Resume

Sign in

Engineer Network

Location:
Boston, MA
Posted:
March 21, 2018

Contact this candidate

Resume:

Karunakar A

Sr Network Engineer

Ph.No: 609-***-****

Email Id:ac4vw9@r.postjobfree.com

Professional Summary:

9+ years of hands on experience in network engineering, designing, integrating, deploying, maintaining and supporting broad range of communication systems.

Experienced configuring Virtual Local Area Network (VLAN), VLAN Trunking Protocol (VTP), Dynamic Trunking Protocol (DTP), Spanning Tree Protocol (STP), RSTP, MST and Per VLAN Spanning Tree (PVST), Virtual routing and Forwarding (VRF).

Implemented MPLS/VPN services for various customers.

Experience in Layer 3 Routing Protocol configurations: RIP, OSPF, BGP, EIGRP and MPLS.

Experience in Layer 2 routing Protocol Configurations: ARP, RARP, ATM/FRAME RELAY and VPN technologies: IPSec & SSL.

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.

Experience in designing, implementing and Managing LAN, WAN solutions for different client setups.

Checkpoint – R60/R65/R70/R75 software version with hardware Checkpoint 11000, 21000 series with VSX environment.

Checkpoint software Blades (IPS, Anti-Bot, Anti-Virus, Identity Awareness and DLP) with managed by Checkpoint Checkpoint smart dashboard in smart domain manager/Provider-1 environment & separate Syslog servers.

Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Extensive work experience with Cisco Routers, Cisco Switches, Juniper routers,Nexus routers, HP and Brocade switches, Load Balancers,Zone Based firewalls and implementing different failover mechanisms on Palo Alto (PA 5030), Juniper, ASA 55XX & Checkpoint R77 firewalls.

Supporting and troubleshooting Checkpoint/Cisco site-to-site VPN/IP Sec functionality.

Experience on working, implementing, configuration and managing Juniper SA 2500/4500/6500 SA devices with secure access services 7.1/8.0.

Checkpoint VPN-1/ Firewall-1, IPSO, SPLAT and GAIA initial setup on open servers, Nokia devices, Crossbeam/Checkpoint hardware devices.

Implemented traffic filters on CISCO routes using Standard Access List and Extended Access list.

Familiarity with WAAS, VoIP, wireless, security, next-gen datacenter networking (SDN, Cisco ACI).

Experience with installing and managing IT services such as Active directory, site replication, DNS, SSH, DHCP, DNS, NAT and Terminal service.

Strong knowledge on mitigation of DDoS attack's & SSL implementation on Cisco and Palo Alto firewalls

Handled Load Balancing using F5 Networks.

Hands on experience with Citrix load balancers.

Experience in configuring Virtual Local Area Network (VLAN), spanning tree protocol (STP), VLAN Trunking Protocol (VTP), Dynamic Trunking Protocol (DTP), Per VLAN spanning Tree (PVST) and 802.1x authentication in access layer switches.

Strong knowledge in HSRP, VRRP redundancy Protocols.

Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.

Worked on high end cisco devices like ASR 1k, 5K, ASR 9000, CRS-X, Cisco 7200 series, Juniper Routers

Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.

Access control server configuration for RADIUS & TACAS+.

Experience with 802.11x wireless technology.

Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.

Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248)

Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.

Excellent communication skills with ability to interact effectively with employees at all level of the organization.

Certifications:

Cisco Certified Network Professional (CCNP)

Cisco Certified Network Associate (CCNA)

Palo Alto Certified

Technical Skills:

Hardware:

Cisco Switches (2900, 2924, 2950, 3550, 5500, 6500, 6509, 6513), Cisco routers (2600, 2800, 3640, 3700, 3825, 7200, 7204, 7206), Cisco PIX 500 series, CSU’s/DSU’s, Catalyst 6500, 7600, 4500, ASR 1k, 5K, and ASR 9000, Juniper M320 and T640 routers.

Firewalls and Sniffers:

Cisco PIX, FWSM, ASA, Juniper firewall NS50, Palo Alto, SSG 550M, Check Point, OPNET, WIRESHARK

Protocols

RIP, RIP2, PPP, OSPF, EIGRP, IS-IS, BGP, SNMP, HTTP, FTP, TFTP, HTTP, DHCP, SMTP, ICMP

WAN Protocols and Technologies

HDLC, PPP, ATM, FRAME RELAY, IDSN, Metro Ethernet

LAN Technologies

Ethernet, TCP/IP, CDP, STP, RSTP, VTP, VLAN, Trunks, Ethernet channel, MPLS.

