Jagadeesh Krishna
609-***-**** **********@*****.***
Professional Summary:
Cisco Certified Network Engineer with 8+ years of experience in the industry, which includes expertise in the areas of Routing, Switching, Firewall and Load Balancing.
Expert level knowledge of troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, BGP, ability to interpret and resolve complex route table problems.
Implementation traffic filters on Cisco routes using Standard, extended Access list.
Expert Level Knowledge about TCP/IP and OSI models.
In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on services.
Cisco ASA Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
Extensive Knowledge on the implementation of Cisco ASA 5500 series and checkpoint R75 firewalls.
Installed Palo Alto PA-3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls
Hands on experience working with Cisco Nexus 7K, 5K & 2K Switches.
Comprehensive knowledge of wireless networking systems and protocols.
Worked on NXOS, IOS, and IOS-XR BXB to N7K-NXOS (MPLS) system test.
Experience in F5, Cisco ACE 4710 Load balancers, Aruba wireless access points and controllers.
Experience deploying BIG-IP F5LTM Load Balancers for load balancing and traffic management of business application.
Strong hands on experience in installing, troubleshooting, configuring of Cisco 7200, 3800, 3600, 3400, 2800, 2600, 2500, 1900, 1941, 1921 and 1800 series Routers, Cisco Catalyst 6800, 6807, 6500, 4500, 3750, 2950, 2960 and 3500XL series switches.
In-depth knowledge and hands-on experience on IP Addressing, Sub netting, VLSM, DNS, DHCP and ARP, reverse & proxy ARP, Ping Concepts.
Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.
Experience in working with Windows power shell scripting to maintain and administrating server environments.
Experience with Layer 2 and Layer 3 protocols like LDP, RSVP/ TE, QOS, COS L2 VPWS and VPLS, FRR.
Responsible for network design, projects and support across the globally co-located data center networks.
Experience on Virtual Private Network (VPN) for operating Network and Data Center
Implementation of HSRP, VRRP and GLBP for Default Gateway Redundancy and troubleshooting.
Facilitating the automated collection, Analyzing, alerting, auditing, reporting and secure storage processing of all the logs using RSA envision solution.
Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
Experienced in Deploying Wireless Network Infrastructure and Wireless Survey Best Practices Advanced knowledge in TCP/IP suite and IPAM, routing protocols, such as OSPF, EIGRP, ISIS, and BGP.
Expertise in network protocols, Firewalls and Communication Network design.
Advanced knowledge, design, installation, configuration, maintenance and administration of Juniper SRX Firewall, Juniper EX and Juniper MX devices.
Solid knowledge and hands-on experience in configuring datacenter infrastructure with Cisco Nexus 5K and 7K series switches (5548, 7010) and Cisco Nexus Fabric Extenders (2232, 2248).
Expert in configuring 802.1d STP and 802.1w rapid-spanning tree protocol (RSTP), Cisco per VLAN spanning Tree (PVST+) / Multiple Spanning-tree 802.1s, VLAN & Dynamic Trunking Protocol (VTP/ DTP) and 802.1x port-security on access layer switches.
Experience with configuring vPC, VDC and OTV between the data centers as a layer 2 extension.
Excellent hands-on experience with Layer 2 protocols ARP, ATM, Frame Relay and VPN technologies: IPSec & SSL
Sound knowledge and experience in IP addressing and subnetting with VLSM, configuring and supporting DNS zones, installing and configuring proxies.
Experience in installing, managing & troubleshooting enterprise Networks & System Administration issues on Windows & Linux platforms in Development, Lab & Production Environments.
Experience in Network Management Tools including HP-Open view, Wireshark, Network Monitor AppMapper, Net Scout, Nmap and Cisco works to support 24x7 Network Operation Center (NOC).
Configuring Virtual Chassis for Juniper EX-4500, EX-4200, EX 3200, EX-2200 series Ethernet switches & Juniper QFabric QFX3500.
Expertise with configuring TACACS+, RADIUS for AAA authentication, user authorization & accounting.
Sound knowledge in implementation of standard, extended ACL’s on Cisco PIX 505, 515, ASA 55xx series, Juniper SRX firewalls.
