Meraki Cloud Controller web interface via WebEx.

Experience in regular storage provisioning from EMC & HDS arrays to Windows/Solaris/Linux/VMWare/AIX servers.

TECHNICAL SKILLS:

Cisco Routers

7600, 7200, 3800, 3600, 2800, 2600, 2500, 1800 Routers.

Routing Protocols

RIP v1/v2, EIGRP, OSPF, BGP, Static route.

Cisco Switches

Nexus 5548, 5596, 6000, 7009, 7018.

LAN Technologies

Ethernet, Fast and Gigabit Ethernet, LWAPs.

WAN Technologies

HDLC, PPP, ISDN Frame Relay, VPN.

F5 load balancers

(LTM & GTM) configuration, administration and troubleshooting.

Juniper

EX 2200, EX 4200, EX 4500, MX-480, M Series, SRX210, SRX240.

Switching Technologies

VLANs, Inter VLAN routing and Port Channels, VTP, Spanning Tree Protocols like PVST+, RSTP+, Ether-Channel.

Network Security

Cisco ASA and PIX 525 Firewalls, ACL, IPsec.

Redundancy Protocols

HSRP, GLBP, VRRP.

VPN Technologies

GRE Tunneling, Remote Access VPN, Site-to- Site VPN.

Applications

Wireshark, Netmon, Microsoft Service Enterprise, Secure CRT, Putty, Alarm Monitoring Console, MS Ticketing, MS Azure, VPN migration, Multipoint Ethernet, SNMP, Genesis Suite 6.5 Router Configuration, SDN, and Genesys Suite 7.x.

VMware

VMware ESX & VCenter Server, VMware Workstation.

Palo Alto Firewalls

PA-2K, PA-3K and PA-5K.

Check Point Firewalls

NGX R65, R70 AND R71.

Security Technologies

Cisco FWSM/PIX/ASDM, Juniper SRX, Cisco ASA Checkpoint, Palo Alto.

Tunneling Protocols

L2TP, IPsec, PPPoE, GRE, MPLS, IEEE 802.1Q.

Authentication Protocols

PAP, CHAP.

Cisco ASA-X Firepower

Platforms 5515, 5525, 5545, 5585.

CERTIFICATIONS:

Cisco CCNA (Cisco Certified Security Associate)

Cisco CCNP (Cisco Certified Network Professional)

Solarwinds certified professional

EDUCATION:

Bachelor’s in technology

PROFESSIONAL EXPERIENCE:

Caterpillar, East Peoria, IL Jan 2016 – Till date

Sr. Network Engineer

Responsibilities:

Designed, installed, and maintained various WAN technologies and applications connecting remote sites to corporate headquarters.

Configured, implemented, and troubleshoot routers and switches with various account settings, permissions, and parameters including security firewalls.

Primary responsibility is to design and deploy various network security & High availability products like Checkpoint NGX, Provider-I, Nokia appliance, Cisco ASA other security products

Installed various network hardware including concentrators, bridges, and hubs to establish communication connections with remote locations.

Configured multiple domain name services (DNS), email services (Exchange Server), web, and file transfer protocol services (FTP) for various platforms including line leasing through DHCP servers.

Maintains and troubleshoot problems with high speed internet access, DSL, T1 lines and DS0, long-distance telephone service and local telephone services.

Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.

Experience with creating VIP (virtual servers), pools, nodes and applying iRules for the virtual servers like cookie Persistency, redirection of the URL.

Design, procure parts and implement networks for LAN & WAN (IPSec, MPLS, Frame Relay, ISDN, and T1/ E1/T3/E3 Lease Line)

Data center migration was involved in Access, Distribution and Core layers

Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.

Experience with configuring Virtual Server and Configuring Load balancing methods in F5 LTM

Experience with design and implementation of Data center migration.

Expert in configuring Cisco Routers, Catalyst Switches, Nexus Switches.

Upgrade Cisco 6500, 3750, 2960s, Nexus 5000, Nexus 2000, Nexus 7000 switch IOS software

Worked extensively with Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches

Identify, design and implement flexible, responsive, and secure technology services

Implemented Positive Enforcement Model with the help of Palo Alto Networks.

Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.

Establish AWS technical credibility with customers and external parties

Help customers build scalable, resilient, and high-performance applications and services on AWS

Develop/capture/document architectural best practices for building systems on AWS

Networking protocols worked with included but not limited to TCP/IP, DNS, WINS, DHCP, VPN, Terminal Services, Routing and Remote Access, Network Design, wiring and cabling.

