Post Job Free
Sign in

Network Engineer Cisco

Location:
Hyderabad, Telangana, India
Posted:
June 06, 2018

Contact this candidate

Resume:

mailto:******@*************.***

Pratap N Contact : +1-732-***-****

Professional Summary

Over 9+ years of expertise as Network Engineer in designing, performing Network analysis, troubleshooting, maintaining and supporting complex network systems.

Have Experience in Cisco Routing, Switching and Security with strong Cisco hardware/software.

Proficient with network hardware and technologies including routers, switches, firewalls, Ethernet, Fast Ethernet, Gigabit Ethernet.

Configured Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers

Configured Cisco Catalyst 2960, 3750, 4500, 6500 and Nexus 3000, 5000, 6000, 7000 series switches.

Troubleshoot TCP/IP problems; troubleshoot connectivity issues in multi-protocol Ethernet, Environment.

Switched telephone network (PSTN), PPP, ISDN, Frame Relay, TCP/IP, and VPN.

Strong knowledge in all aspects of Prime Infrastructure, to include Compliance checks and configuration deployments.

Experience in monitoring and troubleshooting of ISE and Cisco MSE.

Monitored POS and web applications for latency or other connectivity issues - Solar Winds, NetQos, NTop,Splunk.

Well Experienced in configuring protocols HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, CHAP, and SNMP

Configuring & troubleshooting MPLS VPN circuits, IP VPN, Internet circuits.

Provided engineering support for network infrastructure such as proxies, load balancers, encryption, remote access servers (terminal servers/Citrix servers), Remote client access, Network Admission Control (NAC), VPNs, SSL accelerators, WAN optimizers, DHCP controllers, and performance analyzers).

Performed IOS upgrades on CISCO routers and Switches.

Experience in Configuring, upgrading and verifying the NX-OS operation system.

Configured Cisco IOS and NXOS devices for various routing and switching tasks, such as a redundant Internet firewall.

Strong gasp of current and future technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, ACL, VPN, Wireless LAN and configuration of VLANS.

Had Substantial Knowledge including the configuration of Spanning Tree Protocol(STP), Per VLAN

Spanning Tree (PVST), Rapid STP (RSTP) and Rapid per VLAN Spanning Tree Protocol (PVST+).

Proficient in operation of Cisco Nexus 5K switches with Fabric Extender using VPC, VLAN, STP and LACP.

Experience with Cisco ONS 15454/NCS and Ciena 6500 optical networking platforms

Hands on experience in configuring Cisco Prime 2.1 and WCS wireless platforms.

Hands on experience on Juniper firewalls.

Configuring and troubleshooting of SRX firewall series.

Design & administer public wireless using Cisco 5500 WLC and Cisco Prime for network monitoring and configuration.

Prepared, configured and managed firewalls (Fortigate,Fortinet).

Advanced proficiency with Cisco Wireless (APs, Controllers, ISE and Prime).

Assisted in refresh of data center network refresh to Nexus 9k leaf switches.

Configured and managed VLANs, 802.1Q Trunk, RPVST+, Inter-VLAN routing, HSRP and LAN security for Layer-2 and Layer-3 switching domains.

Optimized performance of the WAN Network consisting of Cisco switches by configuring VLANs.

Have Strong Knowledge and experience in designing, supporting and troubleshooting of IPSEC VPN's and Remote access SSL VPN'S

Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.

Have Hands on experience in implementing F5 BIG-IP load balancer

Experience in implementation of F5 GTM based on topology load balancing methods.

Having experience in deploying BIG-IP F5LTM load balancers for Load balancing and traffic management of business application.

Used virtualization tools such as VMWARE and VIRTUAL BOX to build server infrastructure for Arcsight security solution Knowledge of CISCO Wireless networking technology, including ISE configuration and management.

Configured Cisco Access Control Server (ACS) to enforce security policy in User Groups.

Configured access for all Active directory groups to get network access over WAN connections in Cisco ACS.

Firewall technologies including general configuration, risk analysis, security policy,rules creation and

modification of Check Point R65, R70 & R77, Palo Alto and Cisco ASA.

Installed Operating System and configured kernel parameters for Linux /Unix servers.

Configuring rules and maintaining Palo Alto Firewalls & Analysis of Firewall logs.

