Sirisha
Sr. Network Engineer
*******.***********@*****.***
Summary
* **** ***** ** ********** as a Network Engineer, with proficient hands-on experience in the areas of Wi-Fi portfolio, Routing, Switching, Security and Troubleshooting with Strong knowledge in configuring the routing protocols like RIP, OSPF, VOIP, IS-IS, SNMP, EIGRP and BGP.
Expertise in installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800).
Experience in designing, implementing and Managing LAN, WAN solutions for different client setups.
Experience in Layer 3 Routing Protocol configurations: RIP, OSPF, BGP, EIGRP and MPLS.
Experience in Layer 2 routing Protocol Configurations: ARP, RARP, ATM/FRAME RELAY and VPN technologies: IPSec & SSL.
Knowledge on Amazon AWS Virtual private cloud services.
Deploying, Scaling and troubleshooting many Datacenters across all of AWS network fabrics.
Provide scalable, supportable military grade TCP/IP security solutions along with expert TCP/IP network designs that enable business functionality.
Having knowledge and hands-on experience on physical cabling, IP Addressing, Subnetting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.
Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
Knowledge in working with F5 Load Balancers and their implementation in various networks and implementation of F5 BIG-IP load balancer to improve web application delivery speed and replication through and between distributed global data centers.
Strong hands on experience on Cisco Catalyst (3550, 3750, 6500) series switches, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers, PIX Firewall (506, 515, 525, 535), ASA (5505/5510), Load Balancers using Cisco ACE, F5 LTM/GTM, Security Device Manager (SDM), Cisco Works, HP Open View, Solar Winds, Sniffer, Palo Alto Networks Firewall models (PA-2k, PA-3K and PA-5K), Citrix Netscalar.
Supporting and troubleshooting Checkpoint/Cisco site-to-site VPN/IP Sec functionality.
Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
Provided Layer 3 High Availability using first hop redundancy protocols such as HSRP, VRRP and also knowledge of GBLP.
Experience in configuration of AAA with ACS protocols TACACS+, RADIUS and LDAP.
Implementation and maintained intrusion detection/ prevention (IDS/IPS) system to protect enterprise network and sensitive corporate data. For Fine-tuning of TCP and UDP enabled IDS/IPS signatures in Firewall.
Experience in Wireless LAN (IEEE 802.11) and deployment of light weight access point.
Strong knowledge on Wireless Standards and Technologies, i.e. Ethernet, WAN, LAN, IEEE 802.11a, b, g, n (Wi-Fi).
Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500,EX8200 series) Juniper Routers ( E,J,M and T-series).
Experience in installing and configuring DNS, DHCP server.
Experience in Checkpoint IP Appliances R65, R70, R75, R77 & Cisco ASA Firewalls.
Worked on Juniper Net Screen Firewalls like, NS50, SSG 550M, SSG520M, ISG 1000, ISG 200 and Cisco PIX 535, 520, 515, ASA -5500 and 5505.
Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works.
Hands-on experience in using network monitoring tool Solar winds Orion.
Strong hands on experience implementing and troubleshooting Switch technologies such as STP, RSTP, MSTP and VTP along with troubleshooting of inter-VLAN routing.
Working knowledge of routing protocols for voice: VoIP, IPSEC, Multicast, MPLS, DSCP/QoS, Cisco IOS and Wireless security protocols (I.E. 802.1x, EAP, WPA2).
Knowledge of network security protocols such as IPSEC tunnels, GRE tunnels, NAT/ PAT, ACLs and VPN– MP-BGP.
Experience in configuration of Palo Alto firewalls like PA2020, PA3050, and PA5050.
Experience with deployment of Palo Alto firewalls for different NAT, video conferencing traffic. Performing administrative tasks with Palo Alto Networks (Panorama) including Security, NAT policy.
Experience with multiple VoIP protocols such as SIP, MGCP, H.323, SCCP, CDP, and LLDP.
Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.