Solid understanding of physical & virtual security devices including Juniper SRX240, SRX220, SRX550, Fortinet FortiWAF, Microsoft Web Application Proxy.
Experience configuring network security applications not limited to Intrusion Detection and Prevention Systems (IDS/IPS).
Hands-on experience with installing, configuring and managing IT infrastructure applications and services including Active directory site replication, DNS, DHCP, NAT, secure FTP, LDAP, SMTP.
Worked on F5 and A10's GTMs to troubleshoot DNS issues and actively participated in A10 to F5 GTM migrations.
Migrated legacy F5 LTM and GTM appliance to newer version appliances
Technical Skills:
Networking Technologies
LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP
Networking Hardware
Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls.
Routing Protocols
OSPF, ISIS, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting
Security Technologies
PAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint
Network Monitoring
Solarwinds, Wireshark, HRping, Whatsupgold, Infoblox
Operating Systems
Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR, IOS-XE, NX-OS
Routers
CISCO 4300, 4400, 4500,2600, 2800,3800,7200, Juniper M & T Series, ASR 1000
Load Balancers
F5 Networks (BIG-IP), Netscaler (Citrix)
Capacity & performance
Cascade Riverbed (Flow Monitor), WAN Killer
Switches
CISCO 2960,3750,3850, CAT 9300, CAT9400, CAT 9500,4500,6500,6800 Nexus 7k,5k,2k
Programming Languages
C, C++, Perl, Power Shell, Python
Simulation Tools
GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence
Firewalls
Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580), McAfee Web Gateway, Checkpoint, Palo Alto firewalls.
AAA Architecture
TACACS+, RADIUS, Cisco ACS
Features & Services
IOS and Features, HSRP, GLBP, VRRP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR’s, HLD and LLD documents, Dell equal logics
EDUCATION:
Bachelor’s Degree in Computer Science Engineering, Jawaharlal Nehru Technological University (JNTU) -India.
CERTIFICATIONS:
(CCNA) – Cisco Certified Network Associate
(CCNP) – Cisco Certified Network Professional
(PCNSE) – Palo Alto Certified Network Security Engineer
Professional Experience:
AAA Club Alliance October 2016 - Present
Mount Laurel, NJ
Sr. Network Engineer / Firewall Engineer
Responsibilities:
Designed and support the consolidation of data centers utilizing Cisco 6500, Nexus 2K, 5K and 7K infrastructure.
Involved in configuring and implementing of composite Network models consists of Cisco 7600, 7200, 3800 series routers and Cisco 2950, 3500, 5000, 6500 Series switches.
Configured Nexus 7010 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links.
To troubleshoot complex networks layer 1, 2 and layer 3 (Ten Gigabit circuits, Routing with BGP, OSPF, RIP Routing protocols) technical issues.
Experienced in providing a plan, designing and implementing the services for the enterprise class data center networks with leading technologies such as virtual port channel (VPC), virtual extensible LANs, Fabric path and Overlay Transport Virtualization (OTV) in NX-OS
Strong networking capability and knowledge of different firewall platforms to help in random identification and isolation of issues during outages and incidents.
Participated in the installation, configuration, post installation daily operational tasks and configuration and deployment of Cisco Nexus equipment.
To troubleshoot complex networks layer 1, 2 (Frame Relay, ISDN, Point to Point, ATM) to layer 3 (Routing with MPLS, BGP, OSPF, EIGRP, and RIP Routing protocols) technical issues.
Worked on a project to update and manage configuration parameters for data center and servers using Python scripting.
Designed 10 gigabit networks using Cisco Nexus 7000 series switches, and Cisco 3800 series routers
Managed VPN, IPSec, Endpoint-Security, status policy, Application control, IPS, Monitoring, Anti-Spam, Smart Provisioning.
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
Successfully installed Palo Alto PA-3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls
Configuring and enable Net flow on layer 3 ingress ports with defined active timers.
Configured OSPF redistribution and authentication with type 3 LSA filtering to prevent LSA flooding and also Configured OSPF over frame relay networks for NBMA and point to multipoint strategies.
Implemented traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).
Used Net Flow Data statistics from Net Flow engine and export it to a Net Flow Collector for storage.