Design and deploy Cisco ACS Server solutions including TACACS+, High Availability, Active Directory integration, etc.

installation using Cisco 7500, 8500, 5508 Wireless LAN controllers, Cisco Prime Infrastructure equipment and Cisco Identity Services Engine (ISE).

Involved in troubleshooting of DNS, DHCP and other IP conflict problems.

Experience in troubleshooting NAT configurations, Access-Lists (ACL), and DNS/DHCP related issues within LAN Network.

Hands on in deployment of GRE tunneling, SSL, Site-Site IPSEC VPN and DMVPN.

Extensive work experience with Cisco Call Manager Express, CUCM and Cisco Unity Express.

Extensive work& troubleshoot experience of VOIP Phones, Dial Peers, Dial Plan, DID and other

Tele-communication services linked to CME.

Implemented traffic filters on CISCO routes using Standard Access List and Extended Access List.

Certifications:

Cisco Certified Network Associate (CCNA)

Cisco Certified Network Professional (CCNP)

Solar Wind Certified Professional(SCP)

Core Competencies

Network Configuration: Advanced switch/router configuration (Cisco IOS access list, Route redistribution/propagation).

Routing Protocols: IGRP, EIGRP, OSPF, BGPv4, MP-BGP, IS-IS, RIP

WAN Protocols: HDLC, PPP, MLPPP

Circuit switched WAN: T1/E1 – T3/E3/OCX (Channelized, Fractional & full).

Packet Switched WAN: ATM, FRAME RELAY, MPLS VPNs

Security Technologies: Cisco FWSM/PIX/ASDM, Juniper SRX, Palo Alto,

Checkpoint, F5 Load Balancer, ASA firewall.

Cisco Routers: Cisco GSR 12416, 12418, Cisco 7200vxr, Cisco 3640, Cisco 3600

Security Firewalls Checkpoint, Palo Alto, Citrix NetScaler App, Fortinet 6TD, FortiGate 3000, 5000,

3815, 900, 800, 600 series, Imperva, Bluecoat

Redundancy and management: HSRP, VRRP, GLBP, RPR, NSF/NSR, Wireshark, Solarwinds, SNMP

Physical interfaces: Fast Ethernet, Gigabit Ethernet, Serial, HSSI, Sonet (POS)

Layer 2 technology: VLAN, HSRP, VRRP,GLBP,STP, RSTP, PVST+, MST, PVLAN, Optimizing STP (Port Fast, Uplink Fast, Backbone Fast, Root Guard, BPDU Guard),

Layer 3 Switching: CEF, MLS, Ether channel (PAGP & LACP, Load Balancing)

Switches: Cisco Catalyst 6500, MSFC, MSFC2, 7600, 3700, 3500, Cisco2948/3560/4500/3560/3750/3550/3500/2960

Programming languages C / C++, Python, Shell Script, SQL,PL/SQL

Operating Systems: Microsoft XP/Vista/7, UNIX, Linux (Red hat, Opens use, Fedora), Windows

Servers 2003/2008Windows MS-Office.VMware ESX 5.1, VMware Vsphere

client, Microsoft Azure, office 365.

Professional Experience

Fox Studio, Los Angeles, CA Sep 2015 to Present

Sr. Network Engineer

Key Responsibilities:

Implemented DHCP, DNS, IPAM configuration on the servers to allocate, resolute the ip addresses from Subnet.

Experience in working and designing configurations for vPC, vPCdomian, vPC peer-gateway, vPC peer-switch, auto-discovery, vPC single sided, vPC double sided, NX-OS and fabric path.

Oversee and proactively manage Cisco IOS, NXOS, and Palo Alto PAN-OS software upgrades.

Installation, configuration, and testing cisco equipment’s, IOS updates, and configuration

changing, troubleshooting various LAN/WAN technologies issues for internal and external clients,

monitoring network performance, defining network policies and procedures

Resolve customer WAN/LAN/wireless/load balancing networking issues

Installed and configured Solarwinds server.

Implemented the policy rules and DMZ for multiple clients of the state on the Fortigate firewall.

Configuring IPsec VPN Site-site, GRE Tunneling and SDM along with troubleshooting.

Firewall and router configuration changes as per the business requirement.

Provide technical assistance and support for incoming queries and issues related to Networks,

computers systems, software’s, and equipment’s hardware.

Support and maintain the routing and switching Data Center fabrics according to client needs.

Deployed the Syslog server at the site to collect logs and monitored them.

