Sign in

Network Engineer Cisco

San Francisco, California, United States
May 23, 2018

Contact this candidate



**** ******* **. ***# *** San Francisco, CA 94110



I am seeking a position with a technology company that will allow me to apply and enhance my skills of being a network engineer. I desire to gain quality experience that will allow me to take full advantage and develop further my technical knowledge. In addition, I am eager to contribute my creativity and hard work towards the success of your company and to the growth of the fast developing field.


Qualified Network Engineer with 9 years of experience in LAN/WAN network engineering, design, implementation, and support. Highly skilled in interpersonal communications, telecommunications, and team facilitation. Employs an unwavering work ethic with a strong desire to learn and develop professional skills. Strong experience in designing, installation, support, configuration of LAN/WAN network/information system environments. T1, T3, CSU/DSU, Ethernet 10/100/1000 circuits, Routers/Switches (Cisco1800, 1900, 2800, 2900, 3800, 3900, Catalyst 6500/4000, VSS, 3750 (stacked or individual), 3560, Nexus switches 5010, 5500, 5548 and 2248TP, Cisco Wireless LAN Controller 2504 and 4402 as well as integrated 3750G-24-PoE WLAN Controller/Switch) Dynamic routing protocols such as EIGRP, BGP, OSPF, Static routing, Route Map, WAN Design as well as MPLS deployment and maintenance, VLAN, VTP, Spanning-Tree protocol, Stack switches (Layer 2 and 3 switching), VPN, DMVPN, IPSec tunnels, Palo Alto Networks firewalls (5050 and 5060) and Cisco ASA firewalls (5510, 5515X and 5525X). Cisco Meraki VPN, Checkpoint security package (Checkpoint GUI console, Monitor, Tracker, SmartLSM and management server), load balancers CSS 11500 and BigIP LTM F5 load balancers (1600 LTM) as well as network planning, design, troubleshooting, implementation and monitoring using Nagios, Cacti, SolarWinds, Device Expert.

Basic knowledge of: Windows Server 2003, 2008 application management, VMWare 5.0, Linux management servers and usage of VI editor, hence basic shell scripting for network alert notifications, backups or generally executing processes such as command line testing of the desired software’s features or deep troubleshooting/debugging of an outstanding productions network issues.


Excellent knowledge of hardware and software setup, maintenance and troubleshooting for Cisco routers and Switches, VPN and Firewalls, SNMP and disaster recovery.

In-depth knowledge of most of Cisco enterprise routing and switching platforms. Strong understanding of installation, troubleshooting and optimization of Telco circuit technology including point to point tunnels, VRF, B2B tunnels, IPSec tunnels using customer ISP and Checkpoint VPN Edge device.

Performed networks setup, design, support, configuration and troubleshooting end to end on campus, between the customer's healthcare facility and company's support and data centers as well as VPN installation, B2B IPSec tunnels, crypto profiles and firewall rules management for over 1000 customers worldwide.

Implementation and deployment of various Cisco as well as non Cisco networking equipment within the large 2 layered and 3 layered hierarchical networks, including among the others Arista, Dell Force 10, Nexus, Juniper network topologies for the interoperability purposes.

Developed and created procedures and work instructions for various tasks within the organization ranging from the circuit ordering process, VPN router configuration to how to provision the networking devices according to Philips standards.

Well versed in building DMVPN for the benefit of redundant connections.

Extensive knowledge of BigIP F5 load balancer including planning of server pools and executing virtual servers.

Strong analytical and problem solving skills to debug troubleshoot and isolate problems.

Very good at multi tasking as well as habitual documentation.

Administering network servers, routers, switches remotely using standard tools (SSH, putty, Raritan Terminal Services, VNC, RDP)

Proven ability to handle multiple tasks at once and work independently with minimal managerial oversight.

Experienced with standard protocols such as STP, RSTP, MST, UDLD, 802.1x. Implementation of Ether Channeling (LACP and PAgP) for load balancing over the trunks as well as Trunking for accurate VLAN distribution (VTP 2, 3).

Strong understanding of networking systems such as TCP/IP and Ethernet.

Configuration of IP Routing protocols, RIP, IGRP, OSPF, EIGRP, BGP, MPLS, VPLS, HSRP and Inter VLAN Routing.

Good understanding of installation, commissioning and configuration of firewalls (Cisco ASA, Palo Alto Networks and Checkpoint firewalls) and security concepts within the internal infrastructure as well as outside, defining ISAKAMP/IPSec crypto profiles and building secure VPN tunnels for customers’ support as well as for remote users access. Network access filtering. VRF, route maps and access lists.

