Resume

Sign in

Engineer Cisco

Location:
Atlanta, Georgia, United States
Posted:
May 29, 2018

Contact this candidate

Resume:

Pavan

Professional Summary:

*+ Years of professional experience in Network Engineering with Cisco Certified Network Engineer, performing Network analysis, design, Implementing, capacity planning with a focus on performance tuning and support of large Networks

●Responsible for Check Point and Cisco ASA firewall administration across global networks

●Good experience in configuring and troubleshooting CISCO Nexus switches like 7000, 5000 and 2000 series in Data Center Environment.

●Implemented, Tested and troubleshoot Juniper Firewall to establish VPN network to Datacenter and wireless for local network.

●Design, Implementation and support of Cisco Light Weight Wireless Solution, configuration of Cisco 4400, 5508, 8540 WLC's

●Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration

●Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability

●Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)

●Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.

●Hands on experience with VMware ESXi and vCenter applications. Experience in VMware networking with VMware standard switch and Distributed switch.

●Configured and supported the converged network deployment.

●Hands on experience in configurations like boot from SAN and iSCSI. Configured datastores on ESXi by using NFS and CIFS, FC,FCOE.

●Handle user problems by accessing websites and or resources via the proxy servers.

●Experience with design &deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, MPLS QOS

●Configuring Client-to-site VPN using SSL Client Cisco ASA 5540, 5510

●Worked on BGP routing protocol, configuring BGP sessions and troubleshooting on Nexus 3K, 7K, Juniper MX-960 routers.

●Designed and Implemented Chassis based Juniper SRX, EX, M, and MX series products.

●Responsible for hardware vendor utilized Juniper Networks (M, T, MX, EX, SRX, QFX, and Q-Fabric.

●Worked on Nexus platform 7010, 5K series (5548, 5020 and 5010) and FEX (2248, and 2232) and deployed VPC, VDC and OTV and successfully implemented VSS on the Cisco catalyst switches.

●Configured policies on F5 ASM Created rules and scripts for the automation of the environment. Reengineered Firewall policies on Juniper SSG320 and SSG140 Firewalls.

●Worked with the installation of Palo Alto firewall, migrated with a team from predominantly checkpoint environment to Palo Alto global solution.

●Experience in Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA

●Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series)

●Checkpoint – R60/R65/R70/R75 software version with hardware Checkpoint 11000, 21000 series with VSX environment.

●Configured policies on F5 ASM Created rules and scripts for the automation of the environment. Reengineered Firewall policies on SSG320 and SSG140 Firewalls.

●Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall

●Design and implement Cisco wireless network. Troubleshoot RF WLAN system networks.

●Experience working with advance level technical solutions for existing wireless networks VPNs and mesh network.

●Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers

●Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools

●Knowledge of JUNOS platform and worked with IOS upgrade of Juniper devices

Technical Skills:

CISCO Platforms

Nexus 7K, 5K, 2K & 1K, Cisco routers (7600, 7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series)

JUNIPER Platforms

SRX, MX, EX Series Routers and Switches

Networking Concepts

Access-lists, Routing, Switching, subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, VoIP, Bluetooth, Wi-Fi

Firewall

ASA Firewall (5505/5510), Checkpoint, Cisco ASA, RSA SecurID, Qualys, DNS

Network Tools

Solar Winds (NPM, NCM, SAM, WPM), SNMP, Avaya communication manager, Cisco Works, Wireshark, Nagios, Airmagnet

WAN Technologies

Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 / T3 & SONET

LAN Technologies

Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Wireless & Wi-Fi:

Cisco Wireless access points: AIR-CAP3702,AIR-CAP2702 and WLC 5508, 2504,4404.

Security Protocols

IKE, IPSEC, SSL-VPN

Networking Protocols

RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA, ISDN, PRI, BRI, SIP

Operating System

Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, UNIX.

CERTIFICATION: Cisco Certified Network Associate (CCNA)

Cisco Certified Network Professional (CCNP)

PROFESSIONAL EXPERIENCE:

Windstream, Little Rock, AR March 2017 to Till Date

Designation: Sr. Network Engineer

Responsibilities

●Performed technical planning, system integration, verification and validation, evaluates alternatives including cost and risk, supportability and analyses for total systems.

●Designed, Implemented and Supported a full wireless network consisting of multiple controllers, 1000 AP’s.

●Part of the troubleshooting and production support team, involved in monitoring 200 servers, supported data center migration.