Monitored logs from the firewall and syslog server to know the traffic traversing through the network.

Cisco 7200 and 7600 routers are being used as a provider edge (PE) routers where we configured BGP to connect with MPLS service provider.

Support project implementation Of various versions CUCM 7x, 8x, 9x Cisco Unity,CUCM 8x, 9x, 10x, Cisco Unity Voice Mail project implementation

In the MPLS connectivity ASR 1k and 9K devices are used as Customer Edge(CE) routers and deployed VRF.

Troubleshooting and resolve the Splunk - Performance, Log Monitoring Issues,Role Mapping, Dashboard creation, Data models etc. Utilized Riverbed Steelhead, Cisco WAAS and Silver peak appliances.

Implementation, maintenance and monitoring of IDS/IPS, WAF, antivirus and Syslog Servers.

Monitored performance and analyzed network irregularities using tools such as Riverbed

Develop a plan for software defined networking platforms for use across the Data Center environments.

Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.

Knowledge and configuration of redundant router protocols like HSRP, VRRP and GLBP.

Substantial knowledge, including the configuration, of Spanning Tree Protocol (STP), Per VLAN Spanning

Knowledge of Multicasting implementation, such as multicast conceptual mode, IGMP and PIM.

Tree (PVST), Rapid STP (RSTP) and Rapid per VLAN Spanning Tree (PVST+).

Upgrade Cisco Routers, Switches and Firewall (PIX) IOS using TFTP

Emphasis on data center & cloud technologies, Software Defined Networking (SDN), branch solutions,

security, Unified Communications.

In-depth knowledge and technical expertise in data center and cloud technologies, Software Defined Networking

(SDN), branch solutions, security and Unified Communications.

Involved in cutting cost by reducing MPLS for certain locations and replacing service with DMVPN solutions.

Handled SRST and implemented and configured the Gateways, Voice Gateways.

Experience in Junos-Juniper routers and firewalls.

Upgrade and deploy Juniper Routers and Citrix Load Balancer to the Data Center environment.

Replace Campus Cisco End of Life hardware with new Juniper devices.

Worked on Juniper Netscreen Firewalls like, NS50, SSG 550M, SSG520M, ISG 1000.

Configuring HSRP between the 3845 router pairs for Gateway redundancy for the client desktops.

Migration of application, server, service groups from Citrix NetScaler to F5.

Migrated applications from Brocade ServerIron ADX to F5 LTM infrastructure.

Expertise in designing, developing middleware components for software in C/C++ using STL, multithreading, data structures, IPC (TCP/IP socket programming), and design patterns.

Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.

Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.

VM Ware: Installing and Configuring VM ware vSphere ESXi, installing vSphere client, Installing and importing Virtual Machines, Viewing and configuring Virtail Machine hardware

Successfully installed Palo Alto Next-Generation PA-3060, PA-5060 firewalls to protect Data Center with the use of IPS feature.

Working experience with Service now for ticket change management process.

Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized

Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.

Monitoring Network infrastructure using SNMP tools HP NNM, Solar winds and Opnet.

Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, VxLAN, Port security, Trunking, STP, Inter-Vlan routing, LAN security.

Managing data center and network by using Solar winds, NPM, NTA, NCM and F5 load balancer, citrix load balancer also working on troubleshooting.

Performing the ACL requests changes for various clients by collecting source and destination information from them.

Worked on bluecoat web application firewall to improve application performance and to perform health checks on HTTP, HTTPS, TCP, ICAP and ICMP in order to monitor Web content servers.

Involve in creating a Fortinet firewall policy, Secure Email Gateway and web application firewall.

Performing troubleshooting on slow network connectivity issues, routing issues involves OSPF, BGP and identifying the root cause of the issues.

Performed Break Fix support through driving to different buildings, identifying the root cause of the hardware issues with switches, routers.

Design, implementation and operational support of routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.

Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.

Involved in the modification and removal (wherever necessary) of BGP from the MPLS routers.

Worked with Infoblox for secure DNS, DHCP and IPAM.

Involved in IP addresses allocation for all the networking devices including switches, routers, firewalls and F5 load balancers through DNS entry using Infoblox.

Design, install, configure, troubleshoot and maintain varies load balancers including Citrix NetScaler, F5 BIG IP, Riverbed STM.

Maintain, support and deploy Cisco Nexus devices for our Data Center Pod Environment.