Certifications:
Cisco Certified Network Professional (CCNP)
Cisco Certified Network Associate (CCNA)
Palo Alto Certified (ACE)
Technical Skills:
Routers
Cisco 1700, 1800, 2600, 2800, 3700, 3800, 3900, 7200, 7600 series, ASR9k
Switches
Cisco 3550, 3750, 4500, 6500 series & nexus 7k, 5k, 2k, 1000v, 1010
Load Balancer
Cisco CSS, F5 Networks (BIG-IP)
WAN Optimization
Cisco WAAS, PPP Multilink, Riverbed
Routing
OSPF, EIGRP, BGP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing
Switching
VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast Operations, Layer 3 Switches, Ether channels, Transparent Bridging
LAN
Ethernet, Fast Ethernet, Gigabit Ethernet, FDDI, CDDI, Token Ring, ATM LAN, Emulation
WAN
Leased lines 64k - 155Mb (PPP / HDLC), Channelized links (E1/T1/E3/T3), Fiber Optic Circuits, Frame Relay, ISDN, MPLS, Riverbed, DMVPN
Voice
Cisco call manager 8.x, 7.x
IP Telephony
VOIP, T1/T3, ISDN, PRI, Unified Call Manager
Wireless
Cisco 4400 Wireless Controller (WLC) and 1100, 1200 series Access Points
Firewalls
Cisco PIX, ASA, Juniper Netscreen, Palo Alto, SRX, Checkpoint
Features & Services
IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management
AAA Architecture
TACACS+, RADIUS, Cisco ACS
Network Monitor Tool
MRTG, Netbrain & Solarwinds & Cisco Prime Infrastructure
Protocol Analyzer
Wireshark
Security
Cisco ASA, Check point, Juniper SRX, Palo Alto
Operating System:
DOS, Windows (95, 98, NT/2000, XP, Vista/7/8/10), Cisco IOS, Pan-OS
Professional Experience:
Expedia, Bellevue, WA Dec 2016 - Present
Sr. Network Engineer
Responsibilities:
Responsible for Configuring static, IGRP, EIGRP, AND OSPF routing protocols on Cisco and Dell Routers and Switches.
Worked on F5 LTM series like 1600, 6400 and VIPRIONS for the corporate applications and used them for external DNS resolutions.
Experience configuring Catalyst (2900, 3500, 3700 and 6500 Series), Nexus (7000, 5000 and 2000 Series) Switches, and Routers (2800, 3600, 4400 Series) and Wireless AP's (1260, 3600) using CLI and GUI.
Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.
Configured Easy VPN server and SSL VPN to facilitate various employee’s access internal servers and resources with access restrictions.
Configured Client VPN Technologies such as Cisco's VPN Client via IPSEC and Global protect from Palo -Alto Networks.
Configured Palo Alto to connect with Wildfire cloud to prevent Zero-day attacks.
Implemented Traps in Palo Alto Firewall for the organization as a solution to endpoint security replacing traditional Antivirus.
Worked on network security design and installation using Palo Alto Firewall (Application and URL filtering, Threat Prevention, Data Filtering).
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
Upgraded Palo Alto Firewalls PA-7000 to PA-9000.
Migrated Juniper SRX 5400 series to Palo Alto firewalls 7000.
Developed configurations using routing protocols OSPF, BGP, MPLS, datacenter protocols, security requirements and network virtualization.
Configured BGP over MPLS links and redistribution between EIGRP and BGP routes over multiple MPLS providers. Configured EBGP load balancing and ensured stability of BGP peering interfaces.
Deployed Multi-site MPLS Network for customers and Support MPLS, DMVPN, BGP, EIGRP, some OSPF and new VoIP deployments.
Configured EBGP load balancing and ensured stability of BGP peering interfaces.
Hands on experience adding security and NAT rules on Palo Alto firewalls and monitoring logs with necessary filters.
Performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s.
Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
Worked on BIG-IP ASM for SMTP and FTP security checks to protect against spam, viral attacks, directory harvesting, and fraud.
To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASM devices for easier management and common configurations.