Cisco IOS experience on 3600/7200 class hardware in complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data center environment

Hands on experience installing Sup720 for Cisco 6509-E series and its Gigabit Ethernet port deployment in the core network

Delivered and lead projects at various verticals/customers enabling technologies for SDN, OpenStack cloud Based initiative and NFV.

Configuring IP, RIP, EIGRP, OSPF and BGP in routers.

Experience in deploying EIGRP/BGP redistribution and the changing the metrics for the primary and backup

paths for the packet prioritization and EIGRP tuning

Experience on a mesh 6500 and 5500 series routes and switches to support the core trading system. Involved

Experience working with Nexus 7010, 7018, 5020, 2148, 2248 devices

Experience working with High performance data center switch like nexus 7000 series

Configuring IPSEC VPN on SRX series firewalls

Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path.

Configured IPSec site-to-site VPN connection between Cisco VPN 3000 Concentrator and Cisco 3800

Installation and Configuration of Cisco Catalyst switches 4500, 3750 & 3850 series and configured routing protocol OSPF, EIGRP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy.

Hands on experience on troubleshooting Cisco Wireless LAN controllers and Wireless Access points

It also includes the configuration of port channel between core switches and server farm block switches N9K-C9372TX-B18Q.

Experience in communicating with different vendors, IT teams in gathering the details for the project.

Create and test Cisco router and switching operations using OSPF routing protocols in Cisco Lab.

Optimized performance of the LAN network consisting of Cisco 3850/4500/6800 switches by configuring VLANs

Experience in WAN technologies like AT & T, TWC circuit types and replaced them with ISR 4331 and 4351 Routers.

Installation of ISR routers IOS upgrades and also racking and stacking.

Environment: Juniper firewalls 5GT, 208, SSG 5, 140, 550, 550M, NSM, IDS/IPS, 6500/3750/3550/3500/2950 switches, Juniper (M320, T640), Load balancing, Cisco 7200/3845/3600/2800 routers, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, Ether Channels, ISR 4331 AND 4351 ROUTERS

FedEx, Memphis, TN Jul 2014 – Dec 2015

Sr. Network Engineer

Responsibilities:

Responsible for installation, troubleshooting of firewalls (Cisco firewalls, Checkpoint R70.50-75.50 firewalls) and related software, and LAN/WAN protocols.

Supported Tomcat server clustering, load balancing, failover and performance tuning

Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.

Provided proactive threat defense with Checkpoint firewall that stops attacks before they spread through the network.

Extensive Packet level debugging and troubleshooting on Palo Alto Firewalls to resolve numerous network issues.

Rewrite existing Python/Django modules to convey certain format of data.

Install network backbone, wireless controllers and wireless access points (Cisco, Aruba, Ruckus)

Deployed Active Directory domain controllers to Microsoft Azure using Azure VPN gateway.

Building configurations for Juniper MX 2010 and MX 2020 routers with features like port security, VLANS, VTP, PVST+.

Optimizing Citrix HDX Protocols for remote agents located across the globe.

Deployed Citrix UPM solution to reduce profile load time and corruptions.

Maintained Aruba Network, in two different data centers, for over 1500 remote home users (VPN)

Selected as the one person hired from the contractor to maintain the wireless network

Reengineered the LAN to provide more reliable services and to reduce the latency, analyzed the NT domain in the Austin office to determine all the problems

Configured and maintained the networks consisting of Cisco 2800 and 3800 routers, and catalyst 2950, 3560, and 3750 switches.

Configuration of Juniper SRX series firewalls for outbound traffic via blue coat proxy server.

Configure and troubleshooting HA Cluster on Checkpoint and Palo Alto Firewalls.

Analyze logs and make necessary network report using panorama, Palo Alto firewall and smart reporter console application.

Worked on Checkpoint 41K Series to manage network traffic flows using dedicated processing and memory for networking, security, threat prevention and management

Created subnets (on these switches) from the given Class B and Class C addresses to support the VLANs.

Experienced working with various services in Azure like Data to store and analyze the data.

Responsible for developing and deploying Solar Winds which includes WAN/LAN and server monitoring, reporting, and alerting and Configure Orion alerts.

Implemented inter-VLAN routing (on Juniper EX 3300 and EX 3400 switches) among the VLANs to allow communication on larger internetworks.

Implemented extended ACLs on Juniper SRX and 3750 to allow communication between the required networks, and to restrict other communications.

Configuration of security policies for security infrastructure using proper change management process.

Maintaining corporate firewalls and Analysis of firewall logs using Security Analytics.