●Worked as part of a team to manage Enterprise Network Infrastructure as a Tier 3 Support Engineer.

●Experienced in RFID deployment and Deployed most aspects of wireless equipment. Switches, routers, controllers, firewalls, access points, antennas, active and passive RFID hardware. RFID hardware deployment

●At present working extensively with Cisco 5508 Wireless LAN controllers. Replacing 5508 Wireless LAN controller with 5520.

●Responsible for Check Point and SRX firewall administration across our global networks.

●Experience with Network Redesign for Company Campus Locations and Moving from 6500 based Data Center to Nexus based Data Center.

●Expert in the hardware troubleshooting and environment troubleshooting like line cards and PSU’s and SFP’s, cables (twinax,fiber optic cables).

●Experience in reviewing the tech support files from the switches and routers to find out the root cause for the outage or configuration issues.

●Experience in installing VMware ESXi on the blades in different ways like boot from direct attached storage and boot from SAN, mapping CD/DVD device, Flexflash controller (SD cards).

●Experience in hardware troubleshooting in the blade and rack mount servers like DIMM and motherboard and Network interface card, RAID controller and HBA(host bus adapters) troubleshooting.

●Involved in configuring SSG-140, Cisco ASA firewall and Check point firewall.

●Responsible for everyday tasks related to SRX Firewalls, Space Changes, and Iron Port Proxy Traffic.

●Installation of Palo Alto (Web Application and URL filtering, Threat Prevention, Data Filtering).

●Performed upgradation of Palo Alto firewall from old platforms to new platforms 6.1.5 to 6.1.10.

●Configured firewall switch module on Cisco 6506 distribution layer switches, configuring VTPs, Trunking, NAC product, inter-VLAN routing, port fast, uplink fast, backbone fast on access layer switches.

●Enabled STP attack mitigation (BPDU Guard, Root Guard), Using MD5 authentication for VTP.

●Maintained wireless access points at various locations in the company.

●Assisted in the installation of communications hardware - CISCO VOiP administration

●Assisted in MPLS migrations, implemented a backup for the existing WAN connection using site-to-site IP sec VPN tunnels.

●Configured Voice VLAN’s (VOIP), prioritizing the voice traffic over the data traffic.

●Tested and implemented various BGP attributes such as Local Preference, MED, AS-PATH, Community, Extended community using route-maps.

●Worked on migration of Frame Relay based branches to MPLS based VPN for customer’s WAN infrastructure.

●Manages Bluecoat Proxy appliance configuration and is NPC's proxy appliance administrator. He is responsible for analyzing data dealing with traffic composition, usage and throughput as well as blocking customer specified URL content.

●Worked with Blue coat and handled the Trouble Tickets on F5 Load Balancers.

●Deploys on-site to assist with design and installation of client purchased Bluecoat solutions.

●Switching experience includes Cisco Catalyst switches: Cisco 3750, 4500, 6500 series switches.

●Managing enterprise BGP setup by configuring and troubleshooting BGP related issues.

●Troubleshooting issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.

●Maintained effective communications with vendors, peers and clients in resolution of trouble-tickets, equipment RMAs, and support requests.

●Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IP Networking

British Telecom, CT Nov 2015 – Feb 2017

Designation: Network Security Engineer

Responsibilities:

●Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route-feedback, BGP attributes) on Cisco Routers 7613, 7201 and 3945E

●Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NAT’ing, subnetting, also including DNS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, WISM, STP (Spanning tree Protocol), RTSP & Multicasting protocols

●Experience with design and implementation of Virtual Switching System (VSS) for both User segment and server segment using 6509-V-E catalyst switches.

●Set up and troubleshoot secured wireless access points (WAP) and wireless LAN controller (WLC) for broadband internet.

●Worked on Migration of Juniper SRX firewalls for isolation of network segments and VPN's, ASR (9k, 901,903)

●Upgraded the data center network environment with Cisco ASA 5520. Configured ACL’s on Cisco Switches as well as configured routers as terminal servers

●Experience working with advance level technical solutions for OTV, STP on the cisco Nexus series between the Datacenters.

●Monitoring the traffic through Cisco catalyst switches for Detection of Intrusion using IDSM2 and its Prevention IPS

●Research into multiple 802.11standards for possible vulnerabilities within security and research security protocols to find possible vulnerabilities in design.

