Resume

Sign in

Network Engineer

Location:
St. Louis, Missouri, United States
Posted:
February 20, 2018

Contact this candidate

Resume:

Praneeth Emmanuel

Network Engineer

732-***-****

ac4jr0@r.postjobfree.com

PROFESSIONAL SUMMARY

Cisco certified Network Engineer with 8 years of experience in Network designing, Troubleshooting, implementation, Deployment and supported production environment.

Implemented, configured and troubleshooting various Routing Protocols like RIP, EIGRP, OSPF, BGP with real time hands-on experience

Strong Quantitative & Analytical background with professional experience in Network Administration, Quality of Service (QoS), Security Policies & Project Management

Efficient designing of IP Addressing Scenario using VLSM and Sub-netting

Implemented various Switching Technologies STP, RSTP, VLAN & VLAN Trunking Protocol (VTP), Inter-VLAN routing, Ether channel using LACP, PAGP along with Failover Mechanisms such as HSRP & GLBP on Layer 2 Setup.

In-depth knowledge and experience in WAN technologies including SONET Ring, OC3, E3/T3, E1/T1, ISDN, HDLC, Point to Point, Ipv6 multicast, ATM, MPLS, LDP, TDP and Frame Relay.

Experienced in working on Cisco Catalyst (CAT) switches 2900, 3750, 4500, 6500 series.

Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.

For security purposes, enabled Authentications such as WPA2, PAP/CHAP and AAA model for authorization, authentication and accounting purposes.

Hands-on configuration and experience in setting up Cisco Routers to perform at the Access, Distribution and Core layers.

Configuring and troubleshooting Vlan’s, STP, Trunking, Ether channel, DTP on the LAN switches.

Good understanding of the overall IWAN design.

Implemented traffic filters using Access-lists, Distribute-Lists, Route Maps and route manipulation using Offset-list.

Demonstrated experience in developing, implementing, auditing Checkpoint firewall (R77.30) configurations and analyzing, optimizing rule sets.

Experience with configuring DMVPN tunnels for the MPLS and ISP clouds, which are responsible for Transport Independent Design of IWAN.

Strong Experience in using various tools for management, analyzing, and troubleshooting, monitoring & process automation in Lab & Production environment

Knowledge in preparing Technical Documentation and presentations using Microsoft VISIO/Office.

Highly motivated with the ability to work independently or as an integral part of a team and Committed to highest levels of professional.

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.

Experienced in facing the Bluecoat and Palo Alto product lines, up to pre sales type of function

Configuring and troubleshooting different Cisco ASR's like 1002, 1013, 3750, 3850, 4510 and 9K routers.

Knowledge on AAA authentication servers such as TACACS+ and RADIUS.

Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)

In-depth knowledge on Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS.

Expertise in structured cabling, IP address management, Racking, Stacking, UCS management.

Configuration of Network and Security devices such as Cisco routers and switches (Cisco 7K/5K), Firewall (Checkpoint R75/Gaia and Cisco FWSM), Load Balancers, DNS and IP Manager (Infoblox).

Experience with Checkpoint VSX, including virtual systems, routers and switches.

Black listing and White listing of web URL on Blue Coat Proxy Servers.

Administration of production Windows Servers infrastructure that includes Domain Controllers, IIS Web Servers, SharePoint, File and Print and FTP/SFTP servers.

Extensive experience in Windows 2008 Wintel Servers at single or multi domain platforms.

IDS and IPS event management using CSM including signature updates for SSM Modules, IDSM.

Provides management level reporting of firewall and Intrusion Protection System (IPS) activity on a periodic basis.

Excellent interpersonal, communication and organizational skills with the ability to interact effectively with employees at all levels within the organization.

TECHNICAL SKILLS:

Networking : TCP/IP, LAN, WAN, WLAN, Aruba ARM, Cisco Clean Air, Air Magnet, Wireshark, Wave Deploy, SDM, CNA, ASDM, CCP, Iperf, Telnet, DHCP, DNS

Routing Protocols : RIP, RIPv2, IGRP, EIGRP, OSPF, BGP, MPLS, Route Summarization, Redistribution

Switching : VTP, STP, RSTP, MAC, VLAN, L3 Switching

Security : VLAN, VPN, ACL, SSL, NAT, PAT, IDS, IPS, WEP, WPA, WPA-2 (Personal), WPA-2 (Enterprise using RADIUS) Cisco ASA 5585, 5550, 5540, Juniper SRX5400, 5600, 5800, Juniper Net screen 6500, 6000, 5400. Juniper SSG Firewalls, Checkpoint Gaia R76, R77, R77.10 &R77.20 Palo Alto PA-3060/2050, F-5 BIG-IP LTM (3900 and 8900), Blue Coat SG8100, AV 510, Av810, Digital Guardian

