Sign in

Cisco Engineer

Columbus, Ohio, United States
September 25, 2018

Contact this candidate


Career Highlights:

*+ years of hands on experience in Network Engineering, Designing, Integrating, Deploying, Maintaining and Supporting broad range of Communication Systems.

Strong hands on experience in Installing, Troubleshooting, Configuring of Cisco900x, ASR1k, 7200vxr, 3900, 3800, 2900, 2800 series routers and Cisco Catalyst 6500, 4500, 3850T, 3750, 2950 and 3500XL series Switches.

Hands on experience working with Cisco Nexus 7K, 5K & 2K Switches. Configuration of VPC, VDC, Peer Gateway, HSRP and FEX on Nexus family.

Hands on experience in Cisco IOS/IOS-XR/NX-OS, Juniper JUNOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, BGP v4, MPLS, NAT, VLAN, STP, VTP, HSRP & GLBP.

Hands on experience working with Cisco CSR1000v. Experience in fiber channel infrastructure.

Experience with capacity planning, Fiber Channel and mirroring, backup/archive and recovery solutions, high availability, storage consolidation/migration, performance and tuning.

Expert level knowledge of troubleshooting, implementing, optimizing and testing of static and dynamic routing protocols such as EIGRP, OSPF, BGP ability to interpret and resolve complex route table problems.

Design and configure various Azure Networking resources like Azure Virtual Network (VNET), IP addressing scheme, DDoS protection, Subnets, Address Spaces, BGP.

Experience in working with Cisco Identity Services Engine (ISE) and ACS. Worked on Security groups, tags, AAA profiles on ISE.

Cisco ASA Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.

Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series

Extensive Knowledge on the implementation of Cisco ASA 5500 series and Checkpoint R 75 firewalls.

Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series. Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Worked on Windows and Infoblox DNS and DHCP servers. Configuration of Host files, DNS records, IP reservations, configuring scopes.

Worked on Deploying Cisco ACI. Migration from Legacy Data Center Architecture to Spine Leaf Architecture. Experience with VXLAN, EVPN, VTEPS, Bridge Domains, Application Templates. Migrated Nexus 7Ks & Nexus 5Ks to an ACI Fabric consisting of 9336PQ Spines & 9332PQLeafs in a brownfield Datacenter.

Worked on Next Gen Firewall features like URL filtering, SSL Forward Proxy, SSL Decryption, APP ID and ThreatID, Panorama in PA firewalls.

Experience in F5 BIG IP and Cisco ACE Load balancers for load balancing and traffic management of business applications. Migration Experience from ACE to F5.

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability. Experience with Virtual servers, Pools, Monitors, SNAT, proficient in iRule scripting, Persistence, Profiles, WideIP’s, Zones, Listener IP, Static and Dynamic Load balancing techniques on LTM and GTM.

Configured F5 Viprion load balancers for MS Exchange, Skype for Business, Citrix ICA, Airwatch SEG as well as other business applications. Worked on LTM guest Operating Systems and created multiple Route Domains to separate the traffic between different tenants.

Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls(SRX240, SRX550)

In-depth knowledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.

Worked on the design, implementation, and support of IP telephony projects, such as Cisco Unified Communications Manager, Cisco Unified Messaging System, and Cisco Unified Contract Center Express.

Implemented Cisco Unified Communications Manager Applications like CUPS, IPMA, Extension mobility and Attendant console as per customer requirement

Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.

Regularly review the configuration and controls of Palo Alto Networks firewalls and Sourcefire Intrusion Detection System(IDS), further follow up to mitigate the risks.

Experience with Layer 2 and Layer 3 protocols like, FRR CEF, MPLS, Ether Channel VLAN, VTP, VMPS, ISL, dot1q, DTP, Spanning-tree, PVSTF, HSRP, VRRP and GLBP.

Extensive knowledge in all Wi-Fi Standards including 802.11a,b,g,n,ac. Worked on installing of Cisco and Aruba Wireless Controllers. Worked on Cisco CWAP, LAWP, Aruba 225, 325, AP groups, SSID’s, Authentication rules, 802.1X for Wireless etc.


