Resume

Sign in

Engineer Security

Location:
Secunderabad, Telangana, India
Posted:
March 15, 2018

Contact this candidate

Resume:

KARTHIK

Sr Network Security Engineer

Professional Summary

Cisco Certified Network Engineer with 9 plus years of Extensive experience with Routing, Switching and Data Center environment.

Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.

Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS.

Expertise in installing, configuring, and troubleshooting of Cisco Routers (3800, 3600, 2800, 2600, 1800, 1700, 800)

Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)

Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.

Firewall technologies including general configuration, risk analysis, security policy, rules creation and modification of Checkpoint R65, R70, R77, Palo Alto and Cisco ASA.

Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.

Advanced knowledge in Cisco ASA 5500 series and PIX installation, configuration and maintenance, configuration and installation of IOS security features and IPS, security risk analysis, attack mitigation & penetration tests based on LPT methodology.

Experienced in handling and installing Palo Alto Firewalls

Familiarity in application security scanning technologies (AppScan, Fortify).

Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.

Experience working with Nexus 7K, 5K and 2K.

Worked on Juniper NetScreen Firewalls like, NS50, SSG 550M, SSG520M, ISG 1000, and ISG 200.

Implementation of Juniper Firewall, SSG Series, NetScreen Series ISG 1000, SRX Series.

In-depth knowledge and experience in WAN technologies including OC3, E3/T3, E1/T1, Point to Point, MPLS and Frame Relay

Load Balancing using Cisco ACE, Kemp, ADC, F5, Security Device Manager (SDM).

Experience in Configuring and implementing VLAN, VTP domains, LAN switching and STP/RSTP

Experience in QOS on multicast VPN

Experience on Wide area application services

Experience in Cisco: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay & MPLS), Routing protocol configurations (RIP, EIGRP, OSPF, and BGP)

Proficiency in configuration of VLAN setup on various CISCO Routers and Switches.

Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers.

Worked on Cisco ISE with Access control and AAA protocols.

Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.

Strong hands on experience in installing, troubleshooting, configuring of Cisco ASR, 7200, 3900, 3800, and 1800 series Routers, Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches

Extensive hand on experience with complex routed LAN networks, CISCO Routers and Switches.

Worked on blue coat proxy server as part of recent integration into the project

Good experience with Security Incident and Event Management (SIEM), Intrusion Detection and Prevention Systems (IDS/IPS) and log management and database activity monitoring.

Knowledge on Python scripting.

Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).

Hands on experience on Cisco PIXASA Firewalls, Juniper SRX series, Palo Alto, VPN, Troubleshooting Skills, Log Analysis and Review, Compliance Audit.

Professional certifications:

Cisco CCNA certified

Cisco CCNP certified

Palo Alto ACE

Qualys (vulnerability management)

TECHNICAL SKILLS:

Protocols

RIP, RIP V2, EIGRP, OSPF, IS-IS, IGRP, HSRP, VRRP, GLBP, LACP, PAGP, DNS, SMTP, SNMP, FTP, TFTP, LPD/TDP, WLAN, 802.11/802.11e, WEP, POP3 LADP.

LAN Technologies

Workgroup, Domain, HSRP, DHCP, Static, VLAN, STP, VTP, Ether Channel, Trunks.

WAN Technologies

Leased Line, Frame Relay, ISDN, PPP, HDLC, ATM, SONET, Metro Ethernet.

Network Products

CISCO Routers 1700, 1800, 2500, 2600, 2800. CISCO High End Router 3600, 3800, 7200, 12010. CISCO Switches 1900, 2950, 2960. CISCO Campus Switches 3550XL, 3548, 4984 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507, F5 load balancer, Juniper ISG/SRX, Aruba Wireless access points, Aruba controllers and Aruba management software.

Security & VPN

PIX 500 Firewall, ASA 5505 Firewall, AIP SSM, CSC SSM, FWSM, Fort iGATE, CISCO CSM, ACL- Access Control List, IPS/IDS, NAT, PAT, CISCO ACS, Check point, SonicWALL, RSA Secure ID, Fortify, Web inspect, pfSense (Linux based firewall), Symantec DLP, Palo Alto.

Pan aroma.

Authentication

RADIUS, TACACS+, Digital certificates

Monitoring Tools

Wireshark, Nmap, Nessus, OpManager, PRTG Packet Sniffer, Juniper NSM, Junos Space, Riverbed, Netscout.

Servers

Domain servers, DNS servers, WINS servers, Mail servers, Proxy Servers, Print Servers, Application servers, FTP servers, NTP.

Operating Systems

Windows NT 4.0 (Desktop/Server), Windows 2000/2003/2008 server, Windows XP/7, LINUX, Solaris, Red Hat, Active Directory, UNIX.

Languages

C, C++, .Net, Java, J2EE, XML, SQL, Python.

Scripting Language

HTML, Java Script, CSS

PROFFESSIONAL EXPERIENCE:

Charter Communications, MO Aug 2016 - Present

Senior Network Security Engineer

Responsibilities:

Gained strong experience APP DMZ migration project, Migration APPs on Juniper ISG device to New SRX 3600 device.

Moving vendor VPNs from Cisco ASA, PIX devices to new Juniper SRX 1400 device and Palo Alto.

Monitor company’s network using tools like Solar winds, HPNA and Junos Space.

Troubleshooting of vendor VPN, APP DMZ and implementing policies on Juniper SRX and Palo Alto firewalls.

Experience supporting the configuration and maintenance of Firewall/DMZ infrastructure including Network and Application Firewall Packet Filtering technologies (Security Appliances, Juniper).

Working technical knowledge of network control protocols (QOS, PfR, PoE, NTP, DHCP), network management protocols (CDP, FTP, TFTP, SNMP) and security protocols (SSH, HTTPS, AAA, IPSec, TustSec).

Advanced knowledge of tunneling technologies such as L2 and L3 VPN's.

Advanced knowledge of security features like PKI, VPN and Firewall

Knowledge of support systems for network management and element management systems and protocols such as RIPv2, OSPF, OSPF-TE, IS-IS, IS-IS -TE, BGP, MPLS and SI

Research and analysis for planning, organizing, and managing project related network security tasks

Experience creating firewall implementation plans, firewall rule and policy configurations, firewall code upgrades and migrations, and deployment of new firewall builds for Check Point, Palo Alto, or ASA technologies. Comfort accessing and utilizing CLI functions of a Palo Alto Firewalls and Panorama management system.

Using ISE Deployment Assistant (IDA) to validate and document endpoint authentication status during monitor mode deployments.

Configured complex ISE implementation involving 6 agencies with GETVPN, DMVPN, SSL VPNs Configured Cisco ASA 5510 for VPN Network Access Control integration with Cisco ISE (Inline PEPs).

Used troubleshooting skills to fix Multicast routing issues and used WireShark to source packet level issues.

Planning, designing and Configuration of various Policy Configurations, Profile Authorizations, End device Profiling, User Identities, Cisco ISE and AD mapping with various attributes and levels of authorizations and Network Access.

Experienced in Engineering, implementing and troubleshooting Panorama M-500 appliances.

Experience with implementing and supporting various Palo Alto Firewall modules such as Wildfire, Threat Prevention, URL Filtering and Antivirus.

Hands-on experience on F5 BIG-IP GTM/LTM and APM.

Worked on maintaining carrier grade features to SDN control plane with ONOS Distributed Core, thus providing scalability, high availability and sharp performance.

Implemented a framework for testing ONOS scale-out effect which was based on topology discovery throughput and latency for Southbound and Intent latency and throughput for northbound traffic

Hands on experiences with security tools like Fortify, Webinspect.

Experience with hosting SSL certificates on the F5 BIG-IP platform.

Knowledge and experience regarding F5 BIG-IP LTM VIP configurations.

Experience with F5 BIG-IP iRule programming and troubleshooting, software upgrades and procedures.

Knowledge and experience on Bluecoat SG web proxy platform management and configuration.

Gained knowledge on cloud security initiatives Bluecoat Cloud Web Security Services.

Hands on experience in Bluecoat ProxySG Security Configuration, Visual Policy Manager (VPM), Web Filter, Authenticating Users on the ProxySG.

Experience in Bluecoat Monitor and analyze ProxySG performance.

Working knowledge of Checkpoint Firewalls.R77.30 on Smart Management Server, and most Security Gateways are on R77.30. Some are in process to upgrade from R77.20 to R77.30

Worked with security team and audit team to maintain PCI compliance for the network.

Create and maintain documentation as it relates to network configuration, network mapping, processes, and service records.

Develop, implement and maintain policies, procedures, and associated training plans for network administration, usage, and disaster recovery.

Monitor and test network performance and provide network performance statistics and reports.

Practice network asset management, including maintenance of network component inventory and related documentation and technical specifications information.

Environment:, Checkpoint, Nexus, Juniper SRX 650,1400,1500, 3400, 3600, 5400,ASAfirewall-- ASA5545, ASA5585-SSP-20, firewall PIX-525, VPN concentrator -- Cisco 3060, Palo Alto, check point firewall -- r77, F5 Local Traffic Managers (LTM) 5000, 7000 series, Spanning tree protocol, VLANs, STP, DNS/DHCP issues, Palo Alto firewalls, Fortigate Device, BGP, MPLS, Algosec, Firewall analyzer, confluence, Fortify, Aruba Wireless access points, Aruba controllers and Aruba management software,service-now, service desk, Jira, Junos space, SecureCRT, Junos conversion tool, Cisco ASDM, Palo Alto Panorama,Juniper NSM.

TD Auto Finance, Farmington Hills, MI July2015 - July 2016

Senior Network Security Engineer

Responsibilities:

Gained strong experience and knowledge in investigating incidents related to Juniper SRX and Palo Alto firewall and VPN.

Manage installations, configuration and administration of Cisco equipment in IT architecture of organization.

Gained advanced knowledge on multiple security technologies Anti-virus, malware, checkpoint/juniper/Palo Alto Firewalls, VPN, proxies, Fortify, vulnerability, DLP.

Review and analysis of emerging threats and vulnerabilities, risks and business requirements for detection and remediation measures.

Strong experience and knowledge in investigating incidents, remediation, tracking and follow-up for incident closure with concerned teams.

Working knowledge with white listing webpages and blocking webpages with Blue coat Proxy SG and Blue coat reporter.

Worked on Monitoring and analysis of ProxySG performance.

Administration knowledge on Symantec Bright mail Gateway, Symantec Endpoint protection (12.1.6) and Symantec PGP.

On daily basis worked with Juniper SRX 650 and Palo Alto 5050 Firewalls.

Design the layout for cable installations.

Worked with up gradation of Firewalls (Juniper SRX, Palo Alto and Fortigate Devices).

Participate in day to day DLP maintenance activities and analyze DLP incident and report on findings.

Experience on Data Loss Prevention (DLP) and information security.

Worked on manual Penetration testing of client systems, web sites and discovered network vulnerabilities.

Configured network services equipment Riverbed accelerators in compliance with security policy.

Worked on security policies of juniper SRX and Palo Alto and policy cleanup of firewalls.

Comprehensive working knowledge of switches, switching technology, LAN/WAN security, LAN/WAN design, capacity planning, server technology, LAN/WAN troubleshooting, Voice over IP (including T1, DS3, OC-3, routing protocols, TACACS, RADIUS).

Worked with Bluecoat and Infoblox.

Provide support for security solutions related to Bluecoat Proxy, configuring solutions in the development, test and production environment.

Gained good knowledge and hands on experience with routing and switching protocols such as OSPF, BGP and STP.

Worked on MPLS between Data center and offices.

Worked to implement new data center as well as migrated old Switches Nexus 5000 to new Switch Nexus 7000.

Worked on configuration, deployment and administration of Palo Alto, Checkpoint firewalls versions R77.0, R75.46.

Worked on Blue Coat's proxy architecture for the high level of web security.

Configuring and troubleshooting of routing protocols such as OSPF and EIGRP for effective communication on Cisco 3900, 3800 series routers.

Configuration of VLANs on cisco switches 3850, 3650 and troubleshooting IP addressing issues, updating IOS images and other hardware installations

Worked on Cisco ASA 5500 series firewalls, Nexus 7000, 5000 series switches

Experience in troubleshooting Nexus switches

Configured Juniper SRX series firewalls for policy management, and Juniper SSL VPNs

Administer and support Juniper and Palo Alto Firewalls Using NSM (NetScreen and ISG firewalls).

Dealt with NAT configuration and troubleshooting issues related to access lists and DNS/DHCP issues within the LAN network

Troubleshooting VLAN, Spanning Tree Protocol, Switch trunks and IP conflict issues

Coordinated with senior engineers in BGP routing policies and designs

Installing and configuring VPNs for the clients (site to site)

Implemented traffic filters using Standard and Extended Access-lists, Distribute-Lists, and Route-Maps

Monitoring Network infrastructure using SNMP tools

Gained good knowledge on integration of logs into Splunk.

Gained experience with using NSM, SEP, IPS and IDS.

Good hands on experience with f5 BIG-IP GTM and LTM.

Worked with Juniper M320 multiple edge router.

Environment: F5 Local Traffic Managers (LTM) 5000, 7000 series, Fortify, Aruba Wireless access points, Aruba controllers and Aruba management software, Spanning tree protocol, VLANs, STP, DNS/DHCP issues, Palo Alto firewalls, BGP, MPLS, ETHER channels, checkpoint, Palo Alto Panorama, Bluecoat, Nexus, Juniper.

CHI, Lincoln, NE May 2014 - June 2015

Network Engineer

Responsibilities:

Expertise with TCP/IP, routing and switching protocols, CISCO ASR routers, Cisco Catalyst, Arista and Nexus switches, Cisco ASA Cluster firewalls with multi-contexts Firewalls, Palo Alto and IPS configuration.

Extensive working experience with Cisco IOS/NxOS release and Cisco ASR router platforms, Cisco ISR router platforms, Cisco Nexus 7000 and 7700 series platforms, Cisco Nexus 2000 series platforms, Cisco Nexus 1110/1000v, ASA firewalls, ACS 5.x, IPS, Palo Alto, load balancers, Catalyst 6500 series platforms, Catalyst 4700 series platforms, Catalyst 3800 series platforms.

Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.

Extensive working experience with IPv4 technologies and routing to include OPSFv2, EIGRP, BGP/MPLS, OTV/VDC layer 2 extension, vPC, PIM Sparse-dense mode/IGMP, HSRP, TACACS+/RADIUS, RSA Secure ID, Ether Channel, Port Channel, STP, Rapid PVST+, Port Fast, LACP, and other STP protocols.

Experience working with JUNOS OS on Juniper Routers and Switches.

Hands on experience with creating juniper Logical system (LSYS).

Familiar with JUNOS space and other management tools.

Worked with Riverbed (OPNET) suite of performance monitoring tools with troubleshooting and identifying root cause.

Worked on NetScout to identify network utilization graphs, look at circuit information.

Worked on NetScout which application was utilizing bandwidth and which user was using the majority of the bandwidth based on the IP address.

Worked with cisco ASR series routers, ISR G2 and 4k routers, 4500 (Sup6 and Sup7) and 6509(Sup720 and Sup2T) series switches.

Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers

Worked with BMC remedy ticketing system.

Assist with DLP component upgrades, installs, testing and configuration.

Stabilize and optimize DLP system performance, including rules and reports.

Gained good working knowledge on Infoblox and Aruba networks.

Designing and deploying EIGRP, OSPF, BGP, MPLS-VPN protocols and routing technologies for connecting data center to remote locations.

Configured VSS in 4500x, stacked 3850 and 3750x switches, worked on 5548 Nexus FC.

Configuring & managing around 500+ Network & Security Devices that includes F5 BigIP Load balancers and 3DNS, Blue Coat Proxies and Plug Proxies.

Worked with ciscoASA5545x and Palo Alto Firewalls.

Working knowledge of DNS and DHCP.

Expertise in Virtual Private Networking technologies to include DMVPN v3, IPsec/IKE v1/v2 and Web SSL VPN (Cisco or Juniper technologies)

Experience installing, upgrading and supporting Check Point.

Worked with juniper mx240 routers configuration.

Expertise in security identity management platform such as ACS 5.x, RSA Secure ID 8.x

Expertise in packet analysis to decode OSI layers to effectively troubleshoot network issues

Expertise in network monitoring tools such as Solarwinds.

Worked as part of network design team.

Configuring Lightweight and Autonomous APs, WLAN Controllers.

Good working knowledge on F5 LTM and GTM.

Good knowledge on support/administration of Splunk.

Develop and maintain technical documentation (Engineering Design Documents, Change Requests).

Worked on MPLS between Data center and offices.

Worked to implement new data center as well as migrated old Switches Nexus 5000 to new Switch Nexus 7000.

Configuring rules and maintaining checkpoint and Palo alto firewalls and analysis of logs using various tools.

Worked on Blue Coat's proxy architecture for the high level of web security.

Configuring and troubleshooting of routing protocols such as OSPF and EIGRP for effective communication on Cisco 3900, 3800 series routers.

Configuration of VLANs on cisco switches 3850, 3650 and troubleshooting IP addressing issues, updating IOS images and other hardware installations

Worked on Cisco ASA 5500 series firewalls, Palo Alto, Nexus 7000, 5000 series switches

Experience in troubleshooting Nexus switches

Worked with network design, installation, testing and maintenance of network hardware and software.

Environment: CISCO ASR, Cisco Nexus 7000 and 7700, Aruba Wireless access points, Aruba controllers and Aruba management software, Cisco ASA 55xx, Palo Alto, Juniper M and MX series Routers, DHCP snooping, Juniper security appliances, Solar winds, F5 LTM, Palo Alto Panorama, Blue Coat, EIGRP, OSPF, BGP, MPLS-VPN.

Prudential Bank, New York City, NY May 2013 – Mar 2014

Network Data Engineer

Responsibilities:

Responsible for setting up the infrastructure environment with majority of Cisco & Palo Alto appliances apart from various other equipment.

Efficiently using Service Now tool for generation of tickets, assigning severity to incidents, following up with incident status and troubleshooting incidents.

Excellently used Splunk to analyze and monitor incident management and incident resolution problems.

Analyzed and monitored incident management and incident resolution problems using Splunk.

Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.

Upgraded and updated Cisco IOS from 12.3T to 12.4. Used to DHCP to automatically assign reusable IP addresses to DHCP clients.

Configuring and troubleshooting perimeter security devices such as Checkpoint NGX R77 Gaia, Provider-1/MDM, Secure Platform, Palo Alto and ASA Firewalls.

Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering)

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.

Successfully installed Palo Alto PA 3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls

Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall

Exposure to wild fire feature of Palo Alto.

Maintained and managed networks running EIGRP and BGP routing protocols.

Regularly performed firewall audits around Checkpoint and Palo Alto Firewall solutions for customers.

Provided tier 3 support for Checkpoint and Palo Alto Firewall software to support customers.

Work on Checkpoint Platform including Provider Smart Domain Manager. Worked on configuring, managing and supporting Checkpoint Gateways.

Configuration of routing protocols EIGRP and BGP for small to medium sized branches based on company branch standards, including redistribution and route maps.

Access Point refresh and implementation at various sized branches and locations.

Used network monitoring tools such as Spectrum to ensure network connectivity and protocol analysis tools to assess and pinpoint networking issues causing service disruption.

Worked with management and various departments to develop procedures and troubleshoot problems as they arose.

Build IT security infrastructure including Checkpoint, Juniper and Palo Alto firewalls

Configuring F5 Load Balancers: Adding virtual IPs, nodes, pools and health monitoring.

Configuring Juniper NetScreen Firewall Policies between secure zones using NSM (Network Security Manager) and used Panorama for Palo alto for firewall policies push on to device.

Backup and restore of checkpoint and Cisco ASA Firewall policies

Handling Break/Fix situations, monitor, configure, policy creation on Checkpoint's Smart Center Server running on Secure Platform

Monitoring Traffic and Connections in Checkpoint and ASA Firewall

Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960/6500 switches and Cisco 3640/12000/7200/3845/3600/2800 routers, Cisco Nexus 7K/5K, Palo Alto Panorama, Cisco ASA 500, F5 BIGIP LTM, Juniper SRX, Palo Alto, Panorama, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

Medco Health Solutions, Franklin Lake, NJ Mar 2012 – April 2013

Network Engineer

Responsibilities:

Installing, Configuring and troubleshooting Cisco Routers (ASR1002X, 3945, 3845, 2800, 3600) and Switches to perform functions at the Access, Distribution, and Core layers.

Configuring, upgrading and deployment of Nexus 7010, 5596 and 2248.

Designing, implementing LAN/WAN configurations on Cisco Nexus 5K, catalyst 6500 switches

Configuring and resolving various OSPF issues in an OSPF multi area environment.

Implemented, configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).

Expertise in maintenance of layer2 switching tasks - VLAN, VTP, RSTP, configuration of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.

Packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems

Implementing, configuring, and troubleshooting various routing protocols - EIGRP, OSPF, and BGP.

Performing network monitoring, providing analysis using various tools like Wireshark, Solar winds etc.

Experience working in Datacenter environment, configuration changes as per the needs of company.

Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls

Redesigned Internet connectivity infrastructure for meeting bandwidth requirements.

Configuring, implementing and troubleshooting VLAN's, VTP, STP, Trunking, Ether channels.

Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.

Experience in configuring, upgrading and verifying the NX-OS operation system.

Configured and managed Cisco access layer routers and switches

Provided support for troubleshooting and resolving customer reported issues

Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.

Worked on F5 and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance.

Configured and managed OSPF redistribution and authentication with type 3 LSA filtering and to prevent LSA flooding and also configured OSPF over frame relay networks.

Designing, configuring, implementing and troubleshooting (LAN) VLAN's, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.

Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience

Implemented site-to-site VPN in Juniper SRX as per customer.

Implemented various EX, SRX & J series Juniper devices.

Implementing and managing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).

Configured Cisco 1231 Access points with 5959 and 4941 antennas (802.11/a/g).

Designing, configuring, implementing and troubleshooting (LAN) VLAN's, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.

Environment: RIP, OSPF, EIGRP, Cisco 2800/2900/3900/7200/7600, ASR9k, CRS&GSR 12k Series routers, juniper SRX 650/3600, static NAT, dynamic NAT, Cisco 3550/4500/6500 switches.

Mind Thread Information Technology Pvt. Ltd Nov 2009 - Feb 2012

Jr. Network Engineer

Responsibilities:

Setup and configuration for new workstations using ghost imaging software.

Installation and Configuration of Cisco routers 2500 series, 2600 series, 2800 series, 3600 series.

Configuring various printers using TCP/IP.

Monitored network performance and conferred network users how to solve existing system problems.

Solved most of the computers problems (hardware and software)

Dealt with third-party vendors for parts and service orders on all equipment including fax machines, printers, PC's, and phone lines.

Worked on Bugzilla ticketing system for monitoring and solving various network issues.

Perform maintenance tasks on systems and printers such as changing cartridges and check for computer problems.

Troubleshoot network, Internet and email problems for users.

Troubleshoot hardware problems with network cards, video cards, sound cards, motherboards, modems etc.,

Provided comprehensive desktop and network support, resolving technical issues for over 50 end-users.

Assisted with installation, maintenance and troubleshooting of network support equipment.

Environment: Cisco routers 2500, 2600, 2800, 3600, Cisco catalyst series switches 2950, 3500, 3700, 4500, Nortel switches, RIP, OSPF, BGP, Frame Relay, Cisco PIX firewall, IPsec.

Iris Info Solutions, Hyderabad, India Sep 2008 - Oct 2009

Network Data Engineer

Responsibilities:

Configuring and troubleshooting multi-customer ISP network environment.

Involved in network monitoring, alarm notification and acknowledgement.

Implementing new/changing existing data networks for various projects as per the requirement.

Troubleshooting complex networks layer 1, 2(frame relay, ATM, Point to Point, ISDN) to layer 3 (routing with MPLS, BGP, EIGRP, OSPF and RIP protocols) technical issues.

Providing support to networks containing more than 2000 Cisco devices.

Performing troubleshooting for IOS related bugs by analyzing history and related notes.

Carrying out documentation for tracking network issue symptoms and large scale technical escalations.

Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-round technical support.

Commissioning and Decommissioning of the MPLS circuits for various field offices.

Preparing feasibility report for various upgrades and installations.

Installation and maintenance of new network connections for the customers.

Configuring all the required devices and equipment for remote vendors at various sites and plants.

Installing new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations.

Installing and maintaining local as well as network printers.

Validating existing infrastructure and suggesting new network designs.

Working on creating new load balancing policies by employing BGP attributes including Local Preference, AS-Path and Community, MED.

Installing and maintaining Windows NT Workstations and Windows NT Server.

Providing technical support to LAN & WAN systems.

Monitoring Memory/CPU on various low-end routers in a network.

Environment: LAN & WAN, Cisco Devices OSPF, BGP, EIGRP, MPLS and Cisco Switches and Routers.

Education:

Holds a Bachelor’s degree in Information Technology



Contact this candidate