VoIP : SIP, Cisco Call Manager (Version 8.0, 8.5, 8.6), Asterisk

Server Platforms : Windows 2003, Windows 2008, DHCP, DNS, Active Directory

Network Simulators : Packet Tracer, GNS3

Packet Capture tools : Wireshark

Databases : SQL 2005/2008, MS Access

Application : MS Visio, MS Project, MS Office, Adobe Photoshop

Operating Systems : Windows XP professional, Windows 7 Professional, Ubuntu, Mac, UNIX

Ticketing tool : Service-now, Remedy system

Cisco Certified Network Associate (CCNA)

Cisco Certified Network Professional (CCNP)

EDUCATION:

Bachelor’s Degree in Electronics and Instrumentation Engineering

WORK EXPERIENCE:

Charter Communications, ST. Louis, MO Apr 2016 - Present

Network Engineer

Responsibilities:

Involved in configuring and implementing of composite Network models consists of Cisco 7600, 7200, 3800 series routers and Cisco 2950, 3500, 5000, 6500 Series switches.

Managed VPN, IPsec, Endpoint-Security, status policy, Application control, IPS, Monitoring, Anti-Spam, Smart Provisioning, DLP using Checkpoint Firewalls.

Worked with Juno OS and Juniper M&T series switches.

Worked with Cisco ACE GSS 4400 Series global site selector Appliances.

In-depth expertise in the implementation, optimization, troubleshooting and documentation of LAN/WAN networking systems.

Successfully built a new, fully redundant and scalable global core backbone network interconnecting 4 point of presence (POP) with VPLS transport in support of IWAN solution.

Responsible for designing, implementing and troubleshooting temporary infrastructures for Live Webcasting Events

Involved in F5 BIG IP LTM administration, familiar with enterprise level traffic managers like 6800, 3600, 1600, 3400 series

Configured Nexus 7010 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links.

Strong networking capability and knowledge of different firewall platforms to help in random identification and isolation of issues during outages and incidents.

Participated in the installation, configuration, post installation daily operational tasks and configuration and deployment of Cisco Nexus equipment.

Install, upgrade and configure Next-Gen Palo Alto Firewall series PA-200, PA-500 .

Configured ACI Policies, Tenants, Bridge Domain, Private Networks, Contracts and Filters

Configured ACI integration with VMware.

Assistance provided with initial installation and configuration for IWAN along with the IWAN Readiness Assessment for the newly implementing customers

Experience with configuring DMVPN tunnels for the MPLS and ISP clouds, which are responsible for Transport Independent Design of IWAN.

Designed and configured IPSEC VPN tunnels on Palo Alto firewalls to establish remote site connectivity

Install, manage and monitored Palo Alto Firewalls in Panorama

Designed 10 gigabit networks using Cisco Nexus 7000 series switches, and Cisco 3800 series routers

Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0.

Design and Implement DMZ for FTP, Web and Mail Servers with CISCO PIX 506, PIX515.

Mapped, Network Diagrams and physical identification in MS Visio.

Worked with engineering team to resolve tickets and troubleshoot L3/L2 problems efficiently.

Deployed on Nexus 7000, 5000 and 2000 series with V-Block servers and Cisco UCS E-series.

Perform extensive testing around the upgrade, migration and configuration functionality of our software.

Configured Easy VPN server and SSL VPN to facilitate various employees' access internal servers and resources with access restrictions.

Responsible for entire company network infrastructure that includes Cisco Switches, Routers, Firewalls, Access Points, Servers and PBX.

Implementation of Site-to-Site VPNs and DMVPN over the internet using IKE Phase 1 and IKE Phase 2 based on traffic with ASA 5500 series Firewalls.

Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as Cisco 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.

Managing and troubleshooting of Juniper M320 routers including installation, upgrade, configuration and network management.

Experience in migration of VLANS & Configured VLANs with 802.1q tagging, Ether channels, and Spanning tree for creating Access/distribution and core layer switching.

Creation of firewall rules on Checkpoint Smart Dashboard and install policies.

Management of corporate Checkpoint Firewall implementing security protocols and alleviating network attacks.

Deployed Palo Alto Firewalls for web filtering and application control.