Good knowledge on lexicon, regex, and content type filtering on Iron port Supported a user base of more than 30000+ active accounts across multiple domains.
Deployed, configured and implemented cisco 6800 catalyst switch.
Dealt with monitoring and documenting the services in compliance to the SLA requirements as a noc team member.
Experience in working with Network automation tools and testing for network change and configuration management.
Provided redundancy in a multi homed Border Gateway Protocol (BGP) network by tunings AS-path.
Worked on Juniper SA 2500 to configure SSL VPN clients Experience working with Exchange 2010 SP3 for planning and deployment.
Worked with Management tools like CSM and Cisco ACS.
Worked with Cisco IOS, NX-IOS, IOS-XR.
Worked with MPLS to improve quality of service (QoS) by defining LSPs that can meet specific service level agreements (SLAs) on traffic latency, jitter, packet loss and downtime.
Worked on GUI and CLI monitoring for UCS data management using xml API
Worked with Load balancing device like F5 Big-IP local traffic manager (LTM) 1600.
Hands on experience in F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
Experienced in working with BIG-IP Edge Portal and BIG-IP Edge Client.
Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers
Implemented various OSPF scenarios on networks consisting of 7600 routers. Configured policy based routing for BGP for complex network systems.
Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
Tuned BGP internal and external peers with manipulation of attributes such as metric, origin and local preference.
Worked with Nagios for monitoring of network services (SMTP, POP3, HTTP, NNTP, ICMP, SNMP, FTP, SSH).
Primary responsibility is to design and deploy various network security & High Availability products like Cisco ASA other security products.
Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LANs in the network.
Provided full visibility and notification of authorized and unauthorized network access with integration of CISCO ASA/FWSM and NAC solution.
Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, PPP, VPN, Checkpoint, Cisco ASA, AWS, TCL, Riverbed, Clustered SQL server 2014/2012/2008R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003
Wolters Kluwer, Tampa FL February 15 – September 16
Sr. Network / Firewall Engineer
Responsibilities:
Managing and configuring Cisco Switches and Routers independently.
Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.
Configured various Routing protocols such as RIP, OSPF, EIGRP, static routing.
Maintaining Core Switches, creating VLANs and configuring VTP.
Major Deliverables included meeting yearly scheduling demand for advanced switching hardware/software (Universal Translations & Centrex) instruction, in addition to cross training in wireless technologies.
Troubleshooting of Cisco 2900, 3900, 6500, 7500, 7200 Series routers.
Configured static NAT, dynamic NAT, dynamic NAT overloading.
Palo Alto installation, configuration, administration, monitoring and implementing the policies.
Palo Alto user-identification implementation with KIWI server’s user Palo Alto user-id agents
Back up a Cisco IOS to a TFTP server and Upgraded and restored a Cisco IOS from TFTP server.
In-depth expertise in the implementation, optimization, troubleshooting and documentation of LAN/WAN networking systems.
Responsible for designing, implementing and troubleshooting temporary infrastructures for Live Webcasting Events
Involved in F5 BIG IP LTM administration, familiar with enterprise level traffic managers like 6800, 3600, 1600,3400 series
Installation and management of overall administration of LAN, WAN, systems involving design of network layouts, configuration and maintenance, Commissioning Routers & Switches, firewalls, IPS and ensuring maximum uptime during site deployment to VoIP.
Configuring and adding, moving, removing of various IP phones like (7941, 7961, and 7971)
Knowledge on VOIP protocols like H.323, RTP, SIP and good understanding about VOIP devices. Packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems
Performing network monitoring, providing analysis using various tools like Wireshark, Solar winds etc.
Implementation and configuration of F5 Big-IP LTM-6400 load balancers
Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience
Worked on a project to update and manage configuration parameters for data center and servers using Python scripting.
Responsible for Cisco ASA firewall administration across our global networks
Responsible for L2 & L3 support of customer’s Network and Security Infrastructure devices.
Member of a team of professionals responsible for day-to-day 24/7 management of the IT infrastructure, managing multiple Windows, Linux servers in enterprise environment.
Network Services – configure, manage and monitoring through Adaptive Security Device Manager on Cisco ASA 5512, 5515, 5520 and PIX-515E firewalls, configure and troubleshoot S2S IPSec VPN’s.