Knowledge of McAfee web gateways and other web filtering technologies and giving access to personal email accounts based on Organization's security policy standard.

Providing technical support for service request issues, customer engagement and internal projects.

Monitoring performance of network devices using Spectrum.

Implementing Proxy requests, maintaining Proxy incidents and troubleshooting proxy issues using McAfee web gateway.

Adding external websites to the McAfee Web gateway and blocking them when they categorized as an uncategorized URL.

Checking Internet F5 VIP's security policy using AppviewX.

Documentation and reporting of security policies, process and procedures.

Involving troubleshooting network problems using Cisco ASA packet-capture, tracert and Syslog.

Responsible for optimizing Digital Globe's F5 infrastructure. Some of the task included EM setup, 11.x upgrades, standardized AAA, layer 7 pool monitoring, and HA optimization

Responsible for day to day network support in an all Juniper environment. The infrastructure protocols included OSPF BGP, MPLS and VPLS and the hardware consisted of EX4200 and 4300 switches, MX 480 and 960 routers and SRX 240 and 5600 Firewalls.

Responsible for installing pair of Palo Alto Firewalls for branch site in Vwire mode. Reviewed Palo Alto Configurations using Panorama 5.x

Receive official Palo Alto Essentials 201 and 205 training classes.

Used Provider 1 and Smart Domain Manager to migrate Checkpoint R71 and R75 firewalls rules for the new DMZ.

Planned routing changes that consisted of BGP and OSPF.

Environment: Cisco ASA firewalls 5505, 5540 and 5580; Palo Alto Firewalls 3000 and 5000 series; Cisco router 7200 and 3600; Catalyst switches 6500, 3750 and 3550; Nexus 7010, 5020 and 2148 switches; Proxy McAfee Web Gateway, Security Analytics, AppviewX, Spectrum, F5 LTM, GTM 8950, 6900 models.

DTE Energy, Detroit, MI Nov 2013 – June 2014

Network Security Engineer

Responsibilities:

Design and develop infrastructure software for network management system and monitoring for one of the largest networks, containing SDN, traditional routed and traditional optical mode.

Created script in Python for automatizing logs.

Juniper: EX-2200, EX-4200, EX-4500, MX-480, M series, SRX210, SRX240.

Part of the team that manages the IP MPLS VPN and Clients Enterprise Network to ensure all services.

SLA's are met for all internal and external customers. Third level of escalation incident management to support post sale solution during the live cycle of the services.

Design and implemented Cisco VoIP infrastructure for a large enterprise and multi-unit office environment.

Lead design and implementation engineer for VoIP projects consisting from 100 to 15,000 IP Phones and Analog devices.

Expertise to orchestrate the data to and from Data Lake Store using Azure Data factory.

Designing, Implementing LAN/WAN configurations on Cisco Nexus 5k, Catalyst 6500 switch.

Assist customers with Certificate Updates, Load balancing through Citrix Net scalar.

Configuring and resolving various OSPF issues in an OSPF multi area environment.

Configured and designed Access layer switches such as Cisco 4510, 4948, 4507 switches.

PCO (Provisioning Control Office) function in support of Mobility Network Provisioning.

Responsibilities are including managing the order process which encompasses order tracking, validating engineering, documenting and publishing daily reports. This is involving all aspects of the provisioning process CISCO/Juniper including, Ethernet, PPP and other’s duties involve (SRX, Q Fabric and J series).

Configured IPSEC VPN (site to site remote access) on Checkpoint series firewall.

Install and configured S-JRSS Stack to include Juniper, Cisco, Palo Alto, Gagman and Dell 380 series server equipment

Configuration and maintenance of PIX and ASA firewall systems.

Configured DHCP scopes for voice and data VLAN segments.

Manage and implement solution on Telephonic Global MPLS Network

Extensive knowledge and hands-on experience with the latest version 13.3 of JunOS-Space.

Implemented site-to-site VPN in Juniper SRX as per customer.

Implementation of Dynamic VPN via Checkpoint Firewalls and Pulse Secure Clients.

Installation, Configuration, upgradation, Monitoring, Troubleshooting and Testing activities performed on Checkpoint and Juniper Firewalls

Responsible for all Juniper SRX firewalls consisting of SRX3600, 1400, 550. Using CLI and/or Junos Space Security Director for management. Install, upgrade, troubleshoot, design, etc.

Implemented various EX, SRX and EX series Juniper Devices.

Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.

Redistribution of OSPF and EIGRP into BGP with the correct tagging parameters from the old legacy network to route and to utilize the correct MPLS VRF VPN's provided from the bearers.