General basic knowledge of DNS Server with forwarders setup with Active directory as well as providing a network end user support.

Excellent knowledge in Microsoft Office (Word, Excel, Visio, Power Point, etc.).

Strong communication, documentation and organizational skills.


FS24-7 Ltd. August 2016 - Current

I am working currently as a on-call network engineer for Field Service 24/7. The company has its clients all over the wide San Francisco Bay Area and whenever there is an issue with one of the clients' network, I would get an automated email with the problem descriptions, accept the project and drive to the site to solve the issue. The issues are standard network problems, that would include troubleshooting of the network equipment such as routers, switches, load balancers, firewalls, decommission of the old equipment, RMA submittals, replacement of the failed devices and installation and configuration of the new ones using the customers' standard config policies, creation of VPN tunnels to remote offices and setting up a firewall rules, ACL's, adding new Access Points to the existing wireless LAN's, installing the equipment racks, new printers, UPS' or cabling upgrades. Also we I would sometimes the site surveys in order to help the local teams come up with the decision what need to be brought in and how much power would be required to sustain their networks. If the customer would like to decommission the old network due to a sudden growth of business, I would create a Visio diagrams with all the necessary equipment and present a new solution for a more sustainable working environment and better, efficient and more scalable networks. Worked on variety of network equipment such as Cisco Catalyst routers/switches, Nexus switches, Juniper routers/switches, F5 Load Balancers, Cisco ASA, Checkpoint and Palo Alto Networks firewalls, Cisco, Ruckus and Aruba WLAN controllers among the others.

Monitise Americas, Inc. March 2016 – July 2016

I was hired as a consultant to assist their network security/system engineer in stabilizing the existing network infrastructure, to present a topology diagram of the current state of the network or “as is” and produce a plan of a stable new or “to be” network infrastructure. The product Monitise Americas, Inc. was selling was a part software part phone app specialized in mobile banking so the customers were Banks and Credit Unions. The company was in transition of moving to a new co-location in Las Vegas and a new ISP (ViaWest) and needed the network straightened out before it could be moved with the company’s internal infrastructure. Next step was renewing Cisco SMARTNet contracts and replacing the inadequate equipment and ordering the new one, within very restraint budget. After that, I worked with the customers’ network/firewall contacts in order to build VPN tunnel with each financial institution. My job was to validate the new network, which was mainly a Cisco shop, reconfigure VLAN access, maintain change of passwords as a security precaution on guest Wireless LAN, help stabilize the infrastructure by adding a BigIP F5 load balancers and making the general working environment highly available and to work with customers’ teams on building the VPN tunnels at the new co-location. The company did not use routers due to restrained budget so Cisco ASA firewalls were acting as routers so most of the work was done on Palo Alto Networks firewalls (5050 and 5060) and Cisco ASA firewalls (5510, 5515X and 5525X).

Berkshire Hathaway Homestate Companies, Sept 2015 – Feb. 2016

Worked as a Senior Network Engineer with the responsibilities of supporting internal users within the insurance company’s workers compensation branch and departments such as claims, underwriters, lawyers and the applications access to sustain a daily workflow by maintaining internal infrastructure as well as assisting in planned projects that included building the new data center, moving the users to the new office and being the lead in building the new redundant WAN connections to the multiple office locations in the US. The new environment design included implementation of Nexus switches 5010, 5500, 5548 and 2248TP, MPLS, VPLS as well as EIGRP dynamic protocol, DMVPN, IPSec, GRE tunnels, BigIP F5 load balancers, Cisco 3850’s L3 switches/routers, Palo Alto Networks firewalls (5050 and 5060) and Cisco ASA firewalls (5525X).

ZS Pharma Inc. Aug. 2015 – Sept. 2015

ZS Pharma Inc, Pharmaceuticals Company San Mateo, CA

I was hired to help set up network for the new office by building basic network components such as switches (Nexus switches 5500 and 2248TP, MPLS design, Cisco 3750’s, Cisco Catalyst 4509 and assisted in building Cisco ASA Firewall)

Comcast Corporation, Apr. 2015 – Jun. 2015

Comcast Enterprise Technologies – Customer Production Network, Operations. Sunnyvale, CA

I was hired for a short term contract position, basically for a project to set up and build from scratch a new wireless guest network, utilizing Cisco 3750G-24-PoE Wireless LAN Switch/Controller, which would be integrated, across two floors to Dell Force 10 C150 and Arista 10/40/100 GbE Spine switches and it was completed with success within set dead line.