Configuring, managing, troubleshooting Cisco core switches not limited to Nexus 7009 switch, Catalyst 4507, 2960 and 3750 switches.
Plan, schedule & perform IOS upgrade on Cisco ASA 5505, 5512, 5516, 5520 firewalls that are located in the different global regions.
Build and install Secure Network Server to support endpoints in Cisco ISE environment to enable stronger access control over edge devices and BYOD appliances in infrastructure security enhancement project.
Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
Created Cisco ISE dashboards with required dashlets to sort and filter endpoint data based on endpoint categories, guest types, location or OS type.
Configured and Implemented Cisco Identity Services Engine (ISE) with connectivity to Microsoft Active Directory for authentication including Certificate Based Authentication, Windows 2012 Certificate Authority.
Periodically verify applied access control lists are filtering traffic appropriately traversing ingress/egress interfaces of network infrastructure devices including routers, switches, firewalls load balancers, servers, wireless devices (access points, wireless controllers).
Use the data from Cisco ISE to trace out security violations in events of ransomware attacks.
Create and implement access control lists (ACL’s) and policy maps, NAT translations, configuration and administration using Cisco ASDM, analyze Wireshark and Network Monitor captures from Cisco ASA firewalls for troubleshooting network level issues.
Configure the Voice VLAN for IP phones on Catalyst 4507 PoE switches and worked with VoIP team in troubleshooting issues related to Voice gateway VG248 & upgrading the firmware on IP Phones like Cisco 7960 during the upgrade of Cisco UCM from v7.1 to v11.
Implement ITIL processes to proactively monitor and address network connectivity issues in order to reduce business impact while increasing network up-time along with network monitoring tools such as PRTG and Nimsoft.
Handle changes & maintain documentation in respect to CI items for IT assets in internal ticketing system integrated CMDB database.
Configure and troubleshoot infrastructure services not limited to DHCP, DNS, LDAP, and SMTP.
Resolve critical production outages/problems by extending network support to other global office locations.
Check & troubleshoot VMware ESXi Host level connection issues with Cisco UCS fabric interconnects, Brocade switches, EMC VNX 5300, IBM Flash Storage 810 during storage vMotion/migration activities.
Secure and maintain network and datacenter infrastructure documentation as it relates to system configuration, mapping, processes, and service records using Visio and SharePoint portal.
Worked with Backup team on Symantec/Veritas Backup Exec 2012, 2015 and tape rotation policies.
Worked with VMware team to build Virtual machine templates of Windows Server 2012 & RHEL OS to be available for ready-to-go deployments.
Installed, configured Cisco Meraki equipment and web based monitoring platform for MR32 wireless access points.
Served as primary point of contact to trace, troubleshoot and clean up malware during malicious ransomware attack incidents, educate users regarding computer and network security practices.
Worked with multiple IT implementation & operations teams, key decision makers & stakeholders to define, understand business requirements, meet their goals; help them identify & resolve business critical issues ensuring compatibility & interoperability of in-house computing systems.
Active team member coordinating IT stakeholders discussing best practice approaches through ITSM Change Management tools including Remedy.
Worked with multiple IT product vendors, outsourced teams, and temporary contractors to secure and support critical infrastructure servers and services.
Established and maintained great partnerships with internal server, storage, network, platform services (middleware & database) teams working on service request and change procedures.
Participated actively in proof of concept projects implementation which included storage and backup solutions from private cloud providers Amazon AWS & Microsoft Azure.
Environment: Cisco switches - 2948/3560/4500/3560/3750/3550/3500/2960 6500 and Cisco routers - 1200/3640/7200/3845/3600/2800, Cisco Nexus 7K/5K, Cisco ASA 500, Cisco ISE, F5 BIGIP LTM,
RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, TCL, SQL Server 2005 Integration services packages.
Infinity Insurance, Birmingham, AL August 2013 – January 2014
Network / Firewall Engineer
Responsibilities:
Daily analyzed network traffic looking for trends and or malicious activities, created vulnerability report with action plans.
Implemented IPSec Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with Cisco PIX and Cisco ASA Firewalls.
Configured Security policies including NAT, PAT, VPN, route-maps and Access Control Lists.