Bachelors in Electronics and Telecommunication. GPA-3.5

University of Mumbai, India


Cisco Certified Network Professional (CCNP)

Cisco Certified Network Associate (CCNA)

Palo Alto Certified.

Technical Skills:

Switch platforms

Cisco 2900XL, 2950, 2960, 3550, 3750, 4500 and 6500, Nexus (2K, 5K, 7K and 9K)

Router platforms

Cisco routers (Cisco900x, ASR1k, 7200vxr, 3900, 3800, 2900, 2800 ) & Cisco Catalyst switches (Catalyst 6500, 4500, 3850T, 3750, 2950 and 3500XL series), Nexus 7K, 5K & 2K.Cisco 2900XL, 2950, 2960, 3550, 3750, 4500 and 6500, Nexus (2K, 5K, 7K and 9K)

Juniper Platforms

SRX, MX, EX, QFX Series Routers and Switches

Networking Concepts

Access-lists, Routing, Switching, Subnetting, Designing, IPSec, VLAN, VPN, MPLS, VoIP.

Networking Protocols


Network Management/Monitoring

Solar winds, Net flow and Cisco prime, Wireshark, TCP Dump, SSL Dump.

Load Balancers

F-5 BIG-IP LTM 6400, 6899, 5000 series, Viprion series, Netscalers, Cisco ACE.

WAN technologies

MPLS, leased lines & exposure to PPP, DS3, T1 /T3, Hub and Spoke environment.

LAN technologies

Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, MST, 802.1Q, 802.1X, GRE tunnels.

Security Protocols

IKE, IPsec, SSL, AAA, Access-lists, prefix-lists, SSL-VPN, NAT/PAT, URL filtering, SSL proxy


Juniper Netscreen 6500, 6000, 5400, Juniper SSG, SRX5600, SRX5800, CheckPoint (NGX, R70 and R75), Cisco Firewalls (ASA 5500, 5506-X, 5580), Palo Alto Networks (PA-2K, PA-4K and PA-5K).

Operating System

Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix


Client: Huntington National Bank, Aug 2017 – Till Date

Location: Columbus, OH

Role: Senior Network Engineer

Description: Maintain, Operate, Design and Troubleshoot Layer 1, 2 and 3 issues. Maintain connectivity from Enterprise to remote sites and to Data centers. Support and Design F5 LTM and GTM for internal and public facing applications. Migration from ASA to PA 5000 series for Perimeter Firewall and Installation of multiple PA firewalls. Network support for Storage and Virtualization teams. Worked on a POC on Cisco ACI. On call rotation for any network issues.


Designing and supporting the consolidation of data centers utilizing Cisco 6500, Nexus 2K, 5K and 7K


Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience on 5500 series Firewalls.

Provided Level-3 Network support for Cisco Switches and Cisco ASA 5500 Series Security.

Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewalls.

Experience in converting PIX rules over to the Cisco ASA solution.

Configure and maintain all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.

Hands on experience on all software blades of Check Point Firewall. 24x7 on-call step-up support as a part of the safety operations team.

Working closely with knowledge center management to investigate the information center sites for cabling necessities of assorted network instrumentation.

Migration from Checkpoint firewall cluster to Cisco ASA 5580 firewalls in a failover pair configuration.

Provided application level redundancy and accessibility by deploying F5 load balancers. LTM and GTM Installation and operation.

Designing and assisting in deploying enterprise wide Network Security and High Availability Solutions for ASA. Experience in threat detection in cisco firepower and FTD.

Worked on Proof of Concept on deploying Cisco ACI. Knowledge and understanding in Spine Leaf Architecture, VXLAN, VTEPS, Application Templates, Bridge Domains, EVPN, MP-BGP etc.

Worked extensively in Configuring, observation and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover demilitarized zone socialization & configuring VLANs/routing/NAT.

Managing a TACACS server for VPN user authentication and network devices authentication.

Performed Imperva Secure Sphere DAM on WAF Health Checks.

Hands-on expertise within the network management of circuit's mistreatment TDM and Frame Relay.

Managing and providing support to numerous project groups with regards to the addition of recent instrumentation like routers switches and firewalls to the DMZs.

Implementing traffic engineering on existing Multiprotocol Label Switching (MPLS) network and Open Shortest Path First (OSPF).