Philips Healthcare Informatics, Inc., Oct. 2008 - Nov. 2014

Software Customer Services (SCS), Network Operations Network Engineer San Mateo, CA

Responsible for designing, configuration of Palo Alto firewalls as well as Checkpoint, Cisco ASA firewalls and availability of LAN/WAN networks by building of the VPN tunnels for support, health check monitoring and disaster recovery of the integrated medical SAN information systems between healthcare facilities and Philips support and data centers over multinational network stretching throughout North and South Americas, EMEA and APAC regions with multiple datacenters and collocations. Leading and managing multiple projects simultaneously working directly with diverse customers and limited resources.

Designed, developed, introduced, and supported IP network and security enhancements to the internal infrastructure globally as well as in remote customer environments.

Troubleshoot and resolve interoperability issues with integrated network systems on VPN Routers, Firewalls, Load Balancers, Cisco, Dell Force 10 C150 and C300, Arista, Juniper hardware.

Managed network communication, VMWare ESX platform, network security, virtual SAN, virtual F5 load balancing.

Provisioned and installed Cisco routers with VPN tunnels for product support and Disaster Recovery.

Worked directly with ISP/local loop provider on troubleshooting of Frame Relay, T1, T3, CSU/DSU and Ethernet circuits. Strong knowledge of IPSec protocol suite, crypto profiles, BGP and firewall security and rule management.

Philips Projects:

M.D. Anderson Hospital

Configured and installed Cisco VSS at the customer site as a part of Philips integrated system in L3 handoff with multi etherchannels to accommodate the virtual SAN solution on the VMWare platform.

UPMC Hospitals

Devised and implemented the Layer 3 handoff solution for customer’s 15 remote sites that would be using Philips PACS network at the facility’s main data center. Each site required separate VPN point of entry for support and archiving to the Philips’ main customer data center, located in Dallas, TX.

GMC - Geisinger Medical Center

Designed, tested and implemented network conversion from Layer 2 to Layer 3 on over 20 customer's sites. Installed virtual F5 load balancing solution to accommodate the migration from bare metal system to virtual computing environment.

Cisco Systems, Inc. May 2006 - Feb. 2008 Consultant/System Network Test Engineer DSS System Quality Eng San Jose, CA

Managed heterogeneous IOS software loaded networks, as well as windows client/server networks, with emphasis on testing software features and network operations.

Manage installation according to specifications and ensured operational functionality of highly complex networks.

Implement and test the latest features on large, scalable enterprises for the interoperability purposes.

Responsible for daily downloads of software upgrades to test the labs network devices where the key issue is to isolate various problems.

Track and file numerous software caveats using the DDTS database.

Conduct extensive training after creating training documentation on L2/L3 features to internal group members.

Mentor junior team members as they learn testing procedures.

Cisco Projects:

I System Testing for Virtual Switching feature on Catalyst 6500 series:

Worked on devising a thorough network test plan for a VSS feature functionality. Set up a test bed with virtual switching systems running on Supervisor Engine Sup720 10GE, Sup720, Sup32 8GE, Sup2 for Ethernet testing (10/100/1000/10GE) installed in the 3 tier architectural network comprising cat6k, cat4k, and cat3k switches. Designed, supported and configured the networks based on customer requirements.

II System Testing for ION based software for Catalyst 6500 switches

ION is a modular, scalable, programmable, high performance operating system. Involved with testing on a large-scale 3 tier network as well as in the Ring environment.

Carried out interoperability testing with Cat 6K, 4K and Cat 3K running IOS/ ION software. Set up a test bed and configured the network for testing on the system level environment.

Worked with developing engineers for faster resolving of the issues.

III Physical relocation of System Test group and their entire sets of test networks with no downtime allowed:

Organized, prepared and instructed testing lab environments move process. Planned and directed moving of the equipment. Recreated and updated networks topologies, directed redesigning and support of the large networks for the best performance to meet the marketing requirements. Ordered new equipment through Procurement, Internal Ordering Tool and maintained the position of the lab administrator.


Palo Alto Networks Firewall Administration

Checkpoint Firewall Administration

Cisco Network Academy (CCSF).

Certification in UNIX Operating System and Administration.

A.S. Network Administration 2003 2006 City College of San Francisco

B.S. Electronic and Electrical Engineering 1988 1992 University of Science and Technology Sarajevo, Bosnia

Contact this candidate