Christopher Schroeter Phone: 404-***-**** Email: email@example.com
Professional Summary: To pursue a role in the Information Technology field, with a focus in the area of Networking and Networking Security.
Education / Certification:
(Gwinnett Technical College) Since March 2017
(Associate Degree) CyberSecurity
Software: Solarwinds, Remedy, Infoblox, Microsoft Sharepoint, Junos Pulse, Cisco AnyConnect, Microsoft Visio, SecruCrt, Putty, RSA envision, Cisco ASDM, NMAP, Wireshark.
Hardware: Cisco Nexus 2k, 5k, 7k, 9k series switch, Cisco switches 4500s, 6500s, 3750s, 3850s, 3650s and 2960s. Cisco Routers 1800, 1900, 3700, 3800 and 3900. Cisco ASA Next Gen 5500 series. Cisco 4400s controllers, Aruba controller 7200, 3600 and ClearPass, Cisco ACS, Juniper 6500 SA and Mag series and F5 loadbalancers.
Network Analyst, FastWave Communications, September 2014 – Present
Performed Layer 1 installs of Single mode/Multimode Fiber and Copper to Networking devices.
Installed Cisco routers, switches and firewalls for small and larger business. Devices include Cisco Nexus 7k, 5k, 2k, 6500, 4500, 3750 and 3850 stackable configured for Redundancy by utilizing various features such as HSRP, VPC and Port-channel. Configurations applied also includes security, applied SSH, AAA policies, authentication to Tacacs (Cisco ACS) or Radius servers, assigning appropriate VLANs and port security to interfaces, arp inspection, acls, vlan acls and password encryption. Also configured VLAN trunks using dot1q encapsulation and also applied VTP to environments which were uniform.
Router installs included Cisco 2800, 2900, 3800 and 3900 series. Applied configuration for MPLS network connectivity, IPsec\GRE VPN connectivity, ISP internet connectivity and also Metro E for Man connections. Primarily worked on EIGRP environments and some experience with BGP routing protocol. Also worked on DMVPN environments for small /home office setups.
Firewalls installs include Cisco ASA 5500 series, Fortinets and Palo Alto. Setups include creating various DMZs for outside, inside and zones for various application/network landing zones. Configurations include Global Nats, static Nats and destination Nats for translations to different zones. Applied acls to permit or deny traffic to each DMZ. Applied static routes or routing protocol for communication. Also setup ipsec vpns, ssl vpn client and clientless using Cisco Anyconnect. Also familiar with Cisco ASDM to manage, monitor and configure firewalls.
Installed F5 Loadbalancers which included setup of Virtual servers, Pools and health Monitors. Also applied SSL certs, which include request of CSR, purchasing the cert from a verified company, applying cert, verifying via cert checkers and connect to a url. Troubleshooting skills on the f5 includes conducting tcpdump for packet captures and viewing in Wireshark.
Worked on Juniper Sa 6500 and Mag series 6611 setting up new roles, realms and authentication servers. Also setup Junos pulse/Netconnect on clients pc.
Day to Day task when in office has included Network monitoring with Solarwinds, using solarwinds/Infoblox IPAM, utilizing Solarwinds, NCM for configuration and Solarwinds Netflow to view tcp traffic. Familiar with using Remedy for Network change request and incident management.