Assist in the convergence of an old HP core to the new Cisco Data Center Core Infrastructure.

Configures Cisco Routers, Switches, Modems and Sonic Walls for customer’s locations.

Performed load balancing and application level redundancy by deploying F5 BIG-IP LTM 3900.

Configured switches with port security and 802.1x for enhancing customer’s security.

Monitored network for optimum traffic distribution and load balancing using Solar winds.

Monitoring IP address blocks, Address inventory, DHCP scopes for the inside network infrastructure through IPAM Infoblox.

Validate existing infrastructure and recommend new network designs.

Created scripts to monitor CPU/Memory on various low end routers in the network.

Environment: Cisco2948/3560/4500/3560/3750/3550/3500/2960 6500, Cisco 3640/12000 7200/3845/3600/2800 routers, Fortinet Firewall, Nexus 7K/5K, Cisco ASA 500, Checkpoint, windows server 2003/2008: F5 BIGIP LTM, RIP,OSPF,BGP,EIGRP,LAN,WAN,VPN,HSRP, F5 Load Balancers, Checkpoint

Kering, Secaucus, NJ June 2014 to Aug 2015

Sr. Network Security Engineer

Key Responsibilities:

Installation and maintenance of network infrastructure and Configure, administer, and document firewall infrastructure, working with Checkpoint.

Managed the firewall deployment, rules migrations, and firewall administration and was responsible for converting existing rule base onto new platforms.

Create or update jobs by integrating the Python Scripts as windows batch command in Jenkins Server.

Installation of Palo Alto (Application and URL filtering, Threat Prevention, Data Filtering).

Successfully installed Palo Alto PA-3060 Firewalls to protect Data Center.

Implemented Positive Enforcement Model with the help of Palo Alto Networks.

Exposure to Wildfire feature of Palo Alto.

Implemented Zone-Based Firewalling and Security Rules on the Palo Alto Firewall.

Researched, designed and replaced aging Checkpoint Firewall architecture with new next generation Palo Alto appliances serving as Firewalls and URL and application inspection.

Configured and maintained IPsec and SSL VPN on Palo Alto Firewalls.

Investigation and resolution of 3rd line network support incidents

Management/Troubleshooting on Network/Floating IP, Instance, Image, Ceph

Configuration, support and administration of Palo Alto and Checkpoint and to migrate all gateways and management servers to new hardware and software

Implemented Zone-Based Firewalling and Security Rules on the Palo Alto Firewall.

Researched, designed and replaced aging Checkpoint Firewall architecture with new next generation Palo Alto appliances serving as Firewalls and URL and application inspection.

Configured and maintained IPsec and SSL VPN' s on Palo Alto Firewalls.

Excellent working knowledge, skills and expertise with Fortinet and Palo Alto Firewalls.

Implement and monitor firewalls (Fortinet and Palo Alto) security policies.

Assisted on URL web filtering migration from Blue Coat and Websense to Palo Alto firewalls.

Problem resolution of leveraged and dedicated SIEM Environment.

Hands-on experience on Cisco switches 2960, 3750, 3560, Cisco routers 2821 ISR.

Penetration testing and vulnerability analyses of both internal and external of the networks.

Palo Alto design and installation (Application and URL Filtering, Threat Prevention, Data Filtering).

Successfully achieved main goal of project: Played an Integral role in migrating company's security firewall environment from FortiOS 4.0 firewall platform to FortiGate FG 100D.

Configuring policies on Fortigate and Cisco ASA.

Support all security appliances, blocking and managing attack vector, malicious IPs, URLs, MD5 values and conduct analysis of malicious files and URLs using online tools

Implementation experience of VPN technology on Checkpoint SPLAT platform.

Configured CIDRIP RIP, PPP, BGP and OSPF routing.

Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.

Experience with Nexus models like 7K, 5K, 2Kseries, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches

Design, implementation and operational support of routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.

Deployed 7613 as PE and CE router and Configured and troubleshoot the Edge Routers.

Excellent troubleshooting knowledge on T1, T3, OC-3 and OC-12.

Configuring IPSEC VPN (Site-Site to Remote Access) on Juniper SRX firewalls 210,220 and 240 series and also built chasis clusters on them.

Prepare a replacement strategy for EOS firewalls with Cisco and Juniper.

JuniperSSG550,ISG2K and NS5K Firewall performance and feature testing.