Experience in risk analysis, security policy, rules creation and modification of Cisco ASA networks.
Experience in configuring, deploying and deployment of Cisco Security Manager (CSM) for management of ASA Firewall series.
Support customer with the configuration and maintenance of PIX and ASA firewall systems.
Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0.
Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.
Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair
Worked with Aruba Access point as a Public Wi-Fi and successfully implemented Wireless Access Point (WAP).
Using Aruba’s clear policy Manager generate report of all valid users and valid authentication.
Implemented cluster and configuration of SRX-100 Juniper firewall.
Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access
Experience in migration of VLANs & Configured VLANs with 802.1q tagging, Ether channels and Spanning tree for creating Access/distribution and core layer switching.
Measure the application performances across the MPLS cloud through various routing and switching methods.
Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, ASA, Netscreen devices for easier management and common configurations.
Involved in migrating applications from Netscaler to F5 Big -IP environment.
Proficient with F5 LTM and Cisco CSM load balancer in-between the servers inside the server farm and DMZ.
Involved in migration of F5 Local traffic managers of LTM 5100 series to LTM 6800 series for higher.
Performed installation and configuration Cisco Secure Access Control Server (ACS) configuration for AAA (RADIUS) authentication.
Worked on design, configuring and managing of Blue Coat Proxy Servers.
Deploying Cisco ASA and Bluecoat ProxySG (Web Security Appliance) S170 for URL Filtering Policies.
Worked on Blue Coat Proxy SG to safeguard web applications (Blacklisting and Whitelisting of web URL) in extremely untrusted environments such as guest Wi-Fi zones.
Deployment of data center LAN using Nexus 9k, 7k, 5k, 2k switches.
Experience with configuring Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000.
Involved in designing and implementing QOS and policy map to 2800 series routers for all the branches.
Mapped, Network Diagrams and physical identification in MS Visio.
Configured Solar Winds Orion NPM and used it to monitor traffic on a network.
Preformed IOS upgrades on cisco routers and switches.
Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
Worked with engineering team to resolve tickets and troubleshoot L3/L2 problems efficiently.
Working experience on upgrading Checkpoint Firewall old devices/Software to new platforms like R70 to R75.20.s
Environment: Cisco2948/3560/4500/3560/3750/3550/3500/2960 6500 switches and Cisco 3640/1200/ 7200/3845/3600/2800 routers, Cisco ASA 500, Checkpoint, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, Firepower, citrix Netscaler, AWS.
CenturyLink, Wake Forest, NC Apr 2015 – Nov 2016
F5 Network Engineer
Responsibilities:
Expertise in implementing setup, configure, upgrade, manage and troubleshoot on Cisco routers, switches, VPN, firewalls, 802.11 wireless access points and load balancers.
Security infrastructure engineering experience as well as a Microsoft Windows, UNIX, Juniper firewalls, Palo Alto firewalls, Bluecoat Proxies, Juniper Intrusion Prevention devices, and wireless switch security management.
Configuration of Cisco unified computing system (UCS) and using UCS manager perform operation such as device discovery, inventory, configuration, diagnostics, monitoring, fault detection, auditing, and statistics collection.
Configuration and support of Juniper NetScreen firewalls and Palo Alto firewalls.
Successfully installed Palo Alto PA-3060 firewall then configured and troubleshot using CLI and worked with Panorama management tool to manage all Palo Alto firewall and network from central location.
Configure and Install Juniper High Performance series switches like QFX10000 and also create a Data center switching fabric with Junos Fusion.
Administer Palo Alto Firewalls to allow and deny specific traffic and to monitor user usage for malicious activity and future QOS.
Designed and implemented configuration support for routing protocols like OSPF and BGP on Firepower.
Maintain a secure perimeter using Cisco ASA 5500-X with Firepower Services.
Experienced in securing configurations of SSL/VPN connections, troubleshooting Cisco ASA firewalls and related network security measures.
Worked on migration of existing PIX firewall to ASA firewall and with converting PIX rules over to the Cisco ASA solution.