Configured EBGP load balancing and Ensured stability of BGP peering interfaces.

Configured Cisco 2800, 3800 routers and 3750, 4500, 6500 switches as part of the implementation plan.

Environment: LAN, WAN, IWAN, MPLS, Cisco ASA, HSRP, VRRP, GLBP, VLAN, OSPF, EIGRP, BGP, TCP/IP, STP, PVST, RSTP, VTP, F5loadbalancer, NAT, Cisco ASA firewalls, Palo Alto Firewall, SSH, Syslog, SNMP, NTP, SolarWinds, Net flow, Net brain and Infoblox VPN.

Humana Health, Louisville, KY Apr 2015 – Mar 2016

Role: Network Engineer

Responsibilities:

Installed and configured latest Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per business requirements.

Experience in file transfer, email and messaging application protocols like FTP, SFTP, Microsoft Lync and Microsoft Exchange

Used Cisco Prime monitoring tools for alarm generation in case of network failure and for issuing major critical warnings in the network.

Configured and performed the installation Cisco prime infrastructure to deploy IWAN.

Hands-on experience with firewalls, IDS/IPS, malware, forensics, Proxy and network security devices

Performed migration from legacy Catalyst 6513 Switches to Nexus 7010 switches adhering to ITIL change Management Procedure during data center fabric migration process.

Configuring rules and Maintaining Palo Alto with IPS module & Analysis of firewall logs

Integrated Palo Alto next-gen firewalls with overlay VMware NSX SDN network.

Provided daily Palo Alto firewalls administration such as Threat prevention, URL filtering, IPSEC and SSL VPN's, zone based integration, and analyzing syslog's, and utilizing wild fire feature in Panorama 7.1.

Experience with setting up MPLS Layer 3 VPN cloud in data center and also working with BGP WAN towards customer

Worked with ISR 4k, ASR 1k, CSR 1000v and other IWAN compatible routers.

Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500 with ACL, NAT and Multi-Contexts.

Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN.

Responsible for managing activities, Upgrading IOS - Upgrading hardware and installing new devices, Tuning (Configuration), make standardization for the topology.

Good experience with ACI, Open Stack, UCS Directors and UCS Central

Experience working with multi-vendor load balancers like F5 and Citrix NetScaler in configuring, implementing and troubleshooting F5 load balancer in the enterprise network.

Worked on F5 Local Traffic managers (LTM), Global traffic manager (GTM) of series 8900, 6400, 6800, 3400, 5100 and 3600.

Experience with moving data center from one location to another location, from 6500 based data Center to Nexus based data center

Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.

Configured BPDU Guard, port-fast, uplink fast and other spanning tree features

Hands-on experience in the network management of circuits using TDM and Frame Relay network, performing configuration and provisioning management, fault management and performance monitoring.

Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.

Experience configuring VPC (Virtual Port Channel), VDC in Nexus 7010/7018

Environment: 6500/3750/3550/3500/2950 switches, Juniper (M320, T640), LAN, WAN, IWAN, Nexus 7k/5k/2k Routing protocols, Cisco 7200/3845/3600/2800 routers, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, Ether Channels, NMN (Network Node Manager)

Key Bank, Cleveland OH Jan 2014 – Mar 2015

Role: Network Engineer

Responsibilities:

Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route-feedback, BGP attributes) on Cisco Routers 7613, 7201, and 3945E.

Actively involved in switching technology Administration including creating and managing VLANS, Port security - 802.1x, trucking 802.1Q, RPVST+, Inter-VLAN routing, and LAN security on Cisco switches.

Supported EIGRP and BGP based on the network by resolving level 2 & 3 problems of internal teams & external customers of all locations.

Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches

Co-ordinate with design team and implementing the changes as per the design and testing with the concern team.

Network devices IOS up-gradation and taking backups.

Working with Checkpoint Support for resolving escalated issues.

Worked extensively on Data Center Palo Alto firewalls and F5 BIG-IP LTM.

Implemented many number of security policy rules and NAT policy rules on Palo Alto, created Zones, Implemented Palo Alto Firewall interface, Palo Alto IDS and VLAN.

Configured ACI Policies, Tenants, Bridge Domain, Private Networks, Contracts and Filters

Configured ACI integration with VMware

Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.

Subject matter expertise supporting and maintaining F5 Big-IP load balancers

Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.

Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.

Experience with Project documentation tools & implementing and maintaining network monitoring systems and experience with developing network design documentation and presentations using VISIO

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX

Security appliance, Failover, DMZ zoning, & Configuring VLANs/routing/NATing with the firewalls as per the design.