Active team player in network redesigning team assigned for Small Office/Campus branches. This project included changes to both existing voice and data environments.
Responsible for installation and configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configuring OSPF, EIGRP, BGP with Access Control lists planned in Network Design Document following the ITSM change process. Configured port channel connectivity between core switches and server distribution switches connecting to storage devices.
Implemented BGP features such as AS-override, Local preference, eBGP multipath load balancing.
Gained knowledge on VoIP and video communications, SIP Trunking, video streaming services.
Working knowledge and hands on experience on Cisco GSR, Catalyst 6500, 7600/7200 series enterprise routers/switches while configuring OSPF.
Manage and implement Cisco ISE security and NAC security products, configure NAC appliance and NAC profiler to restrict endpoints based on identity or security postures, enforce policies on BYOD (mobile) devices.
Deployed and supported Cisco Identity Services Engine (ISE) with the Cisco ASA 5500 series for VPN connectivity to endpoints in other regions across organization.
Experience with deployment of ISE 3315 and VM version 1.2 with VMware team to monitor enterprise-distributed Cisco equipment using Cisco ISE Web GUI.
Conduct risk assessment based on data reported by Cisco ISE to further filter and categorize users based on applications accessed, their device type, end device's IP/MAC addresses which is helpful in planning session timeout timings according to vendor published vulnerability exploits (CVE).
Implement, configure, maintain & troubleshoot Authentication, Authorization, Accounting (AAA) configurations (RADIUS / TACACS+) across the global infrastructure using Cisco Secure Access Control Server (ACS).
Migrated data center infrastructure from one central location to a remote location, primarily from Catalyst 6500 based DC to Nexus 7009 switches at core.
Created vPC domain, design single sided/double sided vPC, vPC peer-keep alive, vPC peer-link, and vPC member ports between Nexus 7009 and Nexus 5500 series switches in data-center.
Upgraded NX-OS on Nexus 7009 through ISSU (In service software upgrade).
Experience in simultaneous troubleshooting with different IT teams and assisted same in gathering the details for the project documentation.
Migrated legacy F5 LTM and GTM appliance to newer version appliances.
Configured F5 GTM solutions, which includes WideIP, Pool Load Balancing Methods, probers and monitors.
Maintain, install and upgrade/downgrade Cisco hardware including routers, switches, firewalls, and data center switches like Catalyst 3560/3750/6500’s, ASA 5505-5550 firewalls, and Cisco UCS 6100/B-series blade servers.
Configured Virtual Chassis for Juniper EX-4500, EX-4200, EX 3200, EX-2200 series Ethernet switches & Juniper QFabric QFX3500 with a master and backup.
Good understanding of Juniper Q-Fabric Operation & Design.
Responsible for configuring, testing, implementing network security solutions, creating & testing ACL’s on Cisco ASA, Juniper NetScreen and Palo Alto Networks PA-3060 application firewalls.
Adding devices, configuring SNMP traps on network devices, health monitor, modifying device configurations to enable monitoring through Cisco Prime Infrastructure GUI.
Work, resolve tickets and resolve incidents on priority basis by analyzing, troubleshooting infrastructure based on alerts information reported by Cisco Prime infrastructure, Solar winds Orion suite.
Worked on GTMs - F5 and A10's on DNS issues and also was a part of A10 to F5 GTM migrations.
Configured HSRP, VLAN Trunking 802.1Q encapsulation, VLAN Routing on Catalyst 6500 switches
Learnt Scripting for automation of processes and few PowerShell commands for Windows Servers (2008, 2012), gained familiarity with other scripting languages like bash shell scripting, Perl, Python.
Configuration and troubleshooting of Cisco 2800, 2900, 7500, 7200 Series routers
Experience with configuring OTV between the data centers as a layer 2 extension.
Installed Cisco Aironet access points and add them to Cisco wireless controller (5508), manage Aruba, Cisco wireless access controllers, troubleshooting LWAPP on Aruba wireless access points.
Review, validate Network capacity procedures and policies, best practices to ensure proper functioning of Office 365 applications including Outlook, Skype for Business applications.
Troubleshoot and fix intermittent disconnects on MS Outlook, Active Directory user account lockouts using Account Lockout Examiner, Microsoft Support and Recovery Assistant, Wireshark captures.