Troubleshoot the Network Issues onsite and remotely depending on the severity of the issues.

Familiar with various MSIT Tools to check Networking Connectivity, Testing, Configuration and Adding or Removal of IP address blocks, Decommissioning or Adding the Devices.

Deploying and decommissioning the TOR switches and their respective software upgrades.

Created Visio Dean / Visio Documentation to give complete picture of network design for each building.

Configured VLAN’s, Private VLAN’s.

Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco ASA5510, Fortinet Firewall FortiGate 5000 series, Nexus 7K / 5K, 2248 / 3560 / 5020 / 6509, ASA, Checkpoint, LAN,OSPF,BGP,RIP,EIGRP Checkpoint, Palo Alto

Guardian Life Insurance, Tempe, AZ Jan 2013 – May 2014

Network Administrator/Engineer

Responsibilities:

Working as Level 3 Network Engineer in On-shore Network Support team which provides Level 3 Network support to Owens-Corning and its various sites Networks across the globe.

Providing Support and Administration for the entire OC project which includes Cisco routers, switches, and access points.

Deployed Cisco ACS using TACACS+ for Authentication, Authorization and Accounting of access to network devices

Providing L3 support for LAN / WAN.

Installed and configured CSPC software on Windows and Linux platform depending on the needs.

Maintained End of Life reports for Cisco prime infrastructure.

Responsible for installing New servers depending on the client needs.

Hands on experience of large scale access points) wireless deployments including device posturing and

profiling with cisco ISE appliance.

Use Infoblox to reserve IP address and subnet in the network.

Hands on experience managing Cisco ISE appliance to support deployment of Network Access Control functionality on LAN switches in an enterprise environment

Performed WAN Optimizations with strict QoS policies for converged voice, video and data traffic and integrated with Net flow tools (OPNET, Manage engine) for the traffic analysis and to optimize the WAN links.

Planned, designed, installed, configured and maintained fiber optic network, wireless Access points of 802.11 a/b/g/n.

Configure Multicasting Protocols like IGMP and CGMP.

Remotely troubleshoot and configure WAN equipment including routers, switches, firewalls, modems (Cisco, Sonic Walls and Juniper)

Configured Cisco switches for L3 and L2 VLANs with HSRP, VTP and EIGRP implementations.

Responsible to provide technical assistance in the CISCO Call Manager environment.

Responsible for voice technology operations based on Cisco VoIP solutions with specific expertise in several areas including Cisco Call Manager, Unity voicemail, Windows Servers, Linux servers and router/switching/gateway telephony technologies

Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.

Configured switches for LAN/WAN, WLANs, Access list, 802.11a/b/g/n/ac, Cisco PRIME, Cisco (MSE).

Identify, design and implement flexible, responsive, and secure technology services

Experience with Firewall Administration, Rule Analysis, Rule Modification

Troubleshoot traffic passing managed firewalls via logs and packet captures

Configured and resolved various OSPF issues in an OSPF multi area environment.

Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team. The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.

Worked with telecom vendors in regards to network fault isolation.

Working with Cisco Nexus fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.

Perform IOS upgrades in Cisco Routers and Switches including Nexus 3K and 5K.

Dealing with Cisco ASA 5550 providing advanced application-aware firewall services with identity-based access control denial of service (DoS) attack protection all built upon market-proven Cisco PIX Security Appliance technology.

Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.

Installed different software on the systems. Install and managing network devices including Hubs, Switches.

Layer 2 switching technology architecture, implementation and operations including L2 and L3 switching and related functionality. This includes the use of VLANS, STP, VTP and their functions as they relate to networking infrastructure requirements including internal and external treatment, configuration and security.

Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.

Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope.

Environment: In Corporate office architecture with highly reliable & secured network including Cisco routers (7200, 3800, 2800) and Cisco switches (6500, 3700, 4900, 2900), Nexus (7K, 5K & 2K) Routing Protocols (EIGRP, OSPF, BGP), Switching protocols (VTP, STP, GLBP, HSRP), Cisco PIX (525, 535), ASA (5505, 5510), FortiGate Firewall 80C, 100d, 1240b on Forti OS5.2., Checkpoint, Palo Alto, Load balancers

Kensium Solutions Pvt Ltd,India Oct 2010 to Dec 2012

Network Engineer

Key Responsibilities:

The client UBS AG, being a very big bank operates from approx. 55 countries across the globe. This comprises of very large and sophisticated network equipment.