Provided redundancy in a very multi homed Border Gateway Protocol (BGP) network by tunings AS-path.

Handling enterprise outages effectively and driving towards the resolution. Coordination of fault escalations in conjunction with the first high-level technical management of high priority or technically complicated calls.

Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.)

Configured and troubleshooting River bed WAN optimization software to improve the network acceleration at the user end.

Deploy, scale and automate network across multiple global datacenters supporting Amazon Web Services (AWS).

Knowledge and skill of 802.11 a/b/g/n LAN normal for wireless Technology.

Used Cisco ACI Fabric which is based on Cisco Nexus 9000 Series Switches and the Cisco Application Virtual Switch (AVS).

Worked on implementing lab for SDN using Cumulus Linux for test-driving part of DC migration to SDN.

Coordinating, documenting and managing cases and routing support calls with the Tier 1, Tier 2, and Tier 3 Support engineers at HPE and AT&T.

Configure best route map configurations in the new Cisco IOS XR Routing Protocol Language (RPL).

Supporting EIGRP and BGP supported network by partitioning level two & three issues of internal groups & external customers of all locations.

Performing troubleshooting on slow network property problems, routing problems that involves OSPF, BGP and distinctive the foundation reason for the problems.

Extensive active expertise with complicated routed local area network and WAN networks, routers and switches.

Design and Building Software-Defined Data Center environment, including Vmware, VCenter, NSX and Cisco ACI.

Hands-on expertise with Ether Channel, Spanning Tree, Trucking, ACLs, Syslog. Expertise with the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.

Proficiency in configuration of VLAN setup on varied Cisco Routers and Switches.

Work allotted tickets to see the purpose of failure and resolve issues remotely utilizing obtainable tools and different Operation Center resources.

Provide step-up support to L1 members of network team.

Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

Configured Windows Clusters, Windows NLB, H/W Load Balancers (F5, Netscaler). Deployed, configured and troubleshooting runtime errors related to .Net applications on 7.0/7.5 Web Servers and Windows Server 2008/2008 R2 in Dev, QA & Pre-prod environments.

Experience in migrating policies from checkpoint firewall to juniper srx and Cisco ASA to Palo-alto.

Experience with working on firewalls like CISCO ASA 5500 series (5510,5540), JUNIPER SRX series and PALO ALTO (pa-3060, pa-5060), etc.

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, PPP, VPN, Checkpoint, Cisco ASA, AWS, TCL, Riverbed, Clustered SQL server 2014/2012/2008R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003

ATT, Middletown, New Jersey May 2016 – Aug 2017

Senior Network Security Engineer

Description: Migrate from ASA to PA firewalls for Perimeter and Internal Firewalls. Worked on Checkpoint firewalls and Juniper SRX firewalls for the Xerox project. Worked on configuring Site to Site VPN tunnels, security measures and traffic flow analysis from DMZ to Inside and outside zones.


Hands on experience in the configuration, troubleshooting of Juniper SRX firewalls as well as experience working directly with customer in a service/support environment.

Troubleshooting Firewall Connectivity related issues using Smart view tracker on Checkpoint, NSM Log viewer for Juniper Firewalls.

Deployment and Management of Bluecoat proxies in forward proxy scenario as well as for security in reverse proxy scenario.

Demonstrated understanding of network security concepts and systems including F5, WSA, Palo Alto, ASA.

Worked on Blue Coat Proxy SG to safeguard web applications in extremely untrusted environments such as guest Wi-Fi zones.

Performing URL filtering and content filtering by adding URL’s in Bluecoat Proxy SG’s.

Managing & administering Cisco WSA.

Day-to-Day work involves scheduling firewall policy provisioning and working with users to identify connectivity related issues and troubleshoot using both Smart Utilities and CLI.

Active/Standby and Active/Active HA configuration on Cisco ASA and Palo Alto Firewalls.

Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for stateful replication of traffic between active and standby member.

Managing and administering Juniper SRX and Checkpoint Firewalls at various zones including DMZ, Extranet (Various Business Partners) and ASZ and internal.

Expert in Next Gen Firewall Techniques for traffic filtering such as URL Filtering, SSL decryption, Forward proxy, Security policies, Zones, NAT/PAT, ACL, policy-maps etc.