Experience with Network equipment configuration RADIUS, TACACS/TACACS+, and NTP, network management software and SNMP.

Ensure that the clients are enforced with the EPS policy configuration.

Management of quarantine and prevent the other systems from getting infected.

Installed wireless access points (WAP) at various locations in the company.

Created dedicated VLANs for Voice & Data with QOS for prioritizing VOICE over DATA.

Hands on experience and good working knowledge with Checkpoint Firewall policy provisioning.

Packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems.

Management of NAV Primary server for Symantec Antivirus Server and updates.

Virus removal on the infected systems by automated or manual process.

Troubleshooting checkpoint firewall connectivity related issues using Smart view tracker.

Provided Daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.

Environment: Cisco Routers, Cisco Switches, Nexus 7k/5k/2k Routing protocols, F5, Load Balancer HSRP, VRRP, IPSEC VPN, VPN, QOS, ASA firewall, Load balancer, MPLS, VLANS, VTP, RSTP, ACL, NAT, IDS/IPS, SIP, RTP, RADIUS, TACACS+, Juniper SRX 240, ASR 9000, Catalyst 6500, Wireshark, Check point R77, Blue coat proxy server, Symantec Endpoint protection.

Client: Secure-24 IT Services, Hyderabad, India Sep 2011 – Dec 2013

Role: Network Engineer

Responsibilities:

Installation and Maintenance of Cisco Routers 7301, 7606, 7609 & switches 3750, 2950, Ericsson ECN 320 switch.

Handled the tasks of implementing and maintaining LAN and WAN infrastructure of the organization.

Worked for installing, maintain and troubleshoot computer, laptops, workstations, Windows servers and network issues.

Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.

Upgrading and configuring Cisco routers and switches

Extensive hands-on experience with complex routed LAN and WAN networks, routers and switches.

Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.

Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.

Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks

Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.

Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS

Implementing & Troubleshooting of T1, MUXES, CSU/DSU and data circuits.

Experience on designing and troubleshooting of complex BGP and OSPF routing problems,

Involved in configuring IP Quality of service (QoS)

Have experience with Cisco Works LAN Management Solution

Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark tool.

Configuration of switches with VLAN trunk setup for co-location networks.

Implementation, Configuration & Maintenance of WiFi sites.

Coordinated with IT manager to develop and implement LAN infrastructure policy for network security and administration, disaster recovery, patch management and content filtering.

Troubleshooting issues related to Layer 1/2/3 skills like switching / routing, WAN /Hardware and critical network links by coordinating with the vendor.

Environment: Cisco 6505/4500/3550 Switches, Cisco 6500/7500/7200 Routers, LTM, GTM, F5 Load Balancer, ASA, OSPF, BGP, EIGRP, RIP, LAN, WAN, SSL/VPN, HSRP, VLAN Trunking.

Client: Provost Solutions, Hyderabad, India July 2009 – Aug 2011

Role: Network Support Engineer

Responsibilities:

Duties included LAN/WAN daily operations: Router & switch configurations/Access lists.

Maintained router and switch configurations updated and changed configurations depending on corporate requirements and documentation.

Hands on Experience in Inter-vlan routing, redistribution, access-lists

Involved in all technical aspects of LAN and WAN projects including, short and long term planning, implementation, project management and operations support as required

Working knowledge of Terminal server and the configurations

Utilized Wireshark, NMAP and Command Line Prompts on a daily basis

Experience with design and implementation of Data center migration at NBC Universal

Data center migration was involved in Access, Distribution and Core layers.

Working knowledge with 10 gigabit Supervisor Engine 720 on 6500 catalyst switches

Worked with Wireless Network Engineer in deploying and configuring Cisco 1300 Series access point for network connections.

Coordinated with Network Administrator regarding BGP/OSPF routing policies and designs, worked on implementation strategies for the expansion of MPLS VPN networks.

Experience with migration Hybrid based Cisco CatOS and Native Cisco IOS on 6500 catalyst switches.

Involved in migration of WLAN segment on the LAN Core. Also, involved in configuring wireless VLANS

Conduct through analysis, problem solving, and infrastructure planning

Served as a Secondary Network support.

Troubleshoot and fix any backup and monitoring systems related issues in conjunction with Systems team and external vendors

Environment: CISCO routers and switches, Access Control Server, VLAN, Trunk Protocols, CISCO ASA, DHCP, DNS, Spanning tree.



Contact this candidate