The whole network infrastructure of UBS is divided into four regions. APAC, EMEA, AMER and SWISS.

Investment Banking and Wealth Management are the main forms of business across the world, whereas in SWISS, Retail banking is also performed. Hence, the Network infrastructure of Kensium includes RBO’s, ATM’s as well.

We as a part of GNCC are the first point of contact for all Network related issues for UBS.

Using the Netcool/MONDIS infrastructure to monitor all the alerts from various network devices such as Routers, Switches, Firewalls, Load Balancers, Cache Engines, etc. around the Globe.

First level troubleshooting for the Security devices like Firewall, F5 Load Balancers. And escalate it to the next level.

Implemented and Maintained Routing Protocols EIGRP and OSPF in the Network.

Spearheaded meetings & discussions with team members regarding network optimization and regarding BGP issues.

Handled switching related tasks included implementing VLANS, VTP and configuring Fast-Ethernet channel between switches.

Achieved proficient in Adaptive Security Device Manager (SDM) and used it while performing security audit on routers.

Configured Cisco 7204 routers which were also connected to Cisco ASA Firewall (5505) security appliances providing perimeter based firewall security.

Configured Client VPN technologies including Cisco’s VPN client via IPSEC.

Was responsible for designing and implementation of customer’s network infrastructure.

Co-ordinates with Vendors to replace the Faulty Hardware part like Power supply, Fans Sup modules content engines and switches.

Trouble shoot the WAN Issues like site facing slowness issue to use applications.

Co-Ordinate with the vendors/carriers for any WAN related issues, also Performs

Loop testing with Vendors to identify the responsible end of issue.

Works on Live Incidents and Captures troubleshooting data through.

Environment: Net Flow, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, CSM, SUP720, Ether Channels, Cisco 7200/3845/3600/2800 routers, Fluke and Sniffer, Cisco 6509/ 3750/3550/3500/2950 switches,Checkpoint firewalls (SPLAT).

Pioneer e Labs Ltd, Hyderabad, India Nov 2008 to Sep 2010

Network Engineer

Responsibilities:

Experience with Checkpoint Firewall policy provisioning.

Configured and Maintained the Local Network using 2900, 6500 series Switches and 2800 series Routers. Configured and installed the 3600 series Router.

Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewall 5505.

Configured Protocol Handling, Object Grouping and NAT on ASA Firewalls (5505).

Configured Firewall logging, DMZs and related security policies and monitoring.

Designed perimeter security policy; Implemented Firewall ACL’s; Allowed access to specified services; Enabled IDS/IPS signatures in Firewall & fine-tuned TCP & UDP.

Involved in Installing and Configuring a Cisco/Microsoft secure ACS server for AAA authentication (RADIUS/TACACS+).

Used load balancers ACE and load balancing technique with multiple components for efficient performance and to increase reliability through redundancy.

Involved in migration from Frame-Relay/ATM network to MPLS-based VPN for customer’s WAN infrastructure.

Troubleshoot latency and throughput issues on MPLS and Dedicated Internet Access circuits.

Provide high level technical support, including identifying and resolving problems on Cisco supported products for e-Commerce infrastructure. This included external routing and internal/intranet routing for DMZ servers.

Implemented cable multi-service operator (MSO) to capture traditional Telco subscribers with IP telephony and provide relevant QOS.

Configured EIGRP, BGP, and MPLS.

Configured Firewall, QOS by SDM and provide security by Prefix list, Access- List and by Distribution List.

Moved Core switches and several non-Cisco devices under strict deadlines to maintain network functionality

Implemented new ultra-secure networks in multiple data centers that included Cisco, Juniper security devices.

Designed VLAN’s and set up both L2 and L3 logical to have it communicate to the Enterprise network.

Scheduled preventive maintenance for fire-protection systems, including new protocols. Utilize MS

Windows, Word, and Excel for reporting/documenting process.

Satisfactorily Resolved Problems in timely manner with focus on providing a high level of support for all

Customers.

Environment: Cisco 7200/3845/3600/2800 routers, Routing Protocols EIGRP, OSPF, BGP including VPN, MPLS and Ether Channels

Education: Bachelor of Technology in Electronics and Communications Engineering at Jawaharlal Nehru Technological University, Hyderabad, 2008



Contact this candidate