Implemented, Configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).

Expertise in maintenance of layer 2 switching tasks- VLAN, VTP, RSTP, configuration of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.

Implemented Cisco Security Management Appliance and IronPort ESA in DR site to provide redundancy across data centers for email flow.

Conducted site surveys and installation of wireless Area network.

Guided a team of 15 junior Network Engineers for deployment of Cisco LAN/WAN/WLAN infrastructure.

Responsible for service request tickets generated by helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.

Supporting EIGRP and BGP based PwC network by resolving level 2 and 3 problems of internal teams and external customers of all locations.

Estimated project cost and created documentation for project funding approvals.

Created and delivered internal training on BGP.

Administering multiple Firewall of Juniper/ Net Screen, in a managed distributed environment.

Experience with Cisco LAN controllers (8500, 5760, 5500) Cisco Access Points (3700, 2700, 1600, 700W), Cisco Mobility Platform.

Planning, deploying LANs/WANs voice interconnection using protocols VoIP, H.323, SIP, ISDN, L1-L3.

Experience with converting checkpoints VPN rules over to the Cisco ASA Solution. Migration with Cisco ASA VPN experience.

Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes and route filtering using Route-maps.

Have applied ACLs for Internet access to servers using Cisco 5550 ASA firewall and performed NAT.

Worked on WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing protocols (BGP/OSPF) and IP addressing.

Environment: EX-2200, EX-4200, EX-4500, M series MX-480 SRX210, SRX240, 8500, 5760, 5500, Cisco 5550 ASA, Cisco LAN controllers (8500, 5760, 5500) Cisco Access Points (3700, 2700, 1600, 700W), Solarwinds, Checkpoint R77.30 41 K series.

Creative Technosoft Systems, Hyderabad, India Aug 2011 – Oct 2013

Role: System/Network Administrator

Responsibilities:

Enhanced abilities to install and maintain Microsoft Exchange and worked extensively on different applications.

Created network diagram under senior Network Engineers using the Microsoft Visio.

Preparing Client Machines for users with Operating Systems, Software, antivirus and required utilities and mailing clients etc.

Perform daily maintenance, troubleshooting TCP/IP problems, configuration, and installation of all network components and connectivity Issues.

Configuration of CISCO Routers (3600, 4000, 7200, 7600 Series) and 3550, 4500, 2800 3700 series switches.

Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay and ATM).

TCP/IP network planning, Implementation and Management with subnets.

Enabled SNMP traps for our Cacti Monitoring tool to monitor traffic and check the regular health of Servers and Network Devices

Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.

Providing support for advanced level and on-call support for large variety of networks, systems, and infrastructures.

Configured Site-to-Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.

Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.

Troubleshooting network systems and performance, and remediating issues professionally and concisely.

Implemented and Configured IP Routing Protocols such as RIP, EIGRP.

Implemented and configured LAN Protocols: Ethernet, VLANs, VTP and STP.

Worked with Remedy Ticketing tool in maintaining and keep a track of logs/monitor.

Designed and implemented IP Addressing, Sub netting, Route Summarization and Route Distributions.

Monitoring the Servers and Networks.

Environment: LAN, WAN, Sub netting, VLAN, VTP, VPN, NAT, OSPF, BGP, EIGRP, Cisco 3600, 4500.

iD'sign Technologies, Hyderabad, India Dec 2010 – July 2011

Jr. Network Engineer

Responsibilities:

Implementing new/changing existing data networks for various projects as per the requirement.

Troubleshooting complex networks layer 1, 2(frame relay, ATM, Point to Point, ISDN) to layer 3 (routing with BGP, EIGRP, OSPF and RIP protocols) technical issues.

Working on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path, and Community, MED.

Implemented VTP and Trunking protocols (802.1q and ISL) on 3560, 3750 and 4500 series Cisco Catalyst switches.

Performed IOS upgrades on 2900, 3500 series Cisco Catalyst switches and 1800, 2600, 3600 series Cisco routers using TFTP.

Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, Frame relay, NAT, DHCP, TCP/IP).

Installing and maintaining Windows NT Workstations and Windows NT Server.

Providing technical support to LAN & WAN systems.

Monitoring performance of network and servers to identify potential problems.

Involved in network monitoring, alarm notification and acknowledgement.

Performing RIP, OSPF, BGP, EIGRP routing protocol administration.

Preparing feasibility report for various upgrades and installations.

Other responsibilities included documentation and support other teams.

ENVIRONMENT: Windows NT Workstations, NT servers, RIP, OSPF, BGP, and EIGRP.



Contact this candidate