Creating a rule on the checkpoint firewall for a NAT (used NAC to block unauthorized users) to the VLAN IP and allowing the IPsec traffic.
Using Software defined networking (SDN) that approach open protocols, such as OpenFlow, to apply globally aware software control at the edges of the network to access network switches and routers that use in closed and proprietary firmware.
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.
Involved in upgrades to the WAN network from existing 7200vxr with ASR1004 and 3845/3945 routers.
Maintaining Checkpoint security policies including NAT, VPN and Secure Remote access, Configuring IPSEC VPN (Site-Site to Remote Access) on SRX series firewalls.
Configuring Juniper NetScreen Firewall Policies between secure zones using Network Security Manager (NSM).
Working experience with Cisco Unified Communication Manager (CUCM) for more secure communication using voice, data, video and Cisco Call Session Control Platform (CSCP).
Expertise in Palo Alto design and installation for Application, URL filtering, Threat Prevention and Data Filtering.
Performing daily monitoring and maintenance of Solar winds Orion software.
Install, configure and monitors Solar Winds Orion NPM\NCM and Quality of Experience (QOE).
Provided Load Balancing towards Access layer from Core layer using F5 network Load balancers.
Managed the F5 Big-IP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.
Worked on secures applications against layer 7 distributed-denial-of-service (DDoS) attacks, malicious bot traffic, and application vulnerabilities using F5 ASM WAF’s.
Expert in troubleshooting F5 software modules, including BIG-IP LTM, ASM, APM, and iRules (Tcl-based script).
Hands on Experience testing iRules using Browser (IE), HTTP watch on f5 load balancers.
Configuration and troubleshooting F5 LTM, GTM series like 6600, 6800 for different applications and monitoring the availability.
Worked on F5 ASM module for security policy initially created in transparent mode for enforce the security policy, blocking settings and set the enforcement mode to blocking for application ready-security.
Configuring Routes and VLANS as well as setting up VPN accounts off of ASA 5500 series firewall. F5 load balancer and security and monitoring of ASM / GTM.
Involved in the redistribution into OSPF on the core ASA firewall.
I was involved in migration projects, which involves replacing legacy devices to new Nexus devices and introduced VPCs in the new architecture.
Worked on Nexus platform 7k series, 5K series (5548, 5020 and 5010), 2248 and successfully implemented VSS on the Cisco catalyst switches.
Gained experience on working with migration to Check Point and Palo Alto next generation firewalls.
Managed successful delivery of massive security response portfolio including Splunk and Cisco ISE 3300.
Created and resolved Palo Alto and Checkpoint Firewall Rules, Routing, Pushed Policy.
Experience with Brocade Series Router 5600 for installation and configuration.
Firewall deployment, rules migrations, firewall administration and converting existing rule based onto new Checkpoint and Palo Alto Next-Generation Firewall platforms.
Configuration of Virtual Servers, Nodes, and load balancing Pools.
Responsible for Cisco ASA firewall administration across our global networks.
Involved in the modification and removal of BGP from the MPLS routers.
Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multi-Layer Switching.
Implemented site to site VPN in Juniper SRX as per customer Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling.
Environment: Juniper SRX5400, SRX5600, and SRX5800 and Palo Alto PA-3060 & 5050 Firewalls, Bluecoat Proxies, Juniper IPD, Juniper NSM, Panorama, Splunk, F5 LTM, GTM 6600, 6800, Nexus (2K, 5K, 7K and 9K), Nek, Cisco ISE, Websense, Solar Winds NPM, ISIS, PRTG, Wildfire, Azure, CUCM.
Johnson & Johnson, Piscataway, NJ Oct 2013 – Mar 2015
Network Engineer
Responsibilities:
Configuring routing protocols OSPF, EIGRP, RIP, MPBGP, LDP and BGPV4.
Configuring/Troubleshoot issues with the following types of routers Cisco (7200, 6500, 4500, 1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, and DHCP, as well as assisting with customer LAN /WAN.