Configured and deployed VPC, VDC, VSS, OTV, FABRIC PATH between Nexus 7010 and Nexus5596, 5548 switches along with FEX2248.

Performing network monitoring, providing analysis using various tools like Wireshark, Riverbed and Solar winds.

Deep understanding of IDS/IPS such as Sourcefire and Foresight.

Assisted with the transition from the current Cisco ASA FW platform to the Cisco Firepower FPR 4150 NGFW

Implementing Security Solutions in Juniper SRX and Netscreen SSG firewalls by using NSM.

Juniper Firewall Policy management using NSM and Screen OS CLI.

Working on the network team to re-route BGP routes during maintenance and FW upgrades.

Cisco ASA security appliances including Sourcefire, Fire POWER services and Fire Sight Management Console.

Configure B2B VPN with various business partners and 3rd parties and troubleshoot VPN Phase 1 and Phase 2 connectivity issues including Crypto map, Encryption Domain, PSK etc.

Implemented configuration back-ups using WinSCP, Cyberfusion to automate the back-up systems with the help of public and private keys.

Follow information security policies, methods, standards, NIST standards, and practices to organize information systems, IT reference material, and interpret regulations.

Monitor Intrusion Detection Systems (IDS) console for active alerts and determine priority of response.

Environment: Cisco ASA5580/5540/5520, Checkpoint R70, R75, R77.20 Gaia, Palo Alto PA-5000/3000, Big IP F5 LTM/GTM, Solarwinds, Nexus switches, TCP/IP, VPN, Cisco Sourcefire, Splunk, Bluecoat Proxy servers, IDS/IPS. SIEM and Monitoring.

Deutsche Bank Oct 2015 – Apr 2016

Piscataway, NJ

Role: Senior Network Engineer

Description: Design and implementation of Nexus 7K devices as part of Data Center migration. Worked on Nexus family and ASA in setting up from scratch, upgrades. Worked on tickets and NOC team in layer 1, 2 and 3 issues in DC.


Responsible for the implementation and maintenance of firewall based security zones (DMZ*s).

Provide support to internal project teams by adding firewalls, switches and routers to managed DMZs.

Configure the layer 2 and layer 3 on Cisco Nexus 7K, 5K, 6509, 9710, 5596 UP, 4500, 3850, 3950, ASR and 2960.

Worked with Checkpoint, Cisco ASA, and Palo Alto Networks solutions.

Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS.

Implementing & Troubleshooting of T1, MUXES, CSU/DSU and data circuits.

Experience on designing and troubleshooting of complex BGP and OSPF routing problems,

Have sound knowledge of Firewall architecture, routing and VPN.

Have experience working on HP Open view Network Node Manager.

Upgrade firewalls in accordance with change management & Document changes to firewalls.

Monitor traffic and access logs in order to troubleshoot network access issues.

Have experience with Cisco Works LAN Management Solution.

Implemented Positive Enforcement Model with the help of Palo Alto Networks.

Experience in migration of Frame-relay based branches to MPLS based technology using multi-layer stackable switch like 6500 series and 2800 series router.

Testing VPC, BGP, OSPF, EIGTP, RIP, SPAN, Sflow, VlanTrunking, SVI and power supplies on Nexus and ASR devices

Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.

Hands on experience with Cisco 3500, 3750, 4500, 6500 series equipment and configuring and deploying and fixing them with various modules like Gig card, VPN SPA card, WIC card.

Cisco IOS experience on 3600/7200 class hardware in complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data center environment.

Involved in configuring IP Quality of service (QoS).

Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.

Experience in designing, installing & configuring of Cisco PIX, ASA & FWSM (Firewall service module).

Evaluate, Analyze & Implement firewall policies to meet business requirements

Experience in creating and maintaining firewall configurations, updating documentation and log analysis.

Worked extensively in configuring, monitoring and troubleshooting Cisco's ASR 5500

Applying crypto maps and security keys for the branches, ISAKMP (Internet security association key management protocol) for establishing Security associations (SA) cryptographic keys.

Experience in configuring routing protocols like EIGRP, RIP v2, OSPF & BGP and Cisco ACS protocols like RADIUS and TACACS.

Experienced in WAN environments, installing and troubleshooting data circuit problems (MPLS, T1).

Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVSTP+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment.

Involved in designing and applying QOS and policy map to 2800 series routers for all the branches.

Involved in designing GRE tunnels for encryption of data flow from source to destination.

Implementing VoIP solutions using SIP & H.323, also have sound knowledge of Avaya VoIP products.

Implemented and deployed VoIP using ASR 1k series SBC (Session Border Controller).

Experience in configuring VLAN’s STP (Spanning tree Protocol) & RTSP (Rapid Spanning Tree Protocol).

Experience with Project documentation tools & implementing and maintaining network monitoring systems (Cisco works & Netinfo, Infoman Virtual Change) and experience with developing network design documentation and presentations using VISIO.

Understanding & Implementation of IPSEC & GRE tunnels in VPN technology.

Environment: Router 2800, 3800, 7200, 7600; Cisco Catalyst Switch 6500, 6509, 3550

Panasonic, Lake Forest, CA Oct 2014 – Sep 2015

Sr Network Engineer.

Role – Worked on Installation of f5 LTM and GTM for the local and Global Load Balancing. Worked on MPLS circuits of Panasonic for remote site connectivity. Worked on routing internally and over WAN and QOS.

§Involved in Design and Implementation of complex networks related to extranet clients.

§Troubleshooting the Network Routing protocols (BGP, EIGRP and RIP) during the Migrations and new client connections.

§Involved in Configuring and implementing of Composite Network models which consists of Cisco7600, 7200, 3800 series routers and Cisco 2950, 3500, 5000, 6500 Series switches.

§Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers. F5 Networks BigIP Load Balancer.

§Extensive use of Checkpoint Smart Console suite (R75.40, R76, Gaia R77.20 & VSX) to manage policies and rule base of security control points, device mapping using network address translation, objects management, routes and other administrative tasks.

§Designed and implemented VLAN using Cisco switch catalyst 1900, 2900, 5000 and 6000 series.

§Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.

§Configuration and maintenance of the routers running on existing EIGRP and BGP protocol with 7200 router and 6500 core. Also configured route filtering using distribute list with route maps and ACL’s.

§Configured BIG IP F5 load balancer for cluster / server farm load balancing to increase resource availability and provide redundancy.

§Configured network access servers and routers for AAA Security (RADIUS/ TACACS+).

§Built site-to-site IPSec VPNs over Frame-relay and MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.

§Manage operational monitoring of equipment capacity/utilization and evaluate the need for upgrades; develop methods for gathering data needed to monitor hardware, software, and communications network performance.

§Worked towards the key areas of the project to meet SLA’s and to ensure business continuity. Involved in meetings with engineering teams to prepare the configurations according to the requirement.

§Creating change tickets according to the scheduled network changes and implementing the changes.

§Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.

§Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope.

§Configured routers and coordinated with LD Carriers and LECs to turn-up new WAN circuits. Configuring, Maintaining the Routers and Switches and Implementation of RIP, EIGRP, OSPF, BGP routing protocols and trouble shooting.

§Experience with Project data and voice documentation tools and experience with developing network design documentation and presentations using VISIO.

§Responsible for configuration and maintenance of a collapsed core network of 90 switches and routers along with maintenance of existing Wireless network.

§Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN.

§Responsible for implementing QOS parameter on switching configuration.

§Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.

§Regularly performed firewall audits around Checkpoint Firewall-1 solutions for customers.

§Provided tier 3 support for CheckPoint Firewall-1 software to support customers.

Environment: F5 Big-IP LTM 3600/6400/8800c Cisco ACE, cisco Nexus 2148/7010/5000, checkpoint IPSO, SolarWinds, CiscoWorks, cisco 6500/3700/7200 routers, PA- 3060 firewalls, Net screen 500, VPN tunnels, MP-BGP, MPLS LDP, Infoblox, EOL, windows server 2012R2, Active Directory

Optum Inc, Boston MA Jan 2013 – Aug 2014

Network Engineer.

Role – worked to Optum Health onsite through Cognizant to support the Design and Architecture of Data Center Access and Distribution layers, WAN connectivity, Eliminating Single point failures. Worked on Juniper, Cisco switches and Router Installations from Scratch. Worked on operational issues on PA and ASA firewalls.