Redundancy Protocols

HSRP, VRRP, GLBP, RPR, RPR+, NSF-SSO.

Servers

Domain servers, DNS servers, WINS servers, Mail Servers, Proxy Servers, Print Servers, Application servers, FTP Servers

Operating Systems

Windows 2000/2003/2008, windows XP/7, LINUX, Redhat, UNIX, Macintosh

Anti-Virus & Internet Security

MacAfee, Symantec, Trend-Micro & e-Trust.

Professional Experience:

Boston Medical Center, Boston, MA Jan 2016 – Present

Senior Network Engineer

Responsibilities:

Worked on Converting the Partner IPSEC VPN from one Data Center to Another Data Center.

Experience working with Nexus 7010, 5020, 2148, 2248 devices

Worked on Juniper J series j230, M 320 routers and EX 3200 series switch.

Coordinated precise scheduling for all migration events including all equipment and resources for the data center migration on an extremely accelerated schedule with for a high profile client.

Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.

Working experience on upgrading Checkpoint old devices/Software to new platforms like R70 to R75.20.

Worked on network security design and installation using Palo Alto Firewall (Application and URL filtering, Threat Prevention, Data Filtering).

Worked extensively in Configuring, Monitoring and Troubleshooting Palo Alto with ACL, NAT, Object Groups, Failover, Multi-Contexts

Responsible for Palo Alto and Cisco ASA firewall administration across our global networks

Maintenance and configuration of Cisco ASR1000 series

Strong hands on experience in installing, troubleshooting, configuring of Cisco ASR, 7200, 3900, 3800, 2900, 2800, and 1800.

Troubleshooting application and network traffic on Checkpoint smart view tracker along with FW monitor and TCP dumps on CLI based.

Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair

Experience managing Datacenter technologies such as Nexus switches or ACI.

Deploying and commission of core ASR 1K, Nexus 7K, 5K and its downstream devices

Experience configuring, installing and supporting SDN technologies like Cisco ACI a plus.

Working on smart view monitor get statistics for the checkpoint hardware/software CPU’s, memories and overall health of the devices.

Migrating Cisco ASA firewalls policy to new Checkpoint appliance with support of vendor specific tool.

Managing URL Content Filtering on Websense Proxy.

Adding exemption, editing policy groups on Websense Management Server.

Adding/removing ARM bypass rules on Websense appliances.

Implemented Site-to-Site VPNs over the internet utilizing Palo Alto Firewalls

Perform Firewall OS upgrades using CLI, Splat and Voyager GUI.

Backup and restore of checkpoint Firewall policies.

Experience on designing and troubleshooting of complex BGP and OSPF routing problems,

Convert Branch WAN links from TDM circuits to MPLS

Experience with Network Redesign of branch and Campus Networks. This includes changes to both the voice and data environment.

Performed Cisco ASR/router/switch/firewall deployments, maintenance, and code upgrades (1800 - 7600 router's, 2000/5000/7000 series Nexus, FWSM/PIX 515 - ASA 5585 pre-8.3 and post 8.3 deployments including NAT configuration/Packet Tracer/ASDM

Configured application load balancing using F5 LTM.

Experience with configuring VIP, Pools on F5 LTM and working with irule management on LTM

Assisted campus for VOIP network management and troubleshoot

Set up network connectivity for Cisco training. This involved connecting the routers, switches and firewall physically and loading them with a base configuration. It also involved connecting the PCs to the network and providing Internet connectivity

Worked on Data, VoIP, security as well as wireless installations and technologies

Complete understanding of feature testing of switches (RFC 2889 and RFC 2554) using IXIA's IP testing system.

Replace branch hardware with new 2851 routers and 2960 switches.

Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000

Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture

Experience configuring Virtual Device Context in Nexus 7010

Administering and troubleshooting Cisco 4948 series, 6500 devices ASR 9000s, Nexus 3k, 7k series Arista DCS7300, 7010, MX960s

Experience in Configuring, upgrading and verifying the NX-OS operation system.

Implementing & Troubleshooting of T1, MUXES, CSU/DSU and data circuits.