Installation & Maintenance of Juniper switches, routers & firewalls.
Implemented various EX, SRX & J series Juniper devices.
Optimizing and monitoring the performance of a WLAN, LAN, WAN and user's segments
Monitored performance of network appliances and WAN utilizing using network analyzer like Wireshark.
Assisted in MPLS migrations, implemented a backup for the existing WAN connection using site-to-site IPsec VPN tunnels.
Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIG-IP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands-on with F5 BIG-IP LTMs/EM.
Configured various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters, Route-maps and route policy implementation.
Experience working with Network-attached storage (NAS) to provide Local Area Network (LAN) nodes with file-based shared storage through a standard Ethernet connection.
Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.
Configuring HSRP between VLANs, Configuring Ether-Channels and Port Channel on Cisco 6500 catalyst switches.
Experience on DHCP Server to maintain pool of IP address and leased an address to DHCP enable client when it’s start up network.
Implemented security measures using ACL and configured NAT according to the connectivity requirement.
Firewall worked upon includes Checkpoint (R77 Gaia GUI) and Cisco ASA's (ASDM GUI).
Performed load balancing and application level redundancy by deploying F5 BIG-IP LTM 3900.
Focused on building new content and functionality for several F5 ecommerce sites.
Configuration and installation of Palo Alto Networks 5050 application firewalls (NGFW).
Expertise in Palo Alto design and installation for Application, URL filtering, Threat Prevention and Data Filtering.
Worked on configuration, maintenance and administration of Palo Alto PA3000 Firewalls and migrating customers from Cisco ASA to Palo Alto in HA network.
Created and resolved Checkpoint, Palo Alto Customer Orders, and Request Orders.
Configured High availability, User ID on Palo Alto firewall. Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools Editing and Changing Palo Alto Polices and Monitoring threats on firewalls. Analyzed traffic pattern and implemented URL filtering using the Palo Alto Firewall. Troubleshooting and configuring Palo Alto FW's 3060 & 5060.
Involved in migration from Cisco firewalls to Palo Alto firewalls platforms PA 4000 and PA 500 and PA200 firewalls.
Configuring Routing protocols like BGP, OSPF, MPLS, multicast and L2 protocols in ASA to check it is passing through via ASA in customer deployments.
Conversions to BGP WAN routing, which converts WAN routing from OSPF to BGP (OSPF is used for local routing only) that involves new wan links.
Performed interconnection of customer sites using IPSec VPN.
Perform Packet Shaper Bluecoat 75000 OS upgrade, maintenance and configurations.
Gained experience on working with migration to Check Point and Palo Alto next generation firewalls.
Performing onsite data center support including monitoring electrical power, switch alarms, network alerts and access logs.
Provides direct support for all hardware moves, adds, and changes for the VoIP devices.
Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
Troubleshooting any and all network problems involving LAN, WAN, BGP, EIGRP, MPLS/VPN, VRF – VPN Routing and Forwarding Instance, SIP Trunking, Internet ISP, Multi homed - BGP with Level-3 Datacenters.
Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2B network connectivity.
Performed configuration of SNMP, RADIUS, and TACACS along with other standard global configurations on existing client production routers and switches.
Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
Design and deployment of MPLS QOS, MPLS Multicasting per company standards.
Experienced in working with Session Initiation Protocol (SIP) trunking for voice over IP (VoIP) to facilitate the connection of a Private Branch Exchange (PBX) to the Internet.
Configuring static NAT, dynamic NAT, PAT inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation.
Managed successful delivery of massive security response portfolio including Splunk.
Worked with Aruba Access point as a Public Wi-Fi and successfully implemented Wireless Access Point (WAP).
Environment: Juniper routers and switches, Cisco routers 7200; Cisco Catalyst switches 6500, 4500, 2950; Big-IP F5 Load Balancer, Cisco Works; MS Visio, Checkpoint, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy, Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP, STP, VTP, VLAN, VPN, MPLS, HSRP, GLBP.