Environment: Catalyst 6500/3750/3550/3500/2950 switches, Nexus 7K, 5K switches, Cisco 7200/3600/ 2800/2900 series routers, TACACS, EIGRP, RIP, OSPF, BGP, VPN, Cisco Prime, ISE, EtherChannel, vPC, Juniper QFabric, Juniper EX series switches, Cisco UCS, F5 load balancers, Palo Alto and Cisco ASA firewalls, Outlook/Office 365
Reyes Holdings, Rosemont, IL September 2011 – July 2013
Sr Network Engineer
Responsibilities:
Provide initial fault isolation, proactive maintenance and monitoring of Company's Network Equipment.
Designed, validated and implemented LAN, WLAN & WAN solution to suite client’s needs.
Implement ATM/Frame Relay between data centers utilizing Cisco routers & switches.
Leveraged two Nexus 2232 Fabric Extenders and two 2248 Fabric Extenders, making them ‘Dual-homed’ to both Nexus 5Ks and implementing Enhanced Virtual Port-Channel (EvPC).
Experience with configuring vPC, VDC and OTV between the data centers as a layer 2 extension.
Review, analyze the priorities, approve and execute majority of changes in the network infrastructure. These included configuration changes on Cisco Catalyst 4500, Nexus 5K Switches and few Juniper Ethernet switches such as EX2200/2300.
Worked on Cisco catalyst 6509, 4507 series switches for LAN requirements including VLAN’s management, Port Security & troubleshooting LAN issues.
Configure and troubleshoot RIP, OSPF, eBGP, iBGP and implement rate limit filter on Juniper MX480, MX240 routers to limit bandwidth utilization.
Maintain, investigate, resolve and/or escalate network & hardware incidents at Network Security Operations Center (NSOC) using Remedy Action Request, Change Management System.
Worked with design team on configuring F5 BigIP Load Balancers to implement same for web/database applications.
Hands on Experience testing iRules using Browser (IE), HTTP watch on F5 load balancers.
Managed the F5 Big-IP GTM/LTM appliances to include writing iRules.
Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
Worked with Windows team on multiple P1, P2 priority tickets to ensure minimal downtime of business critical application servers including Citrix, Exchange, ADFS, File share, SharePoint, Cisco Call manager, Websense policy servers and Active Directory Domain Controller servers.
Integrate Public Key Infrastructure (PKI) Certificates for encrypted Secure Sockets Layer (SSL) communications on few Web servers.
Analyze existing infrastructure using VMware Capacity Planner and RVTools software.
Gained good knowledge on Cisco GSR, Catalyst 6500, 7600/7200 series enterprise routers/switches.
Installed, configured, and upgraded ISR G1/G2 routers, 2960/3560/4500/4900 switches, wireless LAN controllers and APs in multiple remote offices.
Worked on foundation layouts for dynamic and automated data center with VMware ESX and ESXi
Replace & configure F5 load balancers models 8950, 8800 as part of F5 LTM migration and break fix team.
Configuring Nexus 2000 (FEX) which acts as a remote line card (module) for the Nexus 7000.
Troubleshooting Cisco ISR, ASR 1002, Nexus 7010 & 7009 switches.
Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.
Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
Worked with IT Security auditing team & IT Manager on review of McAfee endpoint security’s security policies to mitigate ransomware attacks.
Implemented and deployed McAfee ePolicy Orchestrator (EPO) server as part of centralized Enterprise Antivirus/Antispyware management project.
Working knowledge on Server Monitoring Protocols/Software: SNMP Server, NetDisco, NetBrain.
Design OSPF Areas for reliable Access Distribution and for Core IP Routing.
Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.
Configuring and troubleshooting QoS involving policing, shaping and queuing towards Core and towards CE and PE routers.
Troubleshooting and monitored routing protocols such RIP, OSPF, EIGRP & BGP.
Design, create and implement VLANs, VTP, Spanning Tree (STP) topology, VLAN Trunking (dot1q and ISL), & Ether channels.
Provided Load Balancing towards access layer from core layer using F5 Network Load Balancers.
Responsible for turning up BGP peering and customer sessions, debugging BGP routing problems.
Environment: Juniper