Involved in designing and implementing QOS and policy map to 2800 series routers for all the branches

Experience Branch Relocation: Connect workstation, servers, etc. Rack and stack Pre-configured new hardware and connect the circuits. Work with Carrier to test and turn-up circuits.

Manage and provide guidance to junior members of the team.

Developing and testing the Customer Network Management System (CNMS) R6.0/7.0 as network performance FCAPS utility.

Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment

Involved in configuring IP Quality of service (QoS)

Involved in Datacenter build and support, Implementation, migrations network support, Interconnectivity between an old Datacenter and new Datacenter.

Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.

Installed new purchased Hardware to the new DC, Migrate data over WAN connection, also greatly involved in virtualization of physical servers.

Contact determining a list of application for the migration, Stakeholder management, vendor management, and change management.

Environment: Router 2900, 3900; Cisco Catalyst Switch 3550, 2960. T1 Controllers, Juniper J series, Checkpoint R70 to R75.20, Cisco ASA, DS3 Lines (T3 Lines), Fiber and Ethernet cabling.

ATOS, Tarrytown NY Jun 2014 – Dec 2015

Senior Network Engineer

Responsibilities:

Implemented LAN/WAN utilizing CISCO 7200, 7204, 7206.

Configured Routing Protocols such as OSPF and policy based routing.

Design OSPF Areas for reliable Access Distribution and for Core IP Routing.

Fine-tuned OSPF metrics to avoid routing loops and ensure redundancy in case of link failures.

Redistribution of routing protocols and Frame-Relay configurations

Implement and manage all the firewalls in smart domain manager/Provider-1 with CMA to organize enterprise and remote locations.

Managing URL Content Filtering on Websense Proxy.

Adding exemption, editing policy groups on Websense Management Server.

Adding/removing ARM bypass rules on Websense appliances.

Perform Firewall OS upgrades using CLI, Splat and Voyager GUI.

Backup and restore of checkpoint Firewall policies.

Monitoring, maintaining, and implementing security policies on Cisco firewalls.

Change Management: Need to make sure that all the change designs and implementations are completed and tested as per the schedule required by the customers.

Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.

Worked on Extensively on Cisco Firewalls, PaloAlto Firewalls (5020,3020)&ASA 5500(5510/5540) Series

Migrated to R75.xx in various Checkpoint 4k/11k/21k appliances from R65, R62, R60, etc., and building the new Smart Center server.

Configured and implemented Composite Network models consists of Cisco7600, 7200, 3800 series and ASR 9k, GSR 12K routers and Cisco 2950, 3500, 5000, 6500 Series switches

Implemented SNMP on Cisco routes to allow for network management

Implementing NAT solutions on CISCO IOS routers.

Network Migration from RIP to OSPF

Implementation and configuration of VPN Tunnels.

Configuring VLAN trunking Protocol (VTP) on core switches.

Configured HSRP and VLAN trunking 802.1Q, VLAN routing on catalyst 6500 switches.

Maintained a Network with more than 600 Network devices, some 20,000-end hosts, and the other Network devices like DHCP, DNS Servers, and Firewall Servers.

Implementation of TCP/IP and related services – DHCP/DNS

Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.

Study single point failures & design WAN structure in such a way that there are no failures in network in case of any device or link failure

Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.

Deploying and decommissioning the VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices

Cisco IPT Migration Projects from legacy PBXs with Nortel.

Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between switches

Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.

Load Balancing using F5 Networks Big IP

Setup simplified and traditional VPN communities and CISCO Anyconnect.

Installed and configured Routers, Bridges, Terminal Servers and CSU/DSU’s to support WAN links

Work with application developers and systems engineer to migrate applications and systems to a new Border Gateway network.

Resolution of complex routing, switching and security related problems with Cisco and Juniper routers and Palo Alto firewalls. HSRP and Ether channel configuration. MPLS and MPLS VPN troubleshooting

Installed and configured CISCO ASA and Checkpoint firewall.

Leveraged two Nexus 2232 Fabric Extenders and two 2248 Fabric Extenders, making them ‘dual-homed’ to both N5Ks and implementing Enhanced Virtual Port-Channel (EvPC).

Involved smart view tracker to check the firewall traffic.

Documented all the work done by using MOPS, Visio, Excel and MS word.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 12000/7200/3845/3600 routers, Cisco ASA5510, Checkpoint.