IBM, India Jan 2012 – Sep 2013
Network Engineer
Responsibilities:
Actively participated and completed many projects based on MPLS VPN, Internet Solutions for corporate customers Backbone.
Experience on designing and troubleshooting of EIGRP, OSPF routing issues.
Configured and resolved various OSPF issues in an OSPF multi area environment.
Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
Worked with customers in troubleshooting issues related to connectivity, STP, VLANs, Inter-VLAN routing, VTP, Ether channels, Layer 2/3 switching, log messages.
Experience in troubleshooting VLAN, STP (Spanning tree protocol), & Switch Trunk and IP subnet issues.
Hands-on experience with WAN technologies like T1/T3, DS3, STM1 and STM4 circuit types
Implemented Cisco Secure Access Control Server (ACS 3.0) for TACACS+/RADIUS.
Worked on redistribution of routing protocols and Frame-Relay configuration
Handled Network Migration from RIP to OSPF.
Implementation of TCP/IP and related Services (DHCP/ DNS/ WINS)
Implementation of HSRP, IPsec, Static Route, IPSEC over GRE, Dynamic routing, DHCP, DNS, FTP, TFTP.
Experience of IP addressing, administrating subnets and various routing models.
Actively participated Implementation and customization of customer network.
Verifying Dynamic Host Configuration Protocol for IPv6 (DHCPv6) and DNSv6 options.
Performed wireless network design, site surveys, as well as Troubleshooting and repairing any issues that occurred on site.
Worked on migration of existing PIX firewall to ASA firewall and with converting PIX rules over to the Cisco ASA solution.
Experienced in working with Session Initiation Protocol (SIP) trunking for voice over IP (VoIP) to
Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on catalyst series.
Switching related tasks like implementing VLANS and configuring ISL trunk on Fast-Ethernet and Gigabit Ethernet channel between switches.
Migrated VLAN from ASA (perimeter firewalls) to FWSM’s for better security management
Environment: Cisco Catalyst 2960/3750/4500/6500 Series Switches, Linux, Cisco 2800/2900/3000 Series ISR's and Cisco 3640/12000 /7200/3845/3600/2800 routers, SQL, Cisco ASA 5500, Juniper Ex switches, Active Directory, Juniper ACX series routers, Windows Server 2003/2008, ACL, SIP, RIP, OSPF, MPLS, BGP, EIGRP, Wi-Fi, LAN, MacAfee, WAN, WAP, IDS, IPS, Aruba WLAN, VPN, HSRP.
Syntel, India Jul 2009 – Dec 2011
Network Engineer
Responsibilities:
Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.
Moved Core switches and several non-Cisco devices under strict deadlines to maintain network functionality
Designed VLAN’s and set up both L2 and L3 logical to have it communicate to the Enterprise network.
Performed Layer I, II and III troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for BGP, OSPF, RIP, RIPv2, EIGRP, Static and default route in a VPN environment using MPLS.
Configured the Cisco router as IP Firewall and for NATing. Switching (Ethernet) related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.
Installing new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations.
Working on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path, and Community, MED.
Providing technical support to LAN & WAN systems.
Configuring all the required devices and equipment for remote vendors at various sites and plants.
Installation and maintenance of new network connections for the customers.
Verified IPV4/IPV6 architectures.
Worked on HSRP and GLBP for first hop redundancy and load balancing.
Performed administrative support for RIP, OSPF routing protocol.
Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
Configured VLANs, Private VLANs, VTP and Trunking on switches.
Gained knowledge in IP Subnetting for Class A, B, and C networks.
Documented the design, implementation and troubleshooting procedures.
Participated in Installation and configuration of Bluecoat Proxy SG in the network for web traffic management and policy configuration.
Performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s.
Installed and configured DHCP Client/Server.
Experienced in setting a cluster environment for load balancing and HA.
Environment: Cisco 2950 switches and Cisco 3825 Routers, LAN, WAN EIGRP, OSPF,RIP, BGP, MPLS, VLAN, QOS, DHCP, DNS.