●Experience working with advance level technical solutions for existing wireless networks VPNs and mesh network.

●Troubleshooting of all wireless network devices and infrastructure including routing protocols and switch configuration.

●Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.

●Installed and configured four PIX 525 and two ASA 5505 in customer locations. In addition to that, two PIX firewall configured for the Guest access

●Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP

●Implementing 3750 Stackable switches using Cisco Stack Wise technology. Experience to review and evaluate current and future design issues as required maintaining network integrity, efficient data flow

●Experience with convert Checkpoint VPN rules over to the Cisco ASA solution and worked on RSA secure IDs to providing VPN Token to Company USERS, Migration with Cisco ASA VPN experience

●Installed wireless access points (WAP) at various locations in the company

●Using TDM and SIP provide technical support to network and applications for employing ACD concepts

●Configured WIFI APs connected in LAN to reduce cable costing by creating AP, worked on Cisco SP Wi-Fi, troubleshoot in Cisco Aironet 3700, 1700 and 600 series

●Worked on configuration and commissioning of the MPLS circuits for various branch offices

●Providing Daily network support for national wide area network consisting of MPLS, VPN and point-to-point site

●Configured of ACL’s in Cisco 5520 ASA firewall for internet Access requests for servers, Protocol Handling, Object Grouping and NAT

●Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs

●Implemented antivirus and web filtering on Juniper SRX 240 at the web server as well as configuration of F5 load balancers and Cisco load balancers (CSM, ACE and GSS)

Vsoft Technologies, Hyderabad May 2013 to Jul 2015

Designation: Network Engineer

Responsibilities:

●Experience in configuring Site-to-site and remote access VPN solutions

●Installed and configured Cisco 7200 series router and Cisco 2950, 4500, 6500 Series switches

●Created data migration strategies to help with completion of migration of data center from one point to another

●Configuration of Cisco 6500 (SUP 720), 4500 (SUP 6) & 3750 Catalyst Switches for network access

●Worked extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution

●ISR 2900 series routers, Cisco 5520 ASA appliance, Wireless LAN upgrade project. Assisted infrastructure team with the installation of 60 cisco 3700 series AP, around the building.

●Installation and configuration of Citrix NetScaler MPX 8200.

●Successfully installed Palo alto PA 3060 Firewall to protect data center and provides L3 support for routers/switches/firewall.

● Successfully executed change on Nexus 9K and 7Ks to support redundant platform.

●Deployment of enterprise firewalls (Palo alto network, Cisco ASA, Check Point) in production environment.

●Expert level Knowledge on working with Wireless LAN Controller's, Cisco NCS, Cisco AP's, LWAPS, Standalone AP's and Mesh AP's.

●Implemented Positive Enforcement Model with the help of Palo Alto Networks.

●Implementation configuration and troubleshooting of Check Point Firewall R 71.

●Key contribution includes troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP

●Troubleshoots in Cisco Aironet 2700 and 600 series

●Configured Client VPN and RSA Token ID technologies including Cisco’s VPN client via IPSEC

●Configuring ACL to allow only authorized users to access the servers

●Participated in on call support in troubleshooting the configuration and installation issues

●Installation, maintenance, troubleshooting local and Wide Areas Network (ISDN, Frame relay, DDR, NAT, DHCP, TCP/IP)

●Provided technical support in terms of upgrading, improving and expanding the network

●Providing technical security proposals, detailed RFP responses and security presentation, installing and configuring ASA firewalls, VPN networks and redesigning customer security architectures

Ananth Technologies, Hyderabad June 2012 to April 2013

Designation: Network Support Engineer

Responsibilities:

●Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.

●Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.

●Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers.

●Configured IP access filter policies.

●Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF).

●Configured Multiprotocol Label Switching (MPLS) VPN with Routing Information Protocol (RIP) on the customer’s site

●Involved in configuring and implementing of composite Network models consists of Cisco7600, 7200, 3800 9000, CSR-1 series routers and Cisco 2950, 3500, 5000, 6500 Series switches

●Configured Nexus 7010 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links

●Managed network IP allocations using QIP Cisco, QIP Alcatel and DSDB.

●Participated in the installation, configuration, and post installation daily operational tasks and configuration of the deployment of Cisco Nexus equipment

●Providing Technical Support and solutions for Network Problems.

●Implementing NAT solutions on Cisco IOS routers.

●Upgrading IOS, troubleshooting network outages.



Contact this candidate