§Installation & Configuring of Cisco 6500, 4500, 2800, 1800 and 1700 series router.

§Installed and configured DNS, DHCP Client/Server.

§Worked on Extensively on Cisco Firewalls, Cisco ASA 5500(5510/5540) Series.

§Gathering application information which are using Splunk tool and analyze their bandwidth traffic.

§Standardized Splunk agent deployment, configuration and maintenance across a variety of UNIX and Windows platforms,

§Responsible for developing and deploying Solar Winds which includes WAN/LAN and server monitoring,

§Reporting, and alerting and Configure Orion alerts.

§Implemented inter-VLAN routing (on Juniper EX 3300 and EX 3400 switches) among the VLANs to allow.

§Projects on Network design, Installation, troubleshooting and suggesting them suitable backup system.

§Worked on Juniper J series j230, M 320 routers and EX 3200 series switch.

§Building configurations for Juniper EX 3300 and EX 4200 switches with features like port security, VLANS, VTP, and PVST+.

§Accountable for ensuring the data center operations meet the functionality and reliability to meet customer Service Level Agreements and expectations.

§Configuring STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.

§Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, NAT, DHCP, TCP/IP).

§Configured Access List (Standard, Extended, and Named) to allow users all over the company to access different applications and blocking others.

§Monitors data center devices, equipment's (HVAC, Servers, other devices) local & remote sites

§Provide visibility and support to the Facilities team when monitoring the Data Center requests.

§Configured Checkpoint and Cisco ASA firewalls to secure the infrastructure for the Data Center.

§Configured VDC (Virtual Device Context) for Nexus 7010 Switch.

§Experience with industry recognized SIEM solutions such as ArcSight, Splunk, LogRhythm, AlienVault, etc

§Provide initial fault isolation, proactive maintenance and monitoring of Company's Network Equipment.

§Perform monitoring and support of internal network security.

§Provide support to internal users and external clients on various hardware and software issues.

§Implemented rules on Juniper SRX 550 at the server farm.

§Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.

§Provided firewall policy configuration and services with Juniper SRX 240 & 650 service gateways.

§Configuring various advanced features (Profiles, monitors, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.

§Worked on physical and virtual networks to provide functionality on additional layers on VMware NSX.

§Monitoring servers like domain controllers, exchange servers and connectivity.

§Managed network connectivity and network SSL Security, between Head offices and Branch office

§Responsible for Internal and external accounts and, managing LAN/WAN and checking for SSL Security Settings of the networking 3750 devices (Cisco Router, switches) co-coordinating with the system/

§Understanding the JUNOS platform and worked with JUNOS upgrade of Juniper devices.

§Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs

§Used load balancers ACE and load balancing technique with multiple components for efficient performance and to increase reliability through redundancy.

§Performed migration of Cisco ACE/GSS onto F5 LTM active/passive pair.

§Troubleshoot on security related issues on JUNIPER SRX/PIX, Checkpoint and IDS/IPS.

§Performed IOS upgrades/Password recover on 2900, 3500 series Cisco Catalyst switches and 1800, 2600, 3600 series Cisco routers using TFTP.

§Implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, and Ether channel, STP, RSTP and MST.

Environment: Cisco routers Series 7200/7600/3800, ASR 7000/9000; Cisco catalyst switches 6500/5000/3500/2950 and Nexus 7K; Junos OS, Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP; VPN, MPLS, HSRP, GLBP, Big-IP F5 LTM Load Balancer, ACE 4400, Ansible, Python scripting, Wireshark, PowerShell, Cisco Works, MS Visio, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy.

Cognizant, Chennai, India Jun 2010 – Dec 2012

Description: Worked to Support the network and troubleshooting issues for OPTUM onsite Data centers and Enterprise offices from Offshore. Worked in Providing connectivity to remote sites, Enterprise buildings, IDF/MDF Architecture, MAC based authentication using ACS. Troubleshooting on OSPF, BGP and VLAN’s.


●Maintaining the Network Infrastructure, Installation, migration and configuration of routers and switches for clients.

●Provide alternative means from dial-up connection to bring down the damage or loss that occurs for the client.

●Configured Routing protocols such as OSPF and policy

Contact this candidate