Cigna Health Care, Hartford, CT Oct 2011 – May 2014

Senior Network Engineer

Responsibilities:

Responsible for the implementation and maintenance of firewall based security zones (DMZ*s).

Provide support to internal project teams by adding firewalls, switches and routers to managed DMZs.

Configure the layer 2 and layer 3 on Cisco Nexus 7K, 5K, 6509, 9710, 5596 UP, 4500, 3850, 3950, ASR and 2960

Worked with Checkpoint, Cisco ASA, and Palo Alto Networks solutions

Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.

Implementing & Troubleshooting of T1, MUXES, CSU/DSU and data circuits.

Experience on designing and troubleshooting of complex BGP and OSPF routing problems,

Have sound knowledge of Firewall architecture, routing and VPN.

Have experience working on HP Open view Network Node Manager.

Upgrade firewalls in accordance with change management & Document changes to firewalls.

Monitor traffic and access logs in order to troubleshoot network access issues.

Have experience with CiscoWorks LAN Management Solution.

Implemented Positive Enforcement Model with the help of Palo Alto Networks

Experience in migration of Frame-relay based branches to MPLS based technology using multi layer stackable switch like 6500 series and 2800 series router.

Testing VPC, BGP, OSPF, EIGTP, RIP, SPAN, sflow, Vlantrunking, SVI and power supplies on Nexus and ASR devices

Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.

Hands on experience with Cisco 3500, 3750, 4500, 6500 series equipment and configuring and deploying and fixing them with various modules like Gig card, VPN SPA card, WIC card.

Cisco IOS experience on 3600/7200 class hardware in complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data centre environment.

Involved in configuring IP Quality of service (QoS).

Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.

Experience in designing, installing & configuring of Cisco PIX, ASA & FWSM (Firewall service module).

Evaluate, Analyze & Implement firewall policies to meet business requirements

Experience in creating and maintaining firewall configurations, updating documentation and log analysis.

Worked extensively in configuring, monitoring and troubleshooting Cisco's ASR 5500

Applying crypto maps and security keys for the branches, ISAKMP (Internet security association key management protocol) for establishing Security associations (SA) cryptographic keys.

Experience in configuring routing protocols like EIGRP, RIP v2, OSPF & BGP and Cisco ACS protocols like RADIUS and TACACS.

Experienced in WAN environments, installing and troubleshooting data circuit problems (MPLS, T1).

Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment.

Involved in designing and applying QOS and policy map to 2800 series routers for all the branches.

Involved in designing GRE tunnels for encryption of data flow from source to destination.

Implementing VoIP solutions using SIP & H.323, also have sound knowledge of Avaya VoIP products.

Experience in configuring VLAN’s STP (Spanning tree Protocol) & RTSP (Rapid Spanning Tree Protocol).

Experience with Project documentation tools & implementing and maintaining network monitoring systems (Cisco works & Netinfo, Infoman Virtual Change) and experience with developing network design documentation and presentations using VISIO.

Understanding & Implementation of IPSEC & GRE tunnels in VPN technology.

Environment: Router 2800, 3800, 7200, 7600; Cisco Catalyst Switch 6500, 6509, 3550

Andhra Bank, Hyderabad, INDIA Aug 2009 – Sep 2011

Senior Network Engineer

Responsibilities:

●Maintaining the Network Infrastructure, Installation, migration and configuration of routers and switches for clients.

●Provide alternative means from dial-up connection to bring down the damage or loss that occurs for the client.

●Configured Routing protocols such as OSPF and policy based routing.

●Team member of Configuration of CISCO 7206 router and Configuration of Catalyst switches.

●Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.

●Create and test Cisco router and switching operations using OSPF routing protocol.

●Configuration and troubleshooting link state protocols like OSPF in multiple areas.

●Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.

●Optimized performance of the WAN network consisting of CISCO 3550/4500/6500 switches by configuring VLANs.

●Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.

●Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.

●Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.

●Configured IP access filter policies.

●Providing Technical Support and solutions for Network Problems.

●Implementing NAT solution's on Cisco IOS routers.

●Upgrading IOS, troubleshooting network outages.

●Worked on Cisco Routers, Active /Passive Hubs, Switches.

●Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network infrastructure and configured all the network Infrastructure devices including Network Printers and Registers.

Environment: Cisco 3550/4500/6500 switches and Cisco 2500, 2600, 3000, 6500, 7500, 7200 routers, Checkpoint